ASIS Foundation Research Council

Connecting Research in Security to Practice

Project Guideline

Overview

The Research Council of the ASIS Foundation is commissioning reports on a series of security topics. The reports will provide guidance to practitioners on effective practices that are based on current existing research. The primary purpose is to provide a connection or link from existing academic research affecting security to real world “on the ground” practice in order to suggest applied research practices. Security industry practices often are not based on any proof of effectiveness having sometimes evolved from historical methods or anecdotal information. Recently, the industry has been moving toward provable practices in performing general functions and tasks. A large and comprehensive body of knowledge exists in the security profession from which valid practices can be based. These reports will establish that link between them.

The relatively brief reports (30 pages more or less) will summarize the contemporary wisdom of the field regarding specific discrete topics of current concern within the security industry. Each report will begin with a “state of the issue” overview of a particular matter/topic breaking out the elements, reviewing contributing factors, and evaluating common responses. The reports will then assess the latest research on that issue and appraise the findings. The author will then suggest strategies, solutions, or promising practices based on the findings of the latest research, highlighting new methods with a focus on measuring effectiveness.

The audience is intended to be security practitioners so each report will focus on the application of information and recommended methods. It will describe how this information impacts the job of a security practitioner and what the best approach is likely to be to address this issue. These reports are designed to suggest new approaches through critical examination of current responses against scientifically obtained data.

This kind of exercise is likely to reveal practices and draw conclusions that could drive further study and so, when appropriate, future research topics will be suggested. By showing what is known and what is not known, the reports will generate ideas for further discussion.

The reports will be scholarly and science-based and follow a prescribed template for formatting so as to create a consistent feel throughout the series.

The reports will usually include the following information:

1. Executive summary

2. Description of the Topic and Component issues

3. Factors Contributing to the Problem

4. Current Responses

5. Measuring Effectiveness

6. Summarization of Valid Research

7. Revelations and Conclusions from Research

8. Approaches Suggested by the Research

9. Future Research Needs

10. Recommended Readings

11. References

12. Author Biography

Sources will include current literature (such as books and articles), research studies, and other materials. The reports will be reviewed by subject matter experts before publication who may provide feedback for further refinement by the author.

Producing a Security Industry CRISP Report

The term white paper typically refers to a detailed or authoritative report. Originally the term referred to government documents, but now a report can be produced in any field. Some reports argue a particular position, while others aim to present all sides of an issue. The ASIS Foundation Research Council is looking for the latter type of report—an objective view of the many considerations surrounding a given topic.

To some extent, the reports being sought are a hybrid of reports and literature reviews. A literature review “surveys scholarly articles, books and other sources (e.g., dissertations, conference proceedings) relevant to a particular issue, area of research, or theory, providing a description, summary, and critical evaluation of each work. The purpose is to offer an overview of significant literature published on a topic” (University Library, 2005). These reports will contain an additional section of recommendations for practice that encompasses good practice and references to scientific evidence on the topic.

Authors are encouraged to review the library of existing reports to gain an understanding of the style and format desired. For other examples of similar reports, authors are encouraged to go to www.popcenter.org. This site produces papers for law enforcement.

Once the author has been commissioned to write a CRISP report on a given topic, he or she can begin the process of producing the report. The author will receive from staff a suggestion sheet, a template, results of the literature review, and this guideline. The following is a good approach an author can follow:

Step 1: Write a statement of the issue that the report will examine. For example, the author might write, “This report examines the relationships between security and law enforcement organizations.” This step may help the author clarify what he or she should look for during the research step.

Step 2: Consider the audience. The report will have a broad audience: security practitioners, security researchers, ASIS leaders, government officials, research funders, security product and service providers, and others. Therefore, the author should write in a way that most people can understand. It would be helpful to define key terms that appear in the report, avoid especially mysterious jargon, and spell out abbreviations and acronyms on first use. The report should be easy to read.

Step 3: Review the literature review and research the topic. The author will be provided with the results of a literature review but should also consult libraries (public libraries, university libraries, corporate libraries, and the ASIS library) to discover and read a wide range of publications about the topic. Trade books, textbooks, popular books, encyclopedias, magazines, journals, newspapers, and many other sources should be consulted. Traditional research methods apply here. The author should record key ideas and details and make sure to cite the sources.

The author should also search the Internet to discover research reports that may not be readily available in libraries.

In addition, the author should use his or her personal knowledge of the issue and, if appropriate, interview other people who are knowledgeable about the issue.

It is essential to provide citations to support key assertions. Citations should follow the style of the American Psychological Association (APA). The Publication Manual of the American Psychological Association is available in libraries and bookstores. Other examples of APA-style citations can be found on the Web.

Step 4: Develop an outline. The following is a model outline. However, the author’s research or the special characteristics of the topic may suggest modifications to this outline. Next to each item is a rough, flexible suggestion as to length.

1. Executive summary (key points from report; tip: write this last) [1-2 pp.]

2. Description of the topic, its component issues, and its importance [2-3 pp.]

3. Factor that contribute to the topic (what other forces have shaped and driven the issue past?) [2-3 pp.]

4. Current responses (including best practices or brief case studies of what works and what does not) [5-6 pp.]

5. Measuring effectiveness. What works and why? How do responses compare? [2-3 pp.]

6. Summarization of existing valid research. How has this issue been examined? What were the findings and are they consistent? [4-8 pp.]

7. Revelations from existing research. What does the research say (imply)? How does the research drive the response? [4-6 pp.]

8. Approaches suggested by the research. Based on this examination, what are the approaches for a practitioner that will best address this issue? [3-7 pp.]

9. Future research needs. Are some aspects of the topic poorly understood? Would research into new technologies help in dealing with the topic? [1-2 pp.]

10. Endnotes. Recommended readings. Are their texts or books that provide supporting detailed information [1 page]

11. References [1-2 pp.]

12. Author’s biography (100-200 words; should include author’s title, affiliation, professional work related to topic of report, and academic credentials) [0.3 p.]

Step 5: Write the report. At this stage, the author should fill in the outline, using the findings from his or her research. Readers will find it helpful if the report uses headings and subheadings to separate various sections. It is also helpful, where appropriate, to present information in numbered or bulleted lists.

Different topics may require reports of different lengths. The ASIS Foundation Research Council CRISP Reports are meant to be brief but informative overviews. Therefore, an average length may be approximately 25 single-spaced pages or 5,500 words. (FYI: in Microsoft Word, you can select Tools/Word Count.)

Step 6: Submit 1st draft. The author will email staff the first draft within 12 weeks of being commissioned. Staff will conduct a peer review. Reviewer comments will be collated and sent to the author and shared with the Research Council. Author will revise draft based on comments and email 2nd draft to staff. It is possible that the report will not obtain approval from peer reviewers and/or the Research Council after revision/s. While every effort will be made to facilitate successful completion, the Foundation retains all rights to refuse publication

Step 7: Prepare biographical sketch.

For more information about this project, please contact Barbara Buzzell, Foundation Director, ASIS Foundation, 1625 Prince Street, Alexandria, VA 22314. Telephone: (703) 518-1441. E-mail: .

References

University Library, University of California-Santa Cruz (2005). How to write a literature review. Retrieved December 20, 2005, from http://library.ucsc.edu/ref/howto/literaturereview.html.

4