Abstract
In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution of such boundaries.
Similar content being viewed by others
Notes
As the Department of Homeland Security (2002, p. ii) has put it, ‘the entire society to overcome a new and very complex challenge’.
This construction of the liberal marked thus came to define the end of mercantilism. Trade came to be regarded as the principal path to liberty, which could capture the positive aspects of expansion, progress, growth and individual striving.
For a discussion of the difference between neoliberal and neo-republican security governance, see Petersen and Tjalve (2013). Where a neo-republican mode of governance is reliant on organicist means of social construction (appeals to communal duty; facilitation of self-regulation), a neoliberal draws on economic or individualist instruments of social control (appeals to economic self-interest).
ASIS is the world’s largest association for security managers. In the United States alone, ASIS has approximately 24 000 members (www.asisonline.org).
The material will be analysed through a discourse analysis focusing on the identity constructions. In the analysis of both the interviews and survey, there are no implied assumptions about the possibility of gaining undisturbed access to the inner lives of the interview persons (Kvale, 1996, pp. 38–58; Gubrium and Holstein, 2003). Instead of assuming the possibility of correspondence between either the material world or the inner thoughts of the interviewed persons and the academic results, the interview/survey is considered an ‘active text’ created in the interaction between interviewer and interviewed. The interviewer is expected to present their ‘preferred self’ (Gubrium and Holstein, 2003; 1997; Järvinen 2005). The object of scientific interest is the meaning created in the interaction between interviewed and interviewer.
The selection of companies for the survey was based on size rather than type of business. This also means that none of the participating companies are providing security services themselves.
In total, 87 American CEOs have participated in the survey.
ASIS has 2800 members in Europe and 27 169 members in the United States (www.asisonline.com).
According to the Business Security Survey 2004, 63 per cent of the British companies (n=100) agreed that 9/11 has ‘strongly influenced’ their approach to security.
Rigakos (2002) observes a similar trend in the private security sector (among the companies selling security services to ‘normal’ companies), where conduct is regulated by their belonging to an ‘old boys’ network.
The term ‘governmentality’ refers to that which Rose (1993, p. 283) has termed the ‘formulas of rule’; that is, the rationalities governing the particular security procedures, techniques and mechanisms. See Johnson (1995) for an attempt to define analytically the link between governmentalities and profession (as institutionalization of expertise).
For a definition of neo-republicanism and the difference to neoliberalism, see Petersen and Tjalve (2013).
Similarly, Ridley (2011) argues how the concept of resilience is taking up a central role in the description of the corporate social responsibility of critical infrastructure companies, using the cases of British railways and Microsoft.
For a historical account on how the relation between market and security politics has been articulated, see Hont (2005).
References
Alliance for Enterprise Security Risk Management. (2005) Convergence of Enterprise Security Organizations, Online, http://iris.nyit.edu/~kkhoo/Fall2008/755/ConvergenceEnterpriseSecurityOrg_08Nov05.pdf, accessed 16 April 2013.
Andersen, N.Å. and Sand, I.-J. (eds.) (2012) Hybrid Forms of Governance. New York: Palgrave Macmillan.
ASIS International. (2010) Enterprise Security Risk Management: How Great Risks Lead to Great Deeds (A Benchmarking Survey and White Paper). Alexandria, VA: The CSO Roundtable of ASIS International, Online, http://www.asisonline.org/education/docs/CSORT_ESRM_whitepaper_2010-04.pdf.
Barry, A., Osborne, T. and Rose, N. (1996) Foucault and Political Reason. London: UCL Press.
Beck, U. (2002) The terrorist threat: World risk society revisited. Theory Culture & Society 19 (4): 39–55.
Beck, U. (2003) The silence of words: On terror and war. Security Dialogue 34 (3): 225–268.
Bhabha, H.K. (1994) The Location of Culture. London and New York: Routledge.
Borodzicz, E.P. and Gibson, S.D. (2006) Corporate security education: Towards meeting the challenge. Security Journal 19 (3): 180–195.
Briggs, R. and Edwards, C. (2006) The Business of Resilience: Corporate Security for the 21st Century. London: Demos.
Davidson, M.A. (2012) Managing risk across the enterprise. Security Management, http://www.securitymanagement.com/article/managing-risk-across-enterprise-005823, accessed 16 April 2013.
Dean, M. (1999) Governmentality, Power and Rule in Modern Society. London: Sage.
Department of Homeland Security. (2002) National Strategy for Homeland Security (July). Online, http://www.ncs.gov/library/policy_docs/nat_strat_hls.pdf, accessed 16 April 2013.
Eggen, D. (2007) Judge invalidates Patriot Act provisions. The Washington Post, 7 September: A3.
Ericson, R. and Doyle, A. (2004) Uncertain Business: Risk, Insurance and the Limits of Knowledge. London and Toronto: Toronto University Press.
Ewald, F. (1991) Insurance and risk. In: G. Burchell, C. Gordon and P. Miller (eds.) The Foucault Effect: Studies in Governmentality. Chicago, IL: University of Chicago Press.
Foucault, M. (1991) Governmentality. In: G. Burchell, C. Gordon and P. Miller (eds.) The Foucault Effect: Studies in Governmentality. Chicago, IL: The University of Chicago Press.
Freeman, R.E. (1984) Strategic Management: A Stakeholder Approach. Boston, MA: Pitman.
Garland, D. (1996) The limits of the sovereign state: Strategies of crime control in contemporary society. British Journal of Criminology 36 (4): 181–209.
Garland, D. (2001) The Culture of Control. Oxford: Oxford University Press.
