• Tiada Hasil Ditemukan

SECURITY AWARENESS IN MILITARY PHYSICAL SECURITY

N/A
N/A
Protected

Academic year: 2022

Share "SECURITY AWARENESS IN MILITARY PHYSICAL SECURITY "

Copied!
24
0
0
Tunjuk Lagi ( halaman)

Tekspenuh

(1)

SECURITY AWARENESS IN MILITARY PHYSICAL SECURITY

BY

ZAHARUDDIN BIN HJ MOHAMMAD

A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management

Kulliyyah of Information and Communication Technology International Islamic University Malaysia

JANUARY 2018

(2)

ii

ABSTRACT

As Malaysia is developing to become a developed country, its defense system also grows rapidly with increase of personnel and sophisticated equipment and modern weaponry. The effectiveness of the control and protection of all these equipment and weaponry and its installations depends entirely on the level of understanding of the principles of physical security, legal aspects, identification of the threat and the crime and skilled in drawing up a comprehensive protection system for the control and detect any threat. The military installations are usually enforced with the security awareness with initiatives to educate the soldiers, because security awareness programs can not eliminate human weakness and vulnerabilities. The aim of the research is to develop a coping mechanism from the military perspective when dealing with treats. A questionnaire survey was used to study the factors that influence security behaviour among military personnel. It is found that factors such perceived severity, perceived vulnerability, response efficacy, and self-efficacy play important roles in influencing security behaviour. The level of security awareness among military personnel it is high. The recommendation is that the security awareness to increase through campaign, rewards and reviewing standard operating procedure.

.

(3)

iii

ثحبلا ةصلاخ

ABSTRACT IN ARABIC

اهعافد ماظن و ,ةمدقتم ةلود حبصت يكل رمتسم روطت في تيلا لودلا نم يه ايزيلام دارفلأا و ةيرصعلا ةحلسلأا و ةروطتلما تادعلماب دوزم و رمتسم نستح في اضيأ يركسعلا ا تادعلما في ةلاعفلا ةرطيسلا و يربكلا روطتلا اذه .ةزاتملما تاراهلما وذ دمتعي ةيركسعل

بناولجا و يدالما نملأل ةيساسلأا ئدابملل مهفلا و كاردلأا ىوتسم ىلع ةيربك ةروصب ةياملحا نع ثحبلا ةلوامح و تاديدهتلا نع فشكلا و مئارلجا ىلع فرعتلا و ةينوناقلا تززع ةيزيلالما ةيركسعلا تآشنملل عافدلا ماظن مسر في تاراهلما للاخ نم ةلماشلا ىلع يعولا ةملاسلاب يعولا جمانرب نلأ. ينيركسعلا دارفلأا ةيبرت ىلع ةردابلما و ةملاسلا

ةيلآ ينستح ةلوامح وه ثحبلا اذه نم فدلها .مهزجع و سانلا فعض حلصي نأ عيطتسي هذه في نايبتسأ مادختسأ تم .تاديدهتلا ةمواقم في ةيركسعلا رظنلا تاهجو نم فيكتلا تيلا لماوعلا ةسارد ضرغل ةساردلا تم دقل و .ينيركسعلا دارفلأل نيملأا كولسلا ىلع رثؤت

,ةباجتسلأا ةعرس و ,ةينملأا رطاخلما كاردإ و ,ةملاسلاب يعولا لثم لماوعلا هذه نأ دايجإ .ينيركسعلا دارفلأا ىدل نيملأا كولسلا ددتح تيلا ةمهلما لماوعلا نم ةيتاذلا ةءافكلا و كسعلا دارفلأا ىدل نيملأا يعولا رادقم اله لصوت تيلا تايصوتلا و .اًدج لياع ناك ينير

للاخ نم ينيركسعلا دارفلأا ىدل نيملأا يعولا رادقم ةدايز و ينستح بيج هنأ يه ثحبلا ةيسايقلا تاءارجلأا و يرياعلما ةعجارم للاخ نم اضيأ و ,مهزيفتح و ةرمتسلما تلاملحا .دارفلأا ءلاؤه ىدل نيملأا يعولا ةدايزل

.

