<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">An exploration into work practices of physical security professionals: A sociotechnical perspective</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Mia</forename><surname>Korhonen</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Criminology and Criminal Justice</orgName>
								<orgName type="institution">University of Portsmouth</orgName>
								<address>
									<settlement>Portsmouth</settlement>
									<country key="GB">United Kingdom</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Moufida</forename><surname>Sadok</surname></persName>
							<email>moufida.sadok@port.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Criminology and Criminal Justice</orgName>
								<orgName type="institution">University of Portsmouth</orgName>
								<address>
									<settlement>Portsmouth</settlement>
									<country key="GB">United Kingdom</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">An exploration into work practices of physical security professionals: A sociotechnical perspective</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">9E0E43A759FA2127F4C9A829BEE25565</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:45+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Physical security</term>
					<term>sociotechnical</term>
					<term>converged security</term>
					<term>work practice</term>
					<term>security professionals 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Physical security is a multifunctional practice that plays a crucial role in an evolving business environment. The ubiquitous digitization of information and the pervasive connectivity of work systems have created new challenges for physical security professionals. This research in progress focuses on developing a better understanding of key challenges faced by physical security professionals and exploring the impact of technological advancements on the physical security profession. The empirical inquiry involved 12 security professionals using semi-structured interviews and was conducted from an interpretive stance. The key findings reveal a mismatch between the perceptions of the importance of physical security and the actual practices, increasing awareness of the impact of information technologies on the profession, and mixed views around how to define a body of knowledge in physical security and how to establish its parameters.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>This work-in-progress paper describes some of the perceptions and perspectives of a small group of physical security practitioners about the challenges they face when practicing their professional responsibilities. The paper also contributes to the discussion about technology's increased impact on the physical security practitioners' roles. Further, this paper introduces physical security practitioners' views about defining a body of knowledge in physical security and establishing its parameters.</p><p>Physical security protects people, assets, and reputations in various organizations. In the constantly evolving business environment, safeguarding people, assets, and reputation should be at the core of business and organizational activities and decisions. However, only 75% of organizations report that their physical security function is well integrated as a component of resilience <ref type="bibr">[1]</ref>. Physical security should be part of organizations' end-to-end risk management and resilience <ref type="bibr">[1]</ref>. In 2023, a vast majority, 96%, of the organizations have experienced a disruption in their business in the past two years, and 91% have experienced at least one disruption other than the pandemic <ref type="bibr" target="#b0">[2]</ref>. In light of these numbers, there is a need for physical security, and indeed, it is a significant industry; it is forecasted that the physical security equipment and services market will reach a worth of $500 billion by 2026 <ref type="bibr" target="#b1">[3]</ref>.</p><p>At the same time, it is acknowledged that physical security has and continues to face complex challenges, for example, due to the impact of evolving technology, economic conditions, and political difficulties <ref type="bibr" target="#b1">[3]</ref>. Furthermore, physical security holds high trust and authority in guarding lives and valuable assets in this constantly developing landscape.</p><p>According to ASIS <ref type="bibr" target="#b1">[3]</ref>, physical security employs over 30 million people globally in various roles. Against the anticipated growth and development of physical security as an industry, physical security practitioners should be equipped with a broad vision of requirements and responsibilities <ref type="bibr" target="#b2">[4]</ref>. The recognition of physical security as a profession and the development of its competence framework are essential to meet the evolving security needs. Therefore, academia and practitioners need to align perspectives so that practitioners can make betterinformed decisions supported by educational tools <ref type="bibr" target="#b3">[5]</ref>.</p><p>The call for research and education programs for physical security based on accepted and validated principles was identified long ago <ref type="bibr" target="#b4">[6]</ref>. Coole's observation <ref type="bibr" target="#b5">[7]</ref> supports this view as he claims that physical security cannot be considered a profession until its practice is based on a consensual body of knowledge and educational standards. To increase the public's confidence in physical security as a profession, further research is needed on what forms the framework for physical security professionalism.</p><p>So far, research on security professionalization has focused mainly on a variety of domains in security. Some research has described the professional development of security consultants [8], security intelligence analysts <ref type="bibr" target="#b7">[9]</ref>, security risk management <ref type="bibr" target="#b8">[10]</ref>, and manned guards, specifically in the private sector <ref type="bibr" target="#b9">[11]</ref>. Some research has been carried out to study professionalism among cybersecurity (or information security) professionals <ref type="bibr" target="#b10">[12]</ref>. In addition, attempts to map the required competencies for security leaders have been carried out <ref type="bibr" target="#b11">[13]</ref>.</p><p>This paper reports initial observations of an attempt to contribute to filling this identified gap: to develop an understanding of professionalism among physical security professionals.