Abstract
The overall goal of the paper is to address the phenomenon of security culture. The conducted research was focused on analysing the possibilities of influencing the shaping of security culture by looking at the role of family. The study is based on a review of theories and published research about security culture and family. The aim of the paper is to answer the following research questions: What is security culture, what elements make up its structure and what role does family play in shaping it? The research methods were based on the classical theoretical methods used in security sciences and included an analysis of literature and scientific articles with the use of synthesis, abstraction and generalisation. Security culture is a category that characterises every security entity. Its structure consists of both basic and detailed elements such as: values, norms, attitudes, actions, cooperation and activity, reasonable openness, wise trust and risk. Based on the literature research, it can be stated that the basic outline of security culture is shaped during childhood and school years. It is shaped mainly in the family and in educational institutions. The research shows that the high level and appropriate nature of security culture can have a positive impact on the security of subjects and their environment, while the unfavourable form of security culture will have the opposite effect. The conducted research reveals that the role of the family in shaping security culture among children is indisputable and very significant and it should not be overestimated.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.