(4)

iv

APPROVAL PAGE

I certify that I have supervised and read this study and that in my opinion, it conforms to acceptable standards of scholarly presentation and is fully adequate, in scope and quality, as a dissertation for the degree of Master of Protective Security Management.

………..

Maisarah Ali Supervisor

I certify that I have read this study and that in my opinion it conforms to acceptable standards of scholarly presentation and is fully adequate, in scope and quality, as a dissertation for the degree of Master of Protective Security Management.

………..

Nurul Nuha Abdul Molok Internal Examiner

This dissertation was submitted to the Centre for IT Advancement and is accepted as a fulfilment of the requirement for the degree of Master of Protective Security Management.

………..

Umar Aditiawarman

Head, Centre for IT Advancement

This dissertation was submitted to the Kulliyyah of Information and Communication Technology and is accepted as a fulfilment of the requirement for the degree of Master of Protective Security Management.

………..

Abdul Wahab Abdul Rahman Dean, Kulliyyah of Information and Communication Technology

(5)

v

DECLARATION

I hereby declare that this dissertation is the result of my own investigations, except where otherwise stated. I also declare that it has not been previously or concurrently submitted as a whole for any other degrees at IIUM or other institutions.

Zaharuddin Hj Muhammad

Signature ... Date ...

(6)

vi

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA

DECLARATION OF COPYRIGHT AND AFFIRMATION OF FAIR USE OF UNPUBLISHED RESEARCH

SECURITY AWARENESS IN MILITARY PHYSICAL SECURITY

I declare that the copyright holders of this dissertation is Zaharuddin Bin Hj Muhammad.

Copyright © 2018 Zaharuddin Bin Hj Muhammad. All rights reserved.

No part of this unpublished research may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without prior written permission of the copyright holder except as provided below

1. Any material contained in or derived from this unpublished research may only be used by others in their writing with due acknowledgement.

2. IIUM or its library will have the right to make and transmit copies (print or electronic) for institutional and academic purposes.

3. The IIUM library will have the right to make, store in a retrieved system and supply copies of this unpublished research if requested by other universities and research libraries.

By signing this form, I acknowledged that I have read and understand the IIUM Intellectual Property Right and Commercialization policy.

Affirmed by Zaharuddin Bin Hj Muhammad

……..……….. ………..

Signature Date

(7)

vii

This dissertation is dedicated to my beloved father and mother, my wife, daughters, son, my brothers and sister.

(8)

viii

ACKNOWLEDGEMENTS

All praise and adorations belong to Allah, the Compassionate Creator and All- Knowing. May His peace and blessings be showered upon the soul of Prophet Muhammad (S.A.W).

It is my utmost pleasure to dedicate this work to my dear parents, and my family, who granted me the gift of their unwavering belief in my ability to accomplish this goal. Thank you for your support, understanding, encouragement, and much more made this journey possible. This study is also dedicated to my late father for laying the foundation of what I turned out to be in life.

I dedicate this work to my lovely wife, Mdm. Norhaslin Isthnin for her full support, everyday encouragement and understanding throughout the period we have been pursuing this course, though support is far too meek a word to describe the sustenance she provides. May Allah bless you abundantly, my love. My children Mimi Martina Athirah, Muhammad Faiq Dennise, Mimi Marina Afiqah and Mimi Marina Afifah.

I am deeply indebted to my supervisor, Prof. Ir .Dr. Maisarah Ali, who guided and encouraged me throughout this study. She has given me great confidence, encouragement, guidance, and a tremendous amount of support throughout my research studies Thank you very much and may Allah bless you.

Finally, I wish to express my appreciation and thanks to those who provided their time, effort and support for this work.

