You are on page 1of 10

Securi9'_

Journal
ELSEVIER

The security-strategy interface: using qualitative process


models to relate the security function to business dynamics

J.H. Powell..... J.P. Bradford b

• . 1I0Mafdll.... ; od ;O,...,.;M

......
Aa:epIcd ....... ..-be:i 10 tile ,..rMiolI 0/. atntqy' within a -IW'Y '*'"
rc:liaoo: e:- ~ IIbility of IlJoe ~ "'nctionf
of the .....~ to cunlrilulc ~ _ of thMllnle«r. ThiI; oonll'ibu1iQa Qlmcb II IIIl1d110 the ICCIIriIy fmocI:il>D ., iI
<loa 10 awkc1iDc ..... producbon. Thl: toOls ....::a<uy 10 support WI axItribulioQ IIIUS( be easy 10 _ , -nil ~ in llJoeir
OIllput, In rootn5t 10 lIM: more ~ lOOlI mel frameaooru appropriote for lbo: &foboII mal. decisiool makinI of the
COO'lIIW'Y. A partirular techn>que. tDoom .. Oual~ System Dynamk:a{OSD) iI presenled. Tboe _lbod illCflI to be IIimf'Ie

mediwll for bricfi..,1eIli<x lIIIDItm'etll. ~ ~ if doe.cribed. "'"'*


in _. intuitive in applieation and l\Ilurai alld eff«tiYe in ill llClion plannios prodllC\l. II prooidel a _lUI and IIXtaible
a practical CIK Mudy, bMed on tbe ..........,_01 of
a product ufely \huIt 10 a Iar~ ..permartel. C 1998 Elsrno:, Sciena: Irc:Iand Ltd. AU ripll __""d.

L Saw My . . . .....,. let rt'ss !he idea of all orpniaatioa in whid!. RnteP: mo-
otpb eUler,., from all. Ievd5 and fnnctiont. of the
Scntev rihia lbe: portfolio of. ownpanya .aM- orpnisatioa aaudinc to their dcl'« of (I)Otad wilh
tiQ is IIIUaIJy _ ali .. • . . ·1b'1titta IIpOI die impor- the outJide Mldd aDd their "",",Iired knlJwied&e ol
tant .iI:a.oa iD eontJul with die day-to-<by opw.OOIllS the operati0n5 ol die pany. n- ~
ul the OfPtliAtiol1. It • to do witb problem$ (II" modeb of an j1iol> mati. an IIOIW !!lOre
opponllllitic:l MIicb IIa¥t a kla& .i mle aDd wlUc:b widely iklt'CptnI (Quiao, 1\llIO; Qu.inn et at, (992).
require Iarp aUocaliom of ~ and SJIllD' of Tbe "meg)' of the COll1patl)' is :lUll as • two-way
control. SlratelY is to do with lhe biI isweJ. proceu. Ardlilti:tural hlirleWOrkJ arc p;lSSCd down
As such it has been Ken in tbe pal II Ihe hems ff'Dll:l the top, while pt'OpOIIis for the elementl of
domain of senior memben of the U«\Itive, to the ltflllety and judgements of feuibilily are passed up-
alellt thaI a whole'corpus of $ln.teP;: Ihintiog (the w.rdl. III this model the top mant&tment are seen as
Desipt JoChool) <M.iatzberlo 1994) aees IInlegy as e~· mucb to be lIClcctilll from a menu of pullltive "rile·
dUlively the preroptive of the CEO. Stategy i5 pes ali they are iDvelltitl& new ooes from la"IU:h.
pwed down from the: top IlId il iI Ihe role of the Under suclI • concepl of stratepe deci$ioIl makiltJ aU
SlIIbordi.Dates merely to ialpleJnetu an idea wbleb ol the fImctioas iDdudUil tile IOmCtimClI lIta\«lcd
tpriDp fuIJy fOl'lbed rn:.:. the out-tray of the top -tty functioa within !be ...... paay arc in I poIitioa
e-=uti¥e. Altemati¥c cootemporaf}' lllood. praenl 10 ooo!ribule 10 the ~ ilnttl)'.
Withill adll framc:=0lk. tbeo, the seo.aricy "","IL
ill aJoapitk the opentioIlt mro • r or ...... hal
·Ceo. I ... _ . a Rip(' -.aiIy as -.B II • ri,bl 10 ooouibluc 10 the

"*
O95J.l~/9Ifl".oo
'I' SotH·I"unlHOU·4
•• ~ sa.- Irdoad Ucl. AI .... .-..L
clementi of a <;()fJIplUIy strategy. In each ease sl,l(h of variables which it is difficult, if not impoaible, to
contnllutions mll5l be limited to the function's area of quantify. While, for e:tample, we rnay be able to say
competence and relevance. but there arc strong con- whal our price- margin in the market pIao;e viJ-i.-vis
neclionS between the security function and tbe com- the competitors' producu may be, it is often difficult
petitive advantage and competence of the firm. Just to be sure about the clolely IlUOciated underlying corn
as a company luis to defend alllinsl commercially-dc. advantage. It is even more difficult to state numeri-
rived preSSllres (Poner, 1979), w it must not ignore: in cally the level of a more qualitative but critical vari-
its bu~eSll planning the il'DponaDCC of threalS and able such lIS, say, Ihe intensity aDd nature of threats
prnsurc:s whicb o~te ouuide th.ilt COIlImertial to our bluiness from new entrants to the industry. A
structure, what will be called here exogenous threats. qualitative model is more likely to have the breadth
Moreover there is a po5$ibility that with the correct and flexibility of content DUded for the represcnta-
tools, core competenccs deriving from tbe SCCllrity tion of strategic and sccurity dynamic$, and although
fuoction of a company, and in particular that of threat the precision of numerical models may be desired,
pallem recognition un make a positive contribulion that precision, in the area of strategy at least, is often
to the competitive advantage of the romp.my. illlllOl)'.
The tools needed to assist this contribution must be The extensive work on soft systems models of vari-
able to cope with more IhM the analysis of the ous types (Checkland, 1981; Oledland and Scholes,
strategic context. and tbe generalised issues of com- 1990) have shown themselves to be most effertive in
petitive advantage. indmt!}' structure and core com- tbe bands of expert users, but can be costly in time
petence&. General strategic questions demand gener- wllen used sporadically by a user wtw.:l5e day-tCHlay
alised tools: specific qucslions demand specific tools interest lies elsewhere.
and approaches. The strategic tools of value chain &tensive experience with security professionals bas
analysis and industry analysis (Mintzberg et 101., 1998) shown that an extension of Ille well-known systems
are essential to the undentanding of the wider strate- dynamics influence diagram (Coyle, 1996) is well·
gic picture and the setting of the overall architeclure, suitcd to Ihe representation of the dynamic interac-
bUI tbey are not specific enough in their OIItput for tions between sccurity issues and company strategy.
the specific functions of the complUly, and hence for The method has proved easy to learn by security
the IIOClIrity fuflction in particulaf. professionals from a wide variety of bacqrounds and
One of the !.ignificant chantcteristics of the impact in use gives a !lOUnd and contnbutory llCtioo planniD8
of business is!;uei upon the security function (and produl:t whil:h linb security thinkUIg with strategic
indeed other functionS of the company) is their dy- issues. Moreover, the system representationS are ac-
namic nature, Customer demand Wlllles and WllllC5, cessible to lI()ft-usera, 10 that it ill In etftdive tool for
peer companies shift from postures of co-operation to presentations to senior cxecutives. Lastly. the analysis
more ovenly competitive stances and the threats to process which it uses is intuitive and transpbrent,
which the security function must respond rise and faU providing a natural framework for reponing by both
in intensity. The contribution of Ihe security function written and spokn media.
to the ovcl1lll Slrategy, then. is to make sense of the This paper brieDy describes the qualitative systems
specific impact of the exoseoous tbreats and identify dynamica (QSD) influence diagram method 11$ gener·
the impact of tboK threats upon the sustainability ally used in 5«Urity applications together with the
and future SI/CCC$l!l of !he cornpany. For that purpose extension to ronvention.al loop anaIysU. This ap-
an easy 10 use dynamic analysis tool is required which proach is then iIlU5U'llted with a ClI$C study cumpk of
can weave security dynamics into the wider busil\CSl; the interaction between produC1 safety issues and
P'=. overall businesl performa~ for a large supermarket.

1. S,...... ~ _O'dlllMa
...

There are a number of candidate approaches to The central part of !be QSD approach is the reprc-
ana\y$ing wch dynamic proc:e&:Ca. Comparative sur- scntarion of the dynamic procc1se~ within the S)'ltem
veys of approaches and rnc:thods (Wilson, 1990) and under consideration through the medium of an infI.u-
more general coosideratioos of modelling aa part of ence diagram. It is appropriate here to dClcribc only
tbe decision making process (Roscnhead, 1989; Riv- the general approach alId grammar of these diagrams.
ett, 19')4), are readily ....ailable. Generally speaking, leaving advice on their generation to authoriries such
quantitative modelling metbods are not partic:ularly aa Coyle (1996), who offers particularly cIcar and
effective because of !he nature of the variablel in- practical instruction. In trials with security profession-
vuJved in strategic proces$C$ (and, indeed, in sccurity als the generation of the influence diagrams has not
iuelO. Both domains are concerned with a wide l1Inge only proven to be natural and eaay. bIIt has of itself
I.H. A>ood, I,," IJo 1': I s...n,..-... 10 (1M) lSl-l60

enhanced their u.odcntandin&: of the socwiry dy.


"'
IWIlics d..n.n, lhe pt0tu6 of model buildiq. The
spc:c:ific embodimeol of tbe mclhod ~poned bere Iw
beeo Ipplied 10 • wj(Je vanery of cues. illdudln&
airporI seeurity, C'OIIIptlitDl" inteUigellClC and producl
Aic:ly, IS -U I f 10 • oUlllbn" of IIIOre smeral 1Nsi-
_ app!ialions. aad Sysaems Dynlmics in ~ra1 ill
• _n-ac:cepted aad 11M' fuI ""d'Oiquc: with •
plelbon of s....t t..fiaI .pptiratilxa.
The purpoIe of the iaft...ence lfia&tIm .. 10 _
-
""'1.,' •. ..,_'1 1

