Skip to main content
Erschienen in:

Open Access 2025 | OriginalPaper | Buchkapitel

4. Measuring and Improving the Resilience of Outdoor Open Areas Against Terrorist Acts: A Behavioural Design Approach

verfasst von : Gabriele Bernardini, Elena Cantatore, Fabio Fatiguso, Enrico Quagliarini

Erschienen in: Terrorist Risk in Urban Outdoor Built Environment

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The resilience of the urban outdoor built environment to terrorist acts depends on the interactions among the physical scenario, the attackers, the hosted users, and the mitigation solutions (both structural and non-structural), when implemented. Due to the complexity of the system, expert risk assessment methods should be also supported by simulation-based approaches. In this sense, this chapter first proposes a method to jointly consider hazard, vulnerability, and exposure in outdoor Open Areas (OAs) by then identifying possible emerging typologies and points of attack. Then, the behavioural design approach is used to evaluate the impact of different input conditions on final risk levels depending on the users’ response to the terrorist act. In this sense, the quantification of user exposure and individual vulnerability is provided, since these parameters can vary over time and space, offering a complete view of input scenarios in case of terrorist act in the OAs. Then, the simulation of user behaviours in such defined emergency and evacuation scenarios can be performed thanks to experimental-based models. Key performance indicators (KPIs) are proposed herein to organize simulation results and quantitatively derive the risk levels in the built environment. Finally, regulation-based mitigation and protective strategies are identified, by considering implementation issues, but their effectiveness could be assessed by using the proposed behavioural-design-based methods taking advantage of simulation about the emergency and evacuation process.

4.1 From Risk Scenarios to Risk Assessment and Mitigation in Outdoor Open Areas

As introduced in previous chapters, the risk assessment and mitigation of the terrorist threat in an outdoor Open Area (OA) are parts of a complex matter, since they are based on the joint analysis of features of the OA itself, perpetrator behaviours, and user behaviours and response to emergency conditions [14]. Moreover, supporting local authorities and their technicians to manage such issues is affected by the level of detail on available information and data, as well as of knowledge on the matter by safety designers. For this reason, methods should both pursue a qualitative and rapid standpoint, but also a quantitative and simulation-based approach, to ensure a complete understanding of possible risk scenarios and effects on the hosted crowd [5]. This chapter hence shows different methods for the creation of risk scenarios, assessment and mitigation effectiveness analysis, correlated to the elements that affect the phenomenology of terrorist acts.
In particular, a risk assessment method to provide possible attack points is defined depending on the effective features of the analysed OA (Sect. 4.2). Such method also supports the development of scenario creation concerning the desirability of the perpetrators in respect to the different specific areas and intended uses composing the OAs.
Then, in view of the dynamics of such a public open space [6], the time-dependent assessment of variations in the OAs use is discussed to evaluate users’ exposure and vulnerability depending on the day and hour of the day in which a terrorist event can be performed (Sect. 4.3). In fact, OAs are typical soft-target for terrorist acts [7], and the probability, characteristics and modus operandi of a terrorist act, as well as its effects on the hosted users, strictly depend on the use of OAs spaces over time in view of dynamics at both the macro (urban) and micro (single OA) scales [6, 810]. Specific user-oriented key performance indicators (KPIs) are defined to this end.
Simulation-based approaches can exploit the results of such analysis to have a deep view of the emergency process, including the representation of evacuation behaviours and of the effects of the attack on the crowd, according to the model proposed in Chap. 3, Sect. 3.​4. In particular, behavioural and simulation-based KPIs are herein defined and rules for the comparisons of scenarios (both in pre-retrofit conditions and in pre- versus post-retrofit conditions) are discussed (Sect. 4.4).
Finally, a rapid summary of Risk-Mitigation and Reduction Strategies (RMRSs) are also offered to support the decision-makers and designers’ actions against terrorist acts in view of the user and OA-related features (Sect. 4.5).

4.2 Measure the Risk Assessment of Outdoor Open Areas to Provide Possible Attack Points in Real Case Study

The parametrization of the phenomenon characterizing terrorist threat in the OAs and the identification of boundary conditions can support the risk interpretation and resolution with smart approaches [1113].
Such approaches require to be supported by qualitative and quantitative details related to the parameters involved [14, 15]. The parametrization process is already discussed in Sect. 2.​3 and highlighted the major relationships among risk determinants (Hazard H, Vulnerability V, Exposure E) and prevalent features that describe OAs and the phenomenon. However, starting from previous study [16] the same parameters can be detailed towards the identification of logical and mathematic rules functional in solving the risk assessment formulation.
Specifically, as already discussed in [16], a system of indexes and parameters is setup in order to identify the global risk of real OAs. The risk formulation is based on three main assumptions at the basis of the structure in Fig. 4.1:
  • The risk assessment R is structured in the three main determinants of risks, which are H, V and E (Eq. 4.1). H, V, and E are calculated as the combination of a limited set of indexes (in), as shown in Fig. 4.1 and Table 4.1, associated with a specific weight w which is coherently assigned according to expert judgment rules (Eqs. 4.2, 4.3 and 4.4). Moreover, R, H, V, and E are evaluated for single scenarios of attack types (T-type).
    Table 4.1
    Summary of indexes and k-parameters involved in the risk assessment formulation, detailing their equations, classification details, and range values
    Index name in
    K type
    Equation
    Classification details
    Values
    Hazard
    Target index iTRG
    Kenv
    KENV = 
    [1, …5]
    likelihood levels
    Remote
    Unlikely
    Possible
    Likely
    Very Likely
    1
    2
    3
    4
    5
    Ksymb
    Ksymb = 
    [1, …5]
    symbolicity classes
    negligible
    low
    medium
    high
    Very high
    1
    2
    3
    4
    5
    Index of use iUSE
    KTUR
    KTUR = 
    Tour.Int = 
    \(\frac{{\left( {n.arrivals} \right)}}{{\left( {n.inhab} \right)}}\)
    Classes of intensity
    very low
    low
    medium
    high
    Very high
    1
    2
    3
    4
    5
    Kuse
    KUSE = 
    [1, …5]
    Classes of use
    rarely
    low
    normal
    high
    Very high
    1
    2
    3
    4
    5
    Prevention index iPREV
    Kcon
    KCON = 
    \(\frac{{\mathop \sum \nolimits_{{{\text{i}} = 1}}^{{\text{n}}} \left( {Zi/Zeff} \right)}}{{N. {\text{Access}}}}\)
    Eff (T2)
    Remote control
    Direct/local control
    Video
    Surveillance
    Innovative systems
     
    Eff (T3)
    Innovative systems
    Reinforced urban furniture
    Barriers
    Dissuasors
    Vulnerability
    Shape index iSHP
    KSHP
    KSHP = 
    fEXT x fSHP
    Classes of fEXT
    0 < 2P/A < 0,02
    0,02 ≤ 2P/A < 0,03
    0,03 ≤ 2P/A < 0,06
    0,06 ≤ 2P/A < 0,03
    2P/A ≥ 0,09
    fEXT = [1, 5],
    fSHP = f(2P/A)
    1
    2
    3
    4
    5
    fSHP = [1, 1.5]
    fSHP = f(w/l)
    Classes of fSHP
    Compact w/l ≥ 0.7
    1.5 (T2)
    1.0 (T3)
     
    elongated or very
    elongated fSHP < 0.7
    1.0 (T2)
    1.5 (T3)
    Accessibility index iACC
    KPER
    KPER = [1, 5]
    r = \(\frac{{\mathop \sum \nolimits_{i = 1}^{n} \left( {A_{vi} } \right)}}{2P}\)
    classes for r
    0 < r < 0,05
    0,05 < r < 0,1
    0,1 < r < 0,2
    0,2 < r < 0,3
    r > 0,3
    1
    2
    3
    4
    5
    KACC
    KACC = 
    \(\frac{{\mathop \sum \nolimits_{{{\text{i}} = 1}}^{{\text{n}}} \left( {Avi*facc i} \right)}}{{\mathop \sum \nolimits_{{{\varvec{i}} = 1}}^{{\varvec{n}}} Avi}}\)
    facc = [1,…,5]
    Not accessible
    Limitedly
    Moderately
    Alternatively
    Accessible
    1
    2
    3
    4
    5
    Obstacle index iOBST
    KOBST(V)
    KOBST = 
    \(\mathop \sum \limits_{i = 1}^{n} d i*finf\,i\)
    f inf = [1, 1.25, 1.5]
    No
    influence
    Average
    increase
    increasing
     
    di = Ai/Avi
    1
    1.25
    1.5
    Exposure
    Index of attack type iATT
    KATT
    KATT = 
    [4, 5]
    consequence levels for KATT
    Minor
    moderate
    Medium
    Major
    Extreme
    1
    2
    3
    4
    5
    Crowding index iCRW
    KCRW
    KCRW = 
    [1, …5]
    Occupancy classes for KCRW
    negligible
    low
    medium
    high
    Very high
    1
    2
    3
    4
    5
    Index of attack reaction iREA
    Kobst(E)
    KOBST(E) = 
    \(\mathop \sum \limits_{i = 1}^{n} d i*finfi*\)
    \(fshp{\text{ob}} i\)
    finf
    Decreasing
    Average
    decreasing
    not influential
    average
    incremental
    incremental
    0.5
    0.75
    1
    1.25
    1.5
    fshpob
    negligible
    low
    medium
    high
    Very high
    1
    2
    3
    4
    5
    Kcm
    KCM = Weff/Wi
    Wi = number of present contermeas
    Weff = 3
    Alarm countermeasures
    Evacuation countermeasures
    Systems of physical interventions
      
  • Each of the indexes (in) is combined with one or more parameters (K summarized in Table 4.1) which describe qualitative and quantitative properties related to the given indexes. The K parameters, described in the following, are organized in order to have five classes of ranges, varying from 1 to 5, avoiding the risk equal to zero.
  • The determinants of risk H, V, and E are evaluated for all the relevant Classes of Built Environment (compare with Chap. 2) present in the OAs, evaluated in the outdoor conditions, and thus for the square/street (F), and outside the public (FB) and strategic/symbolic (FD) buildings. In that sense, the identification of external area of public buildings takes advantage of the quantification process of the space of relevance (SoR) [17], as shown by Eq. 4.5. Here, the commercial extension of the public building (ACommBuild [m2]) is related to the maximum density [persons/m2] of buildings in indoors (CB) and outdoors (COUT) coherently with fire safety regulations.1
$$R_{{T - {\text{type}}\left( {F.Fb,Fd} \right)}} = f\left( {H_{{T - {\text{type}}\left( {F.Fb,Fd} \right)}} ;V_{{T - {\text{type}}\left( {F.Fb,Fd} \right)}} ;E_{{T - {\text{type}}\left( {F.Fb,Fd} \right)}} } \right)$$
(4.1)
$$H_{{T - {\text{type}}(F.Fb,Fd)}} = \left( {\left( {i_{{{\text{TRG}}}} \times w_{{{\text{TRG}}}} } \right) + \left( {i_{{{\text{Use}}}} \times w_{{{\text{Use}}}} } \right) + \left( {i_{{{\text{Prev}}}} \times w_{{{\text{Prev}}}} } \right)} \right)/w_{{{\text{Tot}}}}$$
(4.2)
$$V_{{T - {\text{type}}(F.Fb,Fd)}} = \left( {\left( {i_{{{\text{SHP}}}} \times w_{{{\text{SHP}}}} } \right) + \left( {i_{{{\text{ACC}}}} \times w_{{{\text{ACC}}}} } \right) + \left( {i_{{{\text{Obst}}}} \times w_{{{\text{Obst}}}} } \right)} \right)/w_{{{\text{Tot}}}}$$
(4.3)
$$E_{{T - {\text{type}}(F.Fb,Fd)}} = \left( {\left( {i_{{{\text{ATT}}}} \times w_{{{\text{ATT}}}} } \right) + \left( {i_{{{\text{Crw}}}} \times w_{{{\text{Crw}}}} } \right) + \left( {i_{{{\text{REA}}}} \times w_{{{\text{REA}}}} } \right)} \right)/w_{{{\text{Tot}}}}$$
(4.4)
$$A_{{{\text{SoR}}}} \left[ {m^{2} } \right] = A_{{{\text{CommBuild}}}} \left[ {m^{2} } \right] \times C_{B} \left[ {{\text{persons}}/{\text{m}}^{2} } \right]/C_{{{\text{OUT}}}} \left[ {{\text{persons}}/{\text{m}}^{2} } \right]$$
(4.5)
Given that rationale, Fig. 4.1 summarizes the qualitative and quantitative data structures of indexes and parameters involved, highlighting the major references.
As far as the significance of parameters, the main elements, properties, and details of values and ranges of the K parameters shown in Table 4.1 can be discussed as follows, in correlation with the related indexes shown in Fig. 4.1).
Hazard Indexes and K-Parameters
  • The target index (iTRG) assesses the symbolic significance of potential targets, taking into account political, religious, cultural and social factors. In that sense, the dimensions of relevance for standard uses and touristic attractiveness are translated in terms of KENV—which measures the statistical relevance of attacks for each environmental class (see level of likelihood in Chap. 2, Sect. 2.​1), and KSYMB—which quantifies the variation in symbolic significance of spaces. Both parameters help categorize the likelihood and symbolic importance of potential targets.
  • The index of uses (iUSE) evaluates the attractiveness of places to perpetrators, independent of the number of people involved. For its description, KTUR and KUSE are introduced. KTUR reflects the inherent and potential representativeness of a place and its city, considering factors such as tourist influx and daily usage patterns. KUSE describes the standard use of Open Areas and single structures, considering their inherent proneness to attacks based on daily usage patterns and conditions. These parameters aid in assessing the risk level associated with different urban spaces, providing insights into potential target selection by perpetrators.
  • The prevention index (iPREV) focuses on the presence of prevention strategies or solutions to mitigate terrorist attacks. The effectiveness of these measures depends on their relevance to the type of attack and the distinction between hard and soft targets. The effectiveness of strategies is already classified and discussed in Chap. 2, Sect. 2.​2 by attack types (i.e., T2 and T3), and relates to remote control, direct/local control, video surveillance, and innovative systems such as face-detecting videos. In that sense, the quantitative parameter KCON considers the presence and the number of protective systems for each possible access point to urban Open Areas, aiding in the assessment of their effectiveness in thwarting terrorist activities.
Vulnerability Indexes and K-Parameters
  • The index of shape (iSHP) focuses on the geometric configuration of OAs and its correlation with potential attack methods. KSHP, representing the k-factor for this index, is determined by two factors: the extension of the OA (fEXT) and the shape factor (fSHP), which considers the relationship between width and length. Qualitatively, OAs are categorized as elongated or compact based on fSHP values. In fact, the vulnerability is influenced differently by OA morphology depending on the attack type; elongated spaces are more vulnerable to vehicle-based attacks (T3 with vehicle ramming), while compact spaces are vulnerable to centralized assaults (T2 with cold arms).
  • The accessibility index (iACC) evaluates the ease of perpetrator access to OAs and it is described by means of KPER and KACC. KPER assesses the physical and geometric accessibility of the OA perimeter relying on the total width of OAs accesses (Avi [m2]) and the perimeter (2P [m2]); KACC considers the width of entrances and urban mobility features. In consequence of the latter, the accessibility levels vary between T2 and T3 attack types, with T2 being generally more accessible due to the significance of entrances, while T3 access is contingent on urban regulations and geometric constraints.
  • The obstacle index (iOBST) focuses on physical elements within OAs that may influence meeting and attractiveness in specific sub-areas. Elements such as urban furniture, terrain features, and gardens are evaluated in terms of their extension, relevance, and attractiveness influence. The obstacle parameter KOBST is determined based on the ratio of obstacle extension (di) to the total obstacle surface and the associated attractiveness influence (finf).
Exposure Indexes and K-Parameters
  • The attack index (iATT) assesses the potential level of people involved in attacks based on weapon types and attack methodologies. KATT quantifies the impact of weapon types as discussed in the phenomenological analysis in Chap. 2, Sect. 2.​1, using the classes of consequence levels.
  • Crowd density influences exposure as well, represented by the crowd index (iCRW), denoted as KCRW, which considers the potential number of people involved in an attack scenario based on crowd density in Open Areas or surrounding public activities. The five ranges can be supported by the classification of uses for public spaces at the national level, when present.
  • The index of the attack reaction (iREA) evaluates the impact of physical elements in the environment on user reactions during an attack. It distinguishes between objects that can provide protective cover and those that hinder evacuation efforts. KOBST(E) quantifies the influence of obstacles and objects based on their extension, shape, and impact on protection or evacuation, coherently with the details discussed in literature [5]. Conversely, KCM measures the positive effect of countermeasures on reducing the number of people involved in an attack. This considers strategies like alarm systems and evacuation plans tailored to different attack types (T2 and T3) (see Sect. 2.​2).
All the presented K-parameters are valued following the rules of the participatory Delphi technique [18], in order to ensure the acceptability of relations among K-parameters and in indexes, as well as the formulation and ranging appropriateness of K-parameters.2
Finally, in order to solve the weighting of each index in the calculation of single determinants (Eqs. 4.2, 4.3, 4.4), an analytic hierarchy process (AHP) application has been processed3 highlighting the higher relevance of three main indexes: Target, accessibility, and crowding indexes in each risk determinant (Fig. 4.2).
Even if the final aim of the formulation for the terrorist risk assessment presented in [16] is structured to support operative and comparative evaluation of real case study, the same can be declined to determine possible attack points. Considering the structure of the formulation that provides a qualification of determinants for SoRs and street/square, and the geometric rules identified for the identification of SoRs in the OAs, the formulation can be focused on the single case study, providing a plan distribution of SoRs and risk properties. In the details, the structured formulation has determined a set of reduced bi-dimensional matrices which allow a brief discussion of the risk of OAs and their parts, where to variable condition of hazard proneness, levels of damages are determined for the setup of level of risks. Table 4.2 shows the details of such matrices, determined in [16], which became the way to qualify the OAs in all their parts (open space and SoRs), as specific target types.
Table 4.2
Details on classes of Risk determined for soft and hard targets considering the triad of values for each determinant and their combination
Target type
Level of danger
Class of risk
Soft target
H [1, 2] ∧ E [1, 2]
all the combinations
Negligible
V [5]
H [4, 5]
VxE = [1, 9]
Medium
V [1, 5]; E [1, 3]
VxE = ]9, 15]
High
H [1, 2]
V [1, 5]; E [3, 5]
VxE = [3, 6]
Low
VxE = ]6, 15]
Medium
VxE = ]15, 25]
High
H [3]
V [1, 5]; E [1, 5]
VxE = [1, 4]
VxE = ]4, 12]
VxE = ]12, 25]
Low
Medium
High
Hard target
H [4, 5] ∧ E [4, 5]
VxE = [4, 10]
Medium
V [1, 5]
VxE = ]10, 25]
High