(9)

ix

TABLE OF CONTENTS

Abstract ... ii

Abstract in Arabic ... iii

Approval page ... iv

Declaration ... v

Copyright Page ... vi

Acknowledgements ... viii

Table of Contents ... ix

List of Tables ... xii

List of Figures ... xiv

CHAPTER ONE: INTRODUCTION ... 1

1.1 Background ... 1

1.2 Dimension of Military Installation ... 3

1.3 Component of Physical Security ... 4

1.4 Physical Security Plan ... 6

1.5 Problem Statement ... 7

1.6 Research Questions ... 8

1.7 Research Aim and Objectives ... 9

1.8 Outline of Research Methodology ... 9

1.9 Significant of the Reasearch ... 10

1.10 Scope and Limitation ... 11

CHAPTER TWO: LITERATURE REVIEW ... 12

2.1 Introduction ... 12

2.2 What Influences Secure Behavior? ... 12

2.2.1 Self-Efficacy ... 13

2.2.2 Social Influence ... 13

2.2.3 Attitude ... 14

2.2.4 Perceived Susceptibility ... 14

2.2.5 Perceived Severity ... 15

2.2.6 Response Efficacy ... 15

2.2.7 Response Costs ... 15

2.3 Existing Security Awareness Approaches ... 16

2.4 Security Awareness Training ... 21

2.5 Physical Security ... 23

2.6 Security Awareness and Training Planning ... 24

2.6.1 Designing and Delivering Security Awareness and Training... 24

2.6.2 Security Awareness Techniques ... 25

2.6.3 Monitoring the Effectiveness of Security Awareness and Training ... 26

2.6.4 Monitoring Security Incidents ... 27

2.7 Environmental Security ... 27

2.8 Future Threats ... 28

(10)

x

2.9 Framework for Analyzing Security Awareness Approaches ... 30

2.10 Security Awareness Approaches ... 32

2.11 Chapter Summary ... 33

CHAPTER THREE: RESEARCH METHODOLOGY ... 34

3.1 Introduction ... 34

3.2 Research Design and Approach ... 34

3.3 Research Instrument ... 35

3.3.1 Questionnaire Design ... 36

3.3.2 Attitude Rating Scale - The Likert Scale ... 37

3.4 Sampling ... 38

3.4.1 Sampling Technique ... 38

3.4.2 Calculating the Sample Size ... 39

3.5 Pilot Survey ... 39

3.6 Data Processing and Analysis ... 40

3.6.1 Data Checking ... 40

3.6.2 Data Editing ... 40

3.6.3 Data Coding ... 41

3.6.4 Data Transcribing ... 41

3.6.5 Data Analysis ... 41

CHAPTER FOUR: RESULT, ANALYSIS AND DISCUSSION ... 43

4.1 Introduction ... 43

4.2 Profile of the Respondents ... 43

4.2.1 Gender, Age, Grade and Qualifications ... 43

4.2.2 Working Experience ... 45

4.2.3 Academic / Education Level ... 46

4.3 Perceived Severity ... 48

4.3.1 Suspicious Looking Civilian Visitor, Military Personnel Or Situation. ... 48

4.3.2 Suspicious Visitor, Military Personnel or Situation Will Take Action. ... 49

4.3.3 Allowing an Unauthorized Person to Military Installation. ... 50

4.3.4 Taking Unused Government Property Is A Serious Offense. ... 51

4.3.5 Trespassing A Military Installation Is Not A Serious Offense. ... 52

4.4 Perceived Vulnerability ... 52

4.4.1 My Life Could Be Endangered During Duty In A Military Installation. ... 52

4.4.2 Subjected to a Terrorist Threat or Violent Criminal Acts. ... 53

4.4.3 Subjected to Deal With Disruptive Visitor During In Duty. ... 54

4.4.4 Subjected to Deal With Explosives or Unauthorized Pyrotechnics ... 55

4.5 Response Efficacy ... 57

4.5.1 Awareness of Security Threats and Training Will Enable to Protect Military Installation. ... 57

4.5.2 Taking Security Precautions Is Very Difficult. ... 58

4.5.3 My Military Skills and Knowledge Are Adequate. ... 59

4.5.4 Practicing Safety and Security Measure Is Important For Safety on Duty. ... 60

(11)

