Criminals: Suggestions to Improve Security Procedures
Procedure: a formal or official order or way of doing things – a series of actions that need to be completed in order to achieve something.
Security procedures are considered a critical component of an organization’s overall security program (Dunham 2018). They provide guidance on how to implement, enable, and enforce existing security controls and on how to execute security-relevant business processes in a consistent and concerted manner (ibid.). At the same time, they are to be considered controls in their own right. Same as other components of a security program, they require constant fine-tuning in order to remain effective and efficient over time. This entry highlights a number of triggers or incentives for organizations to upgrade existing security procedures or to implement new ones. It further positions script analysis as a promising tool to ensure that controls and procedures remain effective and fit for purpose.
Security Procedures in the Overall...
KeywordsSecurity procedures Controls Procedural change Crime script analysis
- Alexander, D. C., & Alexander, Y. (2002). Terrorism and business. The impact of September 11, 2001. Ardsley: Transnational Publishers.Google Scholar
- Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(6), 1–12.Google Scholar
- Chtioui, T., & Thiéry-Dubuisson, S. (2011). Hard and soft controls: Mind the gap! International Journal of Business, 16(3), 289–302.Google Scholar
- Clarke, R. V. (1997). Introduction. In R. V. Clarke (Ed.), Situational crime prevention. Successful case studies (2nd ed., pp. 1–44). New York: Harrow and Heston.Google Scholar
- Clarke, R. V., & Newman, G. R. (Eds.). (2005). Crime prevention studies volume 18: Designing out crime from products and systems. Monsey: Criminal Justice Press.Google Scholar
- Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies (Vol. 3, pp. 151–196). Monsey: Criminal Justice Press.Google Scholar
- Dunham, R. (2018, March 14). Security procedures – How do they fit into my overall security documentation library? https://linfordco.com/blog/security-procedures/. Accessed 1 Dec 2018.
- Gilmour, N. (2014). Understanding money laundering. A crime script approach. The European Review of Organised Crime, 1(2), 35–56.Google Scholar
- Hornby, A. S. (1995). Oxford advanced learner’s dictionary of current English (5th ed.). Oxford: Oxford University Press.Google Scholar
- Leclerc, B., & Wortley, R. (2014). The reasoning criminal. Twenty-five years on. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 1–11). New York: Routledge.Google Scholar
- Moreto, W. D., & Clarke, R. V. (2014). Script analysis of the transnational illegal market in endangered species. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 209–220). New York: Routledge.Google Scholar
- Oliver, E., & Wilson, J. (1972). Practical security in commerce and industry (2nd ed.). New York/Toronto: Wiley.Google Scholar
- Schank, R. C., & Abelson, R. P. (1977). Scripts, plans, goals and understanding. An inquiry into human knowledge structures. Hillsdale: Lawrence Erlbaum Associates.Google Scholar
- Taylor, O., Keatley, D. A., & Clarke, D. D. (2017). A behavior sequence analysis of perceptions of alcohol-related violence surrounding drinking establishments. Journal of Interpersonal Violence. https://doi.org/10.1177/0886260517702490.
- van Gelder, J.-L., Nee, C., Otte, M., Demetriou, A., van Sintemaartensdijk, I., & van Prooijen, J.-W. (2016). Virtual burglary: Exploring the potential of virtual reality to study burglary in action. Journal of Research in Crime and Delinquency. https://doi.org/10.1177/0022427816663997.CrossRefGoogle Scholar
- Abbott, A. (1995). Sequence analysis: New methods for old ideas. Annual Review of Psychology, 21, 93–113.Google Scholar