'Kibsification' of private security services: Towards more knowledge-intensive security offerings

Mervi Murtonen, Markus Jähi, Katariina Palomäki, Eija Kupi

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    In response to many external pressures, private security companies are shifting towards more customer-specific and integrated security services. This paper discusses their transformation process towards more knowledge-intensive business services (i.e. 'kibsification') and adds a new profession and new area of support services to the debate on KIBS. The aim is to present the key challenges to accomplishing the kibsification process. The discussion is based on empirical data provided by three research projects and some company-specific development projects. To analyse the KIBS potential of security services, we take the three main characteristics of KIBS as the starting point and discuss how current security services comply with these characteristics. As a result, we identify three key challenges that security providers face in the kibsification process. We conclude that KIBS is a useful concept in security business, although some representatives of the industry show fewer KIBS features than others.
    Original languageEnglish
    Title of host publicationVTT Symposium on Service Innovation
    Place of PublicationEspoo
    PublisherVTT Technical Research Centre of Finland
    Pages145-157
    Publication statusPublished - 2011
    MoE publication typeA4 Article in a conference publication
    EventVTT Symposium on Service Innovation - Espoo, Finland
    Duration: 18 Aug 201118 Aug 2011

    Publication series

    SeriesVTT Symposium
    Number271
    ISSN0357-9387

    Conference

    ConferenceVTT Symposium on Service Innovation
    Country/TerritoryFinland
    CityEspoo
    Period18/08/1118/08/11

    Fingerprint

    Dive into the research topics of ''Kibsification' of private security services: Towards more knowledge-intensive security offerings'. Together they form a unique fingerprint.

    Cite this