</p><p>The structure of the paper is as follows. The first section discusses security, physical security, and professionalism, as these concepts give context for reporting the initial observations. The second section describes the research method and design. Section three presents the critical observations of the study, which illustrate areas informing the professionalization in security practices. The final section discusses the results and draws some conclusions of the study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Background</head><p>The first author, working in the security industry for over twenty years, has found it difficult to pinpoint her sector or how to describe herself as a physical security professional. During her career, the researcher has engaged multiple times in discussions with her peers or other people about what security entails or who is considered a security professional. These discussions generated the idea for her research. As she started investigating the topic, the definitions of security, physical security, and security professionals seemed vague and ambiguous. This paper is part of her research exploring practitioners' perspectives on physical security professionals' competencies, skills, and knowledge.</p><p>This study approaches physical security practitioners as one group of professionals and does not make a distinction between the occupational sub-groups. The reason is that the researcher wanted to explore what professionals consider relevant competencies, skills, and knowledge. Categorizing the professionals beforehand would, in the researcher's view, limit the research and its potential contribution. This approach is also reflected in the research design. The participants represent various categories of professionals; some have more technical backgrounds and experience, whereas others come from security guard backgrounds and now work as security managers.</p><p>The following sections describe the ambiguity around the key concepts, namely security, physical security, and professionalism, as they give context for the study and initial observations reported in this paper. Before explaining physical security, it is necessary to look at its parent domain, security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Security</head><p>Security is multidimensional in both concept and application <ref type="bibr" target="#b34">[36]</ref>. From a security science perspective, it can be viewed as a practice area <ref type="bibr" target="#b34">[36]</ref>, and within that, security is usually divided into two main streams: traditional and non-traditional security <ref type="bibr" target="#b5">[7]</ref>. Traditional security focuses on the sovereignty and stability of a nation and is politically and militarily managed. The nontraditional security sector, however, considers other threat typologies across the international community or within a country <ref type="bibr" target="#b5">[7]</ref>. Some domains within non-traditional security are, for example, cyber security, personnel security, and physical security <ref type="bibr" target="#b12">[14]</ref>. According to Brooks <ref type="bibr" target="#b5">[7]</ref>, the table in Figure <ref type="figure" target="#fig_0">1</ref> shows different categories of security as a domain subject. Although the operational concept of security remains ambiguous, it also has a more philosophical context that is rooted further in the history of humanity. Fundamentally, security has been recognized as "a feeling of being safe from harm, fear, anxiety, oppression, danger, poverty, defense, protection and preservation of core values and threat to those values" <ref type="bibr" target="#b13">[15]</ref>- <ref type="bibr" target="#b15">[17]</ref>. For example, in Europe, the demand for security has been set out in the Stockholm program and reinforced in The European Agenda on Security, both stating that the EU aims to ensure that people live in an area of freedom, security, and justice <ref type="bibr" target="#b16">[18]</ref>. This approach is supported by some scholars who consider security to include crime prevention, risk management, and loss prevention <ref type="bibr" target="#b17">[19,</ref><ref type="bibr" target="#b34">36]</ref>. To some, it can also include counterterrorism and business continuity functions <ref type="bibr" target="#b18">[20]</ref>.</p><p>However, several authors argue that the definition of security remains vague and inadequate <ref type="bibr" target="#b19">[21,</ref><ref type="bibr" target="#b15">17]</ref>. As Manunta <ref type="bibr" target="#b15">[17]</ref> has called out, one of the challenges for the emerging security profession is that: "We security professionals and scholars are entering the millennium from a very flimsy position: We lack a robust and workable definition of security." Some even challenge the philosophical approach to security, claiming that it is subjective and can potentially serve as a vehicle for driving own interests <ref type="bibr" target="#b20">[22]</ref>.</p><p>The ambiguity is not only a semantic problem but also confuses the work practice of security professionals. Without a clear definition of security, how can people work on the same agenda, and how can it be determined when something is secured <ref type="bibr" target="#b20">[22]</ref>? A more systematic approach to defining security is appropriate <ref type="bibr">[16]</ref>. Only after the main elements of the security concept are identified, analyzed, and considered can it be decided which criteria should be applied in each situation <ref type="bibr" target="#b20">[22]</ref>. The same approach should be used for sub-domains of security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Physical security</head><p>Fundamentally, physical security is about protection; everyone protects what they consider valuable, such as their homes, belongings, and money. Physical security is described as the most fundamental aspect of protection, as a process where the layers of protective physical security measures are used to protect people, assets, and facilities <ref type="bibr" target="#b21">[23]</ref>. As gatekeepers, physical security professionals protect employees, information, and property <ref type="bibr" target="#b22">[24]</ref>. Some claim that physical security covers all security matters except cyber security <ref type="bibr" target="#b23">[25]</ref>.</p><p>Garcia <ref type="bibr" target="#b24">[26]</ref> provides a slightly more detailed definition, saying that physical security is "(1) the use of people, procedures, and equipment (alone or in combination) to control access to assets or facilities; (2) the measures required for the protection of assets or facilities from espionage, theft, fraud, or sabotage by a malevolent human adversary." Similarly, according to ASIS <ref type="bibr" target="#b25">[27]</ref>, physical security is (1) the part of security concerned with physical measures designed to safeguard people to prevent unauthorized access to equipment, facilities, materials, and documents and safeguard them against a security incident. However, ASIS <ref type="bibr" target="#b25">[27]</ref> also adds that physical security is (2) the application of control procedures to prevent or deter attackers from accessing a facility, resource, or information. It can include physical barriers to gaining access, electronic security and alarm systems, video monitoring, staffed security, or other responses. Similarly, Coole <ref type="bibr" target="#b27">[29]</ref> provides security engineering in his definition and states that "physical security is occupationally divided into a diverse range of distinct work roles that provide specific client-centered protective services."</p><p>Recently, physical security has evolved towards offering new services in addition to traditional equipment and services. Technological advancements will continue to change physical security equipment and services towards a more comprehensive approach that covers energy and occupancy usage of facilities <ref type="bibr" target="#b1">[3]</ref>.</p><p>The physical security channel described by ASIS <ref type="bibr" target="#b1">[3]</ref> demonstrates the complexity of the physical security industry. It confirms that physical security has developed from its traditional definition of gates, guards, and guns, 3Gs <ref type="bibr" target="#b12">[14]</ref>: It seems that significant emphasis is placed on prevention and protection in the definition of physical security. There are, on the other hand, views that consider physical security expanding its scope beyond this. For example, Rogers et al. <ref type="bibr" target="#b26">[28]</ref> consider physical security as using people and systems to mitigate and respond to or address the problem. Similarly, Talbot &amp; Jakeman <ref type="bibr" target="#b12">[14]</ref> state that a physical security system must be able to assess, mitigate, delay, and respond to a suspected physical breach of security. Coole <ref type="bibr" target="#b27">[29]</ref> further expands the view by stating that physical security is one of the professions that "examines and treats complex threat typologies across an array of societal security concerns."</p><p>The discussion above demonstrates the complexity of physical security responsibilities. The following section will discuss security and physical security professionalism in detail.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Professionalism</head><p>Most scholars believe that security and physical security as its sub-domain lack the profession's status <ref type="bibr" target="#b5">[7,</ref><ref type="bibr" target="#b4">6]</ref>. Professional status is essential for any discipline as it enhances the development of the scientific foundation and its basic concepts and sets the standard for the industry through the framework of accountability and vision. Furthermore, it reduces the risk of discipline being driven by emotions and subjective interests <ref type="bibr" target="#b15">[17]</ref>.</p><p>Many occupations pursue professional status; however, only a few succeed <ref type="bibr" target="#b28">[30]</ref>. While some occupations may wish to seek the status as a profession, for many occupations, the recognition of a profession has to do with responsibility and accountability; the professional is expected to hold a certain degree of knowledge, skills, competence, and dignity to address their respective area of expertise. The emphasis is usually on knowledge, expertise, and higher education <ref type="bibr" target="#b29">[31]</ref>. Thus, professionalism also comes with responsibility; the public's expectations of those recognized as professionals are higher. Interestingly, professionalism is not something an occupation can declare; it must be earned by the public <ref type="bibr" target="#b28">[30]</ref>.</p><p>A practical overall security approach requires a holistic approach. Regardless of size, status, environment, or business purpose, all organizations must consider risks and ways to mitigate them. Globalization, easy access to information 24/7, worldwide political and cultural conflicts, and increased immigration and diversity have impacted the threat paradigm of physical security <ref type="bibr" target="#b30">[32,</ref><ref type="bibr" target="#b31">33]</ref>. New, artificial risks have emerged from these developments, reshaping the perspective on these risks <ref type="bibr" target="#b32">[34]</ref>. These new threats and business realities require better identification and management of security risks. This also poses demands for security professionals. As a profession, physical security must advance and develop professionalism to respond to emerging threats in different landscapes.</p><p>Moreover, the development of professionalism is essential for physical security due to an increased privatization of the security sector. For example, in the EU, an increasing number of tasks traditionally associated with state-provided security services are now provided by private security, including prominent public places and critical national infrastructure <ref type="bibr" target="#b16">[18]</ref>. Hallcrest's <ref type="bibr" target="#b33">[35]</ref> report called out the need for the security industry to develop, discuss, and promote its standards in the wave of privatization.</p><p>Some institutions, such as the American Society for Industrial Security (ASIS), have attempted to launch initiatives to engage with the academic world and leverage security professionalization. The characteristics of professionalism include, for example, generally accepted qualifications, a code of ethics, an academic base meaning corpus of literature, selfregulation, and governing standards <ref type="bibr" target="#b18">[20]</ref>. Although the attempts to professionalize physical security (and security overall) are ongoing, the success is limited <ref type="bibr" target="#b8">[10]</ref>. Garcia <ref type="bibr" target="#b4">[6]</ref> has called after research and education programs based on accepted and validated principles. Coole's observation <ref type="bibr" target="#b5">[7]</ref> supports this view as he claims that physical security cannot be considered a profession until its practice is based on a consensual body of knowledge and educational standards. To increase the public's confidence in security as a profession, it is crucial to establish the characteristics of the profession through academic research <ref type="bibr" target="#b5">[7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Research method</head><p>This study draws on a qualitative approach by using semi-structured interviews, observations, and thematic analysis to collect and analyze the data. The first phase of the study included a systematic literature review. The review used a systematic search strategy from databases (EBSCO Discovery, Web of Knowledge, JSTOR, and Google Scholar) using the following keywords and their combinations: security, physical security, skills, knowledge, and competence. Through this search, the key authors and their work were identified. This literature search supported formulating the interview questions for the second research phase to collect data through semistructured interviews. The second phase also included observations in the Microsoft Cloud Operations and Innovations (CO+I) physical security professionals' community. The 12 semi-structured interviews aimed to elicit physical security professionals' accounts of their skills, competencies, and knowledge and how they enact those in their work. The participants were sampled and recruited through a gatekeeper from the Microsoft Cloud Operations and Innovations (CO+I) Physical Security team in Europe, the Middle East, and Africa. The participants were recruited independently for both interviews and observations. Therefore, not all participants necessarily participated consecutively in both phases of the research. The interviews were conducted with 12 participants, 20 of whom consented to participation through observations. For interviews, each participant was interviewed at least once, most of them twice, over three to four months, and each interview lasted approximately one hour.</p><p>The data from observations was collected through the researcher's overt role. As the researcher is an insider in the Microsoft Cloud Operations and Innovations (CO+I) physical security professionals' community, she was able to observe the community and collect data through observations. The role and purpose of observation were shared with the team members. The observation data was collected anonymously so that the data could not be linked to any individual participant.</p><p>The observations were gathered in two weekly community meetings and recorded by writing notes and memos. The observations were recorded in both calls between 1 February and 31 May 2024 every week, except when the researcher was not participating in the calls herself.</p><p>The interviews were transcribed, and together with observation notes, the researcher organized them in a qualitative data analysis platform for coding. The researcher began the process by familiarizing herself with the data and identifying several points of interest. Through notetaking, the researcher captured ideas of patterns and meanings, which helped to cluster codes <ref type="bibr" target="#b35">[37]</ref>. Notetaking also helped the researcher to reflect on her position as an insider of the community, and it was a conscious decision from the researcher first to stay as close to the data as possible and approach the data through semantic orientation. It was also essential to be able to give a voice to the participants. Therefore, the initial rounds of coding generated a significant number of codes, some broader and some very specific. However, with the help of the familiarization notes, the researcher was able to start combining codes, as some of the codes often captured micro differences between codes. The further the researcher coded, the more her approach sifted towards latent orientation as she started to look deeper into the meanings of codes. For this paper, through this inductive process, the three main groups of codes were selected: technology as an enabler and possibility, physical security as an undervalued core function or chameleon, and education as a tailored necessity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Key findings</head><p>The findings reported in this paper are the ones the researcher interpreted as the most significant during the analysis. It is essential to highlight that the study is ongoing, and the researcher is still exploring the codes and establishing the themes. Therefore, this paper reflects the work in progress, not the final themes of the research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Technology: possibility and enabler</head><p>According to the participants, technology is seen both as an enabler and a possibility. In many responses, it was clearly stated that it is not possible to perform physical security responsibilities without technology. For example, one of the participants stated that they or physical security overall could not do their job without technology: "Technology plays a significant role in my daily work starting from that I am working on laptop, attending meetings online which include local and remote teams, using IT systems for raising tickets for requests, recommendations for changes, just to mention some examples. Technology is an integral part of my work; without it, I would be limited and unable to work as part of a regional/global team. In addition, technology also plays a significant part in security in general, considering the systems that security uses, such as access control, CCTV, etc., which serve a higher level of security instead of relying only on the human workforce doing manual work."</p><p>Technology is also seen as a possibility as it is expected that, for example, AI will impact physical security and how it will be performed. Although technology, specifically AI, can bring emerging threats, it is perceived as a positive development among practitioners: "…far away in the last ten years, and I would predict that in the next ten years, we would see a lot more of that AI in place and let's say fewer humans on site. I think in the end, this human will be there too. The AI has identified that there is a problem here: that humans will still need to intervene and do the final calculation based on common sense."</p><p>Many participants also stated that physical security will always require human aspects and contributions no matter how technology develops. Some practitioners consider physical security not fully utilizing technology, but there is more potential for physical security as an industry to use it to perform its responsibilities more efficiently.