SECURITY AWARENESS IN MILITARY PHYSICAL SECURITY
BY
ZAHARUDDIN BIN HJ MOHAMMAD
A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management
Kulliyyah of Information and Communication Technology International Islamic University Malaysia
JANUARY 2018
ii
ABSTRACT
As Malaysia is developing to become a developed country, its defense system also grows rapidly with increase of personnel and sophisticated equipment and modern weaponry. The effectiveness of the control and protection of all these equipment and weaponry and its installations depends entirely on the level of understanding of the principles of physical security, legal aspects, identification of the threat and the crime and skilled in drawing up a comprehensive protection system for the control and detect any threat. The military installations are usually enforced with the security awareness with initiatives to educate the soldiers, because security awareness programs can not eliminate human weakness and vulnerabilities. The aim of the research is to develop a coping mechanism from the military perspective when dealing with treats. A questionnaire survey was used to study the factors that influence security behaviour among military personnel. It is found that factors such perceived severity, perceived vulnerability, response efficacy, and self-efficacy play important roles in influencing security behaviour. The level of security awareness among military personnel it is high. The recommendation is that the security awareness to increase through campaign, rewards and reviewing standard operating procedure.
.
iii
ثحبلا ةصلاخ
ABSTRACT IN ARABIC
اهعافد ماظن و ,ةمدقتم ةلود حبصت يكل رمتسم روطت في تيلا لودلا نم يه ايزيلام دارفلأا و ةيرصعلا ةحلسلأا و ةروطتلما تادعلماب دوزم و رمتسم نستح في اضيأ يركسعلا ا تادعلما في ةلاعفلا ةرطيسلا و يربكلا روطتلا اذه .ةزاتملما تاراهلما وذ دمتعي ةيركسعل
بناولجا و يدالما نملأل ةيساسلأا ئدابملل مهفلا و كاردلأا ىوتسم ىلع ةيربك ةروصب ةياملحا نع ثحبلا ةلوامح و تاديدهتلا نع فشكلا و مئارلجا ىلع فرعتلا و ةينوناقلا تززع ةيزيلالما ةيركسعلا تآشنملل عافدلا ماظن مسر في تاراهلما للاخ نم ةلماشلا ىلع يعولا ةملاسلاب يعولا جمانرب نلأ. ينيركسعلا دارفلأا ةيبرت ىلع ةردابلما و ةملاسلا
ةيلآ ينستح ةلوامح وه ثحبلا اذه نم فدلها .مهزجع و سانلا فعض حلصي نأ عيطتسي هذه في نايبتسأ مادختسأ تم .تاديدهتلا ةمواقم في ةيركسعلا رظنلا تاهجو نم فيكتلا تيلا لماوعلا ةسارد ضرغل ةساردلا تم دقل و .ينيركسعلا دارفلأل نيملأا كولسلا ىلع رثؤت
,ةباجتسلأا ةعرس و ,ةينملأا رطاخلما كاردإ و ,ةملاسلاب يعولا لثم لماوعلا هذه نأ دايجإ .ينيركسعلا دارفلأا ىدل نيملأا كولسلا ددتح تيلا ةمهلما لماوعلا نم ةيتاذلا ةءافكلا و كسعلا دارفلأا ىدل نيملأا يعولا رادقم اله لصوت تيلا تايصوتلا و .اًدج لياع ناك ينير
للاخ نم ينيركسعلا دارفلأا ىدل نيملأا يعولا رادقم ةدايز و ينستح بيج هنأ يه ثحبلا ةيسايقلا تاءارجلأا و يرياعلما ةعجارم للاخ نم اضيأ و ,مهزيفتح و ةرمتسلما تلاملحا .دارفلأا ءلاؤه ىدل نيملأا يعولا ةدايزل
.
iv
APPROVAL PAGE
I certify that I have supervised and read this study and that in my opinion, it conforms to acceptable standards of scholarly presentation and is fully adequate, in scope and quality, as a dissertation for the degree of Master of Protective Security Management.
………..
Maisarah Ali Supervisor
I certify that I have read this study and that in my opinion it conforms to acceptable standards of scholarly presentation and is fully adequate, in scope and quality, as a dissertation for the degree of Master of Protective Security Management.
………..
Nurul Nuha Abdul Molok Internal Examiner
This dissertation was submitted to the Centre for IT Advancement and is accepted as a fulfilment of the requirement for the degree of Master of Protective Security Management.
………..
Umar Aditiawarman
Head, Centre for IT Advancement
This dissertation was submitted to the Kulliyyah of Information and Communication Technology and is accepted as a fulfilment of the requirement for the degree of Master of Protective Security Management.
………..
Abdul Wahab Abdul Rahman Dean, Kulliyyah of Information and Communication Technology
v
DECLARATION
I hereby declare that this dissertation is the result of my own investigations, except where otherwise stated. I also declare that it has not been previously or concurrently submitted as a whole for any other degrees at IIUM or other institutions.
Zaharuddin Hj Muhammad
Signature ... Date ...
vi
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA
DECLARATION OF COPYRIGHT AND AFFIRMATION OF FAIR USE OF UNPUBLISHED RESEARCH
SECURITY AWARENESS IN MILITARY PHYSICAL SECURITY
I declare that the copyright holders of this dissertation is Zaharuddin Bin Hj Muhammad.
Copyright © 2018 Zaharuddin Bin Hj Muhammad. All rights reserved.
No part of this unpublished research may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without prior written permission of the copyright holder except as provided below
1. Any material contained in or derived from this unpublished research may only be used by others in their writing with due acknowledgement.
2. IIUM or its library will have the right to make and transmit copies (print or electronic) for institutional and academic purposes.
3. The IIUM library will have the right to make, store in a retrieved system and supply copies of this unpublished research if requested by other universities and research libraries.
By signing this form, I acknowledged that I have read and understand the IIUM Intellectual Property Right and Commercialization policy.
Affirmed by Zaharuddin Bin Hj Muhammad
……..……….. ………..
Signature Date
vii
This dissertation is dedicated to my beloved father and mother, my wife, daughters, son, my brothers and sister.
viii
ACKNOWLEDGEMENTS
All praise and adorations belong to Allah, the Compassionate Creator and All- Knowing. May His peace and blessings be showered upon the soul of Prophet Muhammad (S.A.W).
It is my utmost pleasure to dedicate this work to my dear parents, and my family, who granted me the gift of their unwavering belief in my ability to accomplish this goal. Thank you for your support, understanding, encouragement, and much more made this journey possible. This study is also dedicated to my late father for laying the foundation of what I turned out to be in life.
I dedicate this work to my lovely wife, Mdm. Norhaslin Isthnin for her full support, everyday encouragement and understanding throughout the period we have been pursuing this course, though support is far too meek a word to describe the sustenance she provides. May Allah bless you abundantly, my love. My children Mimi Martina Athirah, Muhammad Faiq Dennise, Mimi Marina Afiqah and Mimi Marina Afifah.
I am deeply indebted to my supervisor, Prof. Ir .Dr. Maisarah Ali, who guided and encouraged me throughout this study. She has given me great confidence, encouragement, guidance, and a tremendous amount of support throughout my research studies Thank you very much and may Allah bless you.
Finally, I wish to express my appreciation and thanks to those who provided their time, effort and support for this work.
ix
TABLE OF CONTENTS
Abstract ... ii
Abstract in Arabic ... iii
Approval page ... iv
Declaration ... v
Copyright Page ... vi
Acknowledgements ... viii
Table of Contents ... ix
List of Tables ... xii
List of Figures ... xiv
CHAPTER ONE: INTRODUCTION ... 1
1.1 Background ... 1
1.2 Dimension of Military Installation ... 3
1.3 Component of Physical Security ... 4
1.4 Physical Security Plan ... 6
1.5 Problem Statement ... 7
1.6 Research Questions ... 8
1.7 Research Aim and Objectives ... 9
1.8 Outline of Research Methodology ... 9
1.9 Significant of the Reasearch ... 10
1.10 Scope and Limitation ... 11
CHAPTER TWO: LITERATURE REVIEW ... 12
2.1 Introduction ... 12
2.2 What Influences Secure Behavior? ... 12
2.2.1 Self-Efficacy ... 13
2.2.2 Social Influence ... 13
2.2.3 Attitude ... 14
2.2.4 Perceived Susceptibility ... 14
2.2.5 Perceived Severity ... 15
2.2.6 Response Efficacy ... 15
2.2.7 Response Costs ... 15
2.3 Existing Security Awareness Approaches ... 16
2.4 Security Awareness Training ... 21
2.5 Physical Security ... 23
2.6 Security Awareness and Training Planning ... 24
2.6.1 Designing and Delivering Security Awareness and Training... 24
2.6.2 Security Awareness Techniques ... 25
2.6.3 Monitoring the Effectiveness of Security Awareness and Training ... 26
2.6.4 Monitoring Security Incidents ... 27
2.7 Environmental Security ... 27
2.8 Future Threats ... 28
x
2.9 Framework for Analyzing Security Awareness Approaches ... 30
2.10 Security Awareness Approaches ... 32
2.11 Chapter Summary ... 33
CHAPTER THREE: RESEARCH METHODOLOGY ... 34
3.1 Introduction ... 34
3.2 Research Design and Approach ... 34
3.3 Research Instrument ... 35
3.3.1 Questionnaire Design ... 36
3.3.2 Attitude Rating Scale - The Likert Scale ... 37
3.4 Sampling ... 38
3.4.1 Sampling Technique ... 38
3.4.2 Calculating the Sample Size ... 39
3.5 Pilot Survey ... 39
3.6 Data Processing and Analysis ... 40
3.6.1 Data Checking ... 40
3.6.2 Data Editing ... 40
3.6.3 Data Coding ... 41
3.6.4 Data Transcribing ... 41
3.6.5 Data Analysis ... 41
CHAPTER FOUR: RESULT, ANALYSIS AND DISCUSSION ... 43
4.1 Introduction ... 43
4.2 Profile of the Respondents ... 43
4.2.1 Gender, Age, Grade and Qualifications ... 43
4.2.2 Working Experience ... 45
4.2.3 Academic / Education Level ... 46
4.3 Perceived Severity ... 48
4.3.1 Suspicious Looking Civilian Visitor, Military Personnel Or Situation. ... 48
4.3.2 Suspicious Visitor, Military Personnel or Situation Will Take Action. ... 49
4.3.3 Allowing an Unauthorized Person to Military Installation. ... 50
4.3.4 Taking Unused Government Property Is A Serious Offense. ... 51
4.3.5 Trespassing A Military Installation Is Not A Serious Offense. ... 52
4.4 Perceived Vulnerability ... 52
4.4.1 My Life Could Be Endangered During Duty In A Military Installation. ... 52
4.4.2 Subjected to a Terrorist Threat or Violent Criminal Acts. ... 53
4.4.3 Subjected to Deal With Disruptive Visitor During In Duty. ... 54
4.4.4 Subjected to Deal With Explosives or Unauthorized Pyrotechnics ... 55
4.5 Response Efficacy ... 57
4.5.1 Awareness of Security Threats and Training Will Enable to Protect Military Installation. ... 57
4.5.2 Taking Security Precautions Is Very Difficult. ... 58
4.5.3 My Military Skills and Knowledge Are Adequate. ... 59
4.5.4 Practicing Safety and Security Measure Is Important For Safety on Duty. ... 60
xi
4.5.5 Practicing Safety and Security Measure Is Important for the
Safety of Others. ... 61
4.6 Self-Efficacy ... 62
4.6.1 The Ability to Handle Any Security Problems or Action When on Duty. ... 62
4.6.2 The Ability to Coax an Irritating Visitor From Becoming Angrier. ... 63
4.6.3 I Can Calm Anxious Visitor Inside A Military Installation. ... 64
4.7 Security Awareness Level ... 65
4.7.1 Apply Standard Operating Procedures (Sop) When Dealing With Security Situation ... 65
4.7.2 I Share With Those Who Are Close to Me About Safety And Security Procedures In A Military Installation. ... 66
4.7.3 I Informed People Who Are Close to Me About My Duty Roster ... 67
4.7.4 I Checked The Content Of Any Package That Is Passed To Me . 68 4.7.5 Lock My Weapon And Military Gear While On Duty. ... 69
4.7.6 Read The Standard Operating Procedures (Sop) To Understand The Process And Procedures. ... 70
4.8 To Increase Level Of Security Awarness Among The Royal Military Police Personnel ... 71
4.8.1 I Am Confident That Security Awareness Can Be Increased Through Campaign. ... 71
4.8.2 I Am Confident That Security Awareness Can Be Increased Through Reward ... 72
4.8.3 I Am Confident That Security Awareness Can Be Increase Through Designing of Sop Review ... 73
4.9 Summary ... 74
CHAPTER FIVE: CONCLUSION ... 75
5.1 Introduction ... 75
5.2 Summary of Findinngs ... 75
5.3 Conclusion ... 77
5.4 Implication of The Study ... 78
5.5 Limitation of the Study ... 79
5.6 Recommendations for the Future Study ... 79
REFERENCES ... 80
APPENDICES ... 82
1. Appendix A: The Questionnaire. ... 82
xii
LIST OF TABLES
Table 3.1 The Likert Scale 38
Table 4.1 Gender of Respondents 44
Table 4.2 Age of Respondents 45
Table 4.3 Number of Years in Military Service 45
Table 4.4 Highest Academic Qualification of Respondents 46
Table 4.5 Trained in Unarmed Combat Skill 47
Table 4.6 Suspicious Looking Civilian Visitor, Military Personnel or
Situation 48
Table 4.7 Suspicious Visitor, Military Personnel or Situation Will Take
Action 49
Table 4.8 Allowing an Unauthorized Person to Military Installation 50 Table 4.9 Taking unused government property is a serious offense 51 Table 4.10 Trespassing a military installation is not a serious offense 52 Table 4.11 My Life Could Be Endangered During Duty in A Military
Installation 52
Table 4.12 Subjected to A Terrorist’s Threat or Violent Criminal Acts 53 Table 4.13 Subjected to Deal with Disruptive Visitor During in Duty 54 Table 4.14 Subjected to Deal with Explosives or Unauthorized
Pyrotechnics 55
Table 4.15 Awareness on Security Threats and Training Will Enable to
Protect Safety 57
Table 4.16 Taking Security Precautions is very Difficult 58 Table 4.17 My military skills and knowledge on safety and security are
adequate 59
Table 4.18 Practicing Safety and Security Measure Is Important for Safety
on Duty 60
Table 4.19 Practicing Safety and Security Measure Is Important for The
Safety of Others 61
xiii
Table 4.20 The Ability to Handle Any Security Problems or Action When
on Duty 62
Table 4.21 The Ability to Coax an Irritating Visitor from Becoming
Angrier 63
Table 4.22 I Can Calm Anxious Visitor Inside a Military Installation 64 Table 4.23 Apply Standard Operating Procedures (SOP) When Dealing
with Security Situation 65
Table 4.24 I share with those who are close to me about safety and
security procedures in a military installation 66 Table 4.25 I Informed People Who Are Close to Me About My Duty
Roster 67
Table 4.26 I Checked the Content of Any Package That Is Passed to Me 68 Table 4.27 Lock My Weapon and Military Gear While on Duty 69 Table 4.28 Read the Standard Operating Procedures (SOP) To Understand
the Process and Procedures 70
Table 4.29 I Am Confident That Security Awareness Can Be Increased
Through Campaign 71
Table 4.30 I Am Confident That Security Awareness Can Be Increased
Through Reward 72
Table 4.31 I Am Confident That Security Awareness Can Be Increase
Through Designing of SOP Review 73
xiv
LIST OF FIGURES
Figure 1.1 Physical Security Requirements 6
Figure 1.2 Layer of Defense in Depth (Security Layer) 7
Figure 1.3 Flowchart of Research Methodology 10
Figure 3.1 Methodology Flowchart of the Study 35
Figure 4.1 Genders of Respondents 44
Figure 4.2 Ages of Respondents 45
Figure 4.3 Number of Years in Military Service 46
Figure 4.4 Highest Academic Qualifications of Respondents 47 Figure 4.5 Suspicious Looking Civilian Visitor, Military Personnel or
Situation 48
Figure 4.6 Suspicious Visitor, Military Personnel or Situation Will Take
Action 49
Figure 4.7 Allowing an Unauthorized Person to Military Installation 50 Figure 4.8 Taking unused government property is a serious offense 51 Figure 4.9 My Life Could Be Endangered During Duty in A Military
Installation 53
Figure 4.10 Subjected to a Terrorist’s Threat or Violent Criminal Acts 54 Figure 4.11 Subjected to Deal with Disruptive Visitor during In Duty 55 Figure 4.12 Subjected to Deal with Explosives or Unauthorized
Pyrotechnics 56
Figure 4.13 Awareness on Security Threats and Training Will Enable
Protect Safety in Military Installation 57
Figure 4.14 Taking Security Precautions is very difficult 58 Figure 4.15 My Military Skills and Knowledge Are Adequate 59 Figure 4.16 Practicing Safety and Security Measure Is Important for Safety
on Duty 60
xv
Figure 4.17 Practicing Safety and Security Measure Is Important for The
Safety of Others 61
Figure 4.18 The Ability to Handle Any Security Problems or Action When
on Duty 62
Figure 4.19 The Ability to Coax an Irritating Visitor from Becoming
Angrier 63
Figure 4.20 I can calm anxious visitor inside a military installation 64 Figure 4.21 Apply Standard Operating Procedures (SOP) When Dealing
with Security Situation 66
Figure 4.22 I share with those who are close to me about safety and
security procedures in a military installation 67 Figure 4.23 I Informed People Who Are Close to Me about My Duty
Roster 68
Figure 4.24 I Checked the Content of Any Package That Is Passed to Me 69 Figure 4.25 Lock My Weapon and Military Gear While on Duty 70 Figure 4.26 Read the Standard Operating Procedures (SOP) To Understand
the Process and Procedures 71
Figure 4.27 I Am Confident That Security Awareness Can Be Increased
Through Campaign 72
Figure 4.28 I Am Confident That Security Awareness Can Be Increased
Through Reward 73
Figure 4.29 Am Confident That Security Awareness Can Be Increase
through Designing of SOP Review 74
1
CHAPTER ONE INTRODUCTION
1.1 BACKGROUND
Royal Malaysian Armed Forces has grown rapidly and is equipped with various equipment and modern weaponry. This situation led to the construction of installations and facilitate in line with the development of the Royal Malaysian Police Corps (RMPC). All equipment and weapons placed in strategic locations; aim to protect them from any threat. Thus, the physical nature of security is needed to protect all these installations. To control these installations should use a combination of approaches manpower and comprehensive protection system.
The effectiveness of the control and protection of all these installations depends entirely on the level of understanding of the principles of physical security, and legal aspects, identification of the threat and the crime and skilled in drawing up a comprehensive protection system for the control and detect any threat. Apart from the planning and crime prevention programs also need to be given serious attention to curb the threats that can cripple the function and role of an installation to the service.
Government forces are also required to always make a study on the overall physical security by conducting inspections, exercises to test preparedness and protection systems to ensure the safety task can be implemented effectively.
There are four Royal Military Police Corps camps in the Klang Valley:
a. Headquarters 4 Regiment Royal Military Police Corps (RMPC) was established on June 1, 1981 through the establishment of the power of the FED ( M ) / 3011 ( A ) / 13/80 and is based in Camp Batu 10, Kuantan, Pahang which responsible for providing policing assistance to teams under
2
the auspices of the Headquarters 4 Division. On Apr 16, 1996, 4 Division moved from Camp Batu 10, Kuantan to Camp Wardieburn, Kuala Lumpur as the Central Government formation. 4RMPC is currently responsible for managing the companies.
b. 11 Company RMPC in Camp Perdana, Sungai Besi, Selangor. This coy was established on June 1, 1971 through the establishment of the power of the FED (M) / 3097/1/83. The Tasks and responsibilities 11 Coy RMPC tasks are made within Selangor.
c. 12 Company RMPC in Camp Genting Klang, Kuala Lumpur. With the relocation and restructuring of the Malaysian Army on January 1, 1996, the Coy has taken over the assignment of duty, especially in the Klang Valley from 11 Coy RMPC. Tasks and responsibilities of 12 Coy RMPC involve within Kuala Lumpur area. In addition, tasks of ceremonial duties involve HRH Majesty the King's enthronement ceremony at King Palace Malaysia.
d. 101 Company RMPC in Camp Batu Kentomen, Kuala Lumpur was established on June 1, 1971 based on Whoosh Gae, Rifle Range Road, Kuala Lumpur andin accordance with the Malaysia Army development this Coy have converted to 101 Company RMPC (Base) at Kem Genting Klang, Kuala Lumpur guided by the power of the establishment of Feb (M) / 3097/1/83 force on Feb 19, 1983. Finally, in 1987, the team was moved to Kem Aman, Kuala Lumpur. This team is responsible for the physical security at the following locations:
1. Storage Depots Defense (DSP), Sungai Buloh.
3
2. 93 WKSP Manufacturing Headquarters Staff of the Armed Forces in Sungai Buloh Station.
3. Government Headquarters Army Training (MPLTD) in Kuala Lumpur.
4. 93 Base Ammunition Depot (93 BAD) in BatuArang, Selangor.
1.2 DIMENSION OF MILITARY INSTALLATION
Military installation physical security is the protection of personnel, hardware, programs, networks and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism. In such situations, security systems can be expensive and certain technologies may be unavailable. The intent is to avoid unreasonable costs and implement a balanced solution, which still meets security requirements. To ensure effective and regular training, most the facilities have included security awareness in the mandatory annual safety and protection training. In order to ensure compliance and best practices, security awareness is now integrated into a mandatory refresher training courses and safety manuals and is provided to on site security personnel.
The existence of Standard Operating Procedures (SOP) did not detail the regulations and actions to be taken when a security breach occurred. The physical security revolves on the principles and philosophy of the security surrounding the compound of installation, the external and internal threat to the installations, security procedures in the relations to safeguarding the installation, ordnance items and military personnel, managing acts of unlawful interference so as to minimize the risk
4
and/or effect of such an act, procedure’s, self-defense techniques and military personnel safety and security.
Few commanders or others in leadership positions are not aware the security awareness training activities, nor did they provide effective mechanisms for enabling the commander on the ground to enforce participation in security programs. The commander felt that security inspections must focus on documenting compliance with requirements, e.g., reports of security violations and attendance records.
Royal Military Police personnel that manned and deploy to a physical installation are one of the core groups of the Malaysian Army. They are responsible to keep the ordnance depot, amoury stores, ammunition depot, supply and logistic depot safe and secure. In this perception of coping mechanism, they are developed to define as Royal Military Police personnel perceived severity, perceived vulnerability, responsive efficacy and self-efficacy.
1.3 COMPONENT OF PHYSICAL SECURITY
Physical security consists of several components that need to be integrated to produce a good physical security control. Components that should be included in the physical security are as follows:
a. Human resources. Human resource is the most important entity in the Physical Security. It is the last bastion for the effective control of Physical Security. Teams must realize that security forces trained and professional in dealing with the safety of the installation. Members of the security forces need training related to safety practices. In addition, government forces also need to implement security awareness programs (security
5
awareness) to all the members. Thus, the safety of the installation is the responsibility of all the members.
b. Physical construction. Physical construction is the first protective layer in Physical Security. It is a physical barrier or restrictions such as walls, fences, walls, doors and windows that are intended to complicate and prevent any intrusion. The physical construction used as a clear and distinct obstacle to prevent an invasion. In addition, the use of physical construction also can reduce the use of resources and make the area look more secure and psychologically as a precautionary measure.
c. Procedure. Specific procedures related to physical security should be established. This procedure covers various aspects such as policy, policies, rules and instructions to enable the security forces to make it as a reference and guide in carrying out its duties. Procedures enacted to comply with legal requirements, practical, efficient, clear and easy to understand. Government troops also have to carry out a safety assessment based on the Confidential General Circular No. 1 of 1993.
d. Technology. Availability of the latest technology to help improve the quality of security controls on an installation. Technology platform also has strengthened physical security systems and economical use of manpower. However, the use of technology in security requires a high level of reliability among operators. It also should be tested for the ability and need to be maintained regularly to ensure their effectiveness.
The effectiveness of implementing security controls is dependent on the integration of these components. This integration will determine the physical security
6
control requirements can be met by using resources effectively and efficiently. Figure 1.1 shows the components of this requirement in the physical Security.
1.4 PHYSICAL SECURITY PLAN
Careful planning is essential in developing Physical Security controls to protect installations and assets. Drawing up a safety control requirement should be based on the principles of the Physical Security. Physical Security requirements as described in Figure 1.1.
Figure 1.1 Physical Security Requirements
The physical security control concept was based on security layer. This concept should be followed by the team in formulating effective security controls. Effective protection should be incorporated into the security layer as illustrated in Figure 1.2.
7
Figure 1.2 Layer of Defense in Depth (Security Layer)
1.5 PROBLEM STATEMENT
The military installations are usually enforced with the security awareness with initiatives to educate the soldiers, because security awareness programs can't eliminate human weakness and vulnerabilities. All military organizations in the world carry some amount of risk that can't be avoided through training. This fact drives the capacity of the security personnel to understand what is happening in their environment. Therefore, the best security awareness programs demonstrate that despite the strong human-centric controls and countermeasures, military organizations will eventually be compromised.
The existing of Standard Operating Procedures (SOP) did not detail the regulations and actions to be taken when a security breach occurred. The physical security revolves on the principles and philosophy of the security surrounding the compound of installation, the external and internal threat to the installations, security procedures in the relations to safeguarding the installation, ordnance items and military personnel, managing acts of unlawful interference so as to minimize the risk
8
and/or effect of such an act, procedure’s, self-defense techniques and military personnel safety and security.
Few commanders or others in leadership positions are not aware that security awareness training activities, nor did they provide effective mechanisms for enabling the commander on the ground to enforce participation in security programs. The commander felt that security inspections must focus on documenting compliance with requirements, example reports of security violations and attendance records.
Royal Military Police personnel that manned and deploy to physical installation being the one of the core groups of the Malaysian Army are expected to do their job and responsibilities to keep the ordnance depot, amoury stores, ammunition depot, supply and logistic depot safe and secure. In this perception of coping mechanism, they have developed perceived severity, perceived vulnerability, responsive efficacy and self-efficacy. However, despite of the above some of the military installations were trespassed by civilians.
For example, according to Utusan Publication, On January 20, 2016 at 8.10 pm an incident occurred where KEM KEMENTAH Jalan Padang Tembak Kuala Lumpur has experienced a shock when a 30-year-old man tried to enter the Kem KEMENTAH and claimed to be militants of the Islamic State (IS). He charged criminal intimidation against a member of the military, saying he had a bomb, causing fear to members of the military at that time was on duty as a guard.
1.6 RESEARCH QUESTIONS
The research is focused on the following questions:
1. What is the perception of Royal Military Police personnel’s coping mechanism about external and internal threat in Military Installation?
9
a. What is Royal Military Police personnel’s perceived severity?
b. What is Royal Military Police personnel’s perceived vulnerability?
c. What is Royal Military Police personnel’s perceived response efficacy?
d. What is Royal Military Police personnel’s self - severity?
1.7 RESEARCH AIM AND OBJECTIVES
The present study aims to explore what influences secure and insecure practice within the workplace by understanding employees’ attitudes, beliefs and security behavior.
To achieve the aim the following are the research objectives:
1. Identify the factors influences security behavior and awareness.
2. Evaluate the perception of Royal Military Police personnel’s coping mechanism in dealing with external and internal threat in military installation.
3. Recommend the necessary action in order to increase the level of security awareness among The Royal Military Police personnel.
1.8 OUTLINE OF RESEARCH METHODOLOGY
This research was conducted by using quantitative methods. In order to achieve the aim and objectives of this research, the methodology was conducted in stages, as illustrated in Figure 1.3. Firstly, literature reviews were carried out. Then, a questionnaire was prepared. Pilot surrey was carried out. From the outcome of the pilot survey, the questionnaire was edited. Then the questionnaire survey was carried out at four military camps. Data collected from the questionnaire were analyzed and report was produced.