Using Evacuation Simulations to Ensure the Safety and Security of the 2012 Olympic Venues

نویسنده

  • Chris. W. Johnson
چکیده

In July 2005, London was awarded the right to host the 2012 Olympic and Paralympic Games. The decision of the International Olympic Committee triggered considerable public enthusiasm across the UK. At the same time, it also created a host of logistical and technical challenges. Amongst these the first concern is to ensure the safety and security of competitors and of the public. This paper extends ‘lessons learned’ techniques to analyze security incidents at previous Games. Although these are very different from more conventional health and safety mishaps, the background of technical problems, human error and organizational failure are very familiar. This analysis of previous incidents is used to identify key issues that complicate the organization of Olympic events. For example, there is a danger that concern over previous incidents, such as the Munich attack or the Atlanta bombing, will obscure other forms of attack. Conversely, it is difficult to validate risk-based approaches that consider the likelihood of threats which have yet to be realized. The closing sections argue that computer simulation techniques can be used early in planning to help envisage those scenarios that compromise the safety and security of Olympic events. They can also be used closer to the Games, as training tools to rehearse key tactics and standard operating procedures before live drills are conducted.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Contingency Planning for 2012 Olympic Venues

In July 2005, London was awarded the right to host the 2012 Olympic and Paralympic Games. The decision of the International Olympic Committee triggered considerable public enthusiasm across the UK. At the same time, it also created a host of logistical and technical challenges. Amongst these the first concern is to ensure the safety and security of competitors and of the public. This paper exte...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Method of Grading Subway Stations Based on Evacuation Capability: A Quantitative Method

Stations are the main components of the subway systems. Despite the progress in the construction and maintenance, stations have always been exposed to the natural and man-made disasters. In such incidents, the station’s evacuation capability has a direct relation with a passenger's life. Various factors affect the station's evacuation capability. Investigation of these factors and evaluation of...

متن کامل

overview of ways to enhance the security of video surveillance networks using blockchain

In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of  (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006