Abstract
Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationships with criminology, facility management, safety, and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts’ view of their practising domain, allows directed tertiary pedagogy, and presents what could be considered the scholarly area of Security Science.
Similar content being viewed by others
References
Alruwaii, A., & Brooks, D. J. (2008). Organisational security: a propositional study to map expert knowledge. Proceeding of the 1st Australian Security and Intelligence Conference pp. 4-11). Perth.
ASIS International. (2002). Proceedings of the 2002 academic/practitioner symposium. The University of Cincinnati, Ohio: ASIS International
ASIS International. (2003). Proceedings of the 2003 academic/practitioner symposium. The University of Maryland, Maryland: ASIS International.
ASIS International. (2005). Career opportunities in security. Alexandria: ASIS International.
ASIS International. (2009). Security body of knowledge (BoK): Substantive considerations. Unpublished ASIS International Academic/Practitioner Symposium 2009, ASIS International.
Australian Security Industry Association. (2008). Security industry overview. Retrieved 2 September, 2008, from http://www.asial.com.au/default.asp?page=%2Fconsumer+information%2Fsecurity+industry+overview
Bazzina, M. (2006). Security standards and support systems report: A collaborative project between the Commonwealth Attorney-General's Department and Standards Australia. Sydney: Standards Australia International Ltd.
Borg, I., & Groenen, P. J. (2005). Modern multidimensional scaling: theory and applications (2nd ed.). New York: Springer.
Bradley, T., & Sedgwick, C. (2009). Policing beyond the police: A "first cut" study of private security in New Zealand. Policing and Society, 19(4), 468–492.
Brooks, D. J. (2008). Defining the science of security through knowledge categorisation. Acta Criminologica, CRIMSA Conference Special Edition 2008, 1, 12-23.
Brooks, D. J. (2009a). Key concepts in security risk management: A psychometric concept map approach to understanding. Saarbrucken: VDM Verlag.
Brooks, D. J. (2009b). What is security: Definition through knowledge categorisation. Security Journal. doi:101057/sj.2008.18,1-15.
Calder, J. D. (2007). Been there but going where? assessing old and new agendas in security research and study. Security Journal, 20, 3–8.
Cheng, C. C. (2004). Statistical approaches on discriminating spatial variation of species diversity. Botanical Bulletin of Academia Sinica, 45, 339–346.
Cohen, L., Manion, L., & Morrison, K. (2002). Research methods in education (5th ed.). London: RoutledgeFalmer.
Cox, T. F., & Cox, M. A. A. (2000). Multidimensional scaling: Monographs on statistics and applied probability (2nd ed., Vol. 88). Boca Raton: Chapman & Hall/CRC.
Fischer, R. J., & Green, G. (2004). Introduction to security (7th ed.). Boston: Butterworth Heinemann.
Giever, D. (2007). Security education - past, present and the future. Security Journal, 20, 23–25.
Gill, M. (2007). The challenges for the security sector: thinking about security research. Security Journal, 20, 27–29.
Hesse, L., & Smith, C. L. (2001). Core curriculum in security science. Proceedings of the 5th Australian Security Research Symposium pp. 87-104). Perth, Western Australia.
Jay, C. (2005). Big debacles help shape a new science. The Australian Financial Review, 17 March 2005, 2.
Kooi, B., & Hinduja, S. (2008). Teaching security courses experientially. Journal of Criminal Justice Education, 19(2), 290–307.
Manunta, G. (1996). The case against: Private security is not a profession. International Journal of Risk, Security and Crime Prevention, 1(3), 233–240.
Martinez-Torres, M. R., Garcia, F. J. B., Marin, S. L. T., & Vazquez, S. G. (2005). A digital signal processing teaching methodology using concept-mapping techniques. IEEE Transactions on Education, 48(3), 422–429.
Nalla, M. K. (2001). Designing an introductory survey course in private security. Journal of Criminal Justice Education, 12(1), 35–52.
Pennebaker, J. W., Francis, M. E., & Booth, R. J. (2001). Linguistic inquiry and word count (LIWC2001). Mahwah: Erlbaum.
Prenzler, T., Earle, K., Sarre, R. (2009). Private security in Australia: Trends and key characteristics. Trends and Issues in Crime and Criminal Justice, no. 374 [Electronic Version]. Retrieved 11 August 2010, from http://www.aic.gov.au/publications/tandi/tandi374.html
Prenzler, T., Martin, K., & Sarre, R. (2010). Tertiary education in security and policing in Australia. Asian Journal of Criminology, 5, 1–10. doi:10.1007/s11417-009-9074-7.
Sarre, R. (2005). Researching private policing: Challenges and agendas for researchers. Security Journal, 18(3), 57–70.
Simonsen, C. E. (1996). The case for: Security management is a profession. International Journal of Risk, Security and Crime Prevention, 1(3), 229–232.
Smith, C. L. (2001a). Security science as an applied science? Australian Science Teachers Journal, 47(2), 32–36.
Smith, C. L. (2001b). Security science: An emerging applied science. Journal of the Science Teachers Association of Western Australia, 37(2), 8–10.
Talbot, J., & Jakeman, M. (2008). SRMBOK: security risk management body of knowledge. Carlton South: Risk Management Institution of Australasia.
Tate, P. W. (1997). Report on the security industry training: Case study of an emerging industry. Perth: Western Australian Department of Training. Western Australian Government Publishing.
Trochim, W. M. K. (2005b). Concept mapping. Retrieved 28 July 2009, from http://www.socialresearchmethods.net/kb/conmap.htm
Trochim, W. M., Cook, J. A., & Setze, R. J. (1994). Using concept mapping to develop a conceptual framework of staff's views of a supported employment program for individuals with severe mental illness. Journal of Consulting and Clinical Psychology, 62(4), 766–775.
Turner, P. (2002). Multidimensional scaling analysis of techniques used by physiotherapists in Southeast Australia: A cross-national replication. The Australian Journal of Physiotherapy, 48, 123–130.
Wakefield, A. (2007). The study and practice of security: today and tomorrow. Security Journal, 20, 13–14.
Yates, A. (2007). The future of private security. Canberra: Australian Homeland Security Research Centre.
Young, L. J. (2007). Criminal intelligence and research: An untapped nexus. The Journal of the Australian Institute of Professional Intelligence Officers, 15(1), 75–88.
Zedner, L. (2009). Security: Keys ideas in criminology. London: Routledge.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Brooks, D.J. Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge. Asian Criminology 8, 89–101 (2013). https://doi.org/10.1007/s11417-012-9135-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11417-012-9135-1