Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Associate Professor Dave Brooks

Honorary Associate Professor

Staff Member Details
Email: d.brooks@ecu.edu.au
ORCID iD: https://orcid.org/0000-0002-5770-5517

David is an Honorary Associate Professor within the School of Science.

Background

Prior to taking up the Security Science position with Edith Cowan University, David was employed by the Australian Defence Department as the Western Australian Regional Contract Manager for fixed plant and equipment. He was primarily responsible for the development, implementation and maintenance of the strategic process of Defence facility plant maintenance.

Previous employment includes seven years within the commercial security environment as a technical consultant and 13 years in the Royal Air Force (UK) as a Development Engineer in Air Defence Radar and Display systems.

David has published over 80 articles, with four books and numerous book chapters and academic journals in Security Science. Books include Security Science: The Theory and Practice of Security, and Corporate Security in the Asia Pacific Region. He actively maintains an involvement in the security industry, engaged in assisting organisations to develop effective security policy and guidance.

Professional Memberships

  • 2020 to present, ASIS Foundation Board of Trustees, Trustee
  • 2009 to present, Security Journal, Advisory Board member
  • 2018 to 2019, ASIS International, Professional Development Council member
  • 2011 to present, ASIS International, WA Chapter Executive member
  • 2016 to 2017, Western Australian, Police Minister’s Security Industry Advisory Committee member

Awards and Recognition

University and National Teaching Awards

  • 2004, School of Engineering Distinguished Service Award for Service
  • 2010, Executive Dean’s Award in recognition of continued growth in research profile

Research Areas and Interests

  • Security Science education: Understanding, developing and defining Corporate Security body of knowledge and curriculum
  • Security engineering design methodology
  • Intelligent and Smart building systems: Policy and guidance in mitigating system threats and risks
  • Security risk management: Interrelationship and assessment of threat, criticality and vulnerability
  • Psychometric multidimensional scaling (MDS): To present normative knowledge structure
  • Resilience within Security: Both within an organisation and as a vetting tool.

Qualifications

  • Doctor of Philosophy Science and Mathematics Education, Curtin University of Technology, 2008.
  • Master of Science (Security Science), Edith Cowan University, 2003.
  • BSc (Security Science), Edith Cowan University, 1999.

Research Outputs

Book Chapters

Conference Publications

  • Coole, M., Evans, D., Brooks, D. (2022). A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System. Proceedings - International Carnahan Conference on Security Technology (1-6). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCST52959.2022.9896573.

Journal Articles

  • Medbury, J., Brooks, D., Coole, M. (2021). The efficacy of aligning lessons learnt from significant bushfire incidents to the organisational stratum. The Australian Journal of Emergency Management, 36(2), 26-33. https://doi.org/10.47389/36.2.26.

Book Chapters

Journal Articles

  • Ludbey, C., Brooks, D., Coole, M. (2020). Corporate security career progression: a comparative study of four Australian organisations. Security Journal, 33(4), 531-551. https://doi.org/10.1057/s41284-019-00189-3.
  • Brooks, D., Coole, M., Haskell-Dowland, P. (2020). Intelligent Building Systems: Security and Facility Professionals’ Understanding of System Threats, Vulnerabilities and Mitigation Practice. Security Journal, 33(2), 244–265. https://doi.org/10.1057/s41284-019-00183-9.

Book Chapters

Journal Articles

  • Brooks, D., Coole, M., Corkill, J. (2018). Revealing community security within the Australian security continuum. Security Journal, 31(1), 53-72. https://doi.org/10.1057/s41284-016-0088-4.
  • Ludbey, C., Brooks, D., Coole, M. (2018). Corporate Security: Identifying and Understanding the Levels of Security Work in an Organisation. Asian Journal of Criminology, 13(2), 109-128. https://doi.org/10.1007/s11417-017-9261-x.
  • Coole, M., Brooks, D., Minnaar, A. (2018). Educating the Physical Security Professional: Developing a science based curriculum. Security Journal, 31(2), 524-547. https://doi.org/10.1057/s41284-017-0114-1.

Book Chapters

  • Corkill, J., Brooks, D., Pooley, JA., Cohen, L., Harris, K., Ferguson, C., Harms, C. (2017). The use of resilience indicators to assist in the selection of personnel for employment in classified and covert environments. The Routledge International Handbook of Psychosocial Resilience (436-450). Routledge.

Journal Articles

  • Coole, M., Brooks, D., Minnaar, A. (2017). The physical security professional: Mapping a body of knowledge. Security Journal, 30(4), 1169-1197. https://doi.org/10.1057/s41284-016-0084-8.
  • Ludbey, C., Brooks, D. (2017). Stratum of security practice: Using risk as a measure in the stratification of security works. Security Journal, 30(3), 686-702. https://doi.org/10.1057/sj.2015.50.

Conference Publications

  • Brooks, D., Coole, M. (2017). Codifying knowledge in the development of the discipline of Security Science: Knowledge to diagnose, infer and treat the security problem. Safety and Reliability – Theory and Applications (2453-2460). CRC Press. https://doi.org/10.1201/9781315210469-309.

Reports

  • Brooks, D., Coole, M., Haskell-Dowland, P., Griffiths, M., Lockhart, N. (2017). Building Automation & Control Systems An Investigation into Vulnerabilities, Current Practice & Security Management Best Practice. Australia. ASIS Foundation.
  • Brooks, D., Corkill, J., Coole, M. (2017). A Literature Critique on The Efficacy of Pseudonyms: An investigation into Current Research and Application. Australia. Australian Taxation Office.

Book Chapters

  • Brooks, D., Corkill, J., Coole, M. (2016). The Australian Security Continuum: National and Corporate Security Gaps from a Surveillance Language Perspective. National Security, Surveillance and Terror: Canada and Australia in Comparative Perspective (133-154). Springer. https://doi.org/10.1007/978-3-319-43243-4_6.

Journal Articles

Conference Publications

  • Brooks, D., Coole, M., Johnson, C., Corkill, J., Jenkinson, M. (2015). Efficacy of property marking as situational crime prevention strategy. The Proceedings of 8th Australian Security and Intelligence Conference (5-11). Security Research Institute, Edith Cowan University.
  • Malmenbratt, J., Brooks, D. (2015). CCTV surveillance: The differing aims and functions of CCTV within the corporate stratum. The Proceedings of 8th Australian Security and Intelligence Conference (28-35). Security Research Institute, Edith Cowan University.

Book Chapters

  • Sarre, R., Brooks, D., Smith, C., Draper, R. (2014). Current and emerging technologies employed to abate crime and to promote security. The Routledge Handbook of International Crime and Justice Studies (327-349). Routledge.
  • Brooks, D., Smith, C. (2014). Engineering Principles in the Protection of Assets. Handbook of Security (107-132). Palgrave Macmillan.
  • Brooks, D., Corkill, J. (2014). Corporate security and the stratum of security management. Corporate Security in the 21st Century: Theory and Practice in International Perspective (216-234). Palgrave Macmillan.
  • Brooks, D. (2014). Intrusion Detection Systems in the Protection of Assets. Handbook of Security (683-704). Palgrave Macmillan.

Journal Articles

  • Coole, M., Brooks, D. (2014). Do Security Systems Fail Because of Entropy?. Journal of Physical Security, 7(2), 50-76.

Conference Publications

  • Separovic, C., Brooks, D. (2014). Efficacy of property marking: police identification of stolen property. The Proceedings of 7th Australian Security and Intelligence Conference (33-40). Edith Cowan University.

Books

Book Chapters

  • Sarre, R., Brooks, D., Smith, C., Draper, R. (2013). Emerging Technologies Employed to Abate Crime and to Promote Security. The Routledge Handbook of International Crime and Justice Studies (327-349). Routledge.

Journal Articles

Conference Publications

  • Frohde, K., Brooks, D. (2013). Is emergency management considered a component of business continuity management?. The Proceedings of the 6th Australian Security and Intelligence Conference (18-27). Security Research Centre, Edith Cowan University.
  • Bailey, B., Brooks, D. (2013). Breaking The Theft-Chain-Cycle: Property Marking As A Defensive Tool. The Proceedings of the 6th Australian Security and Intelligence  Conference (1-8). Edith Cowan University.

Books

  • Cubbage, C., Brooks, D. (2012). Corporate Security in the Asia Pacific Region: Crisis, Crime, Fraud and Misconduct. CRC Press.

Book Chapters

  • Brooks, D. (2012). Security threats and risks of Intelligent Building Systems: Protecting facilities from current and emerging vulnerabilities. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection (1-16). IGI Global. https://doi.org/10.4018/978-1-4666-2659-1.ch001.

Journal Articles

  • Griffiths, M., Brooks, D. (2012). Informing security through Cultural Cognition: The influence of cultural bias on operational security. Journal of Applied Security Research, 7(2), 218-238. https://doi.org/10.1080/19361610.2012.656256.

Book Chapters

  • Braes, B., Brooks, D. (2011). Organisational Resilience: Understanding and identifying the essential concepts. Safety and Security Engineering IV (117-128). WIT Press. https://doi.org/10.2495/SAFE110111.

Journal Articles

  • Brooks, D. (2011). Security risk management: A psychometric map of expert knowledge structure. Risk Management, 13(1-2), 17-41. https://doi.org/10.1057/rm.2010.7.
  • Brooks, D. (2011). Intruder alarm systems: Is the security industry installing and maintaining alarm systems in compliance to Australian Standard AS2201?. Security Journal, 24(2), 101-117. https://doi.org/10.1057/sj.2009.12.

Conference Publications

  • Coole, M., Brooks, D. (2011). Mapping the organizational relations within physical security’s body of knowledge: A management heuristic of sound theory and best practice. Proceedings of the 4th Australian Security and Intelligence Conference (49-57). Security Research Centre, Edith Cowan University.
  • Brooks, D., Cotton, H. (2011). Security risk management in the Asia Pacific region: What are security professional using?. Proceedings of the 4th Australian Security and Intelligence Conference (27-37). Security Research Centre, Edith Cowan University.
  • Doleman, R., Brooks, D. (2011). Systemic failures of fire protection equipment in Australian aged care nursing facilities. Proceedings of the 10th EuroFM Research Symposium: Cracking the Productivity Nut (35-45). European Facilities Management Network (EuroFM).
  • Doleman, R., Brooks, D. (2011). A strategy to articulate the facility management knowledge categories within the built environment. Proceedings of the 4th Australian Security and Intelligence Conference (58-67). Security Research Centre, Edith Cowan University.
  • Brooks, D. (2011). Intelligent Buildings: An investigation into current and emerging security vulnerabilities in automated building systems using an applied defeat methodology. Proceedings of the 4th Australian Security and Intelligence Conference (16-26). Security Research Centre, Edith Cowan University.
  • Brooks, D. (2011). Organisational security: From expert knowledge construct to a body of knowledge. Proceedings of the Conference Security in Futures – Security in Change (72-82). University of Turku.

Conference Publications

  • Sargent, R., Brooks, D. (2010). Terrorism in Australia: A psychometric study into the Western Australian public perception of terrorism.. Proceedings of the 3rd Australian Security and Intelligence Conference (63-72). Security Research Centre, Edith Cowan University.
  • Brooks, D., Corkill, J., Pooley, JA., Cohen, L., Ferguson, C., Harms, C. (2010). National security: A propositional study to develop resilience indicators as an aid to personnel vetting. Proceedings of the 3rd Australian Security and Intelligence Conference (35-43). Security Research Centre, Edith Cowan University.
  • Braes, B., Brooks, D. (2010). Organisational resilience: A propositional study to understand and identify the essential concepts. Proceedings of the 3rd Australian Security and Intelligence Conference (14-22). Security Research Centre, Edith Cowan University.
  • Beard, B., Brooks, D. (2010). A comparison of laboratory and vulnerability evaluation methods for the testing security equipment. Proceedings of the 3rd Australian Security and Intelligence Conference (1-13). Security Research Centre, Edith Cowan University.
  • Griffiths, M., Brooks, D., Corkill, J. (2010). Defining the security professional: Definition through a body of knowledge. Proceedings of the 3rd Australian Security and Intelligence Conference (44-52). Security Research Centre, Edith Cowan University.
  • Brooks, D. (2010). Assessing vulnerabilities of biometric readers using an applied defeat evaluation methodology. The Proceedings of the 3rd Australian Security and Intelligence Conference (23-34). Security Research Centre, Edith Cowan University.

Books

  • Brooks, D. (2009). Key concepts in security risk management: A psychometric concept map to approach to understanding. VDM Verlag Dr. Muller.

Journal Articles

  • Brooks, D. (2009). Intruder Alarm Systems: Is the Security Industry Installing and Maintaining Alarm Systems in Compliance to Australian Standard AS2201?. Security Journal, 10(1057), 1-17. https://doi.org/10.1057/sj.2009.12.
  • Brooks, D. (2009). What is security: Definition through knowledge categorisation. Security Journal, 23(12 January 2009), 225-239.

Conference Publications

  • Coole, M., Brooks, D. (2009). Security Decay: An Entropic Approach to Definition and Understanding. Proceedings of the 2nd Australian Security and Intelligence Conference (19-27). Centre for Security Research, Edith Cowan University.
  • Beard, B., Brooks, D. (2009). Consensual security risk assessment: overcoming bias, conflicting interests and parochialism. Proceedings of the 2nd Australian Security and Intelligence Conference (41-47). Centre for Security Research, Edith Cowan University.
  • Loo, YH., Brooks, D. (2009). Terror attacks: Understanding social risk views between Singaporean lay and security practitioners. Proceedings of the 2nd Australian Security and Intelligence Conference (33-40). Centre for Security Research, Edith Cowan University.
  • Beard, B., Brooks, D. (2009). Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests and Parochialism. 2nd Australian Security and Intelligence Conference (41-47). School of Computer and Security Science.
  • Brooks, D. (2009). Defeating biometric fingerprint systems: An applied testing methodology. Proceedings of the 2nd Australian Security and Intelligence Conference (1-9). Centre for Security Research, Edith Cowan University.

Books

  • Brooks, D. (2008). Public Street CCTV: A Psychometric Study of Social Risk. VDM Verlag Dr. Muller.

Journal Articles

  • Brooks, D. (2008). Defining the science of private security through knowledge categorisation. Acta Criminologica, 1(25-Jan), 12-23.

Conference Publications

  • Lane, G., Brooks, D. (2008). The Use of Red Teaming in The Corporate Environment: A Study of Security Management, Vulnerabilities and Defence. Proceedings of the 1st Australian Security and Intelligence Conference (77-83). Centre for Security Research, Edith Cowan University.
  • Alruwaii, A., Brooks, D. (2008). Organisational Security: A Propositional Study to Map Expert Knowledge. Proceedings of the 1st Australian Security and Intelligence Conference (4-11). Centre for Security Research, Edith Cowan University.
  • Alsuhaimi, J., Brooks, D. (2008). Psychometric Risk Perception: Why Some Individuals Elect not to Act on Risks?. Proceedings of the 1st Australian Security and Intelligence Conference (12-16). Centre for Security Research, Edith Cowan University.

Conference Publications

  • McLaughlin, R., Brooks, D. (2006). A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 - 'systems installed in a client's premises'. Proceedings of the 7th Australian Information Warfare and Security Conference (72-79). SCIS, Edith Cowan University, Perth WA.
  • Brooks, D. (2006). Mapping the consensual knowledge of security risk management experts. Proceedings of the 7th Australian Information Warfare and Security Conference (9-11). Edith Cowan University, Perth WA.
  • Beard, B., Brooks, D. (2006). Security risk assessment: Group approach to a consensual outcome. Proceedings of the 7th Australian Information Warfare and Security Conference (1-8). SCIS, Edith Cowan University, Perth, WA.

Journal Articles

  • Brooks, D. (2005). Is CCTV a social benefit? Is psychometric study of perceived social risk. Security Journal, 18(2), 19-29.

Conference Publications

  • Brooks, D., Smith, C. (2002). Public Street Surveillance: A Psychometric Study on the Perceived Social Risk. 3rd Australian Information Warfare & Security Conference (). Edith Cowan University, WA.

Conference Publications

  • Brooks, D. (2001). Closed circuit television: Legal considerations for the security industry regarding digital processed video images. 5th Australian Security Research Symposium (0). Edith Cowan University.
  • Brooks, D. (2001). Is closed circuit television socially acceptable? A proposition for a psychometric study. 5th Australian Security Research Symposium (0). Edith Cowan University.

Research Projects

  • Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice, ASIS International, ASIS - Grant, 2017 ‑ 2018, $79,339.
  • The Efficacy of Pseudonyms: An investigation into Current Research and Application, Australian Taxation Office, Grant, 2017, $20,000.
  • Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 ‑ 2012, $77,154.
  • Building Management Systems Security Vulnerabilities, Department of the Prime Minister and Cabinet, Dept of Prime Minister and Cabinet - Grant, 2010 ‑ 2011, $19,965.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, Understanding the effect of organisational strata on the lessons learnt process in the Western Australian emergency services sector
  • Doctor of Philosophy, Technological surveillance: Understanding how individuals perceive and respond to digital surveillance risks
  • Doctor of Philosophy, Understanding Resilience in the Australian Security Vetting Process: Application of the Psycho-Social Resources for Resilience Scale - Vetting (PRRS-V)
  • Master of Science (Interdisciplinary Studies), Undertaking an Exploratory Analysis of a Framework of Security Culture Using Social Cognitive Theory

Adjunct Supervisor

  • Doctor of Philosophy, Understanding the sphere of risk influence of contemporary corporate security
  • Doctor of Philosophy, Social Risk Decision Making: Balancing Fire safety Hazards Against Security Threats Within the Modern Built Environment

Principal Supervisor

  • Doctor of Philosophy, A study of facility management knowledge classification for the effective stewardship of existing buildings
  • Doctor of Philosophy, Judging dread: A quantitative investigation of affect, psychometric dread and risk consequence
  • Master of Science (Interdisciplinary Studies), A Biodefence Framework for Western Australian Cattle Production Enterprises
  • Master of Science (Interdisciplinary Studies), The corporate security stratum of work: Occupational ceilings, progression, and career success
  • Master of Science by Research, Organizational Resilience: Identifying Thematic Concepts That Underpin Resilient Organizations

Adjunct Supervisor

  • Doctor of Philosophy, Countering-insurgency: A comparative analysis of campaigns in malaya (1948-60), Kenya (1952-60) and rhodesia (1964-1980)
Skip to top of page