Abstract
Partnerships between public and private sector actors are expected to grow in response to calls for a broader cross-sectoral counter-terrorism strategy. However, the formation of these partnerships is a current challenge for private sector security professionals, as there is no standardised approach to securitising terrorism or even a common understanding of how private security can contribute to prevention efforts. This paper provides a review of the literature on private sector security procedures used in response to terrorism. The results showed that physical security and security assessments (risk, threat and vulnerability assessments) were the most frequently discussed security themes for protection against terrorist threats. Security measures that received less attention in the literature were related to intelligence gathering and multi-agency cooperation. It is concluded that security procedures in the private sector related to terrorism and other extreme acts of violence should receive more attention in the academic literature to contribute to a better understanding of private security practices.
Similar content being viewed by others
Notes
Although there is no common definition of cyberterrorism available, the term (similar to the definition of terrorism presented at the beginning of this paper) can be interpreted as the use of computer technology to inflict harm on a person or group in order to further a political, religious or ideological cause.
Expenditure on counter-terrorism strategies often does not include scope for scientific evaluation, as it difficult to assess the effectiveness of security measures against an event that so infrequently occurs. For example, a systematic review of counter-terrorism evaluation research conducted by Lum, Kennedy and Sherley (2006) found that counter-terrorism interventions in their sample were rarely evaluated, and those that received an evaluation often did not achieve the intended effects.
References
*Akhgar, B., and S. Yates (eds.). 2013. Strategic intelligence management, 1st ed. Oxford: Butterworth-Heinemann.
Blomberg, S.B., G.D. Hess, and A. Orphanides. 2004. The macroeconomic consequences of terrorism. Journal of Monetary Economics 51 (5): 1007–1032.
*Bullock, J., G. Haddow, and D. Coppola. 2008. Introduction to homeland security: Principles of all-hazards risk management, 3rd ed. Oxford: Butterworth-Heinemann.
Button, M. 2007. Security officers and policing: Powers, culture and control in the governance of private space. Aldershot: Ashgate Publishing Limited.
Button, M. 2008. Doing security: Critical reflections and an agenda for change. Basingstoke: Palgrave Macmillan.
Carr, M. 2016. Public–private partnerships in national cyber-security strategies. International Affairs 92 (1): 43–62.
Coaffee, J., P. Fussey, and C. Moore. 2011. Laminated security for London 2012: Enhancing security infrastructures to defend mega sporting events. Urban Studies 48 (15): 3311–3327.
Davis, R.C., C. Ortiz, R. Rowe, J. Broz, G. Rigakos, and P. Collins. 2006. An assessment of the preparedness of large retail malls to prevent and respond to terrorist attack. Final report. Washington, DC: National Institute of Justice.
Dorn, N., and M. Levi. 2009. Private–public or public–private? Strategic dialogue on serious crime and terrorism in the EU. Security Journal 22 (4): 302–316.
*Erickson, P. (1999) Emergency response planning: For corporate and municipal managers, 1st ed. London: Academic Press.
European Commission. (2018) High-Level Commission Expert Group on Radicalisation (HLCEG-R): Final report. Luxembourg: Publications Office of the European Union.
*Fennelly, L. 2012. Handbook of loss prevention and crime prevention, 5th ed. Oxford: Butterworth-Heinemann.
Fussey, P., and J. Coaffee. 2012. Balancing local and global security leitmotifs: Counter-terrorism and the spectacle of sporting mega-events. International review for the sociology of sport 47 (3): 268–285.
Frey, B.S., S. Luechinger, and A. Stutzer. 2007. Calculating tragedy: Assessing the costs of terrorism. Journal of Economic Surveys 21 (1): 1–24.
Gotbaum, B. (2005) Undertrained, underpaid, and unprepared: Security officers report deficient safety standards in Manhattan office buildings. A Report by the Public Advocate of the City of New York. New York: Public Advocate for the City of New York.
