Mapping the organizational relations within physical security's body of knowledge: a management heuristic of sound theory and best practice

Security Science education at university levels is still in its infancy, with little agreement towards knowledge, curriculum and competency. Therefore, it is essential that educators draw on relevant literature highlighting means of efficient and effective knowledge transfer for tertiary students within the Security Science domain. Such knowledge transfer will reduce the gap between academic knowledge (explicit) and professional competency (tacit knowledge). This paper presents phase one of a multiphase study. A qualitative “systems based knowledge structure” of security domain categories has been conceptually mapped as a domain heuristic. The heuristic drew on research highlighting that experts have both richer depths of domain knowledge and superior cross referenced organizational structure. The conceptual map takes a topdown approach bounded by routine activity, rational choice, situational crime prevention, defence in depth, security decay and management theories within the elements of prevention, preparedness, response and recovery. Results indicate that within a systems approach, core security professional competencies relate to the ability to skilfully apply the theories and best practice principles represented within the preliminary heuristic that brings together academic theory with practising security strategies.

[1]  J. Talbot,et al.  Security Risk Management Body of Knowledge , 2009 .

[2]  Mark T. Keane,et al.  Cognitive Psychology: A Student's Handbook , 1990 .

[3]  Jd Williams Design Considerations for High-Security Interior Intrusion Detection Systems , 1981 .

[4]  Suleiman K. Kassicieh,et al.  Proposed design of a DSS for the justification of advanced manufacturing technologies , 1993 .

[5]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[6]  Mohammed Ketel IT security risk management , 2008, ACM-SE 46.

[7]  Ronald V. Clarke,et al.  “Situational” Crime Prevention: Theory and Practice , 1980 .

[8]  Lawrence J. Fennelly Effective Physical Security , 2004 .

[9]  D. Bao Technical management notes , 1986, IEEE Transactions on Engineering Management.

[10]  D. Schoen,et al.  The Reflective Practitioner: How Professionals Think in Action , 1985 .

[11]  Mark T. Keane,et al.  Cognitive psychology: A student's handbook, 7th ed. , 2015 .

[12]  Ira S. Winkler,et al.  What is Security , 2007 .

[13]  R. J. Bogumil,et al.  The reflective practitioner: How professionals think in action , 1985, Proceedings of the IEEE.

[14]  Harold L. Wilensky,et al.  The Professionalization of Everyone? , 1964, American Journal of Sociology.

[15]  Geoff Craighead,et al.  High Rise Security and Fire Life Safety , 1995 .

[16]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[17]  P. Marsh Security in buildings , 1985 .

[18]  Michelene T.H. Chi,et al.  EXPERTISE , 2009, Palliative and Supportive Care.

[19]  J. Novak,et al.  Educational Psychology: A Cognitive View , 1969 .

[20]  L. Wood,et al.  Graduate Skills in Business Learning , 2011 .

[21]  Charles A. Sennewald,et al.  Effective Security Management , 1978 .

[22]  Karen Little,et al.  Security, ID Systems and Locks: The Book on Electronic Access Control , 1997 .

[23]  E. Borodzicz,et al.  Corporate Security Education: Towards Meeting the Challenge , 2006 .

[24]  Edward P. Halibozek,et al.  Introduction to Security , 1975 .

[25]  Bm Cohn Reconciling Fire Safety and Security Requirements for Buildings , 1981 .

[26]  Pinata Winoto Controlling malevolent behavior in open multi-agent systems by means of deterrence theory , 2003, IEEE/WIC International Conference on Intelligent Agent Technology, 2003. IAT 2003..

[27]  Robert N. Lussier,et al.  Management Fundamentals: Concepts, Applications, Skill Development , 2002 .

[28]  David J Brooks,et al.  What is security: Definition through knowledge categorization , 2010 .

[29]  E. Yalow Educational psychology: A cognitive view. 2nd ed. , 1978 .

[30]  Russell L. Bintliff The complete manual of corporate and industrial security , 1992 .

[31]  Mahesh K. Nalla,et al.  Assessing the Scope of Corporate Security: Common Practices and Relationships with Other Business Functions , 2002 .