Defending People and Property: A Phenomenological Study on the Experiences of Security Personnel in Commercial Areas
Authors
College of Criminology, Colegio De San Antonio De Padua,,6004, Guinsay, Danao City (Philippines)
Graduate School, University of Cebu Main Campus,6000, Sanciangko Street, Cebu City (Philippines)
College of Criminal Justice Education, Pagadian Capitol College Inc., 7016, Tuburan District Pagadian City (Philippines)
College of Criminal Justice Education, Pagadian Capitol College Inc., 7016, Tuburan District Pagadian City (Philippines)
Article Information
DOI: 10.47772/IJRISS.2025.910000324
Subject Category: Criminology
Volume/Issue: 9/10 | Page No: 3963-3976
Publication Timeline
Submitted: 2025-10-13
Accepted: 2025-10-19
Published: 2025-11-11
Abstract
The study explored the lived experiences of security officers in commercial establishments in Metro Cebu. The study delved into the positive and negative experiences, challenges encountered, and aspiration of the informants. The study used the phenomenological research design with the used of an interview guide and voice recorder. The twelve (12) informants were all agency security officers of commercial establishments in Metro Cebu. Open-ended questions and follow-up questions were used to extract in-depth narratives. The interview process comprises the individual interview and the focused group discussion (FGD). After data gathering, the participants' recorded responses were transcribed and translated using Colaizzi's methodological approach.
Eleven (11) emergent themes were developed as follows: on the positive experiences of the informants, two (2) themes are derived as follows: Experiences and Good Leadership Training Transforms Lives; and Well-Rounded Security Officer has Their Strategic Thinking for Planning And Proper Security Operation Execution. On the negative experiences, four (4) themes are derived as follows: Behavioral Conflict and Decentralized Organizational Communication Affects the Operation’s Performance; Multi Responsibilities and No Security and Safety Manual is a Dilemma in Retail and Mall Security; No Security Contract, Recruitment Standard, and Lack of Workforce are Security Agency Lapses; and Abide the RA 5487 Law and Human Rights When Making an Arrest. On the challenges encountered, three (3) theres are created as follows: Flexible Security Principles is Vulnerable in Retail and Mall Operation; Poor Decision-Making of Security Issues and Lack of Training is Cost Ineffectiveness; and Observance of Human Rights: Code of Honors and Ethics. On the informants’ aspiration, two (2) themes are created as follows: Security Profession is Noble: Be Proud; and Transform to a Better Life: Fly Like an Eagle.
Keywords
criminology, commercial security, qualitative method, Philippine
Downloads
References
1. Books [Google Scholar] [Crossref]
2. Bass, B. M. & Avolio, B. J. (1994). Improving organizational effectiveness through transformational leadership. Thousand Oaks, CA: Sage Publications Inc. [Google Scholar] [Crossref]
3. Bennis, W. G. & Nanus, B. (1985). Leaders: The strategies for taking charge. New York: Harper & Row. [Google Scholar] [Crossref]
4. Berger, P. L. (1963). Invitation to sociology: A humanistic perspective. Garden City, NY: Doubleday. [Google Scholar] [Crossref]
5. Boye, M. W. & Jones, J. W. (1997). Organizational culture and employee counterproductivity. In R. A. Giacalone & J. Greenberg (Eds)., Antisocial behavior in organizations (pp. 172-184). Thousand Oaks, CA: Sage Publications. [Google Scholar] [Crossref]
6. Brecht, E. F. L. (1957). The principles and practice of management. Harlow, England: Longmans, Green and Co. [Google Scholar] [Crossref]
7. Clarke, R. V. (1995). Situational crime prevention: Its theoretical basis and practical scope. In M. Tonry & D. Farrington (Eds)., Crime and justice: A review of research (Vol. 19, pp. 91-150). Chicago, IL: University of Chicago Press. [Google Scholar] [Crossref]
8. Colaizzi, P. (1978). Psychological research as a phenomenologist views it. In: Valle, R. S. & King, M. (1978). Existential phenomenological alternatives for psychology. New York, NY: Open University Press. [Google Scholar] [Crossref]
9. Davis, D. K. (1976). Fundamentals of communication (2nd edition). New York, NY: Harper & Row. [Google Scholar] [Crossref]
10. Eck, J. E. & Clarke, R. V. (2019). Situational crime prevention: Theory, practice and evidence. In M. D. Krohn (Ed.)., Handbook on crime and deviance (pp. 355-376). Basel Switzerland: Springer Nature. [Google Scholar] [Crossref]
11. Fiedler, F. E. (1964). A contingency model of leadership effectiveness. In L. Berkowitz (Ed.)., Advances in experimental social psychology (Vol. 1, pp. 149-190). New York: Academic Press. [Google Scholar] [Crossref]
