Skip to main content

Physical Security: Best Practices

  • Living reference work entry
  • First Online:
  • 302 Accesses

Definition

Best practice in physical security is the professional use of a systems approach, comprising accurate threat and risk assessments (diagnosis), an aligned protection strategy based on sound theory and security principles (inference), and a mitigation system (treatment) that fulfils operational requirements accordant with legislation, standards, and engineering practice to manage the protection of assets, information, and personnel from damage, loss, or unauthorized access against internal and external threats.

Introduction

It is the duty, as a standard of care, for professionals to exercise diligence in their application of standardized expertise when carrying out work, where professional competence (duty) is judged against the state of knowledge that exists in the form of published methodologies, standards, codes, and research. Consequently, professionals should exercise their professional duty accordant with best practice in order to meet their duty of care obligations in...

This is a preview of subscription content, log in via an institution.

References

  • Abbott. (1988). The system of professions: An essay on the division of expert labor. Chicago: The University of Chicago Press.

    Book  Google Scholar 

  • American Institute of Architects. (2003). Security planning and design: A guide for architects and building design professionals. Hoboken: Wiley.

    Google Scholar 

  • ASIS International. (2015). Physical security principles. Alexandria: ASIS International.

    Google Scholar 

  • Atlas, R. I. (1981). Crime prevention through building codes. In J. Stroik (Ed.), Building security ASTM STP 729 (pp. 88–97). Baltimore: American Society for Testing and Materials.

    Chapter  Google Scholar 

  • Bertalanffy, L. V. (1950). An outline of general systems theory. The British Society for the Philosophy of Science, 1(2), 134–165.

    Article  Google Scholar 

  • Clarke, R. V. G. (1980). Situational crime prevention: Theory and practice. The British Journal of Criminology, 20(2), 136–147.

    Article  Google Scholar 

  • Coole, M. P. (2010). Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems. Masters of Science, Edith Cowan University.

    Google Scholar 

  • Coole, M., Brooks, D. J., & Minnaar, A. (2018). Educating the physical security professional: Developing a science-based curriculum. Security Journal, 31(2), 524–547.

    Article  Google Scholar 

  • Craighead, G. (2003). High-rise security and fire life safety (2nd ed.). Woburn: Butterworth-Heinemann.

    Google Scholar 

  • Dandy, G., Daniell, T., Foley, B., & Warner, R. (2018). Planning and design of engineering systems (3rd ed.). Boca Raton: CRC Press.

    Google Scholar 

  • Fennelly, L. J. (2003). Effective physical security (4th ed.). Waltham: Butterworth-Heinemann.

    Google Scholar 

  • Fennelly, L. J., & Crowe, T. (2013). Crime prevention through environmental design (3rd ed.). Oxford: Elsevier Science & Technology.

    Google Scholar 

  • Fischer, R. J., Halibozek, E., & Green, G. (2008). Introduction to security (8th ed.). Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Garcia, M. L. (2008). The design and evaluation of physical protection systems. Boston: Butterworth-Heinemann.

    Book  Google Scholar 

  • Higgins, C. E. (1989). Utility security operations management: For gas, water, electric and nuclear utilities. Illinois: Charles C Thomas Publisher.

    Google Scholar 

  • ISO. (2018). ISO 31000 risk management – guidelines. Geneva: International Organization for Standardization.

    Google Scholar 

  • Jacobs, J. (1961). The death and life of great American cities. New York: Modern Library.

    Google Scholar 

  • Lab, S. P. (2014). Crime prevention: Approaches, practices and evaluations (8th ed.). Waltham: Elsevier.

    Google Scholar 

  • Newman, O. (1972). Defensible space: People and design in the violent city. London: Architectual Press.

    Google Scholar 

  • Parker, M. (Ed.). (2007). Dynamic security: The democratic therapeutic community in prison. London: Jessica Kingsley.

    Google Scholar 

  • Sennewald, C. A. (2013). Security consulting (4th ed.). Waltham: Butterworth-Heinemann.

    Google Scholar 

  • Smith, C. L. (2003). Understanding concepts in the defence in depth strategy. School of Engineering and Mathematics. Edith Cowan University, Perth.

    Google Scholar 

  • Smith, C. L., & Brooks, D. J. (2013). Security science: The theory and practice of security. Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Standards Australia. (2006). AS/NZS HB167, security risk management. Canberra: Standards Australia.

    Google Scholar 

  • Talbot, J., & Jakeman, M. (2009). Guide to SRMBOK physical security specifications and postures. Canberra: Jakeman Business Solutions.

    Google Scholar 

  • The American Institute of Architects. (2004). Security Planning and Design: A guide for architects and building design professionals. Hoboken, NJ: John Wiley & Sons.

    Google Scholar 

  • Underwood, G. (1984). The security of buildings. London: Butterworths.

    Google Scholar 

  • Williams, J. D. (1981). Design considerations for high-security interior intrusion detection systems. In J. Stroik (Ed.), Building security ASTM STP 729 (pp. 140–176). Baltimore: American Society for Testing and Materials.

    Chapter  Google Scholar 

  • Wyss, G. D. (2009). Quantifying the degree of balance in physical protection systems. Presented at the INMM 50th annual conference, Tucson, AZ: U.S. Deptartment of Energy.

    Google Scholar 

  • Zipser, B. (1999). Professionals and the standard of care. Torts Law Journal, 7(2), 167.

    Google Scholar 

Further Readings

  • ASIS International. (2009). Facilities physical security measures guideline. Alexandria: ASIS International.

    Google Scholar 

  • Attorney-General’s Department. (2015). Physical security management guidelines: Security zones and risk mitigation control measures. Barton: Australian Government.

    Google Scholar 

  • O’Shea, L. S., & Awwad-Rafferty, R. (2009). Design and security in the built environment. New York: Fairchild Books.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael P. Coole .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Coole, M.P., Brooks, D.J. (2019). Physical Security: Best Practices. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_220-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_220-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics