Skip to main content

Criminals: Suggestions to Improve Security Procedures

  • Living reference work entry
  • First Online:
Encyclopedia of Security and Emergency Management
  • 502 Accesses

Definition

Procedure: a formal or official order or way of doing things – a series of actions that need to be completed in order to achieve something.

Introduction

Security procedures are considered a critical component of an organization’s overall security program (Dunham 2018). They provide guidance on how to implement, enable, and enforce existing security controls and on how to execute security-relevant business processes in a consistent and concerted manner (ibid.). At the same time, they are to be considered controls in their own right. Same as other components of a security program, they require constant fine-tuning in order to remain effective and efficient over time. This entry highlights a number of triggers or incentives for organizations to upgrade existing security procedures or to implement new ones. It further positions script analysis as a promising tool to ensure that controls and procedures remain effective and fit for purpose.

Security Procedures in the Overall...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Alexander, D. C., & Alexander, Y. (2002). Terrorism and business. The impact of September 11, 2001. Ardsley: Transnational Publishers.

    Google Scholar 

  • Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(6), 1–12.

    Google Scholar 

  • Chtioui, T., & Thiéry-Dubuisson, S. (2011). Hard and soft controls: Mind the gap! International Journal of Business, 16(3), 289–302.

    Google Scholar 

  • Clarke, R. V. (1997). Introduction. In R. V. Clarke (Ed.), Situational crime prevention. Successful case studies (2nd ed., pp. 1–44). New York: Harrow and Heston.

    Google Scholar 

  • Clarke, R. V., & Newman, G. R. (Eds.). (2005). Crime prevention studies volume 18: Designing out crime from products and systems. Monsey: Criminal Justice Press.

    Google Scholar 

  • Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies (Vol. 3, pp. 151–196). Monsey: Criminal Justice Press.

    Google Scholar 

  • Dunham, R. (2018, March 14). Security procedures – How do they fit into my overall security documentation library? https://linfordco.com/blog/security-procedures/. Accessed 1 Dec 2018.

  • Gilmour, N. (2014). Understanding money laundering. A crime script approach. The European Review of Organised Crime, 1(2), 35–56.

    Google Scholar 

  • Haelterman, H. (2009). Situational crime prevention and supply chain security: An ex ante consideration of preventive measures. Journal of Applied Security Research, 4, 483–500.

    Article  Google Scholar 

  • Haelterman, H. (2011). Re-thinking the cost of supply chain security. Crime, Law and Social Change, 56(4), 389–405.

    Article  Google Scholar 

  • Haelterman, H. (2016). Crime script analysis. Preventing crimes against business. London: Palgrave Macmillan.

    Book  Google Scholar 

  • Hornby, A. S. (1995). Oxford advanced learner’s dictionary of current English (5th ed.). Oxford: Oxford University Press.

    Google Scholar 

  • Leclerc, B., & Wortley, R. (2014). The reasoning criminal. Twenty-five years on. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 1–11). New York: Routledge.

    Google Scholar 

  • Moreto, W. D., & Clarke, R. V. (2014). Script analysis of the transnational illegal market in endangered species. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 209–220). New York: Routledge.

    Google Scholar 

  • Oliver, E., & Wilson, J. (1972). Practical security in commerce and industry (2nd ed.). New York/Toronto: Wiley.

    Google Scholar 

  • Schank, R. C., & Abelson, R. P. (1977). Scripts, plans, goals and understanding. An inquiry into human knowledge structures. Hillsdale: Lawrence Erlbaum Associates.

    Google Scholar 

  • Taylor, O., Keatley, D. A., & Clarke, D. D. (2017). A behavior sequence analysis of perceptions of alcohol-related violence surrounding drinking establishments. Journal of Interpersonal Violence. https://doi.org/10.1177/0886260517702490.

  • van Gelder, J.-L., Nee, C., Otte, M., Demetriou, A., van Sintemaartensdijk, I., & van Prooijen, J.-W. (2016). Virtual burglary: Exploring the potential of virtual reality to study burglary in action. Journal of Research in Crime and Delinquency. https://doi.org/10.1177/0022427816663997.

    Article  Google Scholar 

Further Reading

  • Abbott, A. (1995). Sequence analysis: New methods for old ideas. Annual Review of Psychology, 21, 93–113.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harald Haelterman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Haelterman, H. (2019). Criminals: Suggestions to Improve Security Procedures. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_116-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_116-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics