Skip to main content

Where Next for the Professionalization of Security?

  • Chapter
The Handbook of Security

Abstract

The scope of professional practice within security risk management has broadened substantially in the new millennium. As corporations are now operating within an increasingly complex, globalized business environment, they often have to take greater risks in doing so, and rely more on their security departments and other organizational risk management functions to mitigate these. The new millennium has also presented a number of new risks and regulatory requirements affecting business, as highlighted in the research by Briggs and Edwards (2006) on the changing role of corporate security departments. Growing regulatory controls on corporations, following the high-profile collapses of Enron in 2001 and World Com and Tyco in 2002, and heightened concern globally about the problems of bribery, corruption and money laundering have raised the status of organizational risk management within corporate governance structures. The events of 9/11 and subsequent terrorist attacks around the world have signalled that corporations are viable terrorist targets and afforded greater priority to business continuity and crisis management within organizations. Most recently, the increasing threat of cyber-attack and the risks to organizations associated with information security breaches has placed security departments under pressure to integrate their activities better with those of corporate IT departments, in order to address converged security threats (Azeem et al., 2013).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • ASIS Foundation (2009). Compendium of the ASIS Academic/Practitioner Symposium 1997–2008. Alexandria, VA: ASIS International. Accessed December 20, 2013, from http://www.asisonline.org/Membership/Library/Academic-Student-Center/Academic-Practitioner-Symposium.

    Google Scholar 

  • ASIS Foundation (2010). Proceedings of the 2009 Academic/Practitioner Symposium. Alexandria, VA: ASIS International. Accessed December 20, 2013, from http://www.asisonline.org/Membership/Library/Academic-Student-Center/Academic-Practitioner-Symposium.

    Google Scholar 

  • ASIS International (2013a). About ASIS. Alexandria, VA: ASIS International. Accessed December 20, 2013, from http://www.asisonline.org

    Google Scholar 

  • ASIS International (2013b). Code of Ethics. Alexandria, VA: ASIS International. Accessed December 20, 2013, from http://www.asisonline.org/About-ASIS/Pages/Code-of-Ethics.aspx.

    Google Scholar 

  • Australian Government (2010). Protective Security Policy Framework. Canberra: Australian Government. Accessed December 20, 2013, from http://www.ag.gov.au/pspf.

    Google Scholar 

  • Azeem, A., Wakefield, A. and Button, M. (2013). Addressing the Weakest Link: Implementing Converged Security.. Security Journal, 26(3), 236–248.

    Article  Google Scholar 

  • Borodzicz, E. and Gibson, S.D. (2006). Corporate Security Education: Towards Meeting the Challenge.. Security Journal, 19(3), 180–195.

    Article  Google Scholar 

  • Briggs, R. (2005). Joining Forces: From National Security to Networked Security. London: Demos. Accessed December 20, 2013, from http://www.demos.co.uk/publications/joiningforcesbook.

    Google Scholar 

  • Briggs, R. and Edwards, C. (2006). The Business of Resilience: Corporate Security for the 21st Century. London: Demos. Accessed December 20, 2013, from http://www.demos.co.uk/publications/thebusinessofresilience.

    Google Scholar 

  • Brooks, D. (2010). What Is Security? Definition Through Knowledge Categorization.. Security Journal, 23(3), 225–239.

    Article  Google Scholar 

  • Brooks, D. (2013). Corporate Security: Using Knowledge Construction to Define a Practising Body of Knowledge.. Asian Criminology, 8(2), 1–13.

    Article  Google Scholar 

  • Button, M. (2008). Doing Security: Critical Reflections and an Agenda for Change. Basingstoke: Palgrave.

    Book  Google Scholar 

  • Cabinet Office (2010). HMG Security Policy Framework. London: Cabinet Office. Accessed December 20, 2013, from http://www.cabinetoffice.gov.uk/resource-library/security-policy-framework.

    Google Scholar 

  • Chartered Institute of Personnel Development (CIPD) (2011).Competence and Competency Frameworks. London: CIPD.

    Google Scholar 

  • Chartered Security Professionals Registration Authority (2013). Apply. London: CSPRA. Accessed from http://csyp-register.org/apply.

    Google Scholar 

  • Chartered Security Professionals Registration Authority (2013). Register of Chartered Security Professionals Code of Conduct. London: CSPRA. Accessed December 20, 2013, from http://www.csyp-register.org/about.