' •• '1
mari:tt 11. WI'! in whicIt fat10n witbiIl • dy!lamic
sysr.~ atfecI OIX aaotba-. Let lIS ..........1' the dy- ....taia klopa.. 1'bc:Ie ~ Kb of variabIa wbicb are
TI.l!m .... of IIIacb 011 produa inlqrity. lay the IIeIin: aIIllIeCIed by InOW$ ill I c:ydie fa$l!ioa F". .. ] ihDM.
of III IDimaI riJhb pi 're IJOUP 10 diacredit I typicaJ eDlllpIe. tine __ see tIlII • rile iD tbc CQt of
msmclic produa. Whilo:: mall)' bl:tors will de(( the aoodJ will deae_ the profit (1lJ otber Ihint;s bem,
Aiery of lbe product. il will certaiDly be the: IJIOI'C equal), aDd that if I product is makioJ bip prOOl5 il
¥U1rlenbIe if il beoomes attractive 10 the: preMWe will become aD altrXtive lItFt for !be animaJ ri&hts
poop IS I lIrJC!' 1be vuInerabiliry here ill lhe likeli- prcaure croup. As above, if the IltrlC'liw_ of the
hood thaI our prodllCl: iIIlttded 5·"'tttStully, and 10 W]et product is iDaeased it is ISSCrted that lhe
includes both the mlllCe !bat it will become: the vulner.bility of the prodl>Cl will illCKuc. Lastly, lhe
objecl of lUI attlCk aDd the likelihood of that ItllCk loop is closed by linking 'V\Ilncnbility of product' 10
5\Kttediq. Tbere i&, lheo, I rdatioD$hip between 'con of goods', the IlJUIIlCnl bdn. that a vulnerable
'vulroerabiliry of product' and 'anrac:tr.·eness of larget', ptoduct will require enr. re!iOl1lCl:S 10 ensure its
whJch iI sllown in an influence diagram (Fig. I), lollfery, lilly by the provision of detCC10r closures, or b,
Note lhl! the arrow CQfIlleCling the vari.blu has a • more 5CCII£e channel of d~ribution. Fig. 3 then
p1~ .tJII IIt.a<:bed to it. This indicatea not that either shO'll'S that there is a clo5cd loop of .rwwa .... hich
of the variables will necasarily ~ (they might connect these variables.
or might nol) bul rather thaI if 'll1raetiYc_ of There are two rypcs of loops. If I loop COIlIains
lIJlCt' ~aseJ there will be • OOll5equentia! in· only pasiiM llITOM, it is easy 10 see that • $lllall
nuse in 'vulnerability nl procNer. If the correlilion chan&e in one variable "';11 c:ascade .rouod tbe loop
between variables ill Drptive (i.e. 15 oac YUiablc riles increaio& !he vlllue 01 lbe othtt YIriablcs. 1£ lhcTe
the odicI' flBd, I negative • is IUac:bed 10 the _rc DO otlw:r oontrollin& fx1or, lbe inc:rcua arouDd
arrow. For aample, if !be jXIIic:e are pcroeiYed by !be !he loop wuu)d rciaforce oae anodlcr ud ~ woukI
prel5Ure poop 10 be putiaalarly mpced in the pre- be I 1C1lt· r;y for the ..mabka in the loop 10 iDcrax
~1IliOII of IllacQ on !be producl: iD 'I' lioa,!ben il (01" 10 Ocaeasc) witboul lilllit (see F.. 4).
micht be ..1ppOHd thai tile IU~_ of tbe If, lhen, on .....minatio!l of !be iAlllleDOe diaJn.m.
product to Iliad ..,11 fail siDce !be litellbood 01 _ see kIop; .nic:tt QlIDIain oal)' poIilM:: :;anvoos, _
del:eaioD, or die Tet(IIIIfaS nquiftd 10 IDOI1IlI I IIlC- sbnWd IIOCe that !be dynataica wttidt lbc:y leprc::Ktd
ee.fuJ. ItII(l would incRlIC- This ill sbown in F... 2- wi! IIave I WDdcIlCY 10 IWI IWIJ, eitber .. I poUt:ivc
I..qjtiIute VIriabk:& in an iaftIItuce diacnm are direction 01" iD • ncptM diJettioct (de1Xndiac on !be
l!lose wIIidt oould be *""' on I Jellk, Wlroile it III"J'
_ be P 5 ibIe aaually kl nxasun: 'IeWrity of terror-
diJ«tiun in wbidt lbc:y swt). SucIt Ioopa are referred
10 15 'UlIAabIe' 01" 'tunaway' klopI.. 0bie1'Yation 01. the
is! threal', for UMIpIc:, 15 I number, it iI pouotillly fOCopc:iiid, for lbal partiaIIu dyBUIic loop 10 NO
apnuibIc ... Ic¥d on I diding M:IJe. away witbouI. limit .. I dear inl;Ii(:aliolllhal it requitc$
lnfIueaoe diaJnms CIlDlain I number 01 thne vari- Il1IJ'IIIeIMnt anentioa, ei!ber beca._ it is • plxDc:>-
ables 6nted by InOW$ ~ !he a:wreIation menon .... hidt we 1ridt 10 promote 01" 10 I¥UiO. 1lIis
between them, .nd these diagramI. will invariably tendency will tmll to be CClIlDkncICd in reality by

...
.-'.,- OIber facIors, -'IllDe derivio& from the etf«u of Olber
loop dyaantia within the uiIIins IlIOdeI and othas
front unexpre5lCd limitins ma:ltanlsms bul the \IIldcr,
lying instabiliry of the loop is nnertheless aD indic:a-

_.
.- / tion thai the corresponding btJ5irIeK dyrwnica are
appropriate itertlli on the manapmenl agenda.
A loop wIticlt has • single neplive IiJII, bowever.
willl'JOl neeessarily cdlibit unstable behaviour, There
f\l.1. ApooolM!""" ".i= _ _ ~, mlY Ix: a tendency for the loop to "'bUise if tbe
i.H. "'-It, J.P. I1NJftJtrJ I ~~ II) (/993) /5/-161)

.. . . ..... . ..