4.3 Methods for Time-Dependent Assessment of Users-Related Factors

As for other kinds of emergencies affecting the urban built environment [1921], the scenario creation in case of terrorist acts in OAs should consider the organization of data not only about OAs physical vulnerability/morphology and terrorist hazard (see Sect. 4.2), but also the user exposure and vulnerability. Recent works within the BE S2ECURe project4 developed a joint approach for scenario creation based on the assessment of spatiotemporal variations of user-related factors depending on the OAs characterization [6], so as to mainly derive inputs for emergency and evacuation simulation [22]. To pursue replicability and quick application, the proposed methodology essentially relies on:
Remote analysis via: (a) web mapping platforms such as Google Maps/Street view or Open Street Maps, to derive dimensions, typologies, intended uses, scheduling of areas in the OAs and the facing buildings, and to detect the presence of specific elements composing the OAs layout (including obstacles, street furniture); (b) national census databases, to determine the typologies of users depending on their age.
Standard occupant loads, such as those of fire safety codes, to determine a quick index of users’ exposure by density [persons/m2] depending on the intended use of the OAs and the facing buildings.
Nevertheless, the integration of specific GIS-based datasets and census data from local authorities can increase the accuracy of quick results. The whole methodology is shown in Fig. 4.3 and described above.
The first phase concerns the identification of intended uses placed outdoors and indoors and that can generate overcrowding in the OA, by also detecting the related surface, and of the user-related factors such as the main use behaviours, the quick occupant loads and the related temporalities.
Concerning the intended uses, the approach excludes residential areas since they essentially represent a sort of background level in users’ exposure and vulnerability and have a limited impact on the terrorist act attraction due to negligible symbolic and strategical values [7, 23]. The approach hence considers outdoor and indoor areas characterized by users’ gatherings (e.g., cinemas, sights, parks), public buildings, special buildings with symbolic value (e.g., worship places, museums) and hard targets. Indeed, areas not accessible to users such as fenced areas are excluded. Then, the available gross surface GSi [m2] is calculated for each selected indoor and outdoor area. Freeware web mapping tools can be used to measure the plan (or covered) gross surface of each area, e.g., by Calcmaps.5 Then, for buildings, this surface is multiplied by the number of floors hosting the given intended use, e.g., by Google Street Maps.
Concerning use behaviours, different typologies of users are associated to the way they spend time in the intended uses, by mainly distinguishing behaviours between [8]: (a) only outdoor users (OO), who generally walk and move in the outdoors with a limited permanence times in the OA due to physical, social, and leisure activities, including sightseeing; (b) prevalent outdoor users (PO), who spend a long time walking in the outdoors or staying/sitting during social and leisure activities; (c) non-residents users (NR), who essentially populate buildings facing the OA and having a direct access to it, and could also contribute to the pedestrian volumes (moving towards or from the buildings) and gather in front of them while waiting to enter them. Access doors, gates and passages can be remotely identified by Google Street View.
Concerning quick occupant loads OLi [persons/m2] data from Italian fire safety codes [24] are herein adopted and combined with previous works assumptions to extend their applicability to both indoor and outdoor area [25, 26]. OLi can be then arranged depending on specific data based on surveys. For example, OLi can be substituted by using the number of seats instead for restaurants, cinemas and theatres, by the number of students and teachers for educational buildings, and by the number of workers for office buildings close to the public. Furthermore, OLi can vary during the daytime depending on the scheduled activities of the intended uses. Then, temporalities for the considered areas can be derived according to timetables accessed via web search (e.g., opening times via Google Maps or websites of the specific activity open to the public), derived from national6/local regulations, or reasonable estimated by local habits [6, 25]. The occupant loads are applied to the timetable range while 0.00 persons/m2 are considered out of the addressed timetable. The methodology also distinguishes between working days (as the most common and recurring conditions over the year) and holidays (Sundays and other national Holidays), because they can imply specific occupation variations both depending on timetable and use conditions. In addition, seasonal variations can be taken into account by revising OLi, e.g., by increasing values for tourist destinations.
In view of the above, Table 4.3 resumes the selected intended uses categories associating typology of users and quick occupant loads, which are also determined in terms of related temporalities.
Table 4.3
Classification of intended uses by users’ typologies and quick occupant loads according to fire safety code [24] and previous works [25] (i.e., for LOS, see [26])
Intended uses
Typologies of users (acronym)
Quick occupant loads OLi [persons/m2] and temporalities
Pedestrian areas (including sidewalks); green areas and parks accessible by users
Passersby as only outdoor users (OO)
Depending on the assumed level of service—LOS; some relevant classes can be: 0.00 (e.g., nighttime, from 1 to 6AM); 0.10 (LOS A, passersby’s motion is totally free); 0.35 (LOS C, limit conditions for normal walking speed selection by passersby); 1.05 (LOS E, peak timings in passersby’s presence in normal days with possible stoppages and interruptions of flows)
Dehors, open-air terraces of bars and restaurants
Prevalent outdoor users (PO)
 ≥ 0.4 for generic uses (in case of bars and restaurants: 0.7) during opening times
Open markets
 
 ≥ 0.4 during opening times
Outdoor mass gatherings areas (including temporary ones)
 
 ≥ 2.0 (up to 4.0) during mass gatherings; it can include relevant historical and cultural sites, and porticoes too
Educational buildings
Non-residents (NR)
0.4 during general lesson time (e.g., 8AM to 6PM for universities; 8AM to 2PM elsewhere) and 0.1 during office time (e.g., 2PM to 6PM) in working days; 0 during holidays
Hospitals, healthcare buildings, social welfare facilities
 
0.1 for ambulatory and 0.4 for visitors spaces during opening times; 0.1 for wards from 0 to 24 in both working days and holidays
Shops, other commercial buildings
 
0.4 during opening times
Bars, restaurants
 
0.7 during opening times
Government administrative buildings
 
0.4 for areas open to public and 0.1 for areas close to the public during opening times in working days; 0 during holidays
Worship places
 
0.7 at least during celebrations, for both working days and holidays; 0.4 or 0.7 in case of buildings with cultural and historical values attracting visitors (as for other cultural buildings and heritage)
Cinemas, theatres, auditorium and other similar recreational buildings
 
1.2 to 3.0, applied to the audience area/hall, during opening times in both working days and holidays
Cultural buildings and heritage, including museums and public libraries
 
0.4 or 0.2 (i.e., libraries) for general public areas, and 0.7 for visitors’ gathering areas, during the opening times
Transport stations
 
0.2, extended to the whole building area, during both working days and holidays
Office buildings, Factories and warehouses
 
0.4 for areas open to public, 0.1 for areas close to the public and 0.7 for workers/customers’ gathering areas during opening times in working days; 0 during holidays
Accommodation facilities (e.g., hotels)
 
0.4, during both working days and holidays
The second phase concerns the collection of data on individual vulnerabilities, over space and time. Only outdoor users (OO), prevalent outdoor users, non-residents (NR) are users’ typologies related to their position in the OAs, while additional users’ typologies are related to their individual vulnerability due to age and gender. In fact, these factors can imply significant variations in the response to the emergency conditions in terms of pre-movement and evacuation behaviours, motion speed and susceptibility to direct/indirect damages from the attackers and the crowd phenomena [22, 2729]. Age and gender data can be easily collected from local, regional and/or national census and statistics databases[30].7 Municipalities-related distributions of population by age and gender can be considered valid for the urban areas, and thus for the OAs too, although refined on-site surveys can be then carried out at the microscale. According to a quick assessment approach, five age classes are assumed according to Chap. 3, Sect. 3.​3, to represent motion issues and assistance needs in evacuation [27]. These classes are: toddlers T (0–4 years), parents-assisted children PA (5–14 years), young autonomous YA users (15–19 years), adult users AU (20–69 years), and Elderly users EU (70 + years). For each age class, the users’ percentage by age class UPage [%] is directly derived from population statistics databases. According to a quick assessment approach, UPage is homogeneously considered for all the intended uses, except for educational buildings, where the age classes are referred to the typology of hosted students.
Then, temporalities of presence for users by age classes are associated to a presence coefficient at the given time t cpt [-], which should be multiplied to UPage and which varies from 0 (no user of the given age class for the considered intended use is present, thus UPage = 0%) to 1 (the number of users for the given age class is maximum, thus equal to UPage). Such temporalities and thus cpt can be assessed hourly. For OO, cpt = 0 during nighttime, according to Table 4.3 insights, while for PO and NR, cpt = 1 only during the opening times. Such data can be also refined by additionally considering the percentages [%] of male MU and female FU users, still according to the same databases. Moreover, additional user vulnerability factors can also relate to individual features regarding motion disabilities, since they can affect the motion and sensory abilities of the users [31]. Such kind of elements could be added in the proposed approach, by adding a specific presence coefficient and users’ percentage by motion and sensory ability to Eq. 4.7. Nevertheless, related input data could be not available from a consolidated statistical perspective (i.e., using the same databases defined above), their collection could be time consuming, and data should be carefully collected and managed according to data protection authorities regulation since they could related to sensitive data, being related to individual health information.8 Therefore, they are not considered in the proposed method since they are not easily managed according to quick and remote survey approaches.
The last phase concerns the time-dependent organization of data about users’ exposure and individual vulnerability. From a wider perspective and considering a certain time t of the day (hour), the total number of users in the OA NUt [persons] is calculated (Eq. 4.6) by summing the overall number of users by age-classes for each intended use i in the OA NUage,i,t [persons] (Eq. 4.7). NUt dynamically varies from minimum (no user is present since intended uses are close to the public) to maximum (full opening of intended uses) conditions and describes the users’ exposure without specifying individual vulnerability issues. In this sense, the total number of users by age in the OA NUage,t [persons] (Eq. 4.8) can describe the dynamics in individual vulnerability since it aggregates intended-based occupancy data by age classes.
Finally, the aggregation of NUage,i,t by intended uses having the same users’ behaviours (OO, PO and NR) can be performed too, thus depicting vulnerability-related factors depending on the users’ position and habits at the starting of the attack. In particular, in case the attack is performed in outdoors, as in considered in this work, the effective number of exposed users NUt,exp [persons] is equal to the number of users performing OO and PO behaviours, plus those preforming NR who are waiting to enter buildings.
$${\text{NU}}_{t} = \mathop \sum \limits_{{{\text{age}}}} \left( {\mathop \sum \limits_{i} {\text{NU}}_{{{\text{age}},i,t}} } \right)$$
(4.6)
$${\text{NU}}_{{{\text{age}},i,t}} = {\text{GS}}_{i} \cdot {\text{OL}}_{i} \cdot {\text{cp}}_{t} \cdot {\text{UP}}_{{{\text{age}}}}$$
(4.7)
$${\text{NU}}_{{{\text{age}},t}} = \mathop \sum \limits_{i} {\text{NU}}_{{{\text{age}},i,t}}$$
(4.8)
In view of the above, Table 4.4 summarizes the KPIs on time-dependent users’ exposure and vulnerability. All the KPIs can be used to compare different risk scenarios within the same OA, and between several OAs, since they concern values which are normalized or expressed in reference to the OA surface data. Some KPIs can be also used to provide input data for emergency simulations.
Table 4.4
Key performance indicators proposed for describing time-dependent dynamics in users’ exposure and vulnerability, derived from the approach of the BE S2ECURe project [6]
KPI —acronym [unit of measure]
Calculation—use
Range
Overall users’ outdoor density in outdoor at a given time t - UOdt [persons/m2]*
Ratio between NUt and the overall OA surface—quickly comparing different time conditions in terms of users’ density for the same OA and for different OAs (higher the density, higher the exposure)
0 to 3 persons/m2 (reasonable condition for overcrowding)
Users’ normalized number at a given time t - NUnt [-]
Ratio between NUt and the maximum daily value of NUt for the given condition—scaling the conditions at the given time of the day to the maximum reference conditions in terms of users hosted in the built environment. To be applied within the same OA, or in different OAs if normalizing by the maximum NUt value in all the considered OAs
0 (excluded) to 1 (included, as the crowded time of the considered period)
Impact of an event in the OA on the whole population at a given time t - IEt [-]
Ratio between the sum of NUt referred to only outdoor intended uses (that is, the OA itself), and NUt —assessing the possible impact of risks in outdoors by excluding users who can look for shelter indoors at the starting of the attack. TO be applied within the same OA and in different OAs
0 (minimum risk since all the users are indoors) to 1 (maximum risk since all the users are outdoors)
Percentage of users by position at the given time t - OOpt, POpt, NRpt [%]*
Ratio between the users by their position and NUt—assessing the vulnerability of users depending on their initial position among different scenarios in the same OA and in several OAs. OO and PO can be directly exposed to the attack in the OA all over the time
0 to 100
Percentage of users by age and gender given time t - Tpt, PCpt, YApt, AUpt, EUpt, MUpt, FUpt [%]*
Directly from statistics databases or as the ratio between NUage,t and NUt—assessing the individual vulnerability in comparable terms among different scenarios in the same OA and in several OAs. Critical values can be retrieved if values about T, PC, and EU are maximized
0 to 100
*: the KPIs can be used also for simulation scenario creation
Furthermore, the KPIs proposed in Table 4.4 are organized over the time t, still using the hourly sampling mentioned above, and they can be also assessed by separately referring to working days, holidays, and exceptional use conditions (e.g., fairs, exhibitions, concerts, other one-off events and mass gatherings). Furthermore, KPIs can vary depending on the season or the day of the week, depending on the specific OA use conditions. KPIs statistics on maximum values and average (for normal data distribution) or median (in case of non-normal data distributions) values can be calculated regardless of time, to respectively provide a quick description of critical and recurring OA conditions.

