Security Science
eBook - ePub

Security Science

The Theory and Practice of Security

Clifton Smith,David J Brooks

  1. 280 Seiten
  2. English
  3. ePUB (handyfreundlich)
  4. Über iOS und Android verfügbar
eBook - ePub

Security Science

The Theory and Practice of Security

Clifton Smith,David J Brooks

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application of the scientific method to the increasingly challenging tasks of preventing crime and foiling terrorist attacks. Incorporating the latest security theories and principles, it considers security from both a national and corporate perspective, applied at a strategic and tactical level. It provides a rational basis for complex decisions and begins the process of defining the emerging discipline of security science.

  • A fresh and provocative approach to the key facets of security
  • Presentation of theories and models for a reasoned approach to decision making
  • Strategic and tactical support for corporate leaders handling security challenges
  • Methodologies for protecting national assets in government and private sectors
  • Exploration of security's emerging body of knowledge across domains

Häufig gestellte Fragen

Wie kann ich mein Abo kündigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kündigen“ – ganz einfach. Nachdem du gekündigt hast, bleibt deine Mitgliedschaft für den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich Bücher herunterladen?
Derzeit stehen all unsere auf Mobilgeräte reagierenden ePub-Bücher zum Download über die App zur Verfügung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die übrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den Aboplänen?
Mit beiden Aboplänen erhältst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst für Lehrbücher, bei dem du für weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhältst. Mit über 1 Million Büchern zu über 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
Unterstützt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nächsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Security Science als Online-PDF/ePub verfügbar?
Ja, du hast Zugang zu Security Science von Clifton Smith,David J Brooks im PDF- und/oder ePub-Format sowie zu anderen beliebten Büchern aus Commerce & Gestion de l'information. Aus unserem Katalog stehen dir über 1 Million Bücher zur Verfügung.

Information

Chapter 1
Concept of Security

Objectives

Discuss what constitutes a traditional approach to the nature of security.
Critique the scientific method and engineering design process for the study of security science.
Examine the diverse and interrelated disciplines and practice domains of security.
Evaluate theories or concepts that provide definitions of security.
Appraise the need to provide context when defining the concept of security.
Defend a framework that supports a contextual definition of security science.

Introduction

The traditional academic disciplines have evolved and developed over centuries to reach their current state of refinement. These traditional disciplines, such as astronomy, physics, mathematics, medicine, and, more recently, biology and environmental science, exhibit a set of characteristics by which each can be designated as a discipline. Some of the characteristics of a discipline would include:
1. Body of knowledge: A well-defined and inclusive body of knowledge.
2. Structure of knowledge: An internal structure of the knowledge, achieved through internal relationships between concepts so that consistency and logic prevail.
3. Concepts and principles: The building blocks of the knowledge of a discipline are concepts, and the relationships between concepts are governed by principles.
4. Theories: Theories are predictive in function and provide the ultimate test for a discipline, as outcomes can be predicted.
The knowledge domain of security has yet to achieve the status of being designated an academic discipline, as it lacks validity in the characteristics of the traditional disciplines. However, the emerging security science discipline will aspire to these characteristics with future ongoing research applied to the characteristics of a discipline, to provide the context for knowledge, structure, principles, and predictive theories.
Security lacks definition and, therefore, lacks structured knowledge. In addition, security is diverse, cross-disciplined, and without a defined or specified knowledge or skill structure (Hesse and Smith, 2001). Nevertheless, this should not lead to a conclusion that security does not contain a definable knowledge structure. The diversity and cross-disciplined nature of security will evolve as the discipline becomes more professional, concepts are developed and defined, and tertiary education programs increase. Professional development is an essential component of professional employment, as it allows the individual to maintain currency in their chosen career. Thus, professional diversity has to be bounded by structured knowledge concepts. A characteristic of professional development is that it is both ongoing and directed—that is, to maintain the confidence of the community in the knowledge and skills base of a profession, you must continue to strive to be at the leading edge of knowledge in your chosen discipline.
The foundation for the continued development of formal knowledge of security and its applications for the protection of assets in the national and international contexts will depend on an understanding of the principles and concepts of the emerging discipline of security. Research and development in the structure of the discipline of security is crucial for the professional application of a new generation of conceptual principles of security for the protection of assets. As Fischer et al. (2008, p. 482) suggested, the future of security is very positive considering the growth indicated in the discipline.
Security lacks characteristics of a discipline, with a defined and inclusive definition, as the concept of security is diverse and multidimensional. Nevertheless, security can be defined given context. Therefore, this chapter introduces the concept of security and provides definition through context and the presentation of supporting theories, models, and frameworks. Thus, a definition goes some way in achieving such understanding as to why security is multidimensional in nature through a staged approach, commencing from security of the individual to security of national and international systems. Security is a human characteristic that is objective, perceived, expected, and demanded by people in many different forms. It is perhaps one concept that over many decades has not changed in its original use; rather, it has become more broadly used to encompass greater and more diverse meaning.

Scientific method in support of security science

The development of the knowledge base in security science depends on its advancement as a discipline, and the extent of interaction between academia and professional practitioners of the security industry. The knowledge base for the emerging discipline of security will be enhanced by ongoing research both in the fundamental context of theory development and the applied context of asset protection. It is necessary for government, academia, and the commercial security industry to contribute to this knowledge base.
The stages in the development of a scientific discipline depend on the application of the scientific method to the knowledge base under consideration. The scientific method is a process for experimentation to seek cause-and-effect relationships between observable factors in the information of data gathered. For example, does the presence of a person in an e-field detector distort the field so that intrusion can be registered? From a social perspective, do people use utility theory when accessing security risk or do they take a heuristic approach? Whether in the hard or soft sciences, the scientific method seeks the cause-and-effect relationship by controlling the variables in the experimentation of the phenomenon.
A definite feature of a science is that there are a set of procedures that demonstrate how outcomes are produced, and these procedures are sufficiently detailed so that others may replicate the process to verify or refute the outcomes. The scientific method is a process of inquiry that regards itself as fallible, and as a result purposely tests itself and criticizes its outcomes to correct and improve itself. Although there are several versions of the scientific method, a basic approach involves a four-stage model to develop knowledge of a natural phenomenon:
1. Gather data by measuring or recording the observations of the phenomenon.
2. Construct an idea of how the phenomenon operates or functions in the form of a hypothesis.
3. Test or evaluate the idea or hypothesis by designing an experiment to show the operation or function of the phenomenon.
4. Analyze the results of the experiment to see if the hypothesis is true or false; if it is true, then the idea may be formalized as a theory.

Scientific Method

The model of the scientific method can be expanded with preplanning for background research or information seeking before the hypothesis testing stage, and the model can be extended with an outcomes communication or reporting stage after the analysis to disseminate findings to practitioners and interested people (Figure 1.1). The strength of the scientific method is that a formalized process is applied to the problem, and an outcome will either be gained or rejected. A feature of the scientific method is that the hypothesis of the problem can be tested time after time, and if the hypothesis continues to be accepted then it is accepted as knowledge. However, if the hypothesis is rejected once, then the model will not be accepted. The strength of the scientific method is that anyone can conduct the hypothesis testing for the problem, and thus establish the validity of the model.
image
Figure 1.1 Stages of the scientific method showing the hypothesis testing of an idea.
The regularization of observations of a phenomenon can eventually be presented as a theory, provided the phenomenon is scrutinized many times from a variety of viewpoints and with the same outcomes for each experiment. Figure 1.1 shows that if the result of hypothesis testing is false or partially true, then a modified hypothesis must be tested. When consistency of testing the hypothesis is obtained, then the idea becomes a theory and provides a coherent set of propositions that explain a class of phenomena. The theory can be considered as a framework to explain further observations, from which predictions can be made.
The strength of the scientific method is that it is unprejudiced—that is, it is not necessary to believe the results or outcomes of a particular researcher, as one can replicate the experiment and determine whether the results are true or false. The outcomes of the hypothesis testing do not depend on a particular experimenter, so that faith or belief does not play any part in the logical proof or material evidence on whether a scientific idea or theory is adopted or discarded. Thus, a theory is accepted, not based on the proponent, but rather on the quality of the results obtained through observations or experiments. Results obtained through the process of the scientific method are repeatable and reproducible.
An important characteristic of a scientific theory or hypothesis is that it must be falsifiable. That is, if any single experiment relevant to the hypothesis is shown to be negative or untrue, the hypothesis must be rejected. Thus, theories cannot be proven when the hypotheses are tested, but only rejected when a negative test results from an experiment. The philosopher Wittgenstein (1953) in his analyses of experimentation claimed that “there is no independent criterion of correctness,” so that the scientific method must continue to test the validity of its knowledge.
In a tested scientific hypothesis, a prediction is a rigorous, often quantitative, statement forecasting new outcomes under specific conditions of the idea being considered. The scientific method is formulated on testing assertions that are logical consequences of scientific theories, developed through repeatable experiments or observ...

Inhaltsverzeichnis

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Acknowledgments
  7. About the Authors
  8. Foreword
  9. Preface
  10. Chapter 1. Concept of Security
  11. Chapter 2. Security Management
  12. Chapter 3. Security Risk Management
  13. Chapter 4. Built Environment
  14. Chapter 5. Physical Security
  15. Chapter 6. Detection Systems
  16. Chapter 7. Integrated Identification Technology
  17. Chapter 8. Knowledge Management
  18. Chapter 9. Business Continuity Management
  19. Chapter 10. The Future of Security
  20. Index
Zitierstile für Security Science

APA 6 Citation

Smith, C., & Brooks, D. (2012). Security Science ([edition unavailable]). Elsevier Science. Retrieved from https://www.perlego.com/book/1833154/security-science-the-theory-and-practice-of-security-pdf (Original work published 2012)

Chicago Citation

Smith, Clifton, and David Brooks. (2012) 2012. Security Science. [Edition unavailable]. Elsevier Science. https://www.perlego.com/book/1833154/security-science-the-theory-and-practice-of-security-pdf.

Harvard Citation

Smith, C. and Brooks, D. (2012) Security Science. [edition unavailable]. Elsevier Science. Available at: https://www.perlego.com/book/1833154/security-science-the-theory-and-practice-of-security-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Smith, Clifton, and David Brooks. Security Science. [edition unavailable]. Elsevier Science, 2012. Web. 15 Oct. 2022.