Skip to main content

Engineering Principles in the Protection of Assets

  • Chapter
The Handbook of Security

Abstract

Security mitigation strategies are being designed, installed and operated in the protection of a diverse range of assets including people, information and physical buildings or sites. Some of these mitigation strategies are informed by risk and are instigated to address a particular threat or to reduce a known vulnerability. Nevertheless, many of these mitigation strategies are put into place with little regard for the greater system, being the organization and/or the security system. Such an approach reduces the ability of security to be effective, a significant issue as security has the capacity to bear multiple meanings (Smith and Brooks, 2013: 6) that result in differing views of what needs to be achieved when providing security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Barton, J. and Haslet, T. (2007). Analysis, Synthesis, Systems Thinking and Scientific Method: Rediscovering the Importance of Open Systems.. Systems Research and Behavioural Science, 24, 143–155.

    Article  Google Scholar 

  • Beard, B. and Brooks, D.J. (2009). Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism. Paper presented at the Proceedings of the 2nd Australian Security and Intelligence Conference, Perth.

    Google Scholar 

  • Bertalanffy, L.V. (1950). The Theory of Open Systems in Physics and Biology.. Science, New Series, 111(2872), 23–29.

    Google Scholar 

  • Bertalanffy, L.V. (1968). General Systems Theory: Foundations, Development, Application. New York: George Braziller, Inc.

    Google Scholar 

  • Brooks, D.J. (2010). What Is Security: Definition Through Knowledge Categorisation.. Security Journal, 23(3), 225–239.

    Article  Google Scholar 

  • Brooks, D.J. (2011). Security Risk Management: A Psychometric Map of Expert Knowledge Structure.. Risk Management: An International Journal, 13(1/2), 17–41. doi: 10.1057/rm.2010.7.

    Article  Google Scholar 

  • Building Technology Division (1997). GSA Security Criteria. Public Building Services, General Services Administration.

    Google Scholar 

  • CCTViNFO (2009). Quadrant Security Completes First UK Installation to Use Cisco Surveillance Technology. Accessed June 13, 2013, from http://www.cctvinfo.com/news_article.aspx?news_id=6686

    Google Scholar 

  • Coole, M. and Brooks, D.J. (2011). Mapping the Organizational Relations Within Physical Security’s Body of Knowledge: A Management Heuristic of Sound Theory and Best Practice. Paper presented at the 4th Australian Security and Intelligence Conference, Perth.

    Google Scholar 

  • Cubbage, C. and Brooks, D.J. (2012). Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct. Boca Raton, FL: Taylor & Francis.

    Book  Google Scholar 

  • Department of Defense (2006). Unified Facilities Criteria: Security Engineering Electronics Security Systems. Author.

    Google Scholar 

  • Dominguez, D., Parks, J., Williams, A. and Washburn, S. (2012). Special Nuclear Material and Critical Infrastructure Security Modeling and Simulation of Physical Protection Systems. Paper presented at the 46th Annual IEEE International Carnahan Conference on Security Technology, Boston.

    Book  Google Scholar 

  • Fischer, R.J. and Green, G. (2004). Introduction to Security. 7th ed. Boston: Butterworth Heinemann.

    Google Scholar 

  • Fischer, R.J., Halibozek, E. and Green, G. (2008). Introduction to Security. 8th ed. Boston: Butterworth-Heinemann.

    Google Scholar 

  • Garcia, M.L. (2008). The Design and Evaluation of Physical Protection Systems. 2nd ed. Burlington, MA: Butterworth-Heinemann.

    Google Scholar 

  • Haimes, Y.Y. (2006). On the Definition of Vulnerabilities in Measuring Risks to Infrastructures.. Risk Analysis, 26(2), 293–296.

    Article  Google Scholar 

  • INCOSE (2006). Systems Engineering Handbook: A Guide for System Life Cycle Processes and Activities. International Council on Systems Engineering.

    Google Scholar 

  • Keren, M. (1979). Ideological Implications of the Use of Open Systems Theory in Political Science.. Behavioural Science, 24, 311–324.

    Article  Google Scholar 

  • Knoke, M.E. (2012). Physical Security: Protection of Assets Manual. Alexandria, VA: ASIS International.

    Google Scholar 

  • Koffka, K. (1963). Principles of Gestalt Psychology. New York: Harcourt, Brace & World Inc.

    Google Scholar 

  • Lord, S. and Nunes-Vaz, R. (2013). Designing and Evaluating Layered Security.. International Journal of Risk Assessment and Management, 17(1), 19–45.

    Article  Google Scholar 

  • Lussier, R.N. (2009). Management Fundamentals: Concepts, Applications, Skills Development, 4th ed. Mason, OH: South-Western Cengage Learning.

    Google Scholar 

  • Manunta, G. and Manunta, R. (2006). Theorizing about Security, in Gill, M. (ed.) The Handbook of Security. New York: Palgrave Macmillan. pp. 629–657.

    Google Scholar 

  • Midgley, G. (2003). Systems Thinking: General Systems Theory, Cybernetics and Complexity. London: Sage.

    Book  Google Scholar 

  • Popper, K. (1963). Conjectures and Refutations: The Growth of Scientific Knowledge. London: Routledge.

    Google Scholar 

  • Rogers, B.B. (2006). Engineering Principles for Security Managers, in Gill, M. (ed.) The Handbook of Security. Basingstoke: Palgrave Macmillan. pp. 66–89.

    Google Scholar 

  • Roper, C.A. (1999). Risk Management for Security Professionals. Woburn, WA: Butterworth Heinermann.

    Google Scholar 

  • Seldon, A. (ed.) (2012). The CCTV Handbook. Randburg: Technews Publishing (Pty) Ltd.

    Google Scholar 

  • Smith, C.L. and Brooks, D.J. (2013). Security Science: The Theory and Practice of Security. Waltham, MA: Elsevier.

    Google Scholar 

  • Standards Australia (2009). AS/NZS ISO31000:2009 Risk Management: Principles and Guidelines. Sydney: Standards Australia International Ltd.

    Google Scholar 

  • Standards Australia (2012). Risk Management: Guidelines on Risk Assessment Techniques. Sydney: Author.

    Google Scholar 

  • Talbot, J. and Jakeman, M. (2009). Security Risk Management: Body of Knowledge. 2nd ed. Hoboken, New Jersey: John Wiley & Sons, Inc.

    Book  Google Scholar 

  • Winston, A. (2009). CCTV Complexity Can Be Repaired. Accessed June 13, 2013, from http://www.bdonline.co.uk/news/international/cctv-complex-can-be-repaired-say-oma/3152195.article

    Google Scholar 

  • Wittgenstein, L. (1953/2001). Philosophical Investigations. Oxford: Blackwell Publishing.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 David Brooks and Clifton L. Smith

About this chapter

Cite this chapter

Brooks, D., Smith, C.L. (2014). Engineering Principles in the Protection of Assets. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_6

Download citation

Publish with us

Policies and ethics