M. Kubilay Akman


SWOT analysis is an analytical method used in management to understand strengths, weaknesses, opportunities and threats of an organization. It has been used widely since 1960s. Conventional management literature has references to SWOT frequently. However, in security management this method is not used sufficiently. In this article we will have an opportunity to discuss details of SWOT and its applicability to security management field as well. Security managers can benefit from SWOT besides other analytical methods and tools. Internal and external aspects of companies and organizations are evolving very fast. SWOT may provide us a chance to see the potential tendencies in internal and external levels.


Article visualizations:

Hit counter



SWOT analysis, security management, sociology of security, business administration, security studies, corporate security

Full Text:



Avant, Deborah D. (2008), "Private Security", in (Williams, 2008).

Baker, Steven (2017), "5 Types of IT Security Threats Facing Businesses", Rutter, https://www.rutter-net.com/blog/5-types-of-it-security-threats-facing-businesses Accessed: 05.05.2019.

Croft, Stuart (2008), "What Future for Security Studies?", in (Williams, 2008)

Fallon, Nicole (2008), "SWOT Analysis: What It Is and When to Use It", March 2, 2018, https://www.businessnewsdaily.com/4245-swot-analysis.html Accessed: 01.05.2019.

Fine, Lawrence G. (2009), The SWOT Analysis, Kick It, LLC, http://www.lawrencefine.com.

Gallagher, Shane (2013), "Transforming Education through Neuroscience, Cognition, and Game Design", in (Wells, 2013).

Grimes, Roger A. (2017), "IT's 9 biggest security threats", CSO, https://www.csoonline.com/article/3215111/security-it-s-9-biggest-security-threats.html Accessed: 05.05.2019.

Hampson, Fen Osler (2008), “Human Security”, in (Williams, 2008).

Hildeman, Greg (2015), "Using SWOT Analysis to Plan an Uncertain Future and Increase Organizational Effectiveness", https://nexightgroup.com/using-swot-analysis-to-plan-an-uncertain-future-and-increase-organizational-effectiveness Accessed: 01.05.2019.

Hovardas, Tasos (2015), "Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis: A template for addressing the social dimension in the study of socioscientific issues", AEJES, 1.

McDonald, Matt (2008), "Constructivism", in (Williams, 2008)

MindTools, “SWOT Analysis Worksheet”, http://www.mindtools.com/rs/SWOT Accessed: 25.06.2019.

Nazarko, Joanicjusz, Ejdys, Joanna and others (2017), "Application of Enhanced SWOT Analysis in the Future-oriented Public Management of Technology", Procedia Engineering 182.

OIEA, SWOT Manual, Austin Community College

Oreski, Dijana (2012), "Strategy development by using SWOT - AHP", TEM Journal, Volume 1, Number 4.

Ondrejcsák, Robert (Ed.) (2014), Introduction to Security Studies, Centre for European and North Atlantic Affairs (CENAA), Bratislava.

Silbert, Jen Hetzel & Silbert, Tıny (2007), "SOARing from SWOT: Four Lessons Every Strategic Plan Must Know", Innovation Partners International.

Ušiak, Jaroslav (2014), "Introduction to Security Studies", in (Ondrejcsák, 2014)

Valentin, Erhard K. (2005), "Away With SWOT Analysis: Use Defensive/Offensive Evaluation Instead", The Journal of Applied Business Research, Volume 21, Number 2.

Wells II, Linton; Hailes, Theodore C. and Davies, Michael C. (Ed.) (2013), Changing Mindsets to Transform Security: Leader Development for an Unpredictable and Complex World, Center for Technology and National Security Policy, Washington.

Williams, Paul D. (Ed.) (2008), Security Studies / An Introduction, Routledge, London & New York.

DOI: http://dx.doi.org/10.46827/ejmms.v0i0.624


  • There are currently no refbacks.

Copyright (c) 2019 Jairus M. Kitainge, Gilbert Bor, Lucy Wanza

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

The research works published in this journal are free to be accessed. They can be shared (copied and redistributed in any medium or format) and\or adapted (remixed, transformed, and built upon the material for any purpose, commercially and\or not commercially) under the following terms: attribution (appropriate credit must be given indicating original authors, research work name and publication name mentioning if changes were made) and without adding additional restrictions (without restricting others from doing anything the actual license permits). Authors retain the full copyright of their published research works and cannot revoke these freedoms as long as the license terms are followed.

Copyright © 2017-2023. European Journal of Management and Marketing Studies (ISSN 2501 - 9988) is a registered trademark of Open Access Publishing GroupAll rights reserved.

This journal is a serial publication uniquely identified by an International Standard Serial Number (ISSN) serial number certificate issued by Romanian National Library. All the research works are uniquely identified by a CrossRef DOI digital object identifier supplied by indexing and repository platforms. All the research works published on this journal are meeting the Open Access Publishing requirements and standards formulated by Budapest Open Access Initiative (2002), the Bethesda Statement on Open Access Publishing (2003) and  Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities (2003) and can be freely accessed, shared, modified, distributed and used in educational, commercial and non-commercial purposes under a Creative Commons Attribution 4.0 International License. Copyrights of the published research works are retained by authors.