*Halibozek, E., A. Jones, and G. Kovacich. 2007 The corporate security professional’s handbook on terrorism, 1st ed. Oxford: Butterworth-Heinemann.
*Henkey, T. 2017. Urban emergency management: Planning and response for the 21st century, 1st ed. Oxford: Butterworth-Heinemann.
Hsu, H.Y., and D. McDowall. 2017. Does target-hardening result in deadlier terrorist attacks against protected targets? An examination of unintended harmful consequences. Journal of Research in Crime and Delinquency 54 (6): 930–957.
*International Foundation for Protection Officers. 2003. The protection officer training manual, 7th ed. Oxford: Butterworth-Heinemann.
*Kirchner, R. 2014. Surveillance and threat detection: Prevention versus mitigation, 1st ed. Oxford: Butterworth-Heinemann.
Knapp, K.J., T.E. Marshall, R. Kelly Rainer, and F. Nelson Ford. 2006. Information security: Management's effect on culture and policy. Information Management & Computer Security 14 (1): 24–36.
Levi, M., J. Morgan, and J. Burrows. 2003. Enhancing business crime reduction: UK directors' responsibilities to review the impact of crime on business. Security Journal 16 (4): 7–27.
Lindström, J., and A. Hägerfors. 2009. A model for explaining strategic IT-and information security to senior management. International Journal of Public Information Systems 5 (1): 17–29.
Lum, C., L.W. Kennedy, and A. Sherley. 2006. Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology 2 (4): 489–516.
Manzo, J. 2009. Security officers’ perspectives on training. Canadian Journal of Criminology and Criminal Justice 51 (3): 381–410.
Petersen, K.L. 2008. Risk, responsibility and roles redefined: Is counterterrorism a corporate responsibility? Cambridge Review of International Affairs 21 (3): 403–420.
Pizam, A., and G. Smith. 2000. Tourism and terrorism: A quantitative analysis of major terrorist acts and their impact on tourism destinations. Tourism Economics 6 (2): 123–138.
*Purpura, P. 2011. Terrorism and homeland security: An introduction with applications, 1st ed. Oxford: Butterworth-Heinemann.
Sandler, T., and W. Enders. 2004. An economic perspective on transnational terrorism. European Journal of Political Economy 20 (2): 301–316.
Schmid, A. 2004. Statistics on terrorism: The challenge of measuring trends, global terrorism. Forum on Crime and Society 4 (1–2): 49–69.
*Sennewald, C., & J. Christman (eds.). 2008. Retail crime, security, and loss prevention: An encyclopedic reference, 1st ed. Oxford: Butterworth-Heinemann.
Stewart, M.G. 2008. Cost effectiveness of risk mitigation strategies for protection of buildings against terrorist attack. Journal of Performance of Constructed Facilities 22 (2): 115–120.
Sullivan-Taylor, B., and D.C. Wilson. 2009. Managing the threat of terrorism in British travel and leisure organizations. Organization Studies 30 (2–3): 251–276.
*Tarlow, P. 2017. Sports travel security, 1st ed. Oxford: Butterworth-Heinemann.
van Steden, R., and J. De Waard. 2013. ‘Acting like chameleons’: On the McDonaldization of private security. Security Journal 26 (3): 294–309.
von Solms, B., and R. von Solms. 2004. The 10 deadly sins of information security management. Computers & Security 23 (5): 371–376.
Willis, H.H., A.R. Morral, T.K. Kelly, and J.J. Medby. 2005. Estimating terrorism risk. Santa Monica, CA: Rand Corporation.
*Young, C. 2014. The science and technology of counterterrorism: Measuring physical and electronic security risk, 1st ed. Oxford: Butterworth-Heinemann.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Phelps, M. The role of the private sector in counter-terrorism: a scoping review of the literature on emergency responses to terrorism. Secur J 34, 599–620 (2021). https://doi.org/10.1057/s41284-020-00250-6
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41284-020-00250-6