Skip to main content

Corporate Security and the Stratum of Security Management

  • Chapter
Corporate Security in the 21st Century

Part of the book series: Crime Prevention and Security Management ((CPSM))

Abstract

Security is unpredictable, encompassing multidimensional heterogeneous occupations, skills, and knowledge (Brooks, 2010). The security domain encompasses many parts across its broad spectrum of practice, such as national security, public security, and private security to name only a few. Such diversity makes it difficult to provide a single encompassing definition for these many parts, as definition is dependent on applied context. One such context is corporate security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Aleem, A., Wakefield, A. and M. Button. (2013) ‘Addressing the Weakest Link: Implementing Converged Security.’ Security Journal 26/3: 236–248.

    Article  Google Scholar 

  • ASIS International. (2003) Proceedings of the 2003 Academic/Practitioner Symposium. The University of Maryland, College Park, MD: Author.

    Google Scholar 

  • ASIS International. (2004) Chief Security Officer Guideline. Alexandria, VA: Author.

    Google Scholar 

  • ASIS International. (2009) Executive Summary: 2009 Academic/Practitioner Symposium. Alexandria, VA: Author.

    Google Scholar 

  • Bazzina, M. (2006) Security Standards and Support Systems Report: A Collaborative Project Between the Commonwealth Attorney-General’s Department and Standards Australia. Sydney: Standards Australia International Ltd.

    Google Scholar 

  • Brooks, D.J. (2010) ‘What Is Security: Definition Through Knowledge Categorisation.’ Security Journal 23/3: 225–239.

    Article  Google Scholar 

  • Brooks, D.J. (2013) ‘Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge.’ Asian Journal of Criminology 8/2: 89–101.

    Article  Google Scholar 

  • Brooks, D.J. (2014) ‘Intrusion Detection Systems in the Protection of Assets.’ in M. Gill (ed.) Handbook of Security, 2nd Edition. London: Palgrave Macmillan.

    Google Scholar 

  • Buczynski, K.K. (2011) Strategic Security Management Systems: A Common Framework for Government and Private Sector Organizations. Masters of Security Management, Edith Cowan University: Perth.

    Google Scholar 

  • Cubbage, C. and D.J. Brooks. (2012) Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct. Boca Raton, FL: Taylor and Francis.

    Book  Google Scholar 

  • Daft, R.L. (2012). Management, 10th Edition. Mason, OH: Cengage Learning.

    Google Scholar 

  • Fischer, R.J. and G. Green. (2004). Introduction to Security, 7th Edition. Boston: Butterworth Heinemann.

    Google Scholar 

  • Fischer, R.J., Halibozek, E. and G. Green. (2008) Introduction to Security, 8th Edition. Boston: Butterworth-Heinemann.

    Google Scholar 

  • Gill, M. (2007) ‘The Challenges for the Security Sector: Thinking About Security Research.’ Security Journal 20/1: 27–29.

    Article  Google Scholar 

  • Groysberg, B., Kelly, L.K. and B. MacDonald. (2011) ‘The New Path to the C-suite.’ Harvard Business Review 89/3: 2–10.

    Google Scholar 

  • Hesse, L. and C.L. Smith. (2001) Core Curriculum in Security Science. Paper Presented at the Proceedings of the 5th Australian Security Research Symposium, Perth, Western Australia.

    Google Scholar 

  • IBM. (2008) Global Innovation Outlook: Security and Society. Armonk, NY: International Business Machines Corporation.

    Google Scholar 

  • Kahnemann, D. (2011) Thinking, Fast and Slow. New York: Faaar, Straus and Giroux.

    Google Scholar 

  • Kooi, B.and S. Hinduja. (2008) ‘Teaching Security Courses Experientially.’ Journal of Criminal Justice Education 19/2: 290–307.

    Article  Google Scholar 

  • Kraut, A.I., Pedigo, R., McKenna, D.D. and M.D. Dunnette. (1989) ‘The Role of the Manager: What’s Really Important in Different Management Jobs.’ The Academy of Management Executive 3/4: 286–293.

    Article  Google Scholar 

  • Lippert, R.K., Walby, K. and R. Steckle. (2013) ‘Multiplicities of Corporate Security: Identifying Emerging Types, Trends and Issues.’ Security Journal 26/3: 206–221.

    Article  Google Scholar 

  • McGee, A. (2006) Corporate Security’s Professional Project: An Examination of the Modern Condition of Corporate Security Management, and the Potential for Fur-ther Professionalisation of the Occupation. MSC Thesis, Cranfield University, Bedfordshire.

    Google Scholar 

  • Nalla, M.K. (2001) ‘Designing an Introductory Survey Course in Private Security.’ Journal of Criminal Justice Education 12/1: 35–52.

    Article  Google Scholar 

  • Petersen, K.L. (2013) ‘The Corporate Security Professional: A Hybrid Agent Between Corporate and National Security.’ Security Journal 26/3: 222–235.

    Article  Google Scholar 

  • Robbins, S.P. and D.A. DeCenzon (2005) Fundamentals of Management: Essential Concepts and Applications, 5th Edition. Upper Saddle River, NJ: Pearson Education Inc.

    Google Scholar 

  • Sarre, R. and T. Prenzler. (2011) Private Security and Public Interest: Exploring Private Security Trends and Directions for Reform in the New Era of Plural Policing. Caberra: Australian Research Council.

    Google Scholar 

  • Smith, C.L. (2001) ‘Security Science: An Emerging Applied Science.’ Journal of the Science Teachers Association of Western Australia 37/2: 8–10.

    Google Scholar 

  • Smith, C.L. and D.J. Brooks. (2013) Security Science: The Theory and Practice of Security. Waltham, MA: Elsevier.

    Google Scholar 

  • Talbot, J. and M. Jakeman. (2009) Security Risk Management: Body of Knowledge, 2nd Edition. Hoboken, NJ: John Wiley & Sons.

    Book  Google Scholar 

  • Tate, W. (1997) Report on the Security Industry Training: Case Study of an Emerging Industry. Perth: Western Australian Department of Training, Western Australian Government Publishing.

    Google Scholar 

  • Walby, K. and R. Lippert. (2013) ‘Introduction to Special Issue on New Developments in Corporate Security and Contract Private Security.’ Security Journal 26/3: 201–205.

    Article  Google Scholar 

  • Yates, A. (2007) The Future of Private Security. Canberra: Australian Homeland Security Research Centre.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 David J. Brooks and Jeffrey Corkill

About this chapter

Cite this chapter

Brooks, D.J., Corkill, J. (2014). Corporate Security and the Stratum of Security Management. In: Walby, K., Lippert, R.K. (eds) Corporate Security in the 21st Century. Crime Prevention and Security Management. Palgrave Macmillan, London. https://doi.org/10.1057/9781137346070_12

Download citation

Publish with us

Policies and ethics