xi

4.5.5 Practicing Safety and Security Measure Is Important for the

Safety of Others. ... 61

4.6 Self-Efficacy ... 62

4.6.1 The Ability to Handle Any Security Problems or Action When on Duty. ... 62

4.6.2 The Ability to Coax an Irritating Visitor From Becoming Angrier. ... 63

4.6.3 I Can Calm Anxious Visitor Inside A Military Installation. ... 64

4.7 Security Awareness Level ... 65

4.7.1 Apply Standard Operating Procedures (Sop) When Dealing With Security Situation ... 65

4.7.2 I Share With Those Who Are Close to Me About Safety And Security Procedures In A Military Installation. ... 66

4.7.3 I Informed People Who Are Close to Me About My Duty Roster ... 67

4.7.4 I Checked The Content Of Any Package That Is Passed To Me . 68 4.7.5 Lock My Weapon And Military Gear While On Duty. ... 69

4.7.6 Read The Standard Operating Procedures (Sop) To Understand The Process And Procedures. ... 70

4.8 To Increase Level Of Security Awarness Among The Royal Military Police Personnel ... 71

4.8.1 I Am Confident That Security Awareness Can Be Increased Through Campaign. ... 71

4.8.2 I Am Confident That Security Awareness Can Be Increased Through Reward ... 72

4.8.3 I Am Confident That Security Awareness Can Be Increase Through Designing of Sop Review ... 73

4.9 Summary ... 74

CHAPTER FIVE: CONCLUSION ... 75

5.1 Introduction ... 75

5.2 Summary of Findinngs ... 75

5.3 Conclusion ... 77

5.4 Implication of The Study ... 78

5.5 Limitation of the Study ... 79

5.6 Recommendations for the Future Study ... 79

REFERENCES ... 80

APPENDICES ... 82

1. Appendix A: The Questionnaire. ... 82

(12)

xii

LIST OF TABLES

Table 3.1 The Likert Scale 38

Table 4.1 Gender of Respondents 44

Table 4.2 Age of Respondents 45

Table 4.3 Number of Years in Military Service 45

Table 4.4 Highest Academic Qualification of Respondents 46

Table 4.5 Trained in Unarmed Combat Skill 47

Table 4.6 Suspicious Looking Civilian Visitor, Military Personnel or

Situation 48

Table 4.7 Suspicious Visitor, Military Personnel or Situation Will Take

Action 49

Table 4.8 Allowing an Unauthorized Person to Military Installation 50 Table 4.9 Taking unused government property is a serious offense 51 Table 4.10 Trespassing a military installation is not a serious offense 52 Table 4.11 My Life Could Be Endangered During Duty in A Military

Installation 52

Table 4.12 Subjected to A Terrorist’s Threat or Violent Criminal Acts 53 Table 4.13 Subjected to Deal with Disruptive Visitor During in Duty 54 Table 4.14 Subjected to Deal with Explosives or Unauthorized

Pyrotechnics 55

Table 4.15 Awareness on Security Threats and Training Will Enable to

Protect Safety 57

Table 4.16 Taking Security Precautions is very Difficult 58 Table 4.17 My military skills and knowledge on safety and security are

adequate 59

Table 4.18 Practicing Safety and Security Measure Is Important for Safety

on Duty 60

Table 4.19 Practicing Safety and Security Measure Is Important for The

Safety of Others 61

(13)

xiii

Table 4.20 The Ability to Handle Any Security Problems or Action When

on Duty 62

Table 4.21 The Ability to Coax an Irritating Visitor from Becoming

Angrier 63

Table 4.22 I Can Calm Anxious Visitor Inside a Military Installation 64 Table 4.23 Apply Standard Operating Procedures (SOP) When Dealing

with Security Situation 65

Table 4.24 I share with those who are close to me about safety and

security procedures in a military installation 66 Table 4.25 I Informed People Who Are Close to Me About My Duty

Roster 67

Table 4.26 I Checked the Content of Any Package That Is Passed to Me 68 Table 4.27 Lock My Weapon and Military Gear While on Duty 69 Table 4.28 Read the Standard Operating Procedures (SOP) To Understand

the Process and Procedures 70

Table 4.29 I Am Confident That Security Awareness Can Be Increased

Through Campaign 71

Table 4.30 I Am Confident That Security Awareness Can Be Increased

Through Reward 72

Table 4.31 I Am Confident That Security Awareness Can Be Increase

Through Designing of SOP Review 73

(14)

xiv

LIST OF FIGURES

Figure 1.1 Physical Security Requirements 6

Figure 1.2 Layer of Defense in Depth (Security Layer) 7

Figure 1.3 Flowchart of Research Methodology 10

Figure 3.1 Methodology Flowchart of the Study 35

Figure 4.1 Genders of Respondents 44

Figure 4.2 Ages of Respondents 45

Figure 4.3 Number of Years in Military Service 46

Figure 4.4 Highest Academic Qualifications of Respondents 47 Figure 4.5 Suspicious Looking Civilian Visitor, Military Personnel or

Situation 48

Figure 4.6 Suspicious Visitor, Military Personnel or Situation Will Take

Action 49

Figure 4.7 Allowing an Unauthorized Person to Military Installation 50 Figure 4.8 Taking unused government property is a serious offense 51 Figure 4.9 My Life Could Be Endangered During Duty in A Military

Installation 53

Figure 4.10 Subjected to a Terrorist’s Threat or Violent Criminal Acts 54 Figure 4.11 Subjected to Deal with Disruptive Visitor during In Duty 55 Figure 4.12 Subjected to Deal with Explosives or Unauthorized

Pyrotechnics 56

Figure 4.13 Awareness on Security Threats and Training Will Enable

Protect Safety in Military Installation 57

Figure 4.14 Taking Security Precautions is very difficult 58 Figure 4.15 My Military Skills and Knowledge Are Adequate 59 Figure 4.16 Practicing Safety and Security Measure Is Important for Safety

on Duty 60

(15)

xv

Figure 4.17 Practicing Safety and Security Measure Is Important for The

Safety of Others 61

Figure 4.18 The Ability to Handle Any Security Problems or Action When

on Duty 62

Figure 4.19 The Ability to Coax an Irritating Visitor from Becoming

Angrier 63

Figure 4.20 I can calm anxious visitor inside a military installation 64 Figure 4.21 Apply Standard Operating Procedures (SOP) When Dealing

with Security Situation 66

Figure 4.22 I share with those who are close to me about safety and

security procedures in a military installation 67 Figure 4.23 I Informed People Who Are Close to Me about My Duty

Roster 68

Figure 4.24 I Checked the Content of Any Package That Is Passed to Me 69 Figure 4.25 Lock My Weapon and Military Gear While on Duty 70 Figure 4.26 Read the Standard Operating Procedures (SOP) To Understand

the Process and Procedures 71

Figure 4.27 I Am Confident That Security Awareness Can Be Increased

Through Campaign 72

Figure 4.28 I Am Confident That Security Awareness Can Be Increased

Through Reward 73

Figure 4.29 Am Confident That Security Awareness Can Be Increase

through Designing of SOP Review 74

(16)

1

CHAPTER ONE INTRODUCTION

1.1 BACKGROUND

Royal Malaysian Armed Forces has grown rapidly and is equipped with various equipment and modern weaponry. This situation led to the construction of installations and facilitate in line with the development of the Royal Malaysian Police Corps (RMPC). All equipment and weapons placed in strategic locations; aim to protect them from any threat. Thus, the physical nature of security is needed to protect all these installations. To control these installations should use a combination of approaches manpower and comprehensive protection system.

The effectiveness of the control and protection of all these installations depends entirely on the level of understanding of the principles of physical security, and legal aspects, identification of the threat and the crime and skilled in drawing up a comprehensive protection system for the control and detect any threat. Apart from the planning and crime prevention programs also need to be given serious attention to curb the threats that can cripple the function and role of an installation to the service.

Government forces are also required to always make a study on the overall physical security by conducting inspections, exercises to test preparedness and protection systems to ensure the safety task can be implemented effectively.

There are four Royal Military Police Corps camps in the Klang Valley:

a. Headquarters 4 Regiment Royal Military Police Corps (RMPC) was established on June 1, 1981 through the establishment of the power of the FED ( M ) / 3011 ( A ) / 13/80 and is based in Camp Batu 10, Kuantan, Pahang which responsible for providing policing assistance to teams under

(17)

2

the auspices of the Headquarters 4 Division. On Apr 16, 1996, 4 Division moved from Camp Batu 10, Kuantan to Camp Wardieburn, Kuala Lumpur as the Central Government formation. 4RMPC is currently responsible for managing the companies.

b. 11 Company RMPC in Camp Perdana, Sungai Besi, Selangor. This coy was established on June 1, 1971 through the establishment of the power of the FED (M) / 3097/1/83. The Tasks and responsibilities 11 Coy RMPC tasks are made within Selangor.

c. 12 Company RMPC in Camp Genting Klang, Kuala Lumpur. With the relocation and restructuring of the Malaysian Army on January 1, 1996, the Coy has taken over the assignment of duty, especially in the Klang Valley from 11 Coy RMPC. Tasks and responsibilities of 12 Coy RMPC involve within Kuala Lumpur area. In addition, tasks of ceremonial duties involve HRH Majesty the King's enthronement ceremony at King Palace Malaysia.

d. 101 Company RMPC in Camp Batu Kentomen, Kuala Lumpur was established on June 1, 1971 based on Whoosh Gae, Rifle Range Road, Kuala Lumpur andin accordance with the Malaysia Army development this Coy have converted to 101 Company RMPC (Base) at Kem Genting Klang, Kuala Lumpur guided by the power of the establishment of Feb (M) / 3097/1/83 force on Feb 19, 1983. Finally, in 1987, the team was moved to Kem Aman, Kuala Lumpur. This team is responsible for the physical security at the following locations:

1. Storage Depots Defense (DSP), Sungai Buloh.

(18)

3

2. 93 WKSP Manufacturing Headquarters Staff of the Armed Forces in Sungai Buloh Station.

3. Government Headquarters Army Training (MPLTD) in Kuala Lumpur.

4. 93 Base Ammunition Depot (93 BAD) in BatuArang, Selangor.

1.2 DIMENSION OF MILITARY INSTALLATION

Military installation physical security is the protection of personnel, hardware, programs, networks and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism. In such situations, security systems can be expensive and certain technologies may be unavailable. The intent is to avoid unreasonable costs and implement a balanced solution, which still meets security requirements. To ensure effective and regular training, most the facilities have included security awareness in the mandatory annual safety and protection training. In order to ensure compliance and best practices, security awareness is now integrated into a mandatory refresher training courses and safety manuals and is provided to on site security personnel.

The existence of Standard Operating Procedures (SOP) did not detail the regulations and actions to be taken when a security breach occurred. The physical security revolves on the principles and philosophy of the security surrounding the compound of installation, the external and internal threat to the installations, security procedures in the relations to safeguarding the installation, ordnance items and military personnel, managing acts of unlawful interference so as to minimize the risk

(19)

4

and/or effect of such an act, procedure’s, self-defense techniques and military personnel safety and security.

Few commanders or others in leadership positions are not aware the security awareness training activities, nor did they provide effective mechanisms for enabling the commander on the ground to enforce participation in security programs. The commander felt that security inspections must focus on documenting compliance with requirements, e.g., reports of security violations and attendance records.

Royal Military Police personnel that manned and deploy to a physical installation are one of the core groups of the Malaysian Army. They are responsible to keep the ordnance depot, amoury stores, ammunition depot, supply and logistic depot safe and secure. In this perception of coping mechanism, they are developed to define as Royal Military Police personnel perceived severity, perceived vulnerability, responsive efficacy and self-efficacy.

1.3 COMPONENT OF PHYSICAL SECURITY

Physical security consists of several components that need to be integrated to produce a good physical security control. Components that should be included in the physical security are as follows:

a. Human resources. Human resource is the most important entity in the Physical Security. It is the last bastion for the effective control of Physical Security. Teams must realize that security forces trained and professional in dealing with the safety of the installation. Members of the security forces need training related to safety practices. In addition, government forces also need to implement security awareness programs (security

(20)

5

awareness) to all the members. Thus, the safety of the installation is the responsibility of all the members.

