Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-7drxs Total loading time: 0 Render date: 2024-07-18T11:22:42.284Z Has data issue: false hasContentIssue false

4 - The need for a theoretical framework

Published online by Cambridge University Press:  11 November 2021

Get access

Summary

OBJECTIVES

• Explain the similarities between Policing and Security Management Models.

• Appraise the need for a theoretical framework for the management of security information.

• Discuss the Crime Pattern Theory and explain its significance to security information management.

• Be able to discuss critically the Security Risk Management Model used in South Africa compared to the International Security Risk Management Model .

INTRODUCTION

The use of information, intelligence and security risk management models (SRMMs) are certainly not new to law enforcement and the security industry. Researchers often refer to Chinese strategist Sun Tzu and his military treatise, The Art of War, written 2000 years ago, with references to spies, information, intelligence and security risks (Newburn et al., 2008). Information, intelligence gathering and risk assessments have also been used by many leaders over the centuries to maintain control over their political enemies and business competitors. This chapter introduces some of the different crime information, intelligence and SRMMs and motivates for a theoretical framework for security information management. Although there are many models available within the policing and security environments, these models were specifically chosen for this study, because of their similarities and their common thread to security information management. This chapter discusses the problem-oriented policing model, Compstat model, intelligence-led policing model and the security risk management model (South Africa) currently being used by law enforcement and the security industry and concludes his discussion with the need for a theoretical framework for security information management.

INFORMATION/INTELLIGENCE AND SECURITY RISK MANAGEMENT MODELS

Advances in information management in law enforcement in the 1970s gave rise to modern intelligence practices for law enforcement, to manage crime better in society. The Chiefs of Police from England and Wales in the Baumber Report, made it clear that, “intelligence” has to be understood as something more than simply information. It was also noted that “intelligence” as a modern police concept required that all collected information be put together with others and that analysis be performed in order to produce intelligence. Intelligence has since been accepted in policing as the end product of a process often complex, sometimes physical, and always intellectual, derived from information that has been collated, analysed and evaluated in order to prevent crime or secure the apprehension of offenders (Newburn et al., 2008). The demand for risk-based information is elevating law enforcement to the status of primary producers of crime information.

Type
Chapter
Information
Managing Security Information
Incidents, Threats & Vulnerabilities
, pp. 46 - 60
Publisher: University of South Africa
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×