Mapping the organizational relations within physical security’s body of knowledge: a management heuristic of sound theory and best practice

Document Type

Conference Proceeding

Publisher

secau, Edith Cowan University

Editor(s)

David Brooks and Craig Valli

Faculty

Faculty of Computing, Health and Science

School

School of Computer and Security Science / Security Research Centre (secAU)

RAS ID

12245

Comments

Coole, M. P., & Brooks, D. J. (2011). Mapping the organizational relations within physical security's body of knowledge: A management heuristic of sound theory and best practice. Paper presented at the Australian Security and Intelligence Conference. Perth, Western Australia. Available here

Abstract

Security Science education at university levels is still in its infancy, with little agreement towards knowledge, curriculum and competency. Therefore, it is essential that educators draw on relevant literature highlighting means of efficient and effective knowledge transfer for tertiary students within the Security Science domain. Such knowledge transfer will reduce the gap between academic knowledge (explicit) and professional competency (tacit knowledge). This paper presents phase one of a multiphase study. A qualitative “systems based knowledge structure” of security domain categories has been conceptually mapped as a domain heuristic. The heuristic drew on research highlighting that experts have both richer depths of domain knowledge and superior cross referenced organizational structure. The conceptual map takes a topdown approach bounded by routine activity, rational choice, situational crime prevention, defence in depth, security decay and management theories within the elements of prevention, preparedness, response and recovery. Results indicate that within a systems approach, core security professional competencies relate to the ability to skilfully apply the theories and best practice principles represented within the preliminary heuristic that brings together academic theory with practising security strategies.

DOI

10.4225/75/57a012aaac5c3

Access Rights

free_to_read

Share

 
COinS
 

Link to publisher version (DOI)

10.4225/75/57a012aaac5c3