b. Physical construction. Physical construction is the first protective layer in Physical Security. It is a physical barrier or restrictions such as walls, fences, walls, doors and windows that are intended to complicate and prevent any intrusion. The physical construction used as a clear and distinct obstacle to prevent an invasion. In addition, the use of physical construction also can reduce the use of resources and make the area look more secure and psychologically as a precautionary measure.

c. Procedure. Specific procedures related to physical security should be established. This procedure covers various aspects such as policy, policies, rules and instructions to enable the security forces to make it as a reference and guide in carrying out its duties. Procedures enacted to comply with legal requirements, practical, efficient, clear and easy to understand. Government troops also have to carry out a safety assessment based on the Confidential General Circular No. 1 of 1993.

d. Technology. Availability of the latest technology to help improve the quality of security controls on an installation. Technology platform also has strengthened physical security systems and economical use of manpower. However, the use of technology in security requires a high level of reliability among operators. It also should be tested for the ability and need to be maintained regularly to ensure their effectiveness.

The effectiveness of implementing security controls is dependent on the integration of these components. This integration will determine the physical security

(21)

6

control requirements can be met by using resources effectively and efficiently. Figure 1.1 shows the components of this requirement in the physical Security.

1.4 PHYSICAL SECURITY PLAN

Careful planning is essential in developing Physical Security controls to protect installations and assets. Drawing up a safety control requirement should be based on the principles of the Physical Security. Physical Security requirements as described in Figure 1.1.

Figure 1.1 Physical Security Requirements

The physical security control concept was based on security layer. This concept should be followed by the team in formulating effective security controls. Effective protection should be incorporated into the security layer as illustrated in Figure 1.2.

(22)

7

Figure 1.2 Layer of Defense in Depth (Security Layer)

1.5 PROBLEM STATEMENT

The military installations are usually enforced with the security awareness with initiatives to educate the soldiers, because security awareness programs can't eliminate human weakness and vulnerabilities. All military organizations in the world carry some amount of risk that can't be avoided through training. This fact drives the capacity of the security personnel to understand what is happening in their environment. Therefore, the best security awareness programs demonstrate that despite the strong human-centric controls and countermeasures, military organizations will eventually be compromised.

The existing of Standard Operating Procedures (SOP) did not detail the regulations and actions to be taken when a security breach occurred. The physical security revolves on the principles and philosophy of the security surrounding the compound of installation, the external and internal threat to the installations, security procedures in the relations to safeguarding the installation, ordnance items and military personnel, managing acts of unlawful interference so as to minimize the risk

(23)

8

and/or effect of such an act, procedure’s, self-defense techniques and military personnel safety and security.

Few commanders or others in leadership positions are not aware that security awareness training activities, nor did they provide effective mechanisms for enabling the commander on the ground to enforce participation in security programs. The commander felt that security inspections must focus on documenting compliance with requirements, example reports of security violations and attendance records.

Royal Military Police personnel that manned and deploy to physical installation being the one of the core groups of the Malaysian Army are expected to do their job and responsibilities to keep the ordnance depot, amoury stores, ammunition depot, supply and logistic depot safe and secure. In this perception of coping mechanism, they have developed perceived severity, perceived vulnerability, responsive efficacy and self-efficacy. However, despite of the above some of the military installations were trespassed by civilians.

For example, according to Utusan Publication, On January 20, 2016 at 8.10 pm an incident occurred where KEM KEMENTAH Jalan Padang Tembak Kuala Lumpur has experienced a shock when a 30-year-old man tried to enter the Kem KEMENTAH and claimed to be militants of the Islamic State (IS). He charged criminal intimidation against a member of the military, saying he had a bomb, causing fear to members of the military at that time was on duty as a guard.

1.6 RESEARCH QUESTIONS

The research is focused on the following questions:

1. What is the perception of Royal Military Police personnel’s coping mechanism about external and internal threat in Military Installation?

(24)

9

a. What is Royal Military Police personnel’s perceived severity?

b. What is Royal Military Police personnel’s perceived vulnerability?

c. What is Royal Military Police personnel’s perceived response efficacy?

d. What is Royal Military Police personnel’s self - severity?

