SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Corporate Security:
An educational framework of
 integrated knowledge categories

Dr. David Brooks
Security Research Centre (SECAU)
Edith Cowan University, Australia


2009 ASIS International Security Conference
3-5 February 2009
Hong Kong
  Dave Brooks                                 1
Overview
• Understanding security?
• Research questions
• Foundation theories
     – Knowledge structure
     – Multidimensional scaling
• Study design
• Analysis
• Security science framework
Dave Brooks                       2
Understanding Security
• What is security?
• Security industry is broad and multi-
  disciplined
• Security has many layers
• Current international politics has further
  broadened security
• “every time we think we’ve got the
  definition of the security field nailed,
  somebody … starts taking some of the nails
  away” (ASIS International, 2003, p. 10)
Dave Brooks                                3
• Assured freedom from poverty or want       (The Angus & Roberston,
  1992)

• A stable, relatively predictable environment where an
  individual or group may pursue its ends without
  disruption or harm (Fischer & Green 2004, p. 21)
• Provision of private services in the protection of people,
  information and assets (Craighead, 2003)
• National security and the defence of a nation, through
  armed force or the use of force to control a state’s
  citizens (Brooks, 2009)

                 S = f(A, P, T) Si
           where asset (A), protection (P), threat (T)
  Dave Brooks     & situation (Si) (Manunta, 1999)               4
Importance of Definition
•   Career path – compulsory to tertiary
•   Direct higher education
•   Professional bodies
•   Applied research
•   Self regulation
•   Social understanding


Dave Brooks                                5
What is Corporate Security?

    “security cannot be considered singular in
   concept definition, as definition is dependant
                on applied context”
(Brooks, 2009, Security Journal)

• Study extracted 2001 security concepts,
  integrated some into existing models:
   – ASIS Symposium’s
   – Attorney-General’s & Australian Standards
• Outcome - framework of “corporate
  security”, with conceptualisation
                                                 6
Research Questions

• What are the knowledge categories and
  subordinate concepts of security?
• Can a science of security framework be
  developed and presented?




 Dave Brooks                           7
Theoretical Foundation
Cognitive psychology:
• Knowledge is not discovered, but utilises &
  expands existing concepts (Novak & Gowan, 1983)
• Knowledge structure
• Built on previous knowledge
• Categorisation - economised & abstracted
• Expert – novice understanding
• Study tools:
  – Multidimensional Scaling & Linguistic analysis
  Dave Brooks                                   8
Multidimensional Scaling

• Multivariate analysis
• Reduces complex data
• Provides dimensional spatial representation
• Elicits underlying dimensions
• Analysis of judgements (Cox & Cox, 2000)



  Dave Brooks                                9
Initial Analysis
• 104 International tertiary security courses
  critiqued
• 9 Courses selected for content analysis
   & 7 syllabi sourced
• 2001 concepts extraction
• Most common concepts identified using
  Linguistic Inquiry & Word Count (Pennebaker, Francis &
  Booth, 2001)

• Expert validation (N=5)
 Dave Brooks                                         10
Study Methodology




Dave Brooks               11
Extracted Security Categories

 • Criminology            •   Physical security
 • Contingency planning   •   Risk management
 • Facility management    •   Security law
 • Fire science           •   Security management
 • Industrial security    •   Technology
 • Information &
   computer security      • Principles
 • Investigations         • Threats

     Dave Brooks                              12
ASIS Common knowledge categories
       of security model
  • Security             • Fire protection
  • Physical security    • Information
  • Risk management        systems security
  • Emergency/Contin     • Loss prevention
    gency Planning       • Investigations
  • Personnel security    (American Society for Industrial

  • Legal aspects         Security, 2000, p. 87)



  Dave Brooks                                        13
Australian Government:
  Integrated security standards
        framework model




Dave Brooks           (Bazzina, 2006, p. 85)   14
Science of Security Framework




                                15
Psychometric MDS mapping
  of Security Framework




                     27 Australian security
                     experts measured
                     MDS Stress1=0.222
                     α=0.992

                                        16
Science of Security Framework




                                17
Concluding Remarks

• Framework of security presented
• Assist in developing a consensual body
  of knowledge
• Reversed engineered a definition of
  organisational security
• Gained a clear & common understanding?
• Further international research required

Dave Brooks                           18
Thank you
d.brooks@ecu.edu.au   Questions?




                               19
References
American Society for Industrial Security. (2000). Proceedings of the 2000 academic/practitioner
    symposium, The University of Oklahoma, Oklahoma: American Society for Industrial Security.
ASIS International. (2003). Proceedings of the 2003 academic/practitioner symposium, The
    University of Maryland, Maryland: ASIS International.
Bazzina, M. (2006). Security standards and support systems report: A collaborative project
    between the Commonwealth Attorney-General's Department and Standards Australia. Sydney:
    Standards Australia International Ltd.
Brooks, D. J. (2009 in print). What is security: Definition through knowledge categorisation.
    Security Journal.
Craighead, G. (2003). High-rise security and fire life safety. (2nd ed.). Woburn, MA: Butterworth-
    Heinemann.
Cox, T. F. & Cox, M. A. A. (2000). Multidimensional scaling: Monographs on statistics and applied
    probability. London: Chapman & Hall/CRC.
Ferguson, G. (2004, August). Homeland security: Emerging technologies: Policing conference
    returns to Adelaide. Australian Defence Magazine, 12(8), 54.
Fischer, R. J. & Green, G. (2004). Introduction to security. (7th ed.). Boston: Butterworth
    Heinemann.
Novak, J.D. & Gowin, D. B. (1984). Learning how to learn. Cambridge: Cambridge University Press.
Pennebaker, J. W., Francis, M. E. & Booth, R. J. (2001). Linguistic inquiry and word count
    (LIWC2001). Mahwah, NJ: Erlbaum Publishers.
The Angus & Roberston. (1992). Dictionary and thesaurus. Sydney: Harper Collins Publishers.
Yates, A. (2004). Australia's homeland security market and industry's role. Canberra: Australian
    Homeland Security Research Centre.
  Dave Brooks                                                                              20

Weitere ähnliche Inhalte

Ähnlich wie Corporate Security-Training and Education

Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.comDr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.comWilliam Kritsonis
 
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxBachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxwilcockiris
 
Propositional Sudy
Propositional SudyPropositional Sudy
Propositional SudyBBRAES
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesERAUWebinars
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...IOSR Journals
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxAppraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxjewisonantone
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.rNASAPMC
 
Strategic safety managment in construction and engineering
Strategic safety managment in construction and engineeringStrategic safety managment in construction and engineering
Strategic safety managment in construction and engineeringmkpq pasha
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...Max Justice
 
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...William Kritsonis
 
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsMatthew Rosenquist
 
Ins Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer MeetingIns Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer MeetingHoward Hall
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Examkoidis
 

Ähnlich wie Corporate Security-Training and Education (20)

Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.comDr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.com
 
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docxBachelor of Science (Honours) Safety, Health and Environmental Man.docx
Bachelor of Science (Honours) Safety, Health and Environmental Man.docx
 
Propositional Sudy
Propositional SudyPropositional Sudy
Propositional Sudy
 
Erau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degreesErau webinar plus dec 2016 security degrees
Erau webinar plus dec 2016 security degrees
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docxAppraising  Security AssignmentAfter reading Keith Krause and Mi.docx
Appraising  Security AssignmentAfter reading Keith Krause and Mi.docx
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.r
 
Duk goellner seboeck-focus-midterm symposion_march 2012
Duk goellner seboeck-focus-midterm symposion_march 2012Duk goellner seboeck-focus-midterm symposion_march 2012
Duk goellner seboeck-focus-midterm symposion_march 2012
 
Strategic safety managment in construction and engineering
Strategic safety managment in construction and engineeringStrategic safety managment in construction and engineering
Strategic safety managment in construction and engineering
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
Dr. William Allan Kritsonis, Editor-in-Chief, NATIONAL FORUM JOURNALS - www.n...
 