12. Florquin, N. (2011). A booming business: Private security companies and small arms. In Small arms survey 2011: States of security (pp. 133-174). Cambridge: Cambridge University Press. [Google Scholar] [Crossref]
13. Glaser, B. G. & Strauss, A. L. (1967). The discovery of grounded theory: strategies for qualitative research. Chicago, IL: Aldine Publishing Company. [Google Scholar] [Crossref]
14. Greenberg, J. (1997). The STEAL motive: Managing the social determinants of employee theft. In R. A. Giacalone & J. Greenberg (Eds)., Anti-social behavior in organizations (pp. 85-108). Thousand Oaks, CA: Sage Publications. [Google Scholar] [Crossref]
15. Hickman, C. R. & Silva, M. A. (2018). Creating excellence: Managing corporate culture, strategy, and change in the new age. (3rd edition). London, UK: Routledge. [Google Scholar] [Crossref]
16. Husserl, E. (1970). The crisis of European sciences and transcendental phenomenology. Evanston, IL: Northwestern University Press. [Google Scholar] [Crossref]
17. Kelley, H. H. & Thibaut, J. W. (1978). Interpersonal relations: A theory of interdependence. New York, NY: Wiley. [Google Scholar] [Crossref]
18. Lincoln, Y. S. & Guba, E. G. (1985). Naturalistic inquiry. Newbury Park, CA: Sage Publications. [Google Scholar] [Crossref]
19. Locke, E. A. (2000). The prime movers: Traits of the great wealth creators. New York, NY: Amacom. [Google Scholar] [Crossref]
20. Lucas, J. R. (2005). The passionate organization: Igniting the fire of employee engagement. New York: Amacom. [Google Scholar] [Crossref]
21. Lussier, R. N. & Achua, C. F. (2015). Leadership: Theory, application, & skill development. (7th ed). Boston, MA: Cengage Learning. [Google Scholar] [Crossref]
22. Merriam, S. B. (2009). Qualitative research: A guide to design and implementation. San Francisco, CA: Jossey-Bass. [Google Scholar] [Crossref]
23. Miles, M. B. & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook (2nd ed). Thousand Oaks, CA: Sage Publications. [Google Scholar] [Crossref]
24. Neuman, W. L. (2005). Social research methods: Qualitative and quantitative approaches (6th edition). Boston, MA: Pearson Education. [Google Scholar] [Crossref]
25. Northouse, P. G. (2010). Leadership: Theory and practice. (5th ed). Thousand Oaks, CA: Sage Publications. [Google Scholar] [Crossref]
26. Robbins, S. P. & Coulter, M. (2004). Management. (8th edition). Upper Saddle River, NJ: Pearson Education. [Google Scholar] [Crossref]
27. Roeser, S. (2012). The ethics of risk management. In S. Roeser, R. Hillerbrand, P. Sandin, & M. Peterson (Eds)., Handbook of risk theory (pp. 277-306). New York, NY: Springer. [Google Scholar] [Crossref]
28. Siegel, L. J. (2011). Victim precipitation. In Criminology: Theory, research, and policy. 10th edition. Boston, MA: Wadsworth Cengage Learning. [Google Scholar] [Crossref]
29. Van Manen, M. (1997). Researching lived experience: Human science for an action-sensitive pedagogy (2nd ed). London, England: Althouse Press. [Google Scholar] [Crossref]
30. Vroom, V. H. & Jago, A. G. (1988). The new leadership: Managing participation in organizations. Englewood Cliffs, NJ: Prentice Hall. [Google Scholar] [Crossref]
31. Vroom, V. H. & Yetton, P. W. (1973). Leadership and decision-making. Pittsburgh, PA: University of Pittsburgh Press. [Google Scholar] [Crossref]
32. Welsh, B. C. & Farrington, D. P. (2002). Crime prevention effects of closed circuit television: A systematic review (Vol. 252). London, UK: Home Office Research, Development and Statistics Directorate. [Google Scholar] [Crossref]
33. Periodicals/Journals/Manual [Google Scholar] [Crossref]
34. Ariely, D. & Melamede, Y. (2009). The honest truth about dishonesty: A study of moral disengagement in everyday life. Nature, 457(7232), 1151-1155. [Google Scholar] [Crossref]
35. Bolin, J. A. & Heatherly, S. E. (2001). Predictors of employee deviance: The relationship between bad attitudes and bad behavior. Journal of Business and Psychology, 15(3), 405-418. [Google Scholar] [Crossref]
36. Casteel, C. M., Peek-Asa, C., Howard, H. T. & Kraus, J. (2004). Effectiveness of crime prevention through environmental design in reducing criminal activity in liquor stores: A pilot study. Journal of Occupational and Environmental Medicine, 46(4), 450-458. [Google Scholar] [Crossref]
37. Davidson, N. (2014). The shopping mall security function: An overview. Security Journal, 27(1), 1-16. [Google Scholar] [Crossref]
38. Dorn, N. & Levi, M. (2007). European private security, corporate investigation and military services: Collective security, market regulation and structuring the public sphere. Policing & Society, 17(5), 420-443. [Google Scholar] [Crossref]
39. Edward, K. L. & Welch, T. (2011). The extension of Colaizzi’s method of phenomenological enquiry. Contemporary Nurse, 39(2), 163-171. [Google Scholar] [Crossref]
40. Guba, E. G. (1981). Criteria for assessing the trustworthiness of naturalistic inquiries. Educational Communication and Technology Journal, 29(2), [Google Scholar] [Crossref]