1.7 RESEARCH AIM AND OBJECTIVES

The present study aims to explore what influences secure and insecure practice within the workplace by understanding employees’ attitudes, beliefs and security behavior.

To achieve the aim the following are the research objectives:

1. Identify the factors influences security behavior and awareness.

2. Evaluate the perception of Royal Military Police personnel’s coping mechanism in dealing with external and internal threat in military installation.

3. Recommend the necessary action in order to increase the level of security awareness among The Royal Military Police personnel.

1.8 OUTLINE OF RESEARCH METHODOLOGY

This research was conducted by using quantitative methods. In order to achieve the aim and objectives of this research, the methodology was conducted in stages, as illustrated in Figure 1.3. Firstly, literature reviews were carried out. Then, a questionnaire was prepared. Pilot surrey was carried out. From the outcome of the pilot survey, the questionnaire was edited. Then the questionnaire survey was carried out at four military camps. Data collected from the questionnaire were analyzed and report was produced.

Rujukan

DOKUMEN BERKAITAN

storage and retrieval system, without permission in writing from The Secretariat ISICAS 2015, Institut Islam Hadhari (HADHARI), Universiti Kebangsaan Malaysia, 43600 UKM

The aim of this study is to establish the percentage of mismatch bCI\\ cell the an thropometries variable and the classroom chaIr dimension used during school

In this research, the researchers will examine the relationship between the fluctuation of housing price in the United States and the macroeconomic variables, which are

This study tries to introduce the comprehensive framework for security effectiveness of health information systems based on security culture and the

This article is to examine the security environment and perspective of national security in Sri Lanka, identify the non-traditional security threats and analyse the impact on

Given and , the GGH-CVP instance is a problem to find the lattice vector that is located closest to the ciphertext vector such that Euclidean distance is minimum.. Since

The shifting dynamic between these elements has contributed to the paradox that at a time in which the ability to write clearly, concisely, and in a 'reader-friendly' way is

To investigate the effects of structured versus unstructured cyber security training module on cyber security awareness and perceived behaviour among college students from

Technical committees in practice Chapter Six External Relationship of the NVTC Secretariat Introduction The scope of the NVTC’s responsibilities

Exclusive QS survey data reveals how prospective international students and higher education institutions are responding to this global health

،)سدقلا فِ رهظي رمع( ةياور فِ ةنمضتلما ةيملاسلإا رصانعلا ضعب ةبتاكلا تلوانت ثحبلا ةثحابلا زّكرت فوسو ،ةياوّرلا هذله ماعلا موهفلماب قلعتي ام ةساردلا كلت

The immigrants’ quest for food ‘from home’ highlights the centrality of culinary practices in their lives and the strong relationship between food and a sense belonging to a

These measures cover the protocol to establish and protect the password, use an anti - virus product, control by minimizing security risk when sending e -mail or using

The data was collected through questionnaire survey and analysed by Statistical Package for Social Science (SPSS). The relationship between independent variables which are

Abstract: The structural contradictions of being Muslim and members of a nation-state for women in modern-day Muslim nation-states created after the Second World War have never

Therefore, it can be assumed that when the motivation, ability, and trigger factors in the persuasive technology context have a positive effect on the end-user, the end-user’s

The remaining thirteen papers addressed issues related to the teaching of MaqÉÎid al-SharÊ≤ah in institutions of higher learning in Muslim countries, the relationship between the

Security P olicy OrganizationalSecurity Asset Classifica tionand Control Personnel Security Physical andEnvironmentalSecurity Communicationsand OperationsManagement Access Contr

Thus, this study (A Vocabulary Test to Assess the Privacy and Information Security Awareness in Online Social Networking among University College Students) was initiated to

As a result of the disintegration of many empires, and the process of decolonization, there came into existence some independent states without having a direct

This study tries to measure the influence of education, culture and behaviour on students’ security awareness; besides that, this study tries to determine the security

Food security, as defined by the United Nations (2020) Committee on World Food Security refers to a situation where human beings should have physical, social, and economic

Nonetheless, the traditional conception of defining the notion of security, wherein the security concept should stay in the realm of military issues, does not mean that the NTS