The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism | Security Journal Skip to main content
Log in

The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Partnerships between public and private sector actors are expected to grow in response to calls for a broader cross-sectoral counter-terrorism strategy. However, the formation of these partnerships is a current challenge for private sector security professionals, as there is no standardised approach to securitising terrorism or even a common understanding of how private security can contribute to prevention efforts. This paper provides a review of the literature on private sector security procedures used in response to terrorism. The results showed that physical security and security assessments (risk, threat and vulnerability assessments) were the most frequently discussed security themes for protection against terrorist threats. Security measures that received less attention in the literature were related to intelligence gathering and multi-agency cooperation. It is concluded that security procedures in the private sector related to terrorism and other extreme acts of violence should receive more attention in the academic literature to contribute to a better understanding of private security practices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. Although there is no common definition of cyberterrorism available, the term (similar to the definition of terrorism presented at the beginning of this paper) can be interpreted as the use of computer technology to inflict harm on a person or group in order to further a political, religious or ideological cause.

  2. Expenditure on counter-terrorism strategies often does not include scope for scientific evaluation, as it difficult to assess the effectiveness of security measures against an event that so infrequently occurs. For example, a systematic review of counter-terrorism evaluation research conducted by Lum, Kennedy and Sherley (2006) found that counter-terrorism interventions in their sample were rarely evaluated, and those that received an evaluation often did not achieve the intended effects.

References

  • *Akhgar, B., and S. Yates (eds.). 2013. Strategic intelligence management, 1st ed. Oxford: Butterworth-Heinemann.

  • Blomberg, S.B., G.D. Hess, and A. Orphanides. 2004. The macroeconomic consequences of terrorism. Journal of Monetary Economics 51 (5): 1007–1032.

    Article  Google Scholar 

  • *Bullock, J., G. Haddow, and D. Coppola. 2008. Introduction to homeland security: Principles of all-hazards risk management, 3rd ed. Oxford: Butterworth-Heinemann.

  • Button, M. 2007. Security officers and policing: Powers, culture and control in the governance of private space. Aldershot: Ashgate Publishing Limited.

    Google Scholar 

  • Button, M. 2008. Doing security: Critical reflections and an agenda for change. Basingstoke: Palgrave Macmillan.

    Book  Google Scholar 

  • Carr, M. 2016. Public–private partnerships in national cyber-security strategies. International Affairs 92 (1): 43–62.

    Article  Google Scholar 

  • Coaffee, J., P. Fussey, and C. Moore. 2011. Laminated security for London 2012: Enhancing security infrastructures to defend mega sporting events. Urban Studies 48 (15): 3311–3327.

    Article  Google Scholar 

  • Davis, R.C., C. Ortiz, R. Rowe, J. Broz, G. Rigakos, and P. Collins. 2006. An assessment of the preparedness of large retail malls to prevent and respond to terrorist attack. Final report. Washington, DC: National Institute of Justice.

  • Dorn, N., and M. Levi. 2009. Private–public or public–private? Strategic dialogue on serious crime and terrorism in the EU. Security Journal 22 (4): 302–316.

    Article  Google Scholar 

  • *Erickson, P. (1999) Emergency response planning: For corporate and municipal managers, 1st ed. London: Academic Press.

  • European Commission. (2018) High-Level Commission Expert Group on Radicalisation (HLCEG-R): Final report. Luxembourg: Publications Office of the European Union.

  • *Fennelly, L. 2012. Handbook of loss prevention and crime prevention, 5th ed. Oxford: Butterworth-Heinemann.

  • Fussey, P., and J. Coaffee. 2012. Balancing local and global security leitmotifs: Counter-terrorism and the spectacle of sporting mega-events. International review for the sociology of sport 47 (3): 268–285.

    Article  Google Scholar 

  • Frey, B.S., S. Luechinger, and A. Stutzer. 2007. Calculating tragedy: Assessing the costs of terrorism. Journal of Economic Surveys 21 (1): 1–24.

    Article  Google Scholar 

  • Gotbaum, B. (2005) Undertrained, underpaid, and unprepared: Security officers report deficient safety standards in Manhattan office buildings. A Report by the Public Advocate of the City of New York. New York: Public Advocate for the City of New York.

  • *Halibozek, E., A. Jones, and G. Kovacich. 2007 The corporate security professional’s handbook on terrorism, 1st ed. Oxford: Butterworth-Heinemann.