41. a. 75–91. [Google Scholar] [Crossref]
42. Kamp, J. & Brooks, P. (1991). Perceived organizational climate and employee counterproductivity. Journal of Business and Psychology, 5(4), 447-458. [Google Scholar] [Crossref]
43. Krishnan, V. R. (2004). Impact of transformational leadership on followers' influence strategies. Leadership & Organization Development Journal, 25(1), 58–72. https://doi.org/10.1108/01437730410512778. [Google Scholar] [Crossref]
44. Laba, R. & Geldenhuys, B. (2016). Psychological availability and work engagement: The moderating role of sex and race. Journal of Applied Psychology, 101(1), 120-133. [Google Scholar] [Crossref]
45. Montojo, R. (2006). Safety and security concerns: Perceptions of preparedness of elementary school teachers in the United States. Journal of School Violence, 5(4), 37-54. https://doi.org/10.1300/J202v05n04_03. [Google Scholar] [Crossref]
46. Nalla, M. K. & Morash, M. (2002). Assessing the scope of corporate security: Common practices and relationships with other business functions. Security Journal, 15(3), 7-19. [Google Scholar] [Crossref]
47. Saludo, R. (2018). Shoplifting in the Philippines: A review of the literature. Philippine Journal of Criminology, 54(1), 1-16. [Google Scholar] [Crossref]
48. Stenning, P. C. (2000). Powers and accountability of private police. European Journal on Criminal Policy and Research, 8(4), 325-352. [Google Scholar] [Crossref]
49. Tucker, J. H. R. (1989). Employee theft as social control. Deviant Behavior, 10(1), 23 - 44. [Google Scholar] [Crossref]
50. Tyson, R. (2018). How does a business survive and thrive in this world of risks? The Enterprise, 48(16), 4. [Google Scholar] [Crossref]
51. Winkler, F. (2010). The feedback loop in relationships: A conceptual framework for understanding relational stability and change. Personal Relationships, 17(2), 179-201. [Google Scholar] [Crossref]
52. Unpublished Materials [Google Scholar] [Crossref]
53. Cagalitan, E. (2000). An analysis of security risk in the main campus of six universities of Cebu City: Basis for a school security program. Unpublished master’s thesis. University of Cebu, Cebu City. [Google Scholar] [Crossref]
54. Pepito, D. (2016). Security measures in convenience stores. Unpublished master’s thesis, University of Cebu, Cebu City. [Google Scholar] [Crossref]
55. Posadas, M. (2009). Effectiveness of the use of closed-circuit television system (CCTV) in selected establishment in Cebu. Unpublished master’s thesis, University of Cebu, Cebu City. [Google Scholar] [Crossref]
56. Trujillo, N. L. (2008). Security risk and management system in six (6) army detachments in Northern Negros Occidental: Basis for a proposed action plan. Unpublished master’s thesis, University of Cebu, Cebu City. [Google Scholar] [Crossref]
57. Ugbaniel, R. (2013). Work-related capabilities of security guards. Unpublished master’s thesis, University of Cebu, Cebu City. [Google Scholar] [Crossref]
58. Internet Sources [Google Scholar] [Crossref]
59. American Society for Industrial Security (ASIS). (2009). Retail theft: Employee theft is a major problem. Retrieved on July 28, 2020 from https://www.asmag.com/showpost/8799.aspx. [Google Scholar] [Crossref]
60. International Council of Shopping Centers (ICSC). (2015). Security has been and will remain top priority for shopping center& mall industry. Retrieved on July 17, 2020 from https://tinyurl.com/4n2jayex. [Google Scholar] [Crossref]
61. Raths, D. (2014). The role of chief security officer is more vital than ever. Retrieved on April 2017 from https://bit.ly/3jB4Yk8. [Google Scholar] [Crossref]
62. Republic Act No. 10121. (2010). Philippine Disaster Risk Reduction and Management Act of 2010. Retrieved June 30, 2020, from https://www.officialgazette.gov.ph/2010/05/27/republic-act-no-10121/. [Google Scholar] [Crossref]
63. Republic Act No. 5487. (2008). Private Security Agency Act of 2008. Retrieved on June 23, 2020 from https://issuanceslibrary.senate.gov.ph/subject/private-security-agency-law-ra-no-5487. [Google Scholar] [Crossref]
64. Solidum, R. U. (2018). Prepare for tsunami, urges Usec. Solidum. DOST- PHIVOLCS. Retrieved on July 18, 2020, from https://tinyurl.com/54w2txca. [Google Scholar] [Crossref]
Metrics
Views & Downloads
Similar Articles
- Occupational Culture in Relation to Job Satisfaction and Work Performance among Police
- Inmates' Character Reformation and Recidivism in Nigeria: A Study of Okaka Correctional Facility, Yenagoa, Bayelsa State.
- Life World of Former Female Basic Internal Security Operations Course (BISOC) Trainees
- Efficacy of Fingerprint and Facial Recognition in Enhancing National Security in Kenya
- No More Catcalling: Awareness of College of Criminal Justice Education Students on Republic Act 11313 Also Known as Safe Spaces Act