Gubrium, J.F. and Holstein, J.A. (2003) Postmodern Interviewing. London: Sage.
Gubrium, J.F. and Holstein, J.A. (1997) The New Language of Qualitative Method. New York and Oxford: Oxford University Press.
van der Heijden, J. (2011) Friends, enemies, or strangers? On relationships between public and private sector service providers in hybrid forms of governance. Law & Policy 33 (3): 367–390.
Hont, I. (2005) Jealousy of Trade: International Competition and the Nation-State in Historical Perspective. Cambridge, MA: Harvard University Press.
Ipsos MORI. (2004) Corporate Security. Online, http://www.ipsos-mori.com/researchpublications/researcharchive/606/Corporate-Security.aspx, accessed 16 April 2013.
Johnson, T. (1995) Governmentality and the institutionalization of expertise. In: T. Johnson, G. Larkin and M. Saks (eds.) Health Professions and the State in Europe. London: Routledge.
Järvinen, M. (2005) Interview i en interaktionistisk begrebsramme. In: M. Järvinen and N. Mik-Meyer (eds.) Kvalitative metoder i et interaktionistisk perspektiv. Copenhagen, Denmark: Hans Reitzels.
Kvale, S. (1996) InterViews. London: Sage.
Michaels, J.D. (2008) All the president’s spies: Private–public intelligence partnerships in the war on terror. California Law Review 96 (4): 901–966.
Nalla, M. and Morash, M. (2002) Assessing the scope of corporate security: Common practices and relationships with other business functions. Security Journal 15 (3): 7–19.
Napolitano, J. (2011) State of America’s Homeland Security Address. Washington DC: George Washington University, 27 January. Online, http://www.dhs.gov/ynews/speeches/sp_1296152572413.shtm.
O’Brien, K.A. (2009) Managing national security and law enforcement intelligence in a globalised world. Review of International Studies 35 (4): 903–915.
Petersen, K.L. (2008) Terrorism: When risk meets security. Alternatives 33 (2): 173–190.
Petersen, K.L. (2012) Corporate Risk and National Security Redefined. London and New York: Taylor & Francis Group, Routledge.
Petersen, K.L. and Tjalve, V.S. (2013) (Neo)Republican security governance? US homeland security and the politics of ‘shared responsibility’. International Political Sociology 7 (1): 1–18.
Porter, M.E. and Kramer, M.R. (2006) Strategy and society: The link between competitive advantage and corporate social responsibility. Harvard Business Review 84 (12): 78–93.
Power, M. (2007) Organized Uncertainty: Designing a World of Risk Management. Oxford and New York: Oxford University Press.
Ridley, G. (2011) National security as a corporate social responsibility: Critical infrastructure resilience. Journal of Business Ethics 103 (1): 111–125.
Rigakos, G.S. (2002) The New Parapolice – Risk Markets and Commodified Social Control. Toronto, Buffalo and London: University of Toronto Press.
Ritchey, D. (2011) Proud to be security: How roles changed after 9/11. Security Magazine, 1 September, http://www.securitymagazine.com/articles/82306-proud-to-be-security-how-roles-changedafter-911.
Ritzer, G. (1975) Professionalization, bureaucratization and rationalization: The views of Max Weber. Social Forces 53 (4): 627–634.
Rose, N. (1993) Government, authority and expertise in advanced liberalism. Economy and Society 22 (3): 283–299.
Rose, N. and Miller, P. (2008) Governing the Present: Administering Economic, Social and Personal Life. Malden, MA and Cambridge: Polity Press.
Saks, M. (2010) Analyzing the professions: The case for the neo-Weberian approach. Comparative Sociology 9 (6): 887–915.
Simonsen, C.E. (1996) The case for: Security management is a profession. International Journal of Risk, Security and Crime Prevention 1 (3): 229–232.
Slater, D. (2008) Jeff Spivey on Enterprise Risk Management. Online, http://www.csoonline.com/article/print/461481, accessed 16 June 2012.
Teubner, G. (1991) Autopoiesis and steering: How politics profit from the normative surplus of capital. In: R. Veld, L. Schaap, C. Termeer and M. Twist (eds.) Autopoiesis and Configuration Theory: New Approaches to Societal Steering. Dordrecht, the Netherlands: Kluwer Academic Publishing.
The Washington Post. (2007) Judge invalidates Patriot Act provisions, 7 September. Translated by Eggen, D.
Weber, M. (1968) Economy and Society: An Outline of Interpretive Sociology. New York: Bedminster Press.
Wenger, E. (1998) Communities of Practice. Learning, Meaning, and Identity. Cambridge, MA: Cambridge University Press.
Wenger, E. and Snyder, W. (2000) Communities of practice: The organizational frontier. Harvard Business Review 78 (1): 139–145.
Wolf, K.D., Deitelhoff, N. and Engert, S. (2007) Corporate security responsibility: Towards a conceptual framework for a comparative research agenda. Cooperation and Conflict 42 (3): 294–320.
Acknowledgements
I would like to thank the two anonymous reviewers, Trine Villumsen Berling, Ulrik Pram Gad, Lene Hansen, Peter Marcus Kristensen, Jeppe Strandsbjerg and Casper Sylvest for their comments on earlier drafts of this article. Also thanks to Peter Marcus Kristensen for his invaluable research assistance and work on the 2011 Survey mentioned in this article.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Petersen, K. The corporate security professional: A hybrid agent between corporate and national security. Secur J 26, 222–235 (2013). https://doi.org/10.1057/sj.2013.13
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2013.13