4.4 Simulation-Based Indicators

Emergency and evacuation simulations can be performed through the model defined in Chap. 3, Sect. 3.​4, by using input data about the OA morphology and layout, the position, quantity and quality of exposed users (Sect. 4.3), and the quantity and quality of the points of attack (Sect. 4.2). Due to the stochastic effects related to the users’ behaviours within the simulation models (i.e., initial user distributions, individual speed calculation, path selection and motion loops), a significant number of runs repetition (≥10) has to be performed for each scenario, and the general convergence indicators shown in Table 4.5 should be evaluated [22, 32, 33]. These indicators can be analysed to evaluate if the number of consecutive runs is enough to provide statistically-reliable simulation outputs. Thresholds for each indicator varies depending on the given acceptance criteria, but general works remarks that evacuation time and related standard deviation should be at least ≤ 5 ÷ 10% to ensure confident preliminary analysis.
Table 4.5
Main simulation convergence indicators according to literature works [32, 33]
Convergence indicator—acronym [unit of measure]
Calculation
Meaning
Average Total Evacuation Time – TETav,j [s]
TETav,j is equal to the average maximum evacuation time TETj of each j-th run in the given set of runs
The indicator expresses the time needed by the last user to complete the evacuation. The difference between two consecutive TETav,j should tend to 0
Average Evacuation time at the 95% of arrived evacuees – T95av,j [s]
T95av,j is equal to the average maximum evacuation time T95j of each j-th run in the given set of runs
The indicator excludes possible behavioural outliers in users’ evacuation due to model uncertainties and subtitlies, e.g., unfavourable conditions in initial position of the user within the OA, evacuation path choice, interaction with other users and individual speed
Standard Deviation of total evacuation time – SD [s]
Standard deviation of the total evacuation time for the given set of runs
The indicator is consistent assuming the normal distribution of evacuation times. The value can be calculated also for T95
Euclidean Relative Difference – ERD [-]
ERD = \(\frac{|\left|\overrightarrow{x}-\overrightarrow{y}\right||}{||\overrightarrow{y}||}\)
Similarity of angle two curves exists if ERD tends to 0
Secant Cosine – SC [-]
SC = \(\frac{<\overrightarrow{x},\overrightarrow{y}>}{\left|\left|\overrightarrow{x}\right|\right| |\left|\overrightarrow{y}\right||}\)
Similarity of shape between two curves, considering their first derivative, exists if SC tends to 1
Euclidean Projection Coefficient – EPC [-]
EPC = \(\frac{<\overrightarrow{x},\overrightarrow{y}>}{{|\left|y\right||}^{2}}\)
Similarity in the translation of the points that compose the curve, thus describing a sort of scale factor, exists if EPC tends to 1
Difference between the graphic Areas Under the Curves – DAUC [%]
DAUC = \(\frac{\int \overrightarrow{x}-\int \overrightarrow{y}}{\int \overrightarrow{y}}\bullet 100\)
Similarity in the “rapidity” of the evacuation process over time, by considering the whole area under the curves, exists if DAUC tends to 0%
\(\overrightarrow{x}\) and \(\overrightarrow{y}\) represent the average curves of two sets of consecutive runs (e.g., considering 10 runs, \(\overrightarrow{y}\) refers to runs 1 and 9 and is the reference curve, while \(\overrightarrow{x}\) refers to average curves from all the runs and is the curve to be checked)
Besides, convergence analysis, the statistical-based analysis of simulation results has to be performed also to derive KPIs for risk-assessment purposes [22, 34]. The first level of aggregation of data concerns the definition of the evacuation curve for the given scenario, since it traces the overall effects of evacuation interactions between users, the OA and its components, the attackers and their effects on the users and the OA. If the normality of simulation results could not be confirmed, the median evacuation curve, expressing the median number of users reaching a safe area (for the OA, one of the access streets) over time, should be considered. In fact, median values refer to the 50th percentile of distributions and they seem to be robust enough to trace results being not easily affected by extreme values in distributions [35]. In additional quartile-based curves (e.g., 5th, 25th, 75th and 95th) can be calculated. In particular, the curves referring the 5th and 95th percentile of users arrived at a safe are over time can trace the reasonable limits for the effectiveness of the simulated scenario, excluding behavioural outliers [33].
While these curves trace a time-based overview of the evacuation process, the KPIs listed in Table 4.6 summarize the overall risk conditions of a given terrorist act scenario in the OA. These indicators have been developed within the BE S2ECURe project to trace main behavioural issues in terrorist act evacuation [22], and to be consistent with previous works also concerning other kinds of emergencies, such as general purposes, fire and earthquake [3640]. To ensure the KPIs robustness [35], they take advantage of median values from simulation results on the set of simulation runs are considered as for the evacuation curve.
Table 4.6
Key performance indicators for evacuation risk assessment in case of terrorist acts in the OA, based on simulation results, and derived from the approach of the BE S2ECURe project [22]
Simulation KPI—acronym [unit of measure]
Calculation
Meaning
Normalized evacuation time at the 95th percentile of arrived users—TN95 [-]
\({\text{TN}}95 = \frac{{T95_{{{\text{av}},j}} }}{{T_{\max } }}\), where Tmax [s] is the maximum simulation time (when the simulation ends, compare with evacuation model variables in Chap. 3, Sect. 3.​4)
It expresses the time during which users can be still exposed to the attackers in the OA, since some of the are still placed inside it, by excluding outliers (compare with T95av,j in Table 4.5)
Normalized flows at the 95th percentile of arrived users— FN95 [-]
\({\text{FN}}95 = \max \left( {0.1 - \frac{{\left( {F95/\sum l_{s} } \right)}}{{1.5{\text{persons}}/{\text{s}}/{\text{m}}}}} \right)\) where ls [m] is the width of the access street to the OA
It expresses the speediness of the evacuation process since it relies on the slope of the curve (represented by the users’ flow in persons/s). 1.5 persons/s/m is the normalization reference by representing the maximum specific users’ flow from previous literature works [42]
Normalized number of physical contacts among the users—PN [-]
\({\text{PN}} = \frac{{\left( {{\text{PC}}_{T95} /T95} \right)}}{{{\text{PC}}_{\max } }}\) where PCT95 [events] represents the effective (simulation-based) number of physical contacts and PCmax [events/s] is the maximum number of physical contacts, equal to 5%NUt,exp per second [events/s]
It assessed crowd dynamics and interferences by comparing the effective and maximum physical contacts per second (5% of exposed users as reference probability threshold to stop the evacuation [29]). Dividing PCT95 by T95 allows deriving other indicators that can be compared in different scenarios and for different T95. When PN increases, effects of overcrowding and interactions with OA obstacles are more relevant
Casualty ratio—CR [-]
ratio between the number of user casualties due to the attackers and NUt,exp
It expresses the impact of the attackers’ action on the crowd, and thus depends on the attackers’ strategy. At least, CR is equal to 0 in case no attacker is present (e.g., a “false alarm” scenario)
Not-arrived users’ ratio—NA [-]
ratio between the number of users who did not complete the evacuation during the simulation time and NUt,exp
NA includes the effects due both to casualties and any other user who does not leave the OA (e.g., because they prefer gathering in areas inside the OA; compare with modelling details in Chap. 3, Sect. 3.​4). In this sense, it also depends on the OA morphology and the attackers’ strategy
Moreover, the KPIs are normalized to make them ranging from 0 (minimum risk) to 1 (maximum risk). Therefore, they can compare different input scenarios on the same effects scale. In that sense, they can both compare several conditions related to the current scenario of the analysed OA, e.g., as in pre-retrofit conditions, by varying the simulation input factors related to the attack typology, the points of attack, the users’ exposure and vulnerability depending on the time of the day. Similarly, they can be used to compare pre-retrofit scenarios with post-retrofit scenarios implementing specific RMRSs, given that these RMRSs can modify the OA layout, the effects of the attack, the spatiotemporal distribution of the users, and also the user behaviours in emergency and evacuation. To this end, simulation models should be adapted to represent possible specific behaviours apart from those defined in Chap. 3, Sect. 3.​4.
The comparison between KPIs can be then performed in absolute terms, as the difference between the KPIs, since all of them range from 0 to 1, so as to derive how specific conditions scen can impact the KPI levels in respect of a given reference scenario ref. Nevertheless, percentage variation of a given KPI PV [%] can be calculated according to Eq. 4.9, which is based on previous works on behavioural-based design [41]. PV-based assessment can better stress the final KPI levels in respect of the original one. Indeed, both absolute differences of the KPIs < 0 and PV < 0% imply an increase in the users’ safety considering the KPIs in Table 4.6.
$${\text{PV}}_{{{\text{scen}},{\text{ref}}}} = \frac{{{\text{KPI}}_{{{\text{scen}}}} - {\text{KPI}}_{{{\text{ref}}}} }}{{{\text{KPI}}_{{{\text{ref}}}} }} \cdot 100\left[ \% \right]$$
(4.9)