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Physical security: undervalued core function or chameleon?</head><p>According to many participants, physical security suffers from an undervalued perception. Many respondents described physical security as "rather a cost than an asset." The challenge seems to be that when things go well, and there is no disruption to the business, companies or organizations have difficulties understanding what added value physical security as a business function brings. However, at the same time, if something goes wrong, the criticality towards physical security is demonstrated. One of the participants illustrates this point by saying, "…people question why we have security, but when something goes wrong and there's no security, then it's like, where was the security?"</p><p>Often, physical security practitioners feel that they are there to make the lives of others difficult, set up rules, and challenge people when the rules are not complied with. This gives a negative dimension to physical security, and as participants stated, it is hard to work in a positive vacuum with other business functions. This view came across primarily through participant observations where people had an opportunity to discuss their work among their peers [the quote is a free interpretation note by the researcher]: "How to best position physical security as a key stakeholder in daily operations and emphasize the mission." At the same time, as some respondents noted, physical security as an industry has failed to showcase its importance and sell the value of physical security to business executives.</p><p>Physical security has experienced changes within the past couple of decades, mainly due to significant geopolitical incidents such as 9/11 and malicious acts across the globe. Quite a few participants mentioned that some responsibilities have been transferred from governmental security services, such as police, to private physical security as there are insufficient police and resources to maintain security. Therefore, the participants believe physical security is a growing industry that can meet constantly changing threats and challenges. Interestingly, this seems to conflict with the view that other businesses do not appear to value or prioritize physical security, at least not until something goes wrong. Despite the overall negative perception, the practitioners feel an apparent demand for physical security services could increase the profession's contribution to organizational continuity and resilience.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Education: tailored necessity</head><p>Respondents reported that having a one-size-fits-all education for physical security is challenging. Physical security is considered an industry with many tasks and responsibilities. At its current state, it would be challenging to determine what basic education should contain. However, many participants emphasized that physical security as an industry needs a basic education mainly for two reasons.</p><p>The first reason is about the brand and how physical security is perceived. Some participants noted that without self-respect as a professional, it is difficult to expect others to appreciate physical security: "…is we have to value ourselves more in what we do and what we deliver and sell that better to our customers. We have to pay people more to attract the right quality people and get that retention within the teams." According to some participants, better self-respect is directly linked with appropriate education. One participant affirmed, "So more investment in education, you know, educational courses, professional qualifications, more structure and then in a professional way. So, they actually hold their value."</p><p>Secondly, the lack of a career path was seen as a challenge for the industry to lift its image. Currently, most of the respondents consider physical security to be an entry-level job which many choose to earn their living: "People will often, umm, look at security positions like a like a somewhere that they can just, you know, make some money to move forward to another position, and they don't see it as a role for life, and they don't see it as a profession." Once you enter the industry, navigating the roles is difficult because there is an apparent lack of career path: "We also need to build out structured career paths so people can go from the bottom to the top, and it's detailed." Since there is a lack of basic education, there is also no further education within the industry to, for example, provide the necessary skills for managerial roles. Also, the lack of an established framework for soft skills was seen as a challenge, as physical security is very much people's business.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion and Conclusion</head><p>This work-in-progress aimed to explore some of the perspectives of professionalism components by physical security practitioners. There is little research on what physical security practitioners consider the core elements of their professionalism, and this paper contributes to that discussion.</p><p>The initial key finding of this study mentions the applicability of technology as one of the critical elements of physical security professionalism. Although it is recognized how much security has evolved <ref type="bibr" target="#b36">[38]</ref>, there seems to be a view among the practitioners that the potential of technology could be better converged to support physical security responsibilities. As Sadok et al.</p><p>[39] have suggested, companies would benefit from adopting a socio-technical approach to promote a culture of security awareness. The Fourth Industrial Revolution (4IR) calls for fundamental rethinking for professions and physical security professionals confronting the gap, for example, towards cyber security and artificial intelligence, which is critical <ref type="bibr" target="#b36">[38]</ref>. Considering how fast technology has developed, it is slightly surprising to learn from the practitioners that there is still such a gap in how technology has been harnessed in their practice. Adaption has been identified as the priority of professionalization and a source of future advantage <ref type="bibr" target="#b36">[38]</ref>. Physical security as an industry would need to investigate how to close the gap. This would support the further development of its professionalization as it would improve the industry's resilience <ref type="bibr" target="#b36">[38]</ref>. Based on the primary findings, there seems to be a mismatch between the perception of the importance of physical security and the actual work practice. Practitioners consider their work a critical industry but expressed concern that physical security is not prioritized in practice. Companies and organizations across the globe spend money on security systems and human resources <ref type="bibr" target="#b1">[3]</ref>. Still, as demonstrated by participants in this study, physical security is often perceived rather as a cost than an asset. This unflattering perception by executives and senior management has been well-recognized <ref type="bibr" target="#b38">[40,</ref><ref type="bibr" target="#b39">41]</ref>. As participants noted, physical security is a widely abused concept that has been a subject of questionable marketing, blame, and liability <ref type="bibr" target="#b15">[17]</ref>. As participants mentioned, security has failed to brand itself properly, which poses challenges to professionalizing the whole security industry, including physical security. Interestingly, within 25 years, physical security has not been able to change the fact that expectations put on physical security cannot be realistically met <ref type="bibr" target="#b15">[17]</ref>.</p><p>Among practitioners, however, there is a strong consensus that physical security has much to bring to organizations and that physical security will remain a critical industry, especially considering the ongoing privatization of physical security responsibilities <ref type="bibr" target="#b39">[41]</ref>.</p><p>Lastly, the participants stated that physical security requires an established education; however, they have mixed views on how a base education could be achieved, as physical security has many roles and responsibilities. Similarly, Wakefield <ref type="bibr" target="#b39">[41]</ref> notes that the broader disciplinary base would be hard to place for security as it fulfills various functions. Further, it has been argued that more established disciplines, such as medicine and law, have been able to demonstrate their body of knowledge. However, they have a variety of functions within them, too <ref type="bibr" target="#b34">[36]</ref>. Wakefield <ref type="bibr" target="#b39">[41]</ref> suggests that security has not been able to establish its body of knowledge because there is no clear ownership. It remains unclear who should drive the development of that. Indeed, the observations of this study indicate similarly that it is hard to pinpoint which institutions or associations would have that responsibility.</p><p>The primary findings from this study support the view that physical security, and security as its parent domain, still need to work on establishing the professional framework. This will be critical as the industry can be adaptive and resilient through the professional framework for all its challenges in the contemporary threat landscape.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Hierarchical categories of security domain [7].</figDesc><graphic coords="3,76.55,212.13,370.50,99.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 .</head><label>2</label><figDesc>Figure 2. Physical security channel described by ASIS<ref type="bibr" target="#b1">[3]</ref> </figDesc><graphic coords="4,90.75,374.43,447.55,118.30" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<idno>PwC 2023</idno>
		<ptr target="https://www.pwc.com/gx/en/crisis/pwc-global-crisis-resilience-survey-2023.pdf" />
		<title level="m">Global crisis and resilience survey</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://www.asisonline.org/publications--resources/asis-sia-joint-eco-nomic-study/" />
		<title level="m">Complexities in the Global Security Market 2024-2026</title>
				<imprint>
			<publisher>ASIS</publisher>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Trends on Security, Safety and Criminal Justice in the Netherlands</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">R</forename><surname>Muller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Security Management: New Solutions to Complexity</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Jacobs</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Suojanen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Horton</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Saskia Bayerl</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Towards Sustainable Solutions in International Security Management-An Introduction</title>
		<author>
			<persName><forename type="first">G</forename><surname>Jacobs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Suojanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Horton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Saskia Bayerl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Security Management: New Solutions to Complexity</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Jacobs</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Suojanen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Horton</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Saskia Bayerl</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Personal Opinion: Raising the Bar for Security Professionals</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Garcia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security Journal</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="79" to="81" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Physical Security Professional&apos;s Body of Knowledge: a cultural domain analysis of physical security&apos;s knowledge structure</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Coole</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
		<respStmt>
			<orgName>Curtin University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Doctoral dissertation</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Transnational security consulting: UK practitioner perspectives</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C</forename><surname>Scott</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
		<respStmt>
			<orgName>University of Portsmouth</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Doctoral dissertation</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">The Professional Identity of Security Risk Intelligence Analysts in the Private Sector: An International Perspective</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Duvenage</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
