Encyclopedia of Security and Emergency Management

Living Edition
| Editors: Lauren R. Shapiro, Marie-Helen Maras

Criminals: Suggestions to Improve Security Procedures

  • Harald HaeltermanEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-69891-5_116-1


Procedure: a formal or official order or way of doing things – a series of actions that need to be completed in order to achieve something.


Security procedures are considered a critical component of an organization’s overall security program (Dunham 2018). They provide guidance on how to implement, enable, and enforce existing security controls and on how to execute security-relevant business processes in a consistent and concerted manner (ibid.). At the same time, they are to be considered controls in their own right. Same as other components of a security program, they require constant fine-tuning in order to remain effective and efficient over time. This entry highlights a number of triggers or incentives for organizations to upgrade existing security procedures or to implement new ones. It further positions script analysis as a promising tool to ensure that controls and procedures remain effective and fit for purpose.

Security Procedures in the Overall...


Security procedures Controls Procedural change Crime script analysis 
This is a preview of subscription content, log in to check access.


  1. Alexander, D. C., & Alexander, Y. (2002). Terrorism and business. The impact of September 11, 2001. Ardsley: Transnational Publishers.Google Scholar
  2. Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(6), 1–12.Google Scholar
  3. Chtioui, T., & Thiéry-Dubuisson, S. (2011). Hard and soft controls: Mind the gap! International Journal of Business, 16(3), 289–302.Google Scholar
  4. Clarke, R. V. (1997). Introduction. In R. V. Clarke (Ed.), Situational crime prevention. Successful case studies (2nd ed., pp. 1–44). New York: Harrow and Heston.Google Scholar
  5. Clarke, R. V., & Newman, G. R. (Eds.). (2005). Crime prevention studies volume 18: Designing out crime from products and systems. Monsey: Criminal Justice Press.Google Scholar
  6. Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies (Vol. 3, pp. 151–196). Monsey: Criminal Justice Press.Google Scholar
  7. Dunham, R. (2018, March 14). Security procedures – How do they fit into my overall security documentation library? https://linfordco.com/blog/security-procedures/. Accessed 1 Dec 2018.
  8. Gilmour, N. (2014). Understanding money laundering. A crime script approach. The European Review of Organised Crime, 1(2), 35–56.Google Scholar
  9. Haelterman, H. (2009). Situational crime prevention and supply chain security: An ex ante consideration of preventive measures. Journal of Applied Security Research, 4, 483–500.CrossRefGoogle Scholar
  10. Haelterman, H. (2011). Re-thinking the cost of supply chain security. Crime, Law and Social Change, 56(4), 389–405.CrossRefGoogle Scholar
  11. Haelterman, H. (2016). Crime script analysis. Preventing crimes against business. London: Palgrave Macmillan.CrossRefGoogle Scholar
  12. Hornby, A. S. (1995). Oxford advanced learner’s dictionary of current English (5th ed.). Oxford: Oxford University Press.Google Scholar
  13. Leclerc, B., & Wortley, R. (2014). The reasoning criminal. Twenty-five years on. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 1–11). New York: Routledge.Google Scholar
  14. Moreto, W. D., & Clarke, R. V. (2014). Script analysis of the transnational illegal market in endangered species. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 209–220). New York: Routledge.Google Scholar
  15. Oliver, E., & Wilson, J. (1972). Practical security in commerce and industry (2nd ed.). New York/Toronto: Wiley.Google Scholar
  16. Schank, R. C., & Abelson, R. P. (1977). Scripts, plans, goals and understanding. An inquiry into human knowledge structures. Hillsdale: Lawrence Erlbaum Associates.Google Scholar
  17. Taylor, O., Keatley, D. A., & Clarke, D. D. (2017). A behavior sequence analysis of perceptions of alcohol-related violence surrounding drinking establishments. Journal of Interpersonal Violence.  https://doi.org/10.1177/0886260517702490.
  18. van Gelder, J.-L., Nee, C., Otte, M., Demetriou, A., van Sintemaartensdijk, I., & van Prooijen, J.-W. (2016). Virtual burglary: Exploring the potential of virtual reality to study burglary in action. Journal of Research in Crime and Delinquency.  https://doi.org/10.1177/0022427816663997.CrossRefGoogle Scholar

Further Reading

  1. Abbott, A. (1995). Sequence analysis: New methods for old ideas. Annual Review of Psychology, 21, 93–113.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Faculty of Law and Criminology – Department of Criminology, Criminal Law and Social LawGhent UniversityGhentBelgium