Skip to main content
Log in

Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge

  • Published:
Asian Journal of Criminology Aims and scope Submit manuscript

Abstract

Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationships with criminology, facility management, safety, and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts’ view of their practising domain, allows directed tertiary pedagogy, and presents what could be considered the scholarly area of Security Science.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Alruwaii, A., & Brooks, D. J. (2008). Organisational security: a propositional study to map expert knowledge. Proceeding of the 1st Australian Security and Intelligence Conference pp. 4-11). Perth.

  • ASIS International. (2002). Proceedings of the 2002 academic/practitioner symposium. The University of Cincinnati, Ohio: ASIS International

  • ASIS International. (2003). Proceedings of the 2003 academic/practitioner symposium. The University of Maryland, Maryland: ASIS International.

  • ASIS International. (2005). Career opportunities in security. Alexandria: ASIS International.

    Google Scholar 

  • ASIS International. (2009). Security body of knowledge (BoK): Substantive considerations. Unpublished ASIS International Academic/Practitioner Symposium 2009, ASIS International.

  • Australian Security Industry Association. (2008). Security industry overview. Retrieved 2 September, 2008, from http://www.asial.com.au/default.asp?page=%2Fconsumer+information%2Fsecurity+industry+overview

  • Bazzina, M. (2006). Security standards and support systems report: A collaborative project between the Commonwealth Attorney-General's Department and Standards Australia. Sydney: Standards Australia International Ltd.

    Google Scholar 

  • Borg, I., & Groenen, P. J. (2005). Modern multidimensional scaling: theory and applications (2nd ed.). New York: Springer.

  • Bradley, T., & Sedgwick, C. (2009). Policing beyond the police: A "first cut" study of private security in New Zealand. Policing and Society, 19(4), 468–492.

    Article  Google Scholar 

  • Brooks, D. J. (2008). Defining the science of security through knowledge categorisation. Acta Criminologica, CRIMSA Conference Special Edition 2008, 1, 12-23.

  • Brooks, D. J. (2009a). Key concepts in security risk management: A psychometric concept map approach to understanding. Saarbrucken: VDM Verlag.

    Google Scholar 

  • Brooks, D. J. (2009b). What is security: Definition through knowledge categorisation. Security Journal. doi:101057/sj.2008.18,1-15.

  • Calder, J. D. (2007). Been there but going where? assessing old and new agendas in security research and study. Security Journal, 20, 3–8.

    Article  Google Scholar 

  • Cheng, C. C. (2004). Statistical approaches on discriminating spatial variation of species diversity. Botanical Bulletin of Academia Sinica, 45, 339–346.

    Google Scholar 

  • Cohen, L., Manion, L., & Morrison, K. (2002). Research methods in education (5th ed.). London: RoutledgeFalmer.

    Google Scholar 

  • Cox, T. F., & Cox, M. A. A. (2000). Multidimensional scaling: Monographs on statistics and applied probability (2nd ed., Vol. 88). Boca Raton: Chapman & Hall/CRC.

    Book  Google Scholar 

  • Fischer, R. J., & Green, G. (2004). Introduction to security (7th ed.). Boston: Butterworth Heinemann.

    Google Scholar 

  • Giever, D. (2007). Security education - past, present and the future. Security Journal, 20, 23–25.

    Article  Google Scholar 

  • Gill, M. (2007). The challenges for the security sector: thinking about security research. Security Journal, 20, 27–29.

    Article  Google Scholar 

  • Hesse, L., & Smith, C. L. (2001). Core curriculum in security science. Proceedings of the 5th Australian Security Research Symposium pp. 87-104). Perth, Western Australia.

  • Jay, C. (2005). Big debacles help shape a new science. The Australian Financial Review, 17 March 2005, 2.

  • Kooi, B., & Hinduja, S. (2008). Teaching security courses experientially. Journal of Criminal Justice Education, 19(2), 290–307.

    Article  Google Scholar 

  • Manunta, G. (1996). The case against: Private security is not a profession. International Journal of Risk, Security and Crime Prevention, 1(3), 233–240.

    Google Scholar 

  • Martinez-Torres, M. R., Garcia, F. J. B., Marin, S. L. T., & Vazquez, S. G. (2005). A digital signal processing teaching methodology using concept-mapping techniques. IEEE Transactions on Education, 48(3), 422–429.

    Article  Google Scholar 

  • Nalla, M. K. (2001). Designing an introductory survey course in private security. Journal of Criminal Justice Education, 12(1), 35–52.

    Article  Google Scholar 

  • Pennebaker, J. W., Francis, M. E., & Booth, R. J. (2001). Linguistic inquiry and word count (LIWC2001). Mahwah: Erlbaum.

    Google Scholar 

  • Prenzler, T., Earle, K., Sarre, R. (2009). Private security in Australia: Trends and key characteristics. Trends and Issues in Crime and Criminal Justice, no. 374 [Electronic Version]. Retrieved 11 August 2010, from http://www.aic.gov.au/publications/tandi/tandi374.html

  • Prenzler, T., Martin, K., & Sarre, R. (2010). Tertiary education in security and policing in Australia. Asian Journal of Criminology, 5, 1–10. doi:10.1007/s11417-009-9074-7.

    Article  Google Scholar 

  • Sarre, R. (2005). Researching private policing: Challenges and agendas for researchers. Security Journal, 18(3), 57–70.

    Article  Google Scholar 

  • Simonsen, C. E. (1996). The case for: Security management is a profession. International Journal of Risk, Security and Crime Prevention, 1(3), 229–232.

    Google Scholar 

  • Smith, C. L. (2001a). Security science as an applied science? Australian Science Teachers Journal, 47(2), 32–36.

    Google Scholar 

  • Smith, C. L. (2001b). Security science: An emerging applied science. Journal of the Science Teachers Association of Western Australia, 37(2), 8–10.

    Google Scholar 

  • Talbot, J., & Jakeman, M. (2008). SRMBOK: security risk management body of knowledge. Carlton South: Risk Management Institution of Australasia.

    Google Scholar 

  • Tate, P. W. (1997). Report on the security industry training: Case study of an emerging industry. Perth: Western Australian Department of Training. Western Australian Government Publishing.

    Google Scholar 

  • Trochim, W. M. K. (2005b). Concept mapping. Retrieved 28 July 2009, from http://www.socialresearchmethods.net/kb/conmap.htm

  • Trochim, W. M., Cook, J. A., & Setze, R. J. (1994). Using concept mapping to develop a conceptual framework of staff's views of a supported employment program for individuals with severe mental illness. Journal of Consulting and Clinical Psychology, 62(4), 766–775.

    Article  Google Scholar 

  • Turner, P. (2002). Multidimensional scaling analysis of techniques used by physiotherapists in Southeast Australia: A cross-national replication. The Australian Journal of Physiotherapy, 48, 123–130.

    Google Scholar 

  • Wakefield, A. (2007). The study and practice of security: today and tomorrow. Security Journal, 20, 13–14.

    Article  Google Scholar 

  • Yates, A. (2007). The future of private security. Canberra: Australian Homeland Security Research Centre.

    Google Scholar 

  • Young, L. J. (2007). Criminal intelligence and research: An untapped nexus. The Journal of the Australian Institute of Professional Intelligence Officers, 15(1), 75–88.

    Google Scholar 

  • Zedner, L. (2009). Security: Keys ideas in criminology. London: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David J. Brooks.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brooks, D.J. Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge. Asian Criminology 8, 89–101 (2013). https://doi.org/10.1007/s11417-012-9135-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11417-012-9135-1

Keywords

Navigation