  • *Henkey, T. 2017. Urban emergency management: Planning and response for the 21st century, 1st ed. Oxford: Butterworth-Heinemann.

  • Hsu, H.Y., and D. McDowall. 2017. Does target-hardening result in deadlier terrorist attacks against protected targets? An examination of unintended harmful consequences. Journal of Research in Crime and Delinquency 54 (6): 930–957.

    Article  Google Scholar 

  • *International Foundation for Protection Officers. 2003. The protection officer training manual, 7th ed. Oxford: Butterworth-Heinemann.

  • *Kirchner, R. 2014. Surveillance and threat detection: Prevention versus mitigation, 1st ed. Oxford: Butterworth-Heinemann.

  • Knapp, K.J., T.E. Marshall, R. Kelly Rainer, and F. Nelson Ford. 2006. Information security: Management's effect on culture and policy. Information Management & Computer Security 14 (1): 24–36.

    Article  Google Scholar 

  • Levi, M., J. Morgan, and J. Burrows. 2003. Enhancing business crime reduction: UK directors' responsibilities to review the impact of crime on business. Security Journal 16 (4): 7–27.

    Article  Google Scholar 

  • Lindström, J., and A. Hägerfors. 2009. A model for explaining strategic IT-and information security to senior management. International Journal of Public Information Systems 5 (1): 17–29.

    Google Scholar 

  • Lum, C., L.W. Kennedy, and A. Sherley. 2006. Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology 2 (4): 489–516.

    Article  Google Scholar 

  • Manzo, J. 2009. Security officers’ perspectives on training. Canadian Journal of Criminology and Criminal Justice 51 (3): 381–410.

    Article  Google Scholar 

  • Petersen, K.L. 2008. Risk, responsibility and roles redefined: Is counterterrorism a corporate responsibility? Cambridge Review of International Affairs 21 (3): 403–420.

    Article  Google Scholar 

  • Pizam, A., and G. Smith. 2000. Tourism and terrorism: A quantitative analysis of major terrorist acts and their impact on tourism destinations. Tourism Economics 6 (2): 123–138.

    Article  Google Scholar 

  • *Purpura, P. 2011. Terrorism and homeland security: An introduction with applications, 1st ed. Oxford: Butterworth-Heinemann.

  • Sandler, T., and W. Enders. 2004. An economic perspective on transnational terrorism. European Journal of Political Economy 20 (2): 301–316.

    Article  Google Scholar 

  • Schmid, A. 2004. Statistics on terrorism: The challenge of measuring trends, global terrorism. Forum on Crime and Society 4 (1–2): 49–69.

    Google Scholar 

  • *Sennewald, C., & J. Christman (eds.). 2008. Retail crime, security, and loss prevention: An encyclopedic reference, 1st ed. Oxford: Butterworth-Heinemann.

  • Stewart, M.G. 2008. Cost effectiveness of risk mitigation strategies for protection of buildings against terrorist attack. Journal of Performance of Constructed Facilities 22 (2): 115–120.

    Article  Google Scholar 

  • Sullivan-Taylor, B., and D.C. Wilson. 2009. Managing the threat of terrorism in British travel and leisure organizations. Organization Studies 30 (2–3): 251–276.

    Article  Google Scholar 

  • *Tarlow, P. 2017. Sports travel security, 1st ed. Oxford: Butterworth-Heinemann.

  • van Steden, R., and J. De Waard. 2013. ‘Acting like chameleons’: On the McDonaldization of private security. Security Journal 26 (3): 294–309.

    Article  Google Scholar 

  • von Solms, B., and R. von Solms. 2004. The 10 deadly sins of information security management. Computers & Security 23 (5): 371–376.

    Article  Google Scholar 

  • Willis, H.H., A.R. Morral, T.K. Kelly, and J.J. Medby. 2005. Estimating terrorism risk. Santa Monica, CA: Rand Corporation.

    Book  Google Scholar 

  • *Young, C. 2014. The science and technology of counterterrorism: Measuring physical and electronic security risk, 1st ed. Oxford: Butterworth-Heinemann.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthew Phelps.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Phelps, M. The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism. Secur J 34, 599–620 (2021). https://doi.org/10.1057/s41284-020-00250-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41284-020-00250-6

Keywords

Navigation