4.5 Mitigation and Preventive Strategies Towards Effectiveness and Outdoor Open Areas Compatibility

The mitigation of risk and the prevention of violent acts are related to the qualification of risk itself, the identification of intrinsic vulnerabilities and the full knowledge of the phenomenon. In that sense, the application of expeditious formulation for risk assessment combined with the setting up of possible critical scenarios in the real OAs involving users’ behaviour and the use of fast performance indicators allow the analysis of the identified scenarios in an as-built conditions. The reduction of risk and the improvement of resilience of urban place and users can be achieved through a comprehensive and effective system of strategies, which comprehend physical and technical solutions. If the effectiveness of such strategies can be solved by the standards and regulations, also coherently with the attack types, the compatibility of strategies requires to be declined in terms of compatibility of solutions with the real OAs. As already highlighted in discussed in the theories of the “design of security” in British counterterrorism activities [7, 43, 44], the transformation of the physical places may affect the integrity of a real place and the security perception of its users. Considering the relevance of cultural and symbolic places in the proneness to a terroristic attack [45], the resolution of compatibility became pivotal when applied in cultural or historic places. In that sense, all the RMRS strategies identified for their classification (discussed in Sect. 2.​2), a system of datasheets is setup, linking to each potential physical element involved in the strategies, technical solutions, and their possible levels of physical or aesthetical compatibility. The solutions are derived from the analysis of the current regulation about countermeasures of terrorist threat at the international level and properly highlighted in the following Table 4.7.
Table 4.7
Classification and description of regulation-based RMRSs (according to classes provided in Chap. 2), including discussion on their implementation details and forecasted efficacy against main terrorist act typologies
Class
Design of the physical elements of the BE [S1]
Sub-class
ANTI-RAM URBAN FURNITURE [AF] 1/2
SUB-CATEGORY
[AF_1] TREES
[AF_2] NOGO BARRIER
[AF_3] BLOCK
[AF_4] FLOWERPOT
Type of functioning
Passive
Passive
Passive
Passive
Description
As system, prevention or limitation of the passage of vehicles (T3). System of trees can support the temporary protection to cold arms (T2)
Prevention or limitation of the passage of vehicles (T3). As System can support the temporary protection to cold arms (T2)
Prevention or limitation of the passage of vehicles (T3). Its use can be combined with other systems
Prevention or limitation of passage of vehicles (T3), also combined with other systems. Associated to higher dimension can provide temporary protection to cold arms (T2)
Installation type
Permanent
Permanent
Temporary/permanent
Temporary/permanent
Presence of foundation
Natural, Superficial or deep
Rested on the ground/pavement
Rested on the ground/pavement
Shallow foundation
Anti-ram
Yes
Yes
Yes
Yes
Certificate/ test
N.a
N.a
Vehicle 7,5 t  ≤ 80 km/h
Vehicle 7,5 t  ≤ 80 km/h
Source
[46]
[46]
[44]
[44]
Main materials
Greenery
Metal
Stone
Stone, cement
Accessibility
Pedestrians, Bicycles, Wheelchairs
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Integrability
Building’ distance
As Artwork
Materials and shapes
Materials and shapes
Possible interferences
Urban surface network
Any
Any
Any
Efficacy (T2)
Medium
Medium
Not relevant
Medium
Efficacy (T3)
Medium
High
High
Medium
OAs compatibility
High
High
H igh
High
Class
Design of the physical elements of the BE [S1]
Sub-Class
ANTI-RAM URBAN FURNITURE [AF] 2/2
SUB-CATEGORY
[AF_5] ENGINEERED PLANTER
[AF_6] HEAVY OBJECTS
[AF_7] BENCH
[AF_8] SEATS
Functioning type
Passive
Passive
Passive
Passive
Description
Preventing or limiting the passage of vehicles (T3), also in combination with other systems. Extending dimensions, it can provide temporary protection to cold arms (T2)
Heavy objects (monuments, sculptures) for preventing or limiting the passage of vehicles (T3). Extended dimensions can provide temporary protection to cold arms (T2)
Useful for preventing or limiting the passage of vehicles (T3). Its use can be combined with other systems
Useful for preventing or limiting the passage of vehicles (T3). Its use can be combined with other systems
Installation type
Permanent
Temporary/permanent
Permanent
Permanent
Foundation
Variable deep
Rested on the ground/pavement
Shallow foundation
Shallow foundation
Anti-ram
Yes
Yes
Yes
Yes
Certificate/test
Variable
n.a
Vehicle 7,5 t
 ≤ 80 km/h
n.a
Source
[46]
[46]
[44]
[44]
Materials
Cement
stoNe, cement, metal
Wood, stone, cement
Stone, cement
Accessibility
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Integrability
Materials
As artwork
Materials and shapes
Materials and shapes
Interferences
Urban surface network
Any
Any
Any
Efficacy (T2)
Medium
High
Not relevant
Not relevant
Efficacy (T3)
High
Medium
Medium
High
OAs compatibility
Medium
High
High
High
Class of measure
Design of the physical elements of the BE [S1]
Category
ANTI-RAM BARRIER [AB] 1/2
SUB-CATEGORY
[AB_1] MOBILE WEDGE BARRIER
[AB_2] ROTATING WEDGE
[AB_3] RISING WEDGE BARRIERS
[AB_4] FIXED JERSEY BARRIER
Functioning type
Active
Active
Active
Passive
Description
Retractable mobile barrier for limiting the passage of vehicles (T3)
Retractable fixed barrier for limiting the passage of vehicles (T3)
Retractable fixed barrier for limiting the passage of vehicles (T3)
Fixed barrier for limiting the passage of vehicles (T3). Extending dimensions, it can provide temporary protection to cold arms (T2)
Installation type
Permanent
Permanent
Permanent
Permanent
Foundation
Absent
Deep foundation
Shallow foundation
Shallow foundation
Anti-ram
Not
Yes
Yes
Yes
Certificate/test
n.a
Vehicle 7,5 t
 ≤ 80 km/h
Vehicle 7,5 t
 ≤ 80 km/h
Vehicle 5 t
 ≤ 80 km/h
Source
[46]
[46]
[44]
[44]
Materials
Iron
Iron
Iron
Reinforced concrete
Accessibility
Controlled (vehicles)
Controlled (vehicles)
Controlled (vehicles)
Denied (vehicles)
Integrability
Not possible
Not possible
Retractable
Not possible
interferences
Any
Urban surface network
Any
Urban surface network
Efficacy (T2)
Not relevant
Not relevant
Not relevant
Medium
Efficacy (T3)
Medium
High
High
High
OAs compatibility
Low
Low
High
Low
Measure Class
Design of the physical elements of the BE [S1]
Category
ANTI-RAM BARRIER [AB] 2/2
SUB-CATEGORY
[AB_5] MOBILE JERSEY BARRIER
[AB_6] MODULAR BARRIER
[AB_8] DROP-ARM CRASH BEAM
[AB_8] ROD
Functioning type
Passive
Passive
Active
Active
Description
Mobile barrier useful for limiting the passage of vehicles (T3). Extending dimensions, it can provide temporary protection to cold arms (T2)
Mobile device useful for limiting the passage of vehicles (T3)
Mobile device useful for limiting the passage of vehicles (T3)
Fixed device useful for limiting the passage of vehicles (T3)
Installation type
Temporary
Temporary
Permanent
Temporary/permanent
Foundation
Absent
Absent
Absent
Rested on the ground/pavement
Anti-ram
Not
Yes
Yes
Yes
Certificate/test
n.a
n.a
n.a
Vehicle 7 t
 ≤ 80 km/h
Source
[46]
[46]
[44]
[44]
Materials
Reinforced concrete
Iron
Reinforced concrete
Reinforced concrete, iron
Accessibility
Denied (vehicles)
Controlled (vehicles)
Pedestrians, bicycles, wheelchairs
Controlled (vehicles)
Integrability
Not possible
Not possible
Not possible
Not possible
interferences
Any
Any
Any
Any
Efficacy (T2)
Low
Not relevant
Not relevant
Not relevant
Efficacy (T3)
Medium
High
High
High
OAs compatibility
Low
Low
Low
Low
Measure Class
Design of the physical elements of the BE [S1]
Category
BOLLARDS [BO] 1/2
SUB-CATEGORY
[BO_1] FIXED
[BO_2] DEEP AND FIXED
[BO_3] SHALLOW
Functioning type
Passive
Passive
Passive
Description
Road device that simulates the anti-ram effect. reduce the probability of attack occurring with vehicles (T3)
Useful for preventing or limiting the passage of vehicles (T3)
