Skip to main content

The Australian Security Continuum: National and Corporate Security Gaps from a Surveillance Language Perspective

  • Chapter
  • First Online:

Part of the book series: Crime Prevention and Security Management ((CPSM))

Abstract

This chapter presents the concept of surveillance as embedded into the Australian security continuum, arguing there are still significant and challenging gaps in surveillance capabilities and ultimately security. To demonstrate such a security continuum, along with its gaps in efficacy, this chapter draws on variations in the language of surveillance (or concept) to highlight a disconnection across cultural discourses and ultimately states of security. The language of surveillance provides the opportunity to highlight the changing views, needs and applications for the many security continuum actors in the surveillance discourse.

This is a preview of subscription content, log in via an institution.

References

  • ANZPAA. 2014. Australian New Zealand Police: Recommendations for CCTV Systems. Melbourne: Australian New Zealand Policing Advisory Agency.

    Google Scholar 

  • Australian Government. 2013. Guide to Australia’s National Security Capability. Canberra: Australian Government.

    Google Scholar 

  • Bourne, Mike. 2014. Understanding Security. Basingstoke: Palgrave Macmillan.

    Book  Google Scholar 

  • Brooks, David J. 2005. Is CCTV a Social Benefit? A Psychometric Study of Perceived Social Risk. Security Journal 18(2): 19–29.

    Article  Google Scholar 

  • ———. 2013. Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge. Asian Journal of Criminology 8(2): 89–101.

    Article  Google Scholar 

  • Brooks, David J., and Jeffery Corkill. 2012. The Many Languages of CCTV. Australian Security Magazine ASM, 57–59.

    Google Scholar 

  • ———. 2014. Corporate Security and the Stratum of Security Management. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. K. Walby and R.K. Lippert, 216–234. New York: Palgrave Macmillan.

    Google Scholar 

  • Button, Mark. 2008. Doing Security: Critical Reflections and an Agenda for Change. Basingstoke: Palgrave Macmillan.

    Book  Google Scholar 

  • Coole, Michael Patrick. 2015. Physical Security Professional’s Body of Knowledge: A Cultural Domain Analysis of Physical Security’s Knowledge Structure. Doctor of Philosophy, Curtin University of Technology, Perth.

    Google Scholar 

  • Cubbage, Christopher J., and David J. Brooks. 2012. Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct. Boca Raton, FL: Taylor and Francis.

    Book  Google Scholar 

  • Gill, Martin, and Karryn Loveday. 2003. What Do Offenders Think About CCTV? Crime Prevention & Community Safety 5: 17–25.

    Article  Google Scholar 

  • Gill, Martin and Angela Spriggs. 2005. Assessing the Impact of CCTV. Home Office Research Study 292: Home Office Research, Development and Statistics Directorate.

    Google Scholar 

  • Lyon, David. 2007. Surveillance Studies: An Overview. Cambridge: Polity Press.

    Google Scholar 

  • Petersen, Karen L. 2013. The Corporate Security Professional: A Hybrid Agent Between Corporate and National Security. Security Journal 26(3): 222–235.

    Article  Google Scholar 

  • Premier of Western Australia & Cabinet Ministers. 2011. CHOGM 2011. https://www.premier.wa.gov.au/Pages/CHOGM2011.aspx. Accessed 26 May 2015.

  • Prenzler, Tim, Karen Earle, and Rick Sarre. 2009. Private Security in Australia: Trends and Key Characteristics. Trends and Issues in Crime and Criminology 374: 1–6.

    Google Scholar 

  • Sarre, Rick. 2015. Private Security in Australia: Some Legal Musings. Journal of the Australasian Law Teachers Association 3(1/2): 45–54.

    Google Scholar 

  • Sarre, Rick, and Tim Prenzler. 2011. Private Security and Public Interest: Exploring Private Security Trends and Directions for Reform in the New Era of Plural Policing. Caberra: Australian Research Council.

    Google Scholar 

  • Sarre, Rick, David J. Brooks, Clifton Smith, and Rick Draper. 2014. Current and Emerging Technologies Employed to Abate Crime and to Promote Security. In The Routledge Handbook of International Crime and Justice Studies, eds. H.Y. Bersot and B. Arrigo, 327–349. Abington: Routledge.

    Google Scholar 

  • Smith, Clifton, and David J. Brooks. 2013. Security Science: The Theory and Practice of Security. Waltham, MA: Elsevier.

    Google Scholar 

  • Taylor, Emmeline, and Martin Gill. 2014. CCTV: Reflections in Its Use, Abuse and Effectiveness. In The Handbook of Security, 2 edn, ed. M. Gill, 705–726. Basingstoke: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Tow, William, and Brendan Taylor. 2008. What Is Regional Security Architecture? Paper presented at the ISA 2008 Annual Convention, San Francisco.

    Google Scholar 

  • Tzu, Sun. 1971. The Art of War. Stepney, SA: Axiom.

    Google Scholar 

  • Welsh, Brandon C., and David P. Farrington. 2009. Public Area CCTV and Crime Prevention: An Updated Systematic Review and Meta-Analysis. Justice Quarterly 26(4): 716–745.

    Article  Google Scholar 

  • Western Australia Auditor General. 2011. Use of CCTV Equipment and Information. Perth: Author.

    Google Scholar 

  • Western Australia Police. 2015. Blue Iris CCTV Registration. Perth: Author.

    Google Scholar 

  • Wine, Kevin. 2015. Smarter Surveillance: Managing Risk with Business Intelligence. Australian Security Magazine, April/May, 24–25.

    Google Scholar 

  • Zedner, Lucia. 2009. Security: Keys Ideas in Criminology. London: Routledge.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Brooks, D., Corkill, J., Coole, M. (2016). The Australian Security Continuum: National and Corporate Security Gaps from a Surveillance Language Perspective. In: Lippert, R., Walby, K., Warren, I., Palmer, D. (eds) National Security, Surveillance and Terror. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-43243-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43243-4_6

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-43242-7

  • Online ISBN: 978-3-319-43243-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics