Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-vpsfw Total loading time: 0 Render date: 2024-07-18T15:37:12.702Z Has data issue: false hasContentIssue false

6 - Security information management process

Published online by Cambridge University Press:  11 November 2021

Get access

Summary

OBJECTIVES

• Examine the diverse and interrelated disciplines of the South African Police Service and the private security industry in South Africa.

• Despite the efforts by the police, community programmes and private security, crime continues to be a major concern for most citizens in South Africa. Why?

• Understand the difference in meaning of sources, methods and techniques used to collect security information.

• Defend the recommendation that organisations should have their own security information analysis unit (SIAU).

INTRODUCTION

Risk management has a long history, which started about 2 400 years ago in ancient Greece, where the Athenians always assessed risks before making decisions. The international standard ISO 31000:2009 serves as the theoretical foundation for risk management. This standard is currently being improved internationally by technical committees and working groups. Risk management developed in South Africa in the 1970s. Risk managers were also made responsible for finding innovative ways and procedures to reduce losses, which resulted in the integration of risk control and risk financing activities. The aftermath of the 11 September 2001 attacks on the World Trade Centre in New York and the Pentagon in Washington, D.C. identified many failures in security management. Some of the common failures include failure to formally collect security information on threats, vulnerabilities and incidents and have it analysed by qualified security analysts and to act on the information. Incidents, threats and vulnerabilities have the potential to affect an organisation's assets negatively. It is therefore necessary for this security information to be managed effectively and efficiently, so that correct decisions can be made on the implementation of security risk control measures. This chapter looks at the security information management process to reduce crime, increase detection rates and prevent losses.

ESTABLISHING THE CONTEXT

Context usually includes the internal and external organisational environments, organisational objectives and stakeholder identification. This context will determine the process to be followed. Despite the efforts by the police, community programmes and private security, crime continues to be a major concern for most citizens in South Africa (Van Rooyen, 2008). There is a close relationship between the rise of private security and changes to mainstream policing.

Type
Chapter
Information
Managing Security Information
Incidents, Threats & Vulnerabilities
, pp. 88 - 114
Publisher: University of South Africa
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×