    Google Scholar 

  • Evetts, J., Mieg, H.A. and Felt, U. (2006). Professionalization, Scientific Expertise, and Elitism: A Sociological Perspective, in Ericsson, K.A., Charness, N., Feltovich, P.J. and Hoffman, R.R. (eds.) The Cambridge Handbook of Expertise and Expert Performance, 105–127. Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Griffiths, M., Brooks, D.J., Corkill, J. (2010). Defining the Security Professional: Definition Through a Body of Knowledge. Proceedings of the 3rd Australian Security and Intelligence Conference, 44–52, Perth.

    Google Scholar 

  • Guardian (2011). Briton Danny Fitzsimons Jailed in Iraq for Contractors’ Murders. February 28. Accessed December 20, 2013, from http://www.guardian.co.uk/world/2011/feb/28/danny-fitzsimons-jailed-iraq-murders.

    Google Scholar 

  • Guardian (2012a). Blackwater Guards Lose Bid to Appeal Charges in Iraqi Civilian Shooting Case. June 5. Accessed December 20, 2013, from http://www.guardian.co.uk/world/2012/jun/05/blackwater-guards-lose-appeal-iraq-shooting.

    Google Scholar 

  • Guardian (2012b). G4S Boss Discovered Olympic Security Guard Shortfall Only a Few Days Ago. July 14. Accessed December 20, 2013, from http://www.guardian.co.uk/sport/2012/jul/14/london-2012-olympic-security-g4s.

    Google Scholar 

  • Guardian (2012c). Surrey Police Shelve Privatisation Plan after G4S Olympic Failure. July 12. Accessed December 20, 2012, from http://www.theguardian.com/uk/2012/jul/12/surrey-police-privatisation-g4s-olympic.

    Google Scholar 

  • Howe, D. (1986). Social Workers and Their Practice in Welfare Bureaucracies. Aldershot: Gower.

    Google Scholar 

  • Larson, M.S. (1977). The Rise of Professionalism: A Sociological Analysis. Berkeley, CA: University of California Press.

    Google Scholar 

  • Livingstone, K. and Hart, J. (2003). The Wrong Arm of the Law? Public Images of Private Security.. Policing and Society: An International Journal of Research and Policy, 13(2), 159–170.

    Article  Google Scholar 

  • McGee, A. (2006). Corporate Security’s Professional Project: An Examination of the Modern Condition of Corporate Security Management, and the Potential for Further Professionalisation of the Occupation. MSc Thesis, Shrivenham: Cranfield University.

    Google Scholar 

  • Nalla, M. K. (2001). Designing an Introductory Survey Course in Private Security.. Journal of Criminal Justice Education, 12(1), 35–52.

    Article  Google Scholar 

  • Reuters (2012). West Midlands Police Latest to Axe Outsourcing Plans. November 22. Accessed December 20, 2013, from http://uk.reuters.com/article/2012/11/22/uk-britain-police-outsourcing-idUKBRE8AL0BB20121122.

    Google Scholar 

  • Rothwell, A. and Arnold, J. (2005). How HR Professionals Rate ‘Continuing Professional Development’.. Human Resource Management Journal, 15(3), 18–32.

    Article  Google Scholar 

  • Scott, D., Brown, A., Lunt, I. and Thorne, L. (2004). Professional Doctorates: Integrating Professional and Academic Knowledge. Maidenhead: Open University Press.

    Google Scholar 

  • Sennewald, C.A. (2011). Effective Security Management. 5th ed. Burlington, MA: Butterworth-Heinemann.

    Google Scholar 

  • Shepherd, M. and Atkinson, R. (2011). Project Management Bodies of Knowledge; Conjectures and Refutations.. The Electronic Journal of Business Research Methods, 9(2), 152–158.

    Google Scholar 

  • Simonsen, C. (1996). The Case for: Security Management Is a Profession.. International Journal of Risk, Security and Crime Prevention, 1(3), 229–232.

    Google Scholar 

  • Talbot, J. and Jakeman, M. (2009). Security Risk Management Body of Knowledge. Hoboken, NJ: Wiley.

    Book  Google Scholar 

  • Wakefield, A. and Button, M. (2013). New Perspectives on Police Education and Training: Lessons from the Private Security Sector, in Stanislas, P. (ed.) International Perspectives on Police Education and Training. London: Routledge.

    Google Scholar 

  • Wakefield, A. and Prenzler, T. (2009). Privatization, in Wakefield, A. and Fleming, J. (eds.) The Sage Dictionary of Policing. London: Sage.

    Chapter  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Alison Wakefield

About this chapter

Cite this chapter

Wakefield, A. (2014). Where Next for the Professionalization of Security?. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_41

Download citation

Publish with us

Policies and ethics