Abstract
The post 9/11 security landscape has seen a fundamental shift in security planning, organization and management across the national and global security domain. This shift is particularly evident with regards to special events. Major national regional and global events such as the Olympic Games, FIFA world cup, the US Super Bowl, and the Boston Marathon draw large crowds of spectators and participants thereby creating vulnerable targets. The 1972 Munich Olympics and 1996 Atlanta Olympics are 2 examples of pre-9/11 attacks on sporting events. Since 9/11, we have seen attacks on events such as the Boston Marathon in 2013, Las Vegas active shooter in 2017 and the bombing in Manchester at the Ariana Grande concert in 2017. These examples highlight the inherent vulnerabilities and security challenges that reside in major events (sporting, cultural, religious, musical). With this in mind, security budgets have increased to deal with such risks and threats. For example, the security budget for the 2012 London Olympics topped $1.46 Billion and the 2010 Vancouver Olympics was over $900 million.
This chapter examines the security challenges and solutions for managing major event security. Scenario planning and disaster forensic methodologies (Masys AJ (ed), Disaster forensics: understanding root cause and complex causality. Springer, Cham, 2016) are presented along with the role of predictive analytics in supporting vulnerability analysis and security solution navigation. Key recommendations are made pertaining to vulnerability analysis and the development and design of a security architecture planning framework rooted in a High Reliability Security Organizations (Masys AJ, Designing high reliability security organizations for the homeland security enterprise. In: A Siedschlag, A Jerkovic (eds) Homeland security cultures: enhancing values while fostering resilience. Rowman & Littlefield International, London).
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
All Hazards Risk Taxonomy. Available at https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ll-hzrds-ssssmnt/ll-hzrds-ssssmnt-eng.pdf
Dekker, S. (2011). Drift into failure: From hunting broken components to understanding complex systems. Aldershot: Ashgate Publishing.
DODAF. (2015). Volume I: Overview and concepts. Available at: https://dodcio.defense.gov/Portals/0/Documents/DODAF2/DoDAF%20v2.02%20Chg%201%20Vol%20I%20Final%202015-01-19.pdf
Edson, R. (2008). Systems thinking. Applied: A Primer. ASysT Institute http://www.anser.org/docs/systems_thinking_applied.pdf
Fussey, P., Richards, A., & Silke, A. (2012). Chapter 12 – Critical reflections on securing the Olympics: Conclusions and ways forward. Routledge Online Studies on the Olympic and Paralympic Games, 1(41), 227–238.
Gardner, W. L., Panaou, T., Watterson, K., Alao, S., & Jacob, B. G. (2017). Predicting potential human trafficking recruiting geolocations using Eigen decompressed non-zero spatial autocorrelation coefficients and Poissonian heterogeneous gamma distributed variables. International Journal of Geographic Information System,4(2). Retrieved from http://acascipub.com/Journals.php
Goldin, I., & Mariathasan, M. (2014). The butterfly defect- how globalization creates systemic risks, and what to do about it. Princeton: Princeton University Press.
Hodgkinson, G., & Wright, G. (2002). Confronting strategic inertia in a top management team: Learning from failure. Organization Studies, 23(6), 949–978.
Hollnagel, E. (2012). A tale of two Safeties. http://www.resilienthealthcare.net/A_tale_of_two_safeties.pdf
Home Office. (2011). London 2012 Olympic and Paralympic safety and security strategy. Available at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/97983/olympic-safety-security-strategy.pdf
IAEA. (2008). Nuclear security culture (IAEA nuclear security series no. 7). Available at: https://www-pub.iaea.org/MTCD/Publications/PDF/Pub1347_web.pdf
Janis, I. (1972). Victims of groupthink. Boston: Houghton-Mifflin.
Jennings, W. (2012). Chapter 8 – Governing the games in an age of uncertainty: The Olympics and organisational responses to risk. Routledge Online Studies on the Olympic and Paralympic Games, 1(41), 135–162. https://doi.org/10.4324/9780203835227_chapter_8.
Kamara, J. K., Agho, K., & Renzaho, A. M. N. (2019, March 1). Understanding disaster resilience in communities affected by recurrent drought in Lesotho and Swaziland—A qualitative study. PLOS One. Available at: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0212994
Masys, A. J. (2012). Black swans to grey swans- revealing the uncertainty. International Journal of Disaster Prevention and Management, 21(3), 320–335.
Masys, A. J. (Ed.). (2015). Applications of systems thinking and soft operations research in managing complexity. Cham: Springer.
Masys, A. J. (Ed.). (2016). Disaster forensics: Understanding root cause and complex causality. Cham: Springer.
Masys, A. J. (2018). Designing high reliability security organizations for the homeland security Enterprise. In A. Siedschlag & A. Jerkovic (Eds.), Homeland security cultures: Enhancing values while fostering resilience. London/Lanham: Rowman & Littlefield International.
Masys, A. J., Ray-Bennett, N., Shiroshita, H., & Jackson, P. (2014). High impact/low frequency extreme events: Enabling reflection and resilience in a hyper-connected world. 4th International conference on building resilience, 8–11 September 2014, Salford Quays, United Kingdom. Procedia Economics and Finance, 18(2014), 772–779.
Mateski, M. (2009). Red teaming: A short introduction 1.0. Available at: http://redteamjournal.com/papers/A%20Short%20Introduction%20to%20Red%20Teaming%20(1dot0).pdf. Accessed 4 Sept 2009.
Perrow, C. (1984). Normal accidents- living with high-risk technologies. New York: Basic Books.
Perrow, C. (1999). Normal accidents- living with high-risk technologies. Princeton: Princeton University Press.
RAND. (2018). Olympic-caliber cybersecurity. https://www.rand.org/pubs/research_reports/RR2395.html
Reason, J. (2000). Human error: Models and management. BMJ (Clinical Research Ed.), 320(7237), 768–770. https://doi.org/10.1136/bmj.320.7237.768.
Richards, A. (2012). Chapter 2 – Terrorism, the Olympics and sport: Recent events and concerns for the future. Routledge Online Studies on the Olympic and Paralympic Games, 1(41), 15–31.
Schön, D. (1983). The reflective practitioner: How professionals think in action. London: Temple Smith.
Senge, P. (1990). The fifth discipline: The art and practice of the learning organization. New York: Doubleday Currency.
Spann D. (2006). Coping with the unexpected: Integrating HRO and agile. Cutter IT Journal. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.606.2955&rep=rep1&type=pdf
Stanely, N., Jacob, B. G., Masys, A. J., Parikh, J., Izurieta, R., Ortiz, M. (2019). Global Health Security and Disaster Forensics: A solution oriented approach to mapping public health vulnerabilities through predictive analytics. In E-Proceedings of the 38th IAHR World Congress, September 1–6, 2019, Panama City, Panama.
Taleb, N. N. (2007). The black swan: The impact of the highly improbable. London: Penguin Books Ltd.
Taylor, T., & Toohey, K. (2017). The security agencies’ perspective. In M. Parent & J.-L. Chappalet (Eds.), Routledge handbook of sports event management. London: Routledge.
Weick, K. E. (1995). Sensemaking in organizations. Thousand Oakes: SAGE.
Weick, K. E., & Sutcliffe, K. M. (2007). Managing the unexpected: Resilient performance in an age of uncertainty (2nd ed.). San Francisco: Wiley.
Woods, D. D. (2006). Essential characteristics of resilience. In E. Hollnagel, D. D. Woods, & N. Leveson (Eds.), Resilience engineering: Concepts and precepts (pp. 21–34). Aldershot: Ashgate Publishing.
Xu, T., & Masys, A. J. (2016). Critical infrastructure vulnerabilities: Embracing a network mindset. In A. J. Masys (Ed.), Exploring the security landscape- non-traditional security challenges. Cham: Springer.
Zekulin, M. (2009, Fall) Olympic security: Assessing the risk of terrorism at the 2010 Vancouver Winter Games. Journal of Military and Strategic Studies, 12(1)1–25
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Masys, A.J. (2020). Science Informed Major Event Security Planning: From Vulnerability Analysis to Security Design. In: Fox, B., Reid, J., Masys, A. (eds) Science Informed Policing. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-41287-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-41287-6_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41286-9
Online ISBN: 978-3-030-41287-6
eBook Packages: Law and CriminologyLaw and Criminology (R0)