13 research outputs found

    Theory of entropic security decay: The gradual degradation in effectiveness of commissioned security systems

    Get PDF
    As a quantitative auditing tool for Physical Protection Systems (PPS) the Estimated Adversary Sequence Interruption (EASI) model has been available for many years. Nevertheless, once a systems macro-state measure has been commissioned (Pi) against its defined threat using EASI, there must be a means of articulating its continued efficacy (steady state) or its degradation over time. The purpose of this multi-phase study was to develop the concept and define the term entropic security decay. Phase one presented documentary benchmarks for security decay. This phase was broken into three stages; stage one presented General Systems Theory (GST) as a systems benchmark for the study. Stage two applied the writings from stage one to physical security, and stage three presented a benchmark for considering physical system decay. Phase two incorporated the pilot study towards validating the feasibility of undertaking the main study and refining interview instrumentation. Phase three executed the main study, extracting and presenting security experts (N=6) thoughts, feelings and experiences with the phenomenon of security decay. Phase four provided the interpretative analysis, responding to the study’s research question

    Does a weak security discourse provide opportunity for security deviance to flourish?

    Get PDF
    In the years since the tragedy of 9/11 the term security has become a much used and abused term. As the war on terrorism has evolved, politicians of all persuasions played the security card to change law and legislation ostensibly to protect the community. Those whom provide the security assume that freedoms lost by the wider community in the name of security are in fact a fair price to pay for that security. In this environment the security discourse is diminished and this provides an opportunity for security deviance to emerge. This research used a selection of publically reported examples of security misconduct to examine and define the construct security deviance. Security deviance being the misuse and abuse of security policy, processes and mechanisms for unauthorised benefit or gratification

    Security, control and deviance: Mapping the security domain and why it matters

    Get PDF
    Security is one of the foundations on which a stable and cohesive society is built. It is this security that allows citizens to go about their daily lives with freedom and certainty,affording them the ability to make their own choices as to what they do. Yet it may be argued that security is a concept that is misunderstood and perceived in a myriad of ways by the various stratum of society. Since the tragic events of 9 September 2001, security has become a much used and abused term. Law and legislation have been changed and enacted to protectand control the community. Personal rights and freedoms have been given up, wars have been waged and it may be argued by some, police states have emerged out of democracy in the name and pursuit of security. In this period,the global community has witnessed massive growth of global security organisation and the rise and legitimization of its cousin the global private military company. Yet there is remarkably little consensus as to what security is, what constitutes the security domain and just how much freedom should be traded in a free and democratic culture in pursuit of this nebulous concept that is security. The purpose of this paper is to establish a roadmap for domain exploration which focuses attention on the complex and often contradictory nature of security. Notwithstanding scholarly difference and interpretation of the context of security, and the lack of a singularly acceptable definition of security and ignoring the argument that security is so broad as to lack meaning, the authors will assert that security is a legitimate and necessary construct, with specific concerns.This position is framed within the argument that the alternative of non-security(Manunta, 1998) is not acceptable in the context of a civilised world.This paper is presented in four parts, beginning with a discussion of the domain in general. In the second part the concept of security deviance will be discussed before finally proposing a way forward for domain research and discourse.Then, the structural relations, indicating the depth and embedded nature of security in a modern society, will be presented to articulate the opportunities for security deviance in a modern society

    Do Security Systems Fail Because Of Entropy?

    No full text
    Security is implemented to mitigate an organisation’s identified risks, linking layered elements into a system to provide countermeasure by the functions of deter, detect, delay, response and recovery. For a system to maintain its effectiveness these functions must be efficaciously performed in order; however, such systems may be prone to decay leading to security failures. This study used a three-­‐phase qualitative methodology to develop an entropic theoretical foundation and to present a model of entropic security decay. Security decay is defined as degradation of the microscopic constituents propagating through the security system as a result of knowledge, cultural or economic factors. Security management should be primarily concerned with managing the entropic processes against commissioned security system levels; however, when decay occurs it is as a bottom-­‐up factor. This study suggests security controls should be measurable and be designed, applied, and managed to maintain security system efficacy

    The Physical Security Professional: Formulating a Novel Body of Knowledge

    No full text
    © 2015, Copyright © Taylor & Francis Group, LLC. Physical security cannot be considered a profession until its practice is based on a consensual body of knowledge and educational standards. Therefore, this study undertook a cultural domain analysis of physical security professionals' knowledge. The study applied a multiphase approach: conducting expert interviews, quantitative validation and group analysis. Study findings demonstrate that the physical security body of knowledge is a matrix, which is broad and ranges from facility contextualization to explicit aspects such as locks. Such knowledge has a hierarchical structure, organized on the tasks of diagnosing the security problem, inference to reach the optimal resolution and finally, treatment
    corecore