Useful for preventing or limiting the passage of vehicles (T3)
Installation type
Permanent
Permanent
Permanent
Foundation
Rested on the ground/pavement
Deep foundation
Extended and shallow
Anti-ram
Absent
Yes
Yes
Certificate/test
n.a
Vehicle 7 t; ≤ 80 km/h
Vehicle 7 t; ≤ 80 km/h
Source
[46]
[46]
[46]
Materials
Metals concrete, stone
Metals concrete, stone
Metals concrete, stone
Accessibility
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Integrability
Materials, shape
Materials, shape
Materials, shape
Interferences
Any
Urban surface network
Any
Efficacy (T2)
Not relevant
Not relevant
Not relevant
Efficacy (T3)
Low
High
High
OAs compatibility
Medium
Medium
Medium
Category
BOLLARDS [BO] 2/2
SUB-CATEGORY
[BO_4] INTEGRATED WITH FURNITURE
[BO_5] LUMINOUS
[BO_6] RETRACTILE
Functioning type
Passive
Passive
Active
Description
Preventing or limiting the passage of vehicles (T3), combined with other urban furniture (e.g., bike rack)
Useful for preventing or limiting the passage of vehicles (T3)
Mobile for preventing or limiting the passage of vehicles (T3), when active
Installation type
Permanent
Permanent
Permanent
Foundation
Shallow foundation
Deep foundation
Deep foundation
Anti-ram
Yes
Yes
Yes
Certificate/test
n.a
ISO 179/1 eA = 70 kJ/m2
Vehicle 7 t; ≤ 80 km/h
Source
[44]
[44]
[46]
Materials
Metal
Metal, luminous device
Metals, concrete
Accessibility
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Pedestrians, bicycles, wheelchairs
Integrability
Materials, functions
Materials, shape
Materials
Interferences
Any
Urban surface network
Urban surface network
Efficacy (T2)
Not relevant
Not relevant
Not relevant
Efficacy (T3)
Medium
High
High
OAs compatibility
Medium
Medium
Low
Measure Class
Design of the physical elements of the BE [S1]
Category
INNOVATIVE SYSTEMS [IS] 1/2
SUB-CATEGORY
[IS_1] ANTI-EXPLOSION FILM
[IS_2] BDP SYSTEM
[IS_3] BOMB JAMMER
Functioning type
Passive
Passive
Active
Description
Useful device to make glass shatterproof. Used to reduce the possibility of glass shattering and therefore reduce the damage caused by the explosion. It is applied directly to existing glass
Device containing water to absorb the kinetic energy deriving from the impact of a vehicle, preventing the entire barrier from moving. Surrounding users may be flooded but not affected by the barrier (T2/T3)
Portable interference system useful for disabling the radio signal for the explosion of remotely controlled radio devices. Used to reduce the probability of a terrorist attack using radio-controlled explosives (T3)
Installation type
Permanent
Permanent/temporary
Not relevant
Foundation
Not relevant
Absent
Not relevant
Anti-ram
Yes
Yes
Not relevant
Certificate/test
ISO 616933 (EXV33C)
n.a
n.a
Source
Commercial product
BDP System patent
-
Materials
Plastic
Water, plastic
Electronic device
Accessibility
Not relevant
Pedestrians, bicycles, wheelchairs
Not relevant
Integrability
Only with glass
Shape
Not relevant
interferences
Any
Any
Radio devices
Efficacy (T2)
Not relevant
High
Not relevant
Efficacy (T3)
Medium
Medium
High
OAs compatibility
High
High
High
Category
INNOVATIVE SYSTEMS [IS] 2/2
SUB-CATEGORY
[IS_4] TURNTABLE BOLLARDS
[IS_5] METALLIC MESH
Functioning type
Active
Passive
Description
Rotating system) useful for preventing the passage of vehicles (T3)
Device for preventing or limiting the passage of vehicles (T3), when positioned
Installation type
Permanent
Temporary
Foundation
Shallow
Absent
Anti-ram
Yes
Not
Certificate/test
n.a
n.a
Source
[46]
[44]
Materials
Metal, concrete
Metal
Accessibility
Pedestrians, bicycles, wheelchairs
Not relevant
Integrability
Materials, shape
Not relevant
interferences
Pavement
Any
Efficacy (T2)
Not relevant
Not relevant
Efficacy (T3)
Medium
Low
OAs compatibility
Low
Low
Measure class
BE layout [S2]
Safety and security management in the BE [S4]
Category
SAFETY SIGNS [SS]
ALARM SYSTEMS [AS]
SUB-CATEGORY
[SS_1] LUMINOUS
[SS_2] STANDARD
[AS_1] MOBILE APP
[AS_2] PUBLIC ALARM SERVICE
Functioning type
Active
Active
Active
Active
Description
Luminous road signs for indicating escape routes and safe points, even in low light conditions. Used to reduce the damage caused by a terrorist attack (T2/T3)
Road signs useful for indicating escape routes and safe points. Used to reduce the damage caused by a terrorist attack
System to transmit an emergency notification to mobile devices, road signs, radios, by authorities. Provides information and directions to follow in the event of a terrorist attack (T2/T3)
System that allows authorities to transmit a message (text message, email, road signs) to all devices in an emergency situation, providing information and directions to follow. Used to reduce the damage caused by a terrorist attack
Installation type
Permanent/temporary
Permanent/temporary
Not relevant
Not relevant
Foundation
Not relevant
Not relevant
Not relevant
Not relevant
Anti-ram
Not
Not
Not relevant
Not relevant
Certificate/test
UNI EN ISO 7010:2012
UNI EN ISO 7010:2012
TS 102 900 V1.3.1
TS 102 900 V1.3.1
Source
UNI EN ISO 7010:2012
UNI EN ISO 7010:2013
TS 102 900 V1.3.1
TS 102 900 V1.3.2
Materials
Electronic device
Metal
Not relevance
Not relevant
Accessibility
Not relevant
Not relevant
Not relevant
Not relevant
Integrability
Not relevant
Not relevant
Not relevant
Not relevant
Interferences
Any
Any
Any
Any
Efficacy (T2)
Medium
Low
Medium
Medium
Efficacy (T3)
Low
Low
Medium
Medium
OAs compatibility
Medium
Medium
High
High
Measure class
Access control and surveillance in the BE [S3]
Category
REMOTE CONTROL [RC]
S\UB-CATEGORY
[RC_1] VIDEO SURVEILLANCE WITH AI
[RC_2] BIOMETRIC VIDEO SURVEILLANCE
[RC_3] VIDEO SURVEILLANCE TVCC
Functioning type
Active
Active
Active
Description
System that recognizes anomalies behaviours that signal the probability of an imminent crime. Employed to reduce the likelihood of occurrence of a terrorist attack (T2)
Biometric recognition system capable of identifying a person based on biological/ behavioural characteristics compared with data contained in a database (T2)
System designed to continuously record movements in the area of interest. images can be used to identify suspicious behaviour or reconstruct negative events (T2)
Installation type
Permanent
Permanent
Permanent
Foundation
Absent
Absent
Absent
Anti-ram
Not
Not
Not
Certificate/test
n.a
n.a
n.a
Source
[44]
[47]
[48]
Materials
Electronic device
Electronic device
Electronic device
Accessibility
Not relevant
Not relevant
Not relevant
Integrability
Shape and position
Shape and position
Shape and position
interferences
Any
Any
Any
Efficacy (T2)
High
High
Medium
Efficacy (T3)
Not relevant
Not relevant
Not relevant
OAs compatibility
High
High
High
Category
DIRECT CONTROL [DC]
VIGILANCE [VG]
SUB-CATEGORY
[DC_1] IN TRANSIT METAL DETECTOR
[DC_2] MANUAL METAL DETECTOR
[VG] ARMED VIGILANCE
Functioning type
Active
Active
Active
Description
Device useful for detecting the presence of metal objects as users pass by. Used to reduce the probability of a terrorist attack using bladed weapons or firearms (T2)
Manual device useful for detecting the presence of metal objects. Used to reduce the probability of a terrorist attack using bladed weapons or firearms (T2)
Use of military personnel from the armed forces or public security forces with the function of controlling and supervising the built environment (T2/T3)
Installation type
Temporary
Temporary
Temporary/Permanent
Foundation
Not
Not
Anti-ram
Not
Not
Certificate/test
ISO 9001:2008
ISO 9001:2008
Source
ISO 9001:2008
ISO 9001:2009
National authorities
Materials
Electronic device
Electronic device
Accessibility
Not relevant
Not relevant
Controlled
Integrability
Any
Not relevant
Not relevant
Interferences
Any
Any
Not relevant
Efficacy (T2)
Medium
Medium
High
Efficacy (T3)
Not relevant
Not relevant
Medium
OAs compatibility
Low
High
Medium
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Fußnoten
1
In this work, densities are correlated to Italian context in view of the application case study in Chap. 5, i.e. D.M. 03/08/2015 and National Ministerial Decree 19/8/1996; please compare also with Sect. 4.3.
 