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
 
Ins Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer MeetingIns Talk For 2012 Ans Summer Meeting
Ins Talk For 2012 Ans Summer Meeting
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
 

Mehr von Enterprise Security Risk Management

Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Enterprise Security Risk Management
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Enterprise Security Risk Management
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Enterprise Security Risk Management
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Enterprise Security Risk Management
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantEnterprise Security Risk Management
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Enterprise Security Risk Management
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Enterprise Security Risk Management
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Enterprise Security Risk Management
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Enterprise Security Risk Management
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Enterprise Security Risk Management
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...Enterprise Security Risk Management
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Enterprise Security Risk Management
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantEnterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Enterprise Security Risk Management
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Enterprise Security Risk Management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Enterprise Security Risk Management
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Enterprise Security Risk Management
 

Mehr von Enterprise Security Risk Management (20)

Post Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for TouristsPost Pandemic Travel: Terrorism and Security Risks for Tourists
Post Pandemic Travel: Terrorism and Security Risks for Tourists
 
Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)Critical Infrastructure and Systems of National Significance (Australia)
Critical Infrastructure and Systems of National Significance (Australia)
 
Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...Critical Infrastructure & Systems of National Significance: Security Risk Man...
Critical Infrastructure & Systems of National Significance: Security Risk Man...
 
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
Why drunk driving, untested medicines and wild guesses are SAFER then your tr...
 
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
Sydney terrorism.media fear and facts.security risk management. tony ridley. ...
 
Security risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultantSecurity risk management as a sport.tony ridley.security consultant
Security risk management as a sport.tony ridley.security consultant
 
Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...Security regulation, standards and governance.security risk management.tony r...
Security regulation, standards and governance.security risk management.tony r...
 
Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...Security expert witness.what is it.tony ridley.security risk mangement.securi...
Security expert witness.what is it.tony ridley.security risk mangement.securi...
 
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...Security expert witness.preparations.enquiries.tony ridley.security risk mana...
Security expert witness.preparations.enquiries.tony ridley.security risk mana...
 
Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...Security and risk management. from subject matter expert to business leader.t...
Security and risk management. from subject matter expert to business leader.t...
 
Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...Security and risk management in emerging and developing markets.tony ridley.s...
Security and risk management in emerging and developing markets.tony ridley.s...
 
8 security masters degrees compared.security risk management.tony ridley.se...
8  security  masters degrees compared.security risk management.tony ridley.se...8  security  masters degrees compared.security risk management.tony ridley.se...
8 security masters degrees compared.security risk management.tony ridley.se...
 
Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...Appreciation process.time critical decision making.security risk management.t...
Appreciation process.time critical decision making.security risk management.t...
 
Cheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultantCheap and nasty.security certification.tony ridley.security consultant
Cheap and nasty.security certification.tony ridley.security consultant
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...Fat tail distribution hypothesis.tony ridley.security risk management.securit...
Fat tail distribution hypothesis.tony ridley.security risk management.securit...
 
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
Forecastings.intelligence.predictions.experts.accuracy.security science.risk ...
 
Get to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk managementGet to the point..faster.tony ridley.security risk management
Get to the point..faster.tony ridley.security risk management
 
Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...Educational levels of professionals.a guide.tony ridley.security risk managem...
Educational levels of professionals.a guide.tony ridley.security risk managem...
 
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
Takes a thief to catch a thief.security ethics.tony ridley.security risk mana...
 

Kürzlich hochgeladen

RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 

Kürzlich hochgeladen (20)

RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 

Corporate Security-Training and Education

  • 1. Corporate Security: An educational framework of integrated knowledge categories Dr. David Brooks Security Research Centre (SECAU) Edith Cowan University, Australia 2009 ASIS International Security Conference 3-5 February 2009 Hong Kong Dave Brooks 1
  • 2. Overview • Understanding security? • Research questions • Foundation theories – Knowledge structure – Multidimensional scaling • Study design • Analysis • Security science framework Dave Brooks 2
  • 3. Understanding Security • What is security? • Security industry is broad and multi- disciplined • Security has many layers • Current international politics has further broadened security • “every time we think we’ve got the definition of the security field nailed, somebody … starts taking some of the nails away” (ASIS International, 2003, p. 10) Dave Brooks 3
  • 4. • Assured freedom from poverty or want (The Angus & Roberston, 1992) • A stable, relatively predictable environment where an individual or group may pursue its ends without disruption or harm (Fischer & Green 2004, p. 21) • Provision of private services in the protection of people, information and assets (Craighead, 2003) • National security and the defence of a nation, through armed force or the use of force to control a state’s citizens (Brooks, 2009) S = f(A, P, T) Si where asset (A), protection (P), threat (T) Dave Brooks & situation (Si) (Manunta, 1999) 4
  • 5. Importance of Definition • Career path – compulsory to tertiary • Direct higher education • Professional bodies • Applied research • Self regulation • Social understanding Dave Brooks 5
  • 6. What is Corporate Security? “security cannot be considered singular in concept definition, as definition is dependant on applied context” (Brooks, 2009, Security Journal) • Study extracted 2001 security concepts, integrated some into existing models: – ASIS Symposium’s – Attorney-General’s & Australian Standards • Outcome - framework of “corporate security”, with conceptualisation 6
  • 7. Research Questions • What are the knowledge categories and subordinate concepts of security? • Can a science of security framework be developed and presented? Dave Brooks 7
  • 8. Theoretical Foundation Cognitive psychology: • Knowledge is not discovered, but utilises & expands existing concepts (Novak & Gowan, 1983) • Knowledge structure • Built on previous knowledge • Categorisation - economised & abstracted • Expert – novice understanding • Study tools: – Multidimensional Scaling & Linguistic analysis Dave Brooks 8
  • 9. Multidimensional Scaling • Multivariate analysis • Reduces complex data • Provides dimensional spatial representation • Elicits underlying dimensions • Analysis of judgements (Cox & Cox, 2000) Dave Brooks 9
  • 10. Initial Analysis • 104 International tertiary security courses critiqued • 9 Courses selected for content analysis & 7 syllabi sourced • 2001 concepts extraction • Most common concepts identified using Linguistic Inquiry & Word Count (Pennebaker, Francis & Booth, 2001) • Expert validation (N=5) Dave Brooks 10
  • 12. Extracted Security Categories • Criminology • Physical security • Contingency planning • Risk management • Facility management • Security law • Fire science • Security management • Industrial security • Technology • Information & computer security • Principles • Investigations • Threats Dave Brooks 12
  • 13. ASIS Common knowledge categories of security model • Security • Fire protection • Physical security • Information • Risk management systems security • Emergency/Contin • Loss prevention gency Planning • Investigations • Personnel security (American Society for Industrial • Legal aspects Security, 2000, p. 87) Dave Brooks 13
  • 14. Australian Government: Integrated security standards framework model Dave Brooks (Bazzina, 2006, p. 85) 14
  • 15. Science of Security Framework 15
  • 16. Psychometric MDS mapping of Security Framework 27 Australian security experts measured MDS Stress1=0.222 α=0.992 16
  • 17. Science of Security Framework 17
  • 18. Concluding Remarks • Framework of security presented • Assist in developing a consensual body of knowledge • Reversed engineered a definition of organisational security • Gained a clear & common understanding? • Further international research required Dave Brooks 18
  • 20. References American Society for Industrial Security. (2000). Proceedings of the 2000 academic/practitioner symposium, The University of Oklahoma, Oklahoma: American Society for Industrial Security. ASIS International. (2003). Proceedings of the 2003 academic/practitioner symposium, The University of Maryland, Maryland: ASIS International. Bazzina, M. (2006). Security standards and support systems report: A collaborative project between the Commonwealth Attorney-General's Department and Standards Australia. Sydney: Standards Australia International Ltd. Brooks, D. J. (2009 in print). What is security: Definition through knowledge categorisation. Security Journal. Craighead, G. (2003). High-rise security and fire life safety. (2nd ed.). Woburn, MA: Butterworth- Heinemann. Cox, T. F. & Cox, M. A. A. (2000). Multidimensional scaling: Monographs on statistics and applied probability. London: Chapman & Hall/CRC. Ferguson, G. (2004, August). Homeland security: Emerging technologies: Policing conference returns to Adelaide. Australian Defence Magazine, 12(8), 54. Fischer, R. J. & Green, G. (2004). Introduction to security. (7th ed.). Boston: Butterworth Heinemann. Novak, J.D. & Gowin, D. B. (1984). Learning how to learn. Cambridge: Cambridge University Press. Pennebaker, J. W., Francis, M. E. & Booth, R. J. (2001). Linguistic inquiry and word count (LIWC2001). Mahwah, NJ: Erlbaum Publishers. The Angus & Roberston. (1992). Dictionary and thesaurus. Sydney: Harper Collins Publishers. Yates, A. (2004). Australia's homeland security market and industry's role. Canberra: Australian Homeland Security Research Centre. Dave Brooks 20