Simulation of dependencies between armed response vehicles and CPTED measures in counter-terrorism resource allocation

H. Borrion, Octavian Ciprian Bordeanu, S. Toubaline
{"title":"Simulation of dependencies between armed response vehicles and CPTED measures in counter-terrorism resource allocation","authors":"H. Borrion, Octavian Ciprian Bordeanu, S. Toubaline","doi":"10.4324/9781315687773-7","DOIUrl":null,"url":null,"abstract":"National and local governments must continuously adapt counter-terrorism strategies to new \nand evolving threats. With limited budgets, security architects and planners across the world \nface the same recurrent challenge: specifying a portfolio of effective measures and detailing \nwhere and when to deploy those. To perform this difficult task, methods have been proposed \nthat apply a risk-based approach to solve this class of optimisation problems. However, many \nof those methods either ignore important aspects of the attacker-defender interaction or are \ntoo complicated to appeal to practitioners. \nAimed at security specialists, this article uses simulation experiments to examine current \nresponses to an unsophisticated but increasingly frequent manifestation of terrorism: vehicle \nand knife attacks. In particular, it shows that the optimal configuration of Armed Response \nVehicles (ARVs) and measures of Crime Prevention through Environmental Design \n(CPTED) depends on whether offenders conduct hostile reconnaissance, the way they react to \n2 \nthe presence of security measures, and what attributes of the opportunity structure influence \ntheir actions most. \nThrough this study, we demonstrate how information about offender displacement can be \nused to improve security strategies. We found that security architects and planners should not \nnecessarily prioritise the most crowded and high-profile targets but could also consider \ndeploying CPTED measures to protect nearby secondary targets. As we review the \ninformation underpinning our decision-making model, practical challenges in modelling \ndisplacement are then highlighted. Finally, a more general observation is made that, despite \nstrong conceptual differences, ARVs and CPTED measures are, in fact, interdependent","PeriodicalId":118883,"journal":{"name":"Rebuilding Crime Prevention Through Environmental Design","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Rebuilding Crime Prevention Through Environmental Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4324/9781315687773-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

National and local governments must continuously adapt counter-terrorism strategies to new and evolving threats. With limited budgets, security architects and planners across the world face the same recurrent challenge: specifying a portfolio of effective measures and detailing where and when to deploy those. To perform this difficult task, methods have been proposed that apply a risk-based approach to solve this class of optimisation problems. However, many of those methods either ignore important aspects of the attacker-defender interaction or are too complicated to appeal to practitioners. Aimed at security specialists, this article uses simulation experiments to examine current responses to an unsophisticated but increasingly frequent manifestation of terrorism: vehicle and knife attacks. In particular, it shows that the optimal configuration of Armed Response Vehicles (ARVs) and measures of Crime Prevention through Environmental Design (CPTED) depends on whether offenders conduct hostile reconnaissance, the way they react to 2 the presence of security measures, and what attributes of the opportunity structure influence their actions most. Through this study, we demonstrate how information about offender displacement can be used to improve security strategies. We found that security architects and planners should not necessarily prioritise the most crowded and high-profile targets but could also consider deploying CPTED measures to protect nearby secondary targets. As we review the information underpinning our decision-making model, practical challenges in modelling displacement are then highlighted. Finally, a more general observation is made that, despite strong conceptual differences, ARVs and CPTED measures are, in fact, interdependent
反恐资源分配中武装反应车辆与CPTED措施之间依赖关系的模拟
国家和地方政府必须不断调整反恐战略,以适应新的和不断变化的威胁。由于预算有限,世界各地的安全架构师和规划人员都面临着同样的经常性挑战:指定有效措施的组合,并详细说明部署这些措施的地点和时间。为了完成这项艰巨的任务,已经提出了应用基于风险的方法来解决这类优化问题的方法。然而,这些方法中的许多要么忽略了攻击者-防御者交互的重要方面,要么太复杂而无法吸引实践者。针对安全专家,本文使用模拟实验来检查当前对一种不复杂但日益频繁的恐怖主义表现形式的反应:车辆和刀具袭击。特别是,它表明武装反应车辆(arv)的最佳配置和通过环境设计预防犯罪的措施(CPTED)取决于犯罪者是否进行敌对侦察,他们对安全措施存在的反应方式,以及机会结构的哪些属性对他们的行动影响最大。通过这项研究,我们展示了如何利用罪犯转移的信息来改进安全策略。我们发现,安全架构师和规划人员不一定要优先考虑最拥挤和最引人注目的目标,但也可以考虑部署CPTED措施来保护附近的次要目标。当我们回顾支持我们的决策模型的信息,在模拟位移的实际挑战,然后强调。最后,提出了一个更普遍的看法,即尽管在概念上存在很大差异,但抗逆转录病毒药物和禁毒署措施实际上是相互依存的
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信