6,720 research outputs found

    Efficacy of property marking: police identification of stolen property

    Get PDF
    Property marking, as a situational crime prevention technique, has found to be largely ineffectual in the reduction of property theft, although past studies have not considered the role property marking as an aid to the return of stolen or lost property. However, automotive identification and some studies have found that in some cases property marking is effective. Furthermore, many crime prevention groups focus on property marking as a means to reduce crime and the fear of crime. Therefore, the study investigated the processes of lost, stolen and seized goods by law enforcement personnel. The study undertook a qualitative analysis of law enforcement property identification process, including a documentary analysis of procedures and practitioner interviews for content-thematic analysis. The study found that the use of manufacturer serial numbers was the initial line of investigative enquiry. Limiting factors were technical capability to find and use covert property markings. The successful implementation of a code of best practice or standardisation in the recording of serial numbers, and the availability of the community to quickly and easily record their property may have a significant effect in the reduction of property crimes; due to the perceived increase of risk and potential reduction of reward to the offender

    Is emergency management considered a component of business continuity management?

    Get PDF
    Emergency Management (EM) and Business Continuity Management (BCM) frameworks incorporate measures of strategic and operational aspects. Defined within a number of Australian and international standards as well as guidelines, such concepts may be integrated to provide increased resilience for disruptive events. However, it has been found that there is some degree of misalignment of concept integration amongst security and EM bodies of knowledge. In line with cognitive psychology exemplar‐based concepts, such misalignments may be associated with a lack of precision in communality in the approach to EM and BCM. This article presents stage 1 of a two‐stage study. Stage 1 compromised a critique of international literature. Findings indicate that EMs operational function, as an initial response, is saliently considered integrated with the response strategies of BCM. However, the strategic link between BCM and EM concept integration are still distinguished by many separate views. As such, this study has concluded that EM is considered an operational component of BCM by the majority; however, with a broader misalignment of strategic integration. Understanding underpinnings of such misalignment will aid in raising the standards and application of professionalism within Security, EM and BCM domains, supporting clarification and definition of professional boundaries

    Security risk assessment: Group approach to a consensual outcome

    Get PDF
    AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gathered in isolation. This insular method of data collection may lead to inaccurate risk assessment, as stakeholders with vested interests may emphasise their own risks or game the risk assessment process. The study demonstrated how a consensual risk assessment approach may result in a more acceptable risk assessment outcome when compared to individual assessments. The participants were senior managers at a West Australian motel located on the West Coast Highway, Scarborough. The motel consists of four three storey blocks of units, resulting in a total of 75 units. The three main areas of the business are Reception and Management, Housekeeping and Maintenance. The participants were interviewed individually and then as a group. Two activities took place in the study, an individual identification and analysis of risks affecting the facility, followed by a consensual group analysis of the same risks. The individual risk assessment results were collated and compared to the results of the consensus group. This demonstrated that individuals over or under emphasise some risks, dependant on personal affect. The study illustrated that a consensual style of risk information collection and assessment was more acceptable to the group then assessments conducted in isolation

    A Comparison of Laboratory and Vulnerability Evaluation Methods for the Testing Security Equipment

    Get PDF
    A facility wide security system cannot be tested without causing disruption or creating vulnerabilities within the system. To overcome this issue, individual components or equipment may be evaluated to a priori performance standard. The two common approaches to security equipment evaluations are vulnerability attacks and laboratory testing. Laboratory testing of security equipment can reduce the costs and time associated with evaluations, as well as limiting the subjectivity of the tests. Vulnerability attacks will produce more realistic evaluation results of the whole security system; nevertheless, the data obtained is dependent on the physical attributes and skill of the attackers. This study ascertained what methodology, namely laboratory testing or vulnerability testing, was the most effective. To achieve this, both testing methodologies were applied to security padlocks with expert validation. The study confirmed that if security equipment has been laboratory tested to a designed priori performance level, the degree of security vulnerability can be effectively identified. As the security padlocks demonstrated, the high level achieved in the laboratory tests correlated with a high delay factor in vulnerability testing. Such an approach to security equipment testing resulted in a reliable and valid quantitative data set that could be applied at a later stage to other similar equipment. Nevertheless, it is suggested that when considering a facility wide security system, some degree of both laboratory and vulnerability testing has to be applied as they are complimentary

    CCTV surveillance: The differing aims and functions of CCTV within the corporate stratum

    Get PDF
    Closed Circuit Television (CCTV) systems are found in a variety of environments and used for a multitude of purposes, leading to differing views of CCTV within an organisation. In accordance to management theory, organisations contain a stratum of work where each level requires specific skills set. In accordance with this work stratum, the study’s methodology used semi-structured interviews with different levels of security personnel in a Casino complex to extract and undertake a thematic analysis. The study extracted 10 CCTV surveillance features across two themes, being its aims and functions. CCTV features included creating a safe environment, protection, legal compliance and audit, management and support, deterrence, investigation and evidence, all of which were considered at each stratum levels; however, with difference in their meaning. Recommendations suggest that articulating clear awareness of CCTV aims and functions across the corporate work spectrum would result in a more effective CCTV surveillance system

    Divergence of Safety and Security

    Get PDF
    © 2020, The Author(s). Safety and security have similar goals, to provide social wellness through risk control. Such similarity has led to views of professional convergence; however, the professions of safety and security are distinct. Distinction arises from variances in concept definition, risk drivers, body of knowledge, and professional practice. This chapter explored the professional synergies and tensions between safety and security professionals, using task-related bodies of knowledge. Findings suggest that safety and security only have commonalities at the overarching abstract level. Common knowledge does exist with categories of risk management and control; however, differences are explicit. In safety, risk management focuses on hazards management, whereas security focuses on threat mitigation. Safety theories consider health impacts and accidents, whereas security crime and crime prevention. Therefore, safety and security are diverging as distinct professions

    Terrorism in Australia: A Psychometric Study into the Western Australian Public Perception of Terrorism

    Get PDF
    Terrorism is not a new concept, as historically terrorist organisations have used the threat of violence or actual violence to generate fear in individuals, organisations and governments alike. Fear is a weapon and is used to gain political, ideological or religious objectives. Past terrorist attacks have raised concerns around the world, as governments ensured that their anti-terrorism security strategies are adequate. Domestically, Australia upgraded its capacity to respond to terrorism events through security enhancements across many areas and with new initiatives such as the 2002 public counter terrorism campaign. Nevertheless, there has been restricted research into how terrorist events have impacted on the Australian public from a psychometric risk perception perspective. The study used the psychometric risk perception theory, applied to 340 participants, as a benchmark to compare the perception of terrorism risk using its two dimensions of dread and familiarity to risk. The study presented terrorism within a spatial psychometric risk map and found that when compared to other risks, terrorism ranked second highest in terms of dread risk and mid-range in terms of familiarity to risk. Recommendations include the ongoing need to understand public risk perception and directed benefit of public awareness safety campaigns. It is only through such understanding that decision-makers can implement effective safety and security reforms that will benefit both industry and the general community
    corecore