SlideShare a Scribd company logo
Corporate Security:
An educational framework of
 integrated knowledge categories

Dr. David Brooks
Security Research Centre (SECAU)
Edith Cowan University, Australia


2009 ASIS International Security Conference
3-5 February 2009
Hong Kong
  Dave Brooks                                 1
Overview
• Understanding security?
• Research questions
• Foundation theories
     – Knowledge structure
     – Multidimensional scaling
• Study design
• Analysis
• Security science framework
Dave Brooks                       2
Understanding Security
• What is security?
• Security industry is broad and multi-
  disciplined
• Security has many layers
• Current international politics has further
  broadened security
• “every time we think we’ve got the
  definition of the security field nailed,
  somebody … starts taking some of the nails
  away” (ASIS International, 2003, p. 10)
Dave Brooks                                3
• Assured freedom from poverty or want       (The Angus & Roberston,
  1992)

• A stable, relatively predictable environment where an
  individual or group may pursue its ends without
  disruption or harm (Fischer & Green 2004, p. 21)
• Provision of private services in the protection of people,
  information and assets (Craighead, 2003)
• National security and the defence of a nation, through
  armed force or the use of force to control a state’s
  citizens (Brooks, 2009)

                 S = f(A, P, T) Si
           where asset (A), protection (P), threat (T)
  Dave Brooks     & situation (Si) (Manunta, 1999)               4
Importance of Definition
•   Career path – compulsory to tertiary
•   Direct higher education
•   Professional bodies
•   Applied research
•   Self regulation
•   Social understanding


Dave Brooks                                5
What is Corporate Security?

    “security cannot be considered singular in
   concept definition, as definition is dependant
                on applied context”
(Brooks, 2009, Security Journal)

• Study extracted 2001 security concepts,
  integrated some into existing models:
   – ASIS Symposium’s
   – Attorney-General’s & Australian Standards
• Outcome - framework of “corporate
  security”, with conceptualisation
                                                 6
Research Questions

• What are the knowledge categories and
  subordinate concepts of security?
• Can a science of security framework be
  developed and presented?




 Dave Brooks                           7
Theoretical Foundation
Cognitive psychology:
• Knowledge is not discovered, but utilises &
  expands existing concepts (Novak & Gowan, 1983)
• Knowledge structure
• Built on previous knowledge
• Categorisation - economised & abstracted
• Expert – novice understanding
• Study tools:
  – Multidimensional Scaling & Linguistic analysis
  Dave Brooks                                   8
Multidimensional Scaling

• Multivariate analysis
• Reduces complex data
• Provides dimensional spatial representation
• Elicits underlying dimensions
• Analysis of judgements (Cox & Cox, 2000)



  Dave Brooks                                9
Initial Analysis
• 104 International tertiary security courses
  critiqued
• 9 Courses selected for content analysis
   & 7 syllabi sourced
• 2001 concepts extraction
• Most common concepts identified using
  Linguistic Inquiry & Word Count (Pennebaker, Francis &
  Booth, 2001)

• Expert validation (N=5)
 Dave Brooks                                         10
Study Methodology




Dave Brooks               11
Extracted Security Categories

 • Criminology            •   Physical security
 • Contingency planning   •   Risk management
 • Facility management    •   Security law
 • Fire science           •   Security management
 • Industrial security    •   Technology
 • Information &
   computer security      • Principles
 • Investigations         • Threats

     Dave Brooks                              12
ASIS Common knowledge categories
       of security model
  • Security             • Fire protection
  • Physical security    • Information
  • Risk management        systems security
  • Emergency/Contin     • Loss prevention
    gency Planning       • Investigations
  • Personnel security    (American Society for Industrial

  • Legal aspects         Security, 2000, p. 87)



  Dave Brooks                                        13
Australian Government:
  Integrated security standards
        framework model




Dave Brooks           (Bazzina, 2006, p. 85)   14
Science of Security Framework




                                15
Psychometric MDS mapping
  of Security Framework




                     27 Australian security
                     experts measured
                     MDS Stress1=0.222
                     α=0.992

                                        16
Science of Security Framework




                                17
Concluding Remarks

• Framework of security presented
• Assist in developing a consensual body
  of knowledge
• Reversed engineered a definition of
  organisational security
• Gained a clear & common understanding?
• Further international research required

Dave Brooks                           18
Thank you
d.brooks@ecu.edu.au   Questions?