		<respStmt>
			<orgName>University of Portsmouth</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Doctoral dissertation</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">The thoughtful security practitioner: Exploring reflective practice in security risk management</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Hasenstab</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
		<respStmt>
			<orgName>University of Portsmouth</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Doctoral dissertation</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Private security career paths: Establishing the foundations of a structured progression model for the manned guarding sector</title>
		<author>
			<persName><forename type="first">D</forename><surname>Garrett</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
		<respStmt>
			<orgName>University of Portsmouth</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Doctoral dissertation</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Navigating the Cybersecurity Career Path</title>
		<author>
			<persName><forename type="first">Helen</forename><forename type="middle">E</forename><surname>Patton</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2022">2022</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">J</forename><surname>Mathews</surname></persName>
		</author>
		<title level="m">Professional certification: Does the security industry need a new yardstick?</title>
				<meeting><address><addrLine>New Jersey City University</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Security risk management body of knowledge</title>
		<author>
			<persName><forename type="first">J</forename><surname>Talbot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jakeman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Concept of Security</title>
		<author>
			<persName><forename type="first">Muyiwa</forename><surname>Afolabi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Readings in Intelligence and Security Studies, Intelligence and Security Studies Programme</title>
				<editor>
			<persName><forename type="first">Kunle</forename><surname>Ajayi</surname></persName>
		</editor>
		<meeting><address><addrLine>ABUAD</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page">16</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Introduction to security / Robert Fischer</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Fischer</surname></persName>
		</author>
		<editor>Edward Halibozek</editor>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Towards a security science through a specific theory and methodology</title>
		<author>
			<persName><forename type="first">G</forename><surname>Manunta</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
		<respStmt>
			<orgName>University of Leicester</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Doctoral dissertation</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">The evolution of security industry regulation in the European Union</title>
		<author>
			<persName><forename type="first">M</forename><surname>Button</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Stiernstedt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Comparative and Applied Criminal Justice</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="245" to="257" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">What is security: Definition through knowledge categorization</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Brooks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security Journal</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="225" to="239" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Corporate Security Education: Towards Meeting the Challenge</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">P</forename><surname>Borodzicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Gibson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security Journal</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="180" to="195" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Defining the Security Professional: Definition through a Body of Knowledge</title>
		<author>
			<persName><forename type="first">M</forename><surname>Griffiths</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Brooks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Corkill</surname></persName>
		</author>
		<idno type="DOI">10.4225/75/579ed9e4099cd</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 3rd Australian Security and Intelligence Conference</title>
				<meeting>3rd Australian Security and Intelligence Conference<address><addrLine>Perth Western Australia</addrLine></address></meeting>
		<imprint>
			<publisher>Edith Cowan University</publisher>
			<date type="published" when="2010-11-30">30th November 2010</date>
			<biblScope unit="page" from="44" to="52" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">What is Security?</title>
		<author>
			<persName><forename type="first">G</forename><surname>Manunta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security Journal</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="57" to="66" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Effective physical security</title>
		<author>
			<persName><forename type="first">Halibozek</forename><surname>Kovavitch</surname></persName>
		</author>
		<editor>Fennelly, L. J.</editor>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Elsevier Science &amp; Technology</publisher>
			<biblScope unit="page" from="339" to="353" />
		</imprint>
	</monogr>
	<note>Physical Security</note>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">The Complete Guide to Physical Security</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">R</forename><surname>Baker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Benny</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>RC Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Landucci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Khakzad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Genserik</surname></persName>
		</author>
		<title level="m">Physical Security in the Process Industry: Theory with Applications</title>
				<imprint>
			<publisher>Elsevier</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">The Design and Evaluation of Physical Protection Systems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Garcia</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Elsevier Ltd</publisher>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://www.asisonline.org/globalassets/professional-development/careers/career-resources/wis---glossary-of-terms-for-the-security-industry..pdf?_t_id=8yEa3b8FuoYiSDOGiKOD8A%3d%3d&amp;_t_uuid=nccZsFMORq2t7if185Q7Iw&amp;_t_q=glossary&amp;_t_tags=language%3aen%2csiteid%3ab1140b07-9e31-4808-809a-878911c7f3f1%2candquerymatch&amp;_t_hit.id=ASIS_Models_Media_Assets/_1720fa95-d796-40d8-82e5-e5b14df1f5ea&amp;_t_hit.pos=1" />
		<title level="m">ASIS: A Comprehensive Glossary of Terms for Security Industry. A resource for security professionals</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Security education in the 21st century: The role of engineering</title>
		<author>
			<persName><forename type="first">B</forename><surname>Rogers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Palmgren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Giever</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Garcia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of ASEE Annual Conference and Exposition</title>
				<meeting>ASEE Annual Conference and Exposition</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">The physical security professional: Mapping a body of knowledge</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Coole</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Brooks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Minnaar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Security Journal</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1169" to="1197" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">The professionalization of everyone?</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">L</forename><surname>Wilensky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">American journal of sociology</title>
		<imprint>
			<biblScope unit="volume">70</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="137" to="158" />
			<date type="published" when="1964">1964</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Defining a Profession: The Role of Knowledge and Expertise</title>
		<author>
			<persName><forename type="first">Mike</forename><surname>Saks</surname></persName>
		</author>
		<idno type="DOI">.org/10.7577/pp.v2i1.151</idno>
	</analytic>
	<monogr>
		<title level="j">Professions and Professionalism</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Security convergence: managing enterprise security risk</title>
		<author>
			<persName><forename type="first">D</forename><surname>Tyson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Elsevier/Butterworth-Heinemann</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<title level="m" type="main">Security by Design: Innovative Perspectives on Complex Problems</title>
		<editor>Masys, A.</editor>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Security and Safety: An Integrative Perspective</title>
		<author>
			<persName><forename type="first">B</forename><surname>Van Den Berg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hutten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Prins</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Security Management: New Solutions to Complexity</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Jacobs</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Suojanen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Horton</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Saskia Bayerl</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Private security trends</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">C</forename><surname>Cunningham</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">to 2000: the Hallcrest report II / William C</title>
				<editor>
			<persName><forename type="first">John</forename><forename type="middle">J</forename><surname>Cunningham</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Clifford</forename><forename type="middle">W</forename><surname>Strauchs</surname></persName>
		</editor>
		<editor>
			<persName><surname>Van Meter</surname></persName>
		</editor>
		<imprint>
			<publisher>Butterworth-Heinemann</publisher>
			<date type="published" when="1970">1970. 1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">L</forename><surname>Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Brooks</surname></persName>
		</author>
		<title level="m">Security science: the theory and practice of security</title>
				<imprint>
			<publisher>Elsevier, BH</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<monogr>
		<title level="m" type="main">Thematic analysis: a practical guide</title>
		<author>
			<persName><forename type="first">V</forename><surname>Braun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Clarke</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2022">2022</date>
			<publisher>SAGE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Professional Security in Fourth Industrial Revolution</title>
		<author>
			<persName><forename type="first">A</forename><surname>Wakefield</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gips</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Handbook of Security</title>
				<editor>
			<persName><forename type="first">Martin</forename><surname>Gill</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing AG</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page">39</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">A socio-technical perspective to counter cyber-enabled industrial espionage</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sadok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Welch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bednar</surname></persName>
		</author>
		<idno type="DOI">.org/10.1057/s41284-019-00198-2</idno>
	</analytic>
	<monogr>
		<title level="j">Security Journal</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="27" to="42" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<ptr target="https://www.asisonline.org/globalassets/publications-and-resources/security-issues-research/2023-24/security-risk-management/asis-security-risk-management-research-re-port.pdf" />
		<title level="m">ASIS: Current State of Security Risk Management</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Where Next for the Professionalization of Security?</title>
		<author>
			<persName><forename type="first">A</forename><surname>Wakefield</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Handbook of Security</title>
				<editor>
			<persName><forename type="first">Martin</forename><surname>Gill</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Palgrave Macmillan UK</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