2
The pool of participants is structured as a set of people already involved in the scientific studies and technical activities for the resilience and security of cities.
 
3
The AHP methodology has been applied on the set of indexes by the same pool of participants.
 
4
www.​bes2ecure.​net (last access: 16/10/2024).
 
7
E.g., for the Italian scenario, National ISTAT annual reports on basic population statistics (i.e., percentage distribution by municipality) on age and gender for 2020: http://​demo.​istat.​it/​popres/​index.​php?​anno=​2020&​lingua=​ita (last access: 23/11/2023 – in Italian).
 
Literatur
7.
Zurück zum Zitat The European Commission (2022) Security by design: protection of public spaces from terrorist attacks The European Commission (2022) Security by design: protection of public spaces from terrorist attacks
11.
Zurück zum Zitat Agliata R, Bortone A, Mollo L (2021) Indicator-based approach for the assessment of intrinsic physical vulnerability of the built environment to hydro-meteorological hazards: Review of indicators and example of parameters selection for a sample area. Int J Disaster Risk Reduct 58. https://doi.org/10.1016/j.ijdrr.2021.102199 Agliata R, Bortone A, Mollo L (2021) Indicator-based approach for the assessment of intrinsic physical vulnerability of the built environment to hydro-meteorological hazards: Review of indicators and example of parameters selection for a sample area. Int J Disaster Risk Reduct 58. https://​doi.​org/​10.​1016/​j.​ijdrr.​2021.​102199
17.
Zurück zum Zitat Cantatore E, Esposito D, Sonnessa A (2023) Mapping the multi-vulnerabilities of outdoor places to enhance the resilience of historic urban districts: the case of the Apulian region exposed to slow and rapid-onset disasters. Sustainability 15:14248CrossRef Cantatore E, Esposito D, Sonnessa A (2023) Mapping the multi-vulnerabilities of outdoor places to enhance the resilience of historic urban districts: the case of the Apulian region exposed to slow and rapid-onset disasters. Sustainability 15:14248CrossRef
18.
Zurück zum Zitat Linstone HA, Turoff M (1975) The delphi method. Addison-Wesley Reading, MA Linstone HA, Turoff M (1975) The delphi method. Addison-Wesley Reading, MA
19.
Zurück zum Zitat Villagràn De León JC (2006) Vulnerability: a conceptual and methodological review Villagràn De León JC (2006) Vulnerability: a conceptual and methodological review
20.
Zurück zum Zitat IPCC (2012) Managing the risks of extreme events and disasters to advance climate change adaptation. Cambridge University Press, Cambridge IPCC (2012) Managing the risks of extreme events and disasters to advance climate change adaptation. Cambridge University Press, Cambridge
22.
Zurück zum Zitat Quagliarini E, Bernardini G, D’Orazio M (2023) How could increasing temperature scenarios alter the risk of terrorist acts in different historical squares? a simulation-based approach in typological Italian squares. Heritage 6:5151–5188CrossRef Quagliarini E, Bernardini G, D’Orazio M (2023) How could increasing temperature scenarios alter the risk of terrorist acts in different historical squares? a simulation-based approach in typological Italian squares. Heritage 6:5151–5188CrossRef
24.
Zurück zum Zitat Ministry of Interior (Italy) (2015) DM 03/08/2015: Fire safety criteria (Approvazione di norme tecniche di prevenzione incendi, ai sensi dell’articolo 15 del decreto legislativo 8 marzo 2006, n. 139.) Ministry of Interior (Italy) (2015) DM 03/08/2015: Fire safety criteria (Approvazione di norme tecniche di prevenzione incendi, ai sensi dell’articolo 15 del decreto legislativo 8 marzo 2006, n. 139.)
26.
Zurück zum Zitat Bloomberg M, Burden A (2006) New York City pedestrian level of service study-phase 1. NY, USA, New York Bloomberg M, Burden A (2006) New York City pedestrian level of service study-phase 1. NY, USA, New York
29.
Zurück zum Zitat van der Wal CN, Formolo D, Robinson MA, et al (2017) Simulating crowd evacuation with socio-cultural, cognitive, and emotional elements. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 10480 LNCS:139–177. https://doi.org/10.1007/978-3-319-70647-4_11 van der Wal CN, Formolo D, Robinson MA, et al (2017) Simulating crowd evacuation with socio-cultural, cognitive, and emotional elements. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 10480 LNCS:139–177. https://​doi.​org/​10.​1007/​978-3-319-70647-4_​11
30.
Zurück zum Zitat De Lotto R, Pietra C, Venco EM (2019) Risk analysis: a focus on urban exposure estimation. Computational science and its applications—ICCSA 2019. Springer, Cham, pp 407–423CrossRef De Lotto R, Pietra C, Venco EM (2019) Risk analysis: a focus on urban exposure estimation. Computational science and its applications—ICCSA 2019. Springer, Cham, pp 407–423CrossRef
32.
Zurück zum Zitat Ronchi E, Kuligowski ED, Reneke PA, et al (2013) The process of verification and validation of building fire evacuation models. NIST Tech Note 1822: Ronchi E, Kuligowski ED, Reneke PA, et al (2013) The process of verification and validation of building fire evacuation models. NIST Tech Note 1822:
33.
35.
Zurück zum Zitat Gravetter FJ, Wallnan LB (2013) Statistics for the behavioural sciences, 9th edn. Wadsworth, Cengage Learning Gravetter FJ, Wallnan LB (2013) Statistics for the behavioural sciences, 9th edn. Wadsworth, Cengage Learning
38.
Zurück zum Zitat Bernardini G, Ferreira TM (2022) Emergency and evacuation management strategies in earthquakes: towards holistic and user-centered methodologies for their design and evaluation. In: Ferreira TM, Rodrigues H (eds) Seismic vulnerability assessment of civil engineering structures at multiple scales. Woodhead Publishing - Elsevier, pp 275–321 Bernardini G, Ferreira TM (2022) Emergency and evacuation management strategies in earthquakes: towards holistic and user-centered methodologies for their design and evaluation. In: Ferreira TM, Rodrigues H (eds) Seismic vulnerability assessment of civil engineering structures at multiple scales. Woodhead Publishing - Elsevier, pp 275–321
41.
Zurück zum Zitat Bernardini G (2017) Fire safety of historical buildings. Traditional Versus Innovative “Behavioural Design” Solutions by Using Wayfinding Systems, 1st ed. Springer International Publishing Bernardini G (2017) Fire safety of historical buildings. Traditional Versus Innovative “Behavioural Design” Solutions by Using Wayfinding Systems, 1st ed. Springer International Publishing
43.
Zurück zum Zitat Coaffee J, Bosher L (2008) Integrating counter-terrorist resilience into sustainability. Proc Inst Civ Eng Des Plan 161:75–83 Coaffee J, Bosher L (2008) Integrating counter-terrorist resilience into sustainability. Proc Inst Civ Eng Des Plan 161:75–83
44.
Zurück zum Zitat GCDN Commissioned Research (2018) Beyond concrete barriers innovation in urban furniture and security in public space GCDN Commissioned Research (2018) Beyond concrete barriers innovation in urban furniture and security in public space
45.
Zurück zum Zitat Cantatore E, Quagliarini E, Fatiguso F (2022) European cities prone to terrorist threats: phenomenological analysis of historical events towards risk matrices and an early parameterization of urban built environment outdoor areas. Sustainability 14. https://doi.org/10.3390/su141912301 Cantatore E, Quagliarini E, Fatiguso F (2022) European cities prone to terrorist threats: phenomenological analysis of historical events towards risk matrices and an early parameterization of urban built environment outdoor areas. Sustainability 14. https://​doi.​org/​10.​3390/​su141912301
46.
Zurück zum Zitat Federal Emergency Management Agency (2007) FEMA 430: site and urban design for security: guidance against potential terrorist attacks Federal Emergency Management Agency (2007) FEMA 430: site and urban design for security: guidance against potential terrorist attacks
47.
Zurück zum Zitat Lyon D (2008) Biometrics, identification and surveillance. Bioethics 22:499–508CrossRef Lyon D (2008) Biometrics, identification and surveillance. Bioethics 22:499–508CrossRef
48.
Zurück zum Zitat (NaCTSO) NCTSO, Kingdom U, Infrastructure C for the P of N, Kingdom U (2012) Protecting Crowded Places: Design and Technical Issues (NaCTSO) NCTSO, Kingdom U, Infrastructure C for the P of N, Kingdom U (2012) Protecting Crowded Places: Design and Technical Issues
Metadaten
Titel
Measuring and Improving the Resilience of Outdoor Open Areas Against Terrorist Acts: A Behavioural Design Approach
verfasst von
Gabriele Bernardini
Elena Cantatore
Fabio Fatiguso
Enrico Quagliarini
Copyright-Jahr
2025
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-6965-0_4