                               19
References
American Society for Industrial Security. (2000). Proceedings of the 2000 academic/practitioner
    symposium, The University of Oklahoma, Oklahoma: American Society for Industrial Security.
ASIS International. (2003). Proceedings of the 2003 academic/practitioner symposium, The
    University of Maryland, Maryland: ASIS International.
Bazzina, M. (2006). Security standards and support systems report: A collaborative project
    between the Commonwealth Attorney-General's Department and Standards Australia. Sydney:
    Standards Australia International Ltd.
Brooks, D. J. (2009 in print). What is security: Definition through knowledge categorisation.
    Security Journal.
Craighead, G. (2003). High-rise security and fire life safety. (2nd ed.). Woburn, MA: Butterworth-
    Heinemann.
Cox, T. F. & Cox, M. A. A. (2000). Multidimensional scaling: Monographs on statistics and applied
    probability. London: Chapman & Hall/CRC.
Ferguson, G. (2004, August). Homeland security: Emerging technologies: Policing conference
    returns to Adelaide. Australian Defence Magazine, 12(8), 54.
Fischer, R. J. & Green, G. (2004). Introduction to security. (7th ed.). Boston: Butterworth
    Heinemann.
Novak, J.D. & Gowin, D. B. (1984). Learning how to learn. Cambridge: Cambridge University Press.
Pennebaker, J. W., Francis, M. E. & Booth, R. J. (2001). Linguistic inquiry and word count
    (LIWC2001). Mahwah, NJ: Erlbaum Publishers.
The Angus & Roberston. (1992). Dictionary and thesaurus. Sydney: Harper Collins Publishers.
Yates, A. (2004). Australia's homeland security market and industry's role. Canberra: Australian
    Homeland Security Research Centre.
  Dave Brooks                                                                              20

More Related Content

Similar to Corporate Security-Training and Education

Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.comDr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
William Kritsonis
 
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxBachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
wilcockiris
 
Propositional Sudy
Propositional SudyPropositional Sudy
Propositional SudyBBRAES
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degrees
ERAUWebinars
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
IOSR Journals
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxAppraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
jewisonantone
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.rNASAPMC
 
Duk goellner seboeck-focus-midterm symposion_march 2012
Duk goellner seboeck-focus-midterm symposion_march 2012Duk goellner seboeck-focus-midterm symposion_march 2012
Duk goellner seboeck-focus-midterm symposion_march 2012
Danube University Krems, Centre for E-Governance
 
Strategic safety managment in construction and engineering
Strategic safety managment in construction and engineeringStrategic safety managment in construction and engineering
Strategic safety managment in construction and engineering
mkpq pasha
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
CODE BLUE
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
Max Justice
 
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
William Kritsonis
 
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Matthew Rosenquist
 
Ins Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer MeetingIns Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer Meeting
Howard Hall
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
TI Safe
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
koidis
 

Similar to Corporate Security-Training and Education (20)

Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.comDr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
 
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxBachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
 
Propositional Sudy
Propositional SudyPropositional Sudy
Propositional Sudy
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degrees
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxAppraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.r
 
Duk goellner seboeck-focus-midterm symposion_march 2012
Duk goellner seboeck-focus-midterm symposion_march 2012Duk goellner seboeck-focus-midterm symposion_march 2012
Duk goellner seboeck-focus-midterm symposion_march 2012
 
Strategic safety managment in construction and engineering
Strategic safety managment in construction and engineeringStrategic safety managment in construction and engineering
Strategic safety managment in construction and engineering
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
 
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
 
Ins Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer MeetingIns Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer Meeting
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
 

More from Enterprise Security Risk Management

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
Enterprise Security Risk Management
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
Enterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Enterprise Security Risk Management
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Enterprise Security Risk Management
 

More from Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Recently uploaded

ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 

Recently uploaded (20)

ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 

Corporate Security-Training and Education

  • 1. Corporate Security: An educational framework of integrated knowledge categories Dr. David Brooks Security Research Centre (SECAU) Edith Cowan University, Australia 2009 ASIS International Security Conference 3-5 February 2009 Hong Kong Dave Brooks 1
  • 2. Overview • Understanding security? • Research questions • Foundation theories – Knowledge structure – Multidimensional scaling • Study design • Analysis • Security science framework Dave Brooks 2
  • 3. Understanding Security • What is security? • Security industry is broad and multi- disciplined • Security has many layers • Current international politics has further broadened security • “every time we think we’ve got the definition of the security field nailed, somebody … starts taking some of the nails away” (ASIS International, 2003, p. 10) Dave Brooks 3
  • 4. • Assured freedom from poverty or want (The Angus & Roberston, 1992) • A stable, relatively predictable environment where an individual or group may pursue its ends without disruption or harm (Fischer & Green 2004, p. 21) • Provision of private services in the protection of people, information and assets (Craighead, 2003) • National security and the defence of a nation, through armed force or the use of force to control a state’s citizens (Brooks, 2009) S = f(A, P, T) Si where asset (A), protection (P), threat (T) Dave Brooks & situation (Si) (Manunta, 1999) 4
  • 5. Importance of Definition • Career path – compulsory to tertiary • Direct higher education • Professional bodies • Applied research • Self regulation • Social understanding Dave Brooks 5
  • 6. What is Corporate Security? “security cannot be considered singular in concept definition, as definition is dependant on applied context” (Brooks, 2009, Security Journal) • Study extracted 2001 security concepts, integrated some into existing models: – ASIS Symposium’s – Attorney-General’s & Australian Standards • Outcome - framework of “corporate security”, with conceptualisation 6
  • 7. Research Questions • What are the knowledge categories and subordinate concepts of security? • Can a science of security framework be developed and presented? Dave Brooks 7
  • 8. Theoretical Foundation Cognitive psychology: • Knowledge is not discovered, but utilises & expands existing concepts (Novak & Gowan, 1983) • Knowledge structure • Built on previous knowledge • Categorisation - economised & abstracted • Expert – novice understanding • Study tools: – Multidimensional Scaling & Linguistic analysis Dave Brooks 8
  • 9. Multidimensional Scaling • Multivariate analysis • Reduces complex data • Provides dimensional spatial representation • Elicits underlying dimensions • Analysis of judgements (Cox & Cox, 2000) Dave Brooks 9
  • 10. Initial Analysis • 104 International tertiary security courses critiqued • 9 Courses selected for content analysis & 7 syllabi sourced • 2001 concepts extraction • Most common concepts identified using Linguistic Inquiry & Word Count (Pennebaker, Francis & Booth, 2001) • Expert validation (N=5) Dave Brooks 10
  • 12. Extracted Security Categories • Criminology • Physical security • Contingency planning • Risk management • Facility management • Security law • Fire science • Security management • Industrial security • Technology • Information & computer security • Principles • Investigations • Threats Dave Brooks 12
  • 13. ASIS Common knowledge categories of security model • Security • Fire protection • Physical security • Information • Risk management systems security • Emergency/Contin • Loss prevention gency Planning • Investigations • Personnel security (American Society for Industrial • Legal aspects Security, 2000, p. 87) Dave Brooks 13
  • 14. Australian Government: Integrated security standards framework model Dave Brooks (Bazzina, 2006, p. 85) 14
  • 15. Science of Security Framework 15
  • 16. Psychometric MDS mapping of Security Framework 27 Australian security experts measured MDS Stress1=0.222 α=0.992 16
  • 17. Science of Security Framework 17
  • 18. Concluding Remarks • Framework of security presented • Assist in developing a consensual body of knowledge • Reversed engineered a definition of organisational security • Gained a clear & common understanding? • Further international research required Dave Brooks 18
  • 20. References American Society for Industrial Security. (2000). Proceedings of the 2000 academic/practitioner symposium, The University of Oklahoma, Oklahoma: American Society for Industrial Security. ASIS International. (2003). Proceedings of the 2003 academic/practitioner symposium, The University of Maryland, Maryland: ASIS International. Bazzina, M. (2006). Security standards and support systems report: A collaborative project between the Commonwealth Attorney-General's Department and Standards Australia. Sydney: Standards Australia International Ltd. Brooks, D. J. (2009 in print). What is security: Definition through knowledge categorisation. Security Journal. Craighead, G. (2003). High-rise security and fire life safety. (2nd ed.). Woburn, MA: Butterworth- Heinemann. Cox, T. F. & Cox, M. A. A. (2000). Multidimensional scaling: Monographs on statistics and applied probability. London: Chapman & Hall/CRC. Ferguson, G. (2004, August). Homeland security: Emerging technologies: Policing conference returns to Adelaide. Australian Defence Magazine, 12(8), 54. Fischer, R. J. & Green, G. (2004). Introduction to security. (7th ed.). Boston: Butterworth Heinemann. Novak, J.D. & Gowin, D. B. (1984). Learning how to learn. Cambridge: Cambridge University Press. Pennebaker, J. W., Francis, M. E. & Booth, R. J. (2001). Linguistic inquiry and word count (LIWC2001). Mahwah, NJ: Erlbaum Publishers. The Angus & Roberston. (1992). Dictionary and thesaurus. Sydney: Harper Collins Publishers. Yates, A. (2004). Australia's homeland security market and industry's role. Canberra: Australian Homeland Security Research Centre. Dave Brooks 20