1
.1

-... --./."-.1
• ., II~ IIlI 1 ...
r·. ~
.

. " ...
fla. (, ~ the ~Ion d • omall dIaflte IfOIlIId an
_ _ (ru.-.y) loop.

down a oomplicaled system into individual dynamie


elements.

....-. - In ellaracterising 11 partjeWar loop as inherenlly
unsuble or potentially Rable, it ill DOt intended to
imply lhat the loop will, within the eontext 01 the

/
system, exhibit ally particular behaviour. Frequently
the inherent instability will be OOII.tained by the effect

.-
....... ·n,
I'll- 1. A IDop cnl'Ol:l<d r""" ... inlIuer><e di.>&Jam.
of the rest of the l)'IIeDl, but the inherent beluwtour
of the loop provides a IDtlUIS of determining the
pouible aetions open to an interested manager. Fig. 5
shows an eDIIlple of a managed (and lienee poten·
tially stable) loop by way of lII1 eumple.
effect of the negatively OOlttIaIOO OOIIlIeCIiOII is suf·
ficiently ill:n:.m,:. Unlike the runaway loop, there is the 3. J. Ac/Of" IINl1y:Iis
potential for !hili latter IypC w be IIllIIUIFd 10 a liable
limited condition, and such a loop is known in the A further step of loop ana/ysilI is ooneemed with
systems dynamialliteralure u a 'malIllI'=d' loop. Ihe degree 10 which interested panks, the actors,
Funher eMll1inalioo will reveal that, in examining have a motivation and/or a IIO""t'r to Iffect the dy-
the stability of a loop. two negatives will cancel one namics of the system. The objective here is 10 disooYer
another OUt, 50 that the oawre of a loop, i.e. whether management actions whieh can influence lhose par·
it ill inherently unstable or potenlially 51able. can be tk:!; 10 the benefit of the client orp.ni#lion. 115 aim is
detelIllined by applying the folklwing rule:A loop 10 identify the parlicular clemenu of the dynamics or
which has no ~tives or lUI even nwnber of negalive the system over which interested partie$ have oontrol
signs atladled to the l\ft'OW5 is • rutlaWll)' loop. If it in order to promote that power or atlenWite it acc0rd-
IIlllI an odd number of negatives it is 1I. managed loop. ing 10 our interest. Additionally, the motivalion of the
An example of this limple loop analysis is coo- parties is taken inlo account, since it may be within
~ in the ca&e S1udr below. the pqweT of a party 10 affccl a particular element of
This nile then provides the basil for • simple the dyrwuia but DOl in their inlerest. The process of
unssment of the nature of the dynamic prove.....' analysis is _nlially simple.
within a sys!ClII. Those loops which are identified lIS Firstly a list of interested pllrties iJ compiled. In the
being potentially UIIStabIe represent elements of a example of the product safety system commenced
IDI.IIIgement ageDda aimed al promoting those mech· above. the interested parties may be:
anisms whieh we wish to happen, and altenulllil\&
those dynamics wl1id:l we wish to suppre$. By extract· $, the market;
ing (by iDIpe<:tionJ from the inftuenee diagram aU the S, the !leCIlrity function of the company;
Joops and characterising them lIS <k:sen1led above, the C, lhe PR function of the company;
essential cbancteristics of a compOCated system can A, the decision matel'll of the animal rishts pres-
be IIDOO\Iered. 1be extraetion of the loops breaks suce group;
,,,
-

--
wto... 7,

F.. 5. A ma"..J ~ """'lIliftifla 0IlIy.- .....tm .....

P, the police: and quenlial wlnerability is under the influcooe of the


M, the new$ media. police and the security fuooion of the company
togetbcr with lh.e pressure group (P, S and A), since
n.e analysis is essentially an iterative one. If a the activities of the IiCClIrity and the poli<:e hlwe tile
significant party is left out of the lllIlIlysis al the potential 10 alter the lkgree 10 wbich the pressure
becitlllini and it beoocnes IlPPllIcnt thaI the gap is a group will see the product as a viable target. Similarly,
significaol ODe, thai par1y can be included at a later the extent to which the link between profitability of
stage. Practice shows that this iterative procca is of the company and the atiractiveneS6 of its prodllClS a5
OOI\$idcrable benefit in representing the management a target will be subject to the effectiveness of tile PR
problem: idelllification of the interested panies fur- function of the company (C) in auppressing inap-
ther informs the system understanding 50 thai all propriate news stories together with lhe compliance
influence diagnm may be enhanced, which in 111m (or otherwi~)of the media. ll>e ~e group dearly
fwtber informs the understanding of which partie$ also has an influence qver this lillOW.
llH: significant in determining an actioI:J plan aimed at 'The purpose of attaching the IlllIIlCS of the influen.
mal\aging the system. tial parties 10 ea<:b arrow is 10 provide a cue fur
The seoond $lage of the lUWysilI is 10 examine each management actiom which can be laken so 3$ to
loop aDd identitY whkb panie$ have aD interest in its promole or attenuate the influence of the loop. In the
behaviour. Each arrow in lbc loop then has attached eumpk: of Fig. 6 it mi&ht be concluded that since the
to ;1 the name of each party who ClUl inll.uence thai pressure goup (A) haye an intere51 ill wppressin8, the
eJcmcnt of the loop. Using the loop of Fig. 6 as an effect of the loop and ~ they have In influence
eumple, we might artadl the interested parties to the <:NCr the element of Ibe loop which links competitive
arrows of the loop lU Ibown in FJg. 6. advantage to romumer demand, we m;y.t R'llQI'!ably
For example, il might weD be the judgement of the "pea to see lI;\ion by the presIUIll pvup to weaken
company'l accutives that the COD.lle<:1ion between the the a.mversion of our competitive advatttage inlo $3le$.
att.nlctivenesl of the product as a larget and its coose- This may show itself in the placement of Degative
IR. "-'t I.t'. S,04f.ui IS«wiIy~/(}(199d) H/-/(t)

....
e::--dooo,.01
~+
ca" tid..
....ll8\ji .

~ ~ft~

messages in the media, so that any conjunl;tion of the management of the systcm which we have rcpre-
interests belwecn M and A in this respect is made scnted.
more significant. Our management action might then Before examining some of lhe por.«:!iealitics of the
include a specitK: intervemion by our PR function (C) approach wttidl ha~ cmerged from cxpcricnoc with
to rounter any tenOcll(')' of the press to lmen to the method. a Clllle study is prnc:nted in order to.oow
interested stories by the pressure group before such tbe metbod more fully and in order 10 provide a
ncp.tiYc ~ses arc placed. Sll(h aetiCHI might in. furthcr cumplc of the analysis stages.
dude early briefing to cllltlre that the company's facts
are plal:Cd before the ~ in advucc. oo.m to
morc specific IDCaSUrn 10 cnsure that indMdua! re-
portcn give our company a sympathetic hearing. This study reports an &llI!ys.is of tbe impact of
Thirdly. II u!ICfuI ancillary analysis stcp is to takc product safcly coosidcrations 00 the tmsincss »>an-
each particular loop and adopl: a stated specific view· ning of • large food distribut;oa company, mown
point upon it. For cxam:pIc, in the loop of Fig. 5 we here 115 Fo<x!Q), in partiatlar respccl of • large
would clearly wish to adopl: a viewpoint of the 5CCIlrity multiple retail outlet in Orlordshirc, UK.. The 5lore
function of the company. but we might equally well has a very wide ~ of prod\lCtS and is typjcaI of the
willi to improve our undcntanding of the situation we large supermarket complexes rlCar 10 .lmosl cvcry
are seeking to Ill.llMgC by taking .. number of other large lawn in &rope. Inevitably. pan of ita a1ensive
viewpoints, for cumplc, the prcs:wrc group or a ('ll)Ifto prodl.lC1 range wiIJ. include itclllJ whictJ may, witbout
pc1i1or. The ob;cttivc of this third analysis step is, wamin&, beeome the target of prodl.lC1 integrity at-
again, to identify the componcnu of an action plan tacks, cithcJ from. Illy. an a.nimaI ri&hu group dilsal·
whidl can contribute 10 our particular objectives in isfied with the product;oa or testina process or from
J.H."'-il,lP.M. r oI/~~/I(J998)JjJ-1MJ

nliooal or Unlional vmdictiw: atIXb from indMdu-


"'
5C'>eD in the top right KlClioa of FIg. 1 (not:e a in
ak. W'IIile Ihc: Slore has DOt been, and docs IIOf apec1 the figure) by followUl& the dlain of lJTOWI; '«lSI
10 be !be Rlbjoct of ~ altacb. lYdI considenliom of JIJOd:5 -- price iD market -- ClOOI~titiYeadvan,
are 'Widely indWcd in opcntiollal pLonnin, oflbcx tage __ alOSllmct demand __ profit'.
retail oulkQ. (b) 'The CXJN""'•• I between the (actllll) vu1rlerabi1.

............
TIM: opc:nlioDal planni", probk:m eaa l!lindon: be
~
ity of lbe product, eoasumcn' perexpOons of
product safety and lbe intenetiDn berweeu that
~ ~ and the ckgee of nepti¥c media
By ·1 _1M ....1..... ~ tlo< _ _
auentiort. 1'hiIi can be teen {oote b in F.,. 1) by
FoodCo - - . iokMiIy .. II ....... - " " ~
foUowing the dlaiD: \'\Ilnenbility of wF'-~r·
"'*" b Ill< I j.
cei¥cd produd safety-<iuality/fe.alures and by
obM:rvi", toward the left of Fil. 1 the effea or
'negalive media allention' mfucinl lbe 'per-
ccivi:d prodllCl safety',
Inilial discussions suge6ted a suitable Slarting point (e) Conlidcncx in the produeu sold by FoodCo is
as the attractiveness m
the larget - wblll malr.C$ Ilffected both by attacks on FoodCo and anacts
FoodCo a potential YiClim? It emersed thaI three on the rela.il food indllStty in general. Thus we
facton ClOIllribvtcd to the altBaivenesti of the Wpcr- see in Fi&- 1 (note c) a sct of conne:dions (in the
market u a talJCt. botlom left) between 'no of terrorisl allacq 011
F'trSl was a CXMlSidcration of tbc prllCalS Il50Cd in !be company' and 'number oflClTOrisl actions iII the:
lIWIufacture of its product nDF and its ClIViromncn- ilKIu5tri, Thc:se in tllfll affect the: media iDterest
tal ctfect. 1'hiIi comprised a broad audit of the tedJ- ('time on media') and the product safety.
..;qua IIKd by IUJlIltien .mio:h may QIIR a octtioll of (d) the effect of FoodCo's PR fullCtioD 011 the: IIIICdia
lOCict)' 10 ..... a Inrof campait:n ~ !be dla.ia. .is lIOI to be iplra!1.lld towanb !be richl lX1Itre
For ..... mpae. the II5C of b6cKhed paper bleac:bcd in of F.. 7 CDole d) ClllI be teeD lbe variab6c
!I)'pelle products, oe the: laC of ccnain iodiscrimiMle 'ddellJive OOll!Cnt of~, whidl ;, iDiIi-
Iishio.f mc\hod$ ...tDr;h QUIC unacttptable coUouen! pted by ·neptM. IIIICdia anenUon' and whidI
fatalitie5 /MY incite action by pr-essure poops. will raull io ao iDc:rtase in the '~ra:ived
TIM: second fxt:or was tlu.t of !be raw materials product safety' of FoodCo's produeU..
tbclll5e!vQ. PublX: la5Ic::s may differ, lor cDalpIc, over
!be II.pproprillteness of the lI§e of cemin animUs, While the four main mech.ani$/n$ above p«Mdcd
either as a food ilOUrt:e or u other raw material. A the ~ for the diagram, many otber arrows QlI be
HTIalJ 3Cgl'DCnt of the community may chooloc 10 wage _n conneetinJ the variables. Fot example, the 'at·
a ampalgn against a particular relailer as being the lractivene", of the largel' (centre right of Fig. 1) is
Jrl()$t high profile ilUpplier of the good which causes arfected by the unaa:eptll.bility to the pressure group
IlUCb Qlfence. Lastly. the tcstina methods are of sig- or the processes of manufaclure, raw maleriaJs. eN"
nificalllCe in nisirl& the threat foe lhe retailer. Stock· lesting metbods.. Tbe altTlClNeDess of the: hUICI is.,
iog OOIWDCbaI which inY'Olve lesting 00 animals is however, reduced by the atent to which the police
probably !be _ high profile aample of such are eoncenrnrioa upon wpp.--ing suc:b activity ('p0-
phenomcOll iII IllCCIll tima. lice CllpFlDmt'). ComelSoCly tbe animal ripUi ae-
1'hiIi audil of vulDerabWty suges;ted that FoodCo liviJU may be prooooked 10 attad; if FoodCo', 'profit'
0ClIlId indeed be at rid; from Mdt actMty. The AIpCT- .is hlah. DOt least because this represents a more
mad:e(', FDmlI attraetiYe_ as • WF1 ieadIi 10 a damapng ioIavmtioa. 011 their pan. Alleotioll is alto
~DtiaI iDcreI$C iII the V\ilnerabWty of partial- draWlIlpCcificaDy to the lXJml«Iioa between 'V\i!Der.
Iar producu. 1'hiIi product vub:nbility feem diuclIy abilit)' of product' aDd 'OOIC of pNi', a CJlIIlOecIioa
inlo the aast:QlDCn' ~ of the I&fety of !be wtUetl recopile:s that a ~ vulocrablc product ,.,iJ1
prod.... require addiliooal, roRIy meaJ!!fC$ to ensure ilS Afety,
such I!II deteaor do5Ures. or graler application or
4.1.I,1JIeitlJfl-ce~ 5CCllrit)' stalf's time.
"The influence: diagram of Fis. 1 emerged fmm 'The result of suc;h corWdentioo. <Wer a period of
CJDr\$identlom of a number of associated media· apprm. 6 h of group work, is the $ln.octure of lhe
nismlI: influence diagmn of F'lJ. 1, Funher lXlD5ideration of
the potential conlribulion of the: acton (So S. C. A. P,
(a) the relatiomhip befWUn cost of pxls, tbe price M) defiDed above, leads 10 tnc description of the
ill the martet, lUld the resu1tins demand and atenl to which tl\o$e acton OOlllrol the conn.eetion.
evenlual profit 10 FoodCo. This dynamit" QI\ be This ill 5bown in Fie. 8 by the attachment or
the


... -
--
,..

appropriate tenens} for the actors to the arrow SYIII- 4.1.2. T. Alrraclk'C,,~ of Ultgel ..... t'l</nmlbilil)' of
bolising the connection. The previous eumplc (Fig. 6) proJUi:t ..... no of ~rrt>riJt DtIlICks On company. This
can ll(l'W be Soecn to be an extract (rom the full closed loop oontllms only lI.JTOWI with + signs. Simple
diagram of Fig. 7, and illustrates the process of 'poli· loop analy$is thus indicates thai the panicular mecha-
ticisation' of the diagram. nism which it describes is ullSlllbJe. If il were not for
the controlling context of the rest of the system and
4./.1. Loop llM!yjU for compensating mlUlllgemenl action, this loop would
Inspection of Fig. 7 reveals a number of closed reHect the inc:reasi1Jl; tendency COf an existiDg lar&e1
\oop5. hut for the P'llJl"*' of illustration only one ClllI to appear even mon: attractive 10 an aggressor. We
be discussed here, although thoe discLl$Sion allcJ'l>e SUT- note that two of the atJQWS are controlled by both A
roulldill& the loop of Fig. 6 provides an lKlditional (the animal rights pressure group) and by S the
example. 1lle llClual ~uation anal~ i50laled all tbe security function of the company, an obselVation
loops in Fig. 7 and e:camined ca(:h in a way ~ilar 10 which merdy reflects the struggle for control of the
the analysis shown here. vulneQlb,lity of tbe: product and its tendeDC)' to be
lB. ~ I.P.BnMqonJ f$«wilflotmw/ IOf/99Il! JjJ-/6IJ

--
.••'1."- trolled. JlIlil as the 5«tJrity function will be highly
skilled ~t the OOIltlngellC)' planning foe, say, fire or

-;/ computer fr~ud, so it can mobilise the capabilities of


tlte PR ftmction of tlte CQlIlpany to contribute to the
contingency pllllllling for product safeI)' anach.
Moreover, when tbe conversation takes place between
the head of 5eCllrity and the bead of PR in the Laller's
London office, the diagram of FiB. 7 can proride an
accessible and visual ~ation of the need for the
two futlC1iom (unusually perhaps) to work together. A
jointly advocated action plan may emerge which seeks
to adapt corporate pol;ey to inject rC$l)urce5 intO the
PR function to mount a product safety awareneSi
campaign lIIllOfIpt iu clIlitomers in order to provide
an early_warning ltIe(:hanism.

4./.3. Coru:/usiQ,u qf ,mtJ/y5Is


alladr.ed. In this respect the loop alIa.lym hu, appar· Analysis similar to that of tile previotls section for
ently, little to tell tk SOCIIrity function, mher than to other loops led to a number of proposals foe action,
point up to ~nior management the importance of some of which had been dis<;u$sed previously and
weakening tbe lXmIledion between tk vulnerability some of which emerged anew from the analysis. 1be
of the product and the actual attacks on the CQlIlpany.
<Jose eDIllination, however, shows that the role of S,
tbe $eCUrity fUIlC'lion is different .in the two arrows
(see Fig. 8).
-
following list provides a selection of tbose concIu·

(a) A dose connection is Il«USilry beIWCen the


In the connection 'allraetivencu of target' lIC1Mtics and planning of the security function
..... ·vulnerability of product', the role of the security and that of the PR function. In addition to
function is to render the product lellS allractive as a attenuating the $ClISitisation of pressure groups
target. wllereas in the connection 'vulnerability of to the allratliveness of Food0.>'s products. it was
product' ..... 'no (If terrQris! attacks', the r(lle (If the also appropriate for the PR function to form
SOCIIrit)' function is to protect a vulnerable target. The part of the eontingency plannins for a product
paraUel can he drawn hetween camouflage as a means safety ana<:L
of rendering it military target In!. observable, and (b) C1o&e cooperation ill neeeS$3I}' betweeD the $e.
hen~ less liable to be allllCkcd and the protection of rurity functions of the industry as a whole, be-
that target in the eventuality that it is attacked. This cause of the effect on tbe atlractiveness of OIIC
distinctioo may ~ll inform the management agenda company because of attacks on OIhen' products.
of the se.:urity function by defining more clearly iu (e) "The elJectiveness of the .soecurity function is inti.
separate IVies and in tum constitute the basis for mately connected with the bllliiness success of
specific proposals for appropriate fundina:. Food0.>, as evidenced by the mechanisms sym-
T1te last element of the loop connectS'no of terror- bolised in Fig. 7 and in OIlier loops. This pro-
ilt attllCks' witb 'attractiveness (If target', an arrow vided good arguments for increases in the fund-
which is under the control of the pl'C'S5ure group (A) ing of tbe securil)' function Oil grounds of im-
and N>odCo's PR function. C. 'The role of the PR proved business effectiveness as distinct from
function here is to protect where it can tbe image of merely repr«entittg an 'insurance' payment. The
FoodCo as a soft or atlractive target. For example, C security function was thus seen as a direct CQQ-
may well promote the picture that the previous at· tributor 10 busffiess success ratbcr than as a
tad(,\: on Food0.> have shown them lessons to which 'IWO-legged overhead',
they have reacted, and that there are undeclared but (d) Specific but subtle advice to customers regarding
nevertheless effective improvements to product !lafety wluit they should do if they Qllserved that product
already in pLa~. seals _re oot intact was cousidered appropriate.
We _, then, by an anaIy$is of this simple loop that with the obvious proviso that such advice must
while the sewnty function and the PR function of 001 be seen to imply any actual threat.
FoodCo IJUI)' be geographically separated (one in ~. (e) The loop 'time on media' to 'police engagement'
fordshirc. the other in central lDmJon) they have an indieated that the .-:urity function's very posi-
intimate operational connection in terms of prevent· live relations with the police authonties COIIld be
ing the loop discussed here from becoming Ul\COn· used to the advantage of FoodCo in the event of
a produd safeI)' threat in order 10 provide ad- the most powerful dynamic in their view. it is at Ieut
vallC% warning and thereby increase the level of a recognisable part of a more complex system.
police inte~t and engagement in the problem. Third, the constnKtion and analysis is remarkably
quick to perform in pra~,icc. The FoodCo example
took approximately 3 half-days in total. The product is
often highly diroocd towards action and, moreover.
action which is aimed at the manipulatinn of a partie--
The FoodCo ease study reported above illustrates a ular and commonly understood clement of the prOCC5ll
number of issues of praelice. First, the QSD method under scrutiny.
can be secn to deliver results at any appropriate level Constructing the influence diagrams is not difficult
of modelling that the user ehoo::J!;cs and is able to and security professionals from a significant number
contribute to. The FoodCo model, for e.umpk, did of organisatKms, intluding goycrnlll(:nt bodies and
not _k 10 imlllene it:lelf in the demil of shipments private companies have u~d it s~lly on anum·
of goods. amountll sold and so fonh. Rather, it fo- ber of casct<.
cused on the high level policy issll<'s and sougbt to The QSD appToodl offers an intuitive analysis ap-
identify the interactions between the business dy- proach "'hich is accessible to security professional and
namics of the client and the seeuril)' issues. These others. and which provides a ready means of address-
eme~d naturally from tbe prCl<leSS of building the ing tIM: interactions bctweell the busillCSS process as a
influence diagram model. New variables and links are whole and the security process specifically. To the
added, and the$: initially reflect enning understand- security manager aspiring to more general manage-
ing of the dynamics of the situation. In analysis. ment responsibility it offen., additionally, a means of
howe---er, new loops, representing uru;een, or at lellSt building on the product of general slrategic and busi-
unelCpressed dynamics will then emerge, and tbe un· ness process tools such as Value alain Analysis and
derstanding of the client is thereby inereased. This Industl)' Analysis (Minttbcrg et aI.• 1998). These tools,
growth of undentanding appears wtJatever tbe level while providing elCelient general understanding of
of expertise of the client or the analyst. If tbe FoodCo the global busine5S context and pro«ss, are often
problem had been to identify more specifi<: policies, as insufficiently specific to provide a basis for practical
opposed to the general ones invited in the ltClUal case. action plans and QSD can provide that link with
the model would have been more specific, would have practice.
demanded more specifie knowledge to construct and
yet would have produced a new level of understanding
in a similar way.
Second. the model repre!ients a 'lingua franca' lIS
well Iili a sensemaking tool. Often The medium of the
0>0d<W>d, P., 19t11. S~ems Thaw".. SysI<:'" 1'fllCli«:. J. wit<)'.
model can allow, as in the case of the jointly-derived ChidlcOlcr.
security/PR agenda in the FoodCo example, a c0m- CIIcdland, P, SdI<>Ic>. J, 1990, S<>tt Sysl<dlO Mc'ho><lolacY in
monly understood fra"""......rk, if not for agreement, ""'i<HI. J. wiley, ChidIeoIer.
then at least for oonstruetm dialogue. The abilil)' of Coyle. ll. t996. s,..c..... ~ Modclihc: ... 1'T...:tnI Ap-
ptOIclI. CIl.IIpnwo and HIlI, r - .
The models to represent conflicting views of the dy-
MinlZtcrc. H.. 1'Jlll,. The IUic and Foit ol SU•• cpe Pbnniol,.
namics within a proceSll is particularly useful for group Prcnria>HoII, Ne-' York, PI' )lH~.
work.. A particular trick that it is nC<:e$Sll1)' to point MiIllZtclJ, n. Quirm, J.. Gb<.m.L S, t9lltl. The 51"",,&!, PtocaL
out to new participants is that if two members of a He_I HelftPll<al. !'fc-nrice flall.
group oonstt\lCling a diagram are in disagreement, the Poner. M.. 19J'\l. ''-CornpcMiwl F _ Shopt Sr"'!qy. Han'ln!
influence diagram approach allows the two conflicting awo- Itaoiocor, Mardo-Aprii.
o.m.., J.. IlltlO. Srr..... {.... 0-,.: '-"Iic>t t""'.""'rltal;"'"
vkws to be represented in the diagram at the same llomcwood. tm...
time. By delaying a decil;;on as to which of tb., \WQ Quinn, J, M~1f, 0 .. F........ D., tm. The kamin, ~i<>n.
conflicting views is the more important. powerful or Eur Ill........ 1.to. 1<I6-1511.
amect, the rich_ of tltoe two viewpoints togethct Ri>'ell. p" t'Jlll,. The cm'I eI DcciII<loI _Di",. J. "',.".. CbId>-
can be exploited withoot personal friction. Frequently -,.
R...,.,l>cad, J.. 19I19. Ratior:Ial AIIal)W {(;If a !'n:Jl>tcawIliait W"dd.
practice has shown that the two disagreeing members J. Wiley. ClIichc<Icr.
win come to understand the opposing """chanisms WiIIoo, 8, t99fl. SyAcrna: Conccpu M<l~ and ~
and accept that while the allernatm view may not be lION, 2r>cI ed. J. Wiley. a...........

You might also like