Book contents
- Frontmatter
- Contents
- List of illustrations
- Acronyms
- Foreword
- Foreword
- Acknowledgements
- Preface and overview
- 1 General orientation
- 2 Concepts in security information management
- 3 Security information management in practice
- 4 The need for a theoretical framework
- 5 Security information management model
- 6 Security information management process
- 7 Summary
- Bibliography
- Index
Preface and overview
Published online by Cambridge University Press: 11 November 2021
- Frontmatter
- Contents
- List of illustrations
- Acronyms
- Foreword
- Foreword
- Acknowledgements
- Preface and overview
- 1 General orientation
- 2 Concepts in security information management
- 3 Security information management in practice
- 4 The need for a theoretical framework
- 5 Security information management model
- 6 Security information management process
- 7 Summary
- Bibliography
- Index
Summary
Security is both a state of being and a means to that end. As a state of being, security suggests two quite distinct objective and subjective conditions. And as an objective condition, it takes a number of possible forms. Firstly, it is the condition of being without threat: the hypothetical state of absolute security. Secondly, it is defined by the naturalisation of threats: the state of being protected from. Thirdly, it is a form of avoidance or non-exposure to danger … As a subjective condition, security again suggests both the positive condition of feeling safe and freedom from anxiety or apprehension defined negatively by reference to insecurity.
— Zedner, 2003: 155This book was written to enlighten security officials about security information management, which includes the collection and analysis of information on security incidents, threats and vulnerabilities and the implementation of security risk control measures. It is hoped that the reader will now have an idea how to collect security information legally and ethically, using different sources, methods and techniques, as well as analyse security information according to the needs of the client and transforming the analysis results into actionable crime information products, strategies and physical protection systems (PPS) be implemented as security risk control measures. It is hoped that the reader will understand the difference between security information management and security risk management as well as other information and intelligence management strategies. The book presents a security information management model (SIMM) to guide security practitioners in their daily activities.
OVERVIEW
Presently, the security industry comprises private and government security service providers. They are divided into different sectors according to the security service function they perform. Each sector has a specific goal and emphasis in respect of security-related functions.
The substantive grounded theory that was developed by the author describes how security information is presently managed in the security industry. The substantive grounded theory also forecasts that if security information is not managed correctly, there will be a continuous recurrence of losses. The substantive grounded theory in this research was developed by obtaining qualitative data through focused semi-structured interviews and focus group interviews.
- Type
- Chapter
- Information
- Managing Security InformationIncidents, Threats & Vulnerabilities, pp. xix - xxivPublisher: University of South AfricaPrint publication year: 2018