Using Evacuation Simulations to Ensure the Safety and Security of the 2012 Olympic Venues
نویسنده
چکیده
In July 2005, London was awarded the right to host the 2012 Olympic and Paralympic Games. The decision of the International Olympic Committee triggered considerable public enthusiasm across the UK. At the same time, it also created a host of logistical and technical challenges. Amongst these the first concern is to ensure the safety and security of competitors and of the public. This paper extends ‘lessons learned’ techniques to analyze security incidents at previous Games. Although these are very different from more conventional health and safety mishaps, the background of technical problems, human error and organizational failure are very familiar. This analysis of previous incidents is used to identify key issues that complicate the organization of Olympic events. For example, there is a danger that concern over previous incidents, such as the Munich attack or the Atlanta bombing, will obscure other forms of attack. Conversely, it is difficult to validate risk-based approaches that consider the likelihood of threats which have yet to be realized. The closing sections argue that computer simulation techniques can be used early in planning to help envisage those scenarios that compromise the safety and security of Olympic events. They can also be used closer to the Games, as training tools to rehearse key tactics and standard operating procedures before live drills are conducted.
منابع مشابه
Contingency Planning for 2012 Olympic Venues
In July 2005, London was awarded the right to host the 2012 Olympic and Paralympic Games. The decision of the International Olympic Committee triggered considerable public enthusiasm across the UK. At the same time, it also created a host of logistical and technical challenges. Amongst these the first concern is to ensure the safety and security of competitors and of the public. This paper exte...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملMethod of Grading Subway Stations Based on Evacuation Capability: A Quantitative Method
Stations are the main components of the subway systems. Despite the progress in the construction and maintenance, stations have always been exposed to the natural and man-made disasters. In such incidents, the station’s evacuation capability has a direct relation with a passenger's life. Various factors affect the station's evacuation capability. Investigation of these factors and evaluation of...
متن کاملoverview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کامل