scispace - formally typeset
Search or ask a question
Author

Christopher J. Cubbage

Bio: Christopher J. Cubbage is an academic researcher. The author has contributed to research in topics: Corporate security & Misconduct. The author has an hindex of 1, co-authored 2 publications receiving 16 citations.

Papers
More filters
BookDOI
13 Aug 2012
TL;DR: Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effect as discussed by the authors.
Abstract: As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effect

16 citations

Book ChapterDOI
19 Apr 2016

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper examined corporate philanthropy in the context of corporate wrongdoing punishment in emerging markets and found that after being punished for fraudulent behavior by the government, convicted firms tend to use Corporate philanthropy as an institutional strategy to regain legitimacy.
Abstract: This study examines corporate philanthropy in the context of corporate wrongdoing punishment in emerging markets. Building on institutional theory, we propose that in emerging markets, after being punished for fraudulent behavior by the government, which is collectively the largest institution, convicted firms tend to use corporate philanthropy as an institutional strategy to regain legitimacy. Using data of Chinese-listed firms that were punished for financial fraud in the ten years from 2004 to 2013, our findings show the subsequent growth of corporate philanthropy to be positively related to punishment severity. Furthermore, convicted firms’ media visibility, dominant state ownership, and national political appointment strengthen the effect of punishment severity on corporate philanthropy increase. Our institutional perspective offers new insights into why firms engage in corporate philanthropy after fraud punishment.

21 citations

Book ChapterDOI
01 Jan 2014
TL;DR: The security domain encompasses many parts across its broad spectrum of practice, such as national security, public security, and private security to name only a few, making it difficult to provide a single encompassing definition.
Abstract: Security is unpredictable, encompassing multidimensional heterogeneous occupations, skills, and knowledge (Brooks, 2010). The security domain encompasses many parts across its broad spectrum of practice, such as national security, public security, and private security to name only a few. Such diversity makes it difficult to provide a single encompassing definition for these many parts, as definition is dependent on applied context. One such context is corporate security.

14 citations

01 Jan 2019
TL;DR: In this paper, the authors present a survey of the security as specialised work in the British Secret Service and conclude that security as specialized work is an important area of research in the Secret Service.
Abstract: ....................................................................................................................................................... II FIGURES .......................................................................................................................................................... IX CHAPTER ONE INTRODUCTION ........................................................................................................................ 1 1.0 INTRODUCTION ................................................................................................................................... 1 1.1 BACKGROUND OF THE STUDY .................................................................................................................. 2 1.2 AN OVERVIEW OF CORPORATE SECURITY ................................................................................................... 2 1.3 THE RESEARCH .................................................................................................................................... 5 1.4 SIGNIFICANCE OF THE RESEARCH .............................................................................................................. 6 1.5 OVERVIEW OF THE STUDY ....................................................................................................................... 6 1.5.1 Chapter Two: Society, Organisation, and Work ............................................................................ 6 1.5.2 Chapter Three: Security as Specialised Work ................................................................................ 7 1.5.3 Chapter Four: Methodology ......................................................................................................... 7 1.5.4 Chapter Five: Phase One .............................................................................................................. 8 1.5.5 Chapter Six: Phase Two ................................................................................................................ 9 1.5.6 Chapter Seven: Interpretation and Discussion .............................................................................. 9 1.5.7 Chapter Eight: Conclusion and Findings ........................................................................................ 9 1.6 CONCLUSION..................................................................................................................................... 10 CHAPTER TWO SOCIETY, ORGANISATION, AND WORK ................................................................................. 11 2.0 INTRODUCTION ................................................................................................................................. 11 2.1 ORGANISATION AND SOCIETY ................................................................................................................ 11 2.2 SOCIETAL WORK AND GOALS ................................................................................................................ 12 2.3 SPECIALISATION AND INCENTIVES ........................................................................................................... 13 2.4 CLASS AND STRUCTURE ........................................................................................................................ 14 2.5 STRATIFICATION AND SUCCESS ............................................................................................................... 14 2.6 TYPICAL STRATIFIED WORK SPECIALISATIONS AND ORGANISATIONAL STRUCTURES ................................................ 16 2.7 ORGANISATIONAL PROGRESSION ............................................................................................................ 18 2.8 MEASUREMENT OF STRATIFICATION IN WORK ........................................................................................... 18 2.8.1 Uncertainty, Capacity, and Risk.................................................................................................. 20 2.8.2 The Work Stratum ..................................................................................................................... 20 2.9 STRATEGIC DECISION MAKING / WORK HIERARCHY DECISION MAKING ........................................................... 24 2.10 CONCLUSION..................................................................................................................................... 25 CHAPTER THREE SECURITY AS SPECIALISED WORK ....................................................................................... 26 3.0 INTRODUCTION ................................................................................................................................. 26 3.1 THE PRACTICE OF SECURITY .................................................................................................................. 27

12 citations

01 Jan 2016
TL;DR: Ludbey et al. as discussed by the authors proposed the Corporate Security Stratum of Work Codee Roy Ludbey v 2.4.1 and 3.5.3.4 Significance, Reliability and Validity.
Abstract: ................................................................................................................................................ I COPYRIGHT AND ACCESS DECLARATION ................................................................................................ II ACKNOWLEDGEMENTS .......................................................................................................................... III CONTENTS .............................................................................................................................................. IV LIST OF FIGURES ................................................................................................................................... VIII LIST OF TABLES ..................................................................................................................................... VIII LIST OF PUBLICATIONS ........................................................................................................................... IX Published ............................................................................................................................................ ix Under Peer Review ............................................................................................................................ ix CHAPTER ONE: INTRODUCTION .............................................................................................................. 1 1.1 Background of the Study ............................................................................................................... 1 1.1 Purpose Statement ....................................................................................................................... 2 1.2 Study Objectives ........................................................................................................................... 3 1.3 Research Questions ...................................................................................................................... 3 1.4 Significance ................................................................................................................................... 3 1.5 Overview of the Study................................................................................................................... 4 Chapter Two: Underlying Theory and Review of the Literature ..................................................... 4 Chapter Three: Methodology ......................................................................................................... 4 Chapter Four: Pilot Study ................................................................................................................ 4 Chapter Five: Analysis ..................................................................................................................... 4 Chapter Six: Interpretation and Discussion .................................................................................... 5 Chapter Seven: Conclusion and Findings ........................................................................................ 5 1.6 Conclusion ..................................................................................................................................... 5 CHAPTER TWO: UNDERLYING THEORY AND THE LITERATURE INFORMING THIS STUDY....................... 6 2.1 Sociological Theory of Structural Functionalism ........................................................................... 6 2.1.1 Criticisms of Structural Functionalism ................................................................................... 7 2.2 Organisations and Management................................................................................................... 7 2.2.1 Organisational Behaviour ....................................................................................................... 8 2.2.2 Organisational Structure ........................................................................................................ 9 2.3 Organisational Management ...................................................................................................... 11 2.3.1 Management Planning ......................................................................................................... 11 2.3.2 Management Leadership ..................................................................................................... 12 2.4 Jaques’ Requisite Organisation ................................................................................................... 13 The Corporate Security Stratum of Work Codee Roy Ludbey v 2.4.1 Work, Task Complexity, and Human Capability ................................................................... 13 2.4.2 Measurement of Work ......................................................................................................... 14 2.4.3 Level of Work and Task-Time Complexity Measures ........................................................... 14 Stratum One: Concrete Shaping / Direct Action ....................................................................... 15 Stratum Two: Diagnostic / Task Definition ............................................................................... 15 Stratum Three: Task Extrapolation / Alternative Serial Paths .................................................. 16 Stratum Four: Transforming Systems / Parallel Processing Tasks ............................................ 16 Stratum Five: Shaping Whole Systems through Direct Action .................................................. 16 Stratum Six: Defining Whole Systems through Cumulative Processing/Conceptual Abstract . 17 Stratum Seven: Development of Whole Systems through Extrapolative Development .......... 17 2.4.4 Criticisms of Jaques' Theories .............................................................................................. 17 2.5 Corporate Security ...................................................................................................................... 18 2.5.1 The Practice of Security ....................................................................................................... 19 Security Diagnosis ..................................................................................................................... 19 Security Inference ..................................................................................................................... 20 Security Treatment ................................................................................................................... 20 2.5.2 The Corporate Security Jurisdictional Boundary .................................................................. 20 2.5.3 Corporate Security Roles and Functions .............................................................................. 21 2.6 Conclusion ................................................................................................................................... 26 CHAPTER THREE: METHODOLOGY ........................................................................................................ 27 3.1 Study Design ................................................................................................................................ 27 3.2 Pilot Study ................................................................................................................................... 27 3.3 Population and Sample ............................................................................................................... 27 3.3.1 Sample Frame ...................................................................................................................... 28 3.3.2 Sample Selection .................................................................................................................. 28 3.4 Instrument .................................................................................................................................. 28 3.4.1 Work Measurement Scale .................................................................................................... 29 3.4.2 Task Complexity Measurement Tool ................................................................................... 29 3.5 Analysis ....................................................................................................................................... 29 3.5.1 Reliability and Validity .......................................................................................................... 29 3.5.2 Triangulation and External Audit ......................................................................................... 30 Triangulation ............................................................................................................................. 30 External Audit............................................................................................................................ 30 3.6 Research Ethics ........................................................................................................................... 31 The Corporate Security Stratum of Work Codee Roy Ludbey vi 3.7 Conclusion ................................................................................................................................... 31 CHAPTER FOUR: PILOT STUDY .............................................................................................................. 32 4.1 Pilot Study ................................................................................................................................... 32 4.2 Participants ................................................................................................................................. 32 4.2.1 Response Rate ...................................................................................................................... 32 4.3 Response Data ...................................

10 citations

Book ChapterDOI
TL;DR: For example, the authors pointed out that the law does not discourage such intrusive activities, particularly in so far as they relate to public agencies and, increasingly, as it relates to the investigative undertakings carried out by the private sector as well.
Abstract: On a daily basis, vast numbers of citizens around the world are being observed through the surveillance activities of others. Police, intelligence agencies, corporations, employers, media and property owners many by using their privately contracted security personnel and service providers, are all now capable of observing, filming and monitoring the activities of others, including listening in to their conversations. Increasingly, they are accessing their data, too, for marketing purposes at the lower end of the scale (Andrejevic 2012), and for intelligence analysis at the higher end (Prunckun 2010). "On-selling" of electronic information and consumer databases is now part of global commerce (Dearne 2001), too. For the most part, the law does not discourage such intrusive activities, certainly in so far as they relate to public agencies and, increasingly, as they relate to the investigative undertakings carried out by the private sector as well.

7 citations