Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Effective physical security by lawrence fennelly pdf

08/10/2021 Client: muhammad11 Deadline: 2 Day

Physical Security

Search the Internet for an article for examples of physical security threats

Word Count - min 400 words or 2-3 Paragraphs

APA Format

Intext and End of the paper Bibliography

Atleast 2 references

Textbook Attached (can be used as a reference if cited)

https://www.genieall.com/physical-security-threats/

https://unitedlocksmith.net/blog/5-most-common-types-of-physical-security-threats

https://www.charter-global.com/common-physical-security-threats/

Plag Report Attached Needed as Well

Due 9/25

Effective Physical Security

FIFTH EDITION

Lawrence J. Fennelly

2

Table of Contents

Cover image

Title page

Copyright

Dedication

Foreword

Preface

Chapter 1. Encompassing Effective CPTED Solutions in 2017 and Beyond: Concepts and Strategies

Introduction

Environment

Space

Target Hardening

CPTED Assessments

Questions to be Answered During an Assessment

CPTED Survey for Colleges and Universities: 30 Vulnerabilities Based on CPTED Assessments

CPTED Recommendations

Psychological Properties of Colors

CPTED Landscape Security Recommendation

Conclusion

Chapter 2. Introduction to Vulnerability Assessment

Risk Management and Vulnerability Assessment

Risk Assessment and the Vulnerability Assessment Process

Statistics and Quantitative Analysis

Vulnerability Assessment Process Overview

Planning the Vulnerability Assessment

Protection Objectives

Data Collection—Detection

Data Collection—Delay

Data Collection—Response

Analysis

3

kindle:embed:0006?mime=image/jpg
Reporting and Using the Vulnerability Assessment

Systems Engineering and Vulnerability Assessment

System Requirements

System Design and Analysis

System Installation and Test

System Replacement

Summary

Chapter 3. Influence of Physical Design

Introduction

Defensible Space

Crime Prevention Through Environmental Design

Conclusion

Chapter 4. Approaches to Physical Security

Levels of Physical Security

The Value of Planning

Physical Barriers

Security Surveillance System (CCTV)

The Security or Master Plan and Countermeasures

Convincing Oneself That a Proposal Is Justified

Designing Security and Layout of Site

Summary

Chapter 5. Security Lighting

Introduction

Illumination

Types of Lamps

Twenty-Five Things You Need to Know About Lighting

Energy Management

Lighting Checklist

Lighting Definitions

Chapter 6. Electronics Elements: A Detailed Discussion

Introduction

Alarm/Access Control Systems

Server (and Business Continuity Server)

Workstations

Advanced Elements

CCTV and Digital Video Systems

How Digital Video Differs From Analog

Wireless Digital Video

4

Satellite

Wireless Architectures

Video Analytics

Lenses and Lighting

Security Communications

Analog Versus Digital

Command/Control and Communication Consoles

Workstation and Console Specifics

Guard Console Functions

Communication Systems

Summary

Questions and Answers

Chapter 7. Use of Locks in Physical Crime Prevention

Lock Terminology and Components

Key-Operated Mechanisms

Combination Locks

Lock Bodies

Door Lock Types

Strikes

Attacks and Countermeasures

Locks and the Systems Approach to Security

Appendix 7A: Key Control

New Standard Set for Exit Devices, Locks, and Alarms

Electrified Panic Hardware

Appendix 7B: Key Control and Lock Security Checklist

Chapter 8. Internal Threats and Countermeasures

Introduction

Internal Theft

Management Countermeasures

Physical Security Countermeasures

Security Officers

Chapter 9. External Threats and Countermeasures Introduction

Methods of Unauthorized Entry

Countermeasures

Chapter 10. Biometrics in the Criminal Justice System and Society Today Introduction

History of Biometrics and Fingerprinting in the United States

5

Biometrics Usage Today

The Federal Bureau of Investigation’s Biometric Center of Excellence

Biometric Modalities and Technology

International Biometrics: India’s Private Usage of Biometrics on Society

Future Advancements of Biometrics

Chapter 11. Access Control Systems and Identification Badges

Access Control Systems and Protocols

Identification Badging System

Chapter 12. Chain-Link Fence Standards

Recommendations

Security Planning

Material Specifications

Design Features and Considerations

Typical Design Example

Chapter 13. Doors, Door Frames, and Signage

Introduction

Residential Buildings

Exterior Number Sizing

The Function of a Door

Terminology

Standards for Doors

Chapter 14. Glass and Windows

Introduction

Types of Glass

Glass and Security

Window Film

Chapter 15. The Legalization of Marijuana and the Security Industry

Marijuana—the Pros and Cons

Should Marijuana be Legal for Medicinal and/or Recreational Purposes?

The Short-Term Effects of Marijuana

The Long-Term Effects of Marijuana

Is Marijuana Addictive?

Security for Marijuana Farms and Dispensaries

Chapter 16. Designing Security and Working With Architects Leadership in Energy and Environmental Design

Crime Prevention Through Environmental Design Planning and Design Review

6

Physical Security Systems

Chapter 17. Standards, Regulations, and Guidelines Compliance and Your Security Program, Including Global Resources

Introduction

Standards

Regulations

Guidelines

Managing Compliance

Resources

Chapter 18. Information Technology Systems Infrastructure

Introduction

Basics of Transport Control Protocol/Internet Protocol and Signal Communications

Transport Control Protocol/User Datagram Protocol/Real-Time Protocol

User Datagram Protocol

Networking Devices

Network Infrastructure Devices

Servers

Network Architecture

Network Configurations

Creating Network Efficiencies

Digital Video

Digital Resolution

Frame Rates

Display Issues

Managing Data Systems Throughput

System Architecture

Interfacing to Other Enterprise Information Technology Systems

Summary

Chapter 19. Security Officers and Equipment Monitoring Introduction

Command Center

Best Locations for Closed-Caption Television

Introduction to Access Control and Biometrics

Designated Restricted Areas

Summary

Chapter 20. Video Technology Overview

Overview

Video System

7

Camera Function

Scene Illumination

Scene Characteristics

Lenses

Cameras

Transmission

Switchers

Quads and Multiplexers

Monitors

Recorders

Hard-Copy Video Printers

Ancillary Equipment

Summary

Glossary for CCTV

Chapter 21. Understanding Layers of Protection Analysis Introduction

Conclusion

Chapter 22. Fire Development and Behavior

Introduction

Stages of Fire

How Fire Spreads

Four Ways to Put Out a Fire

Classifying Fire

UL Standard 217, 268 and NFPA 72

Water Supply for Sprinklers and Tanks

Appendix: A Fire Safety Inspection

Administrative and Planning Phase

General Physical Inspection Phase

Extinguisher Inspection Phase

Stand Pipe, Fire Hose, and Control Valve Inspection Phase

Sprinkler System Inspection Phase

Hazardous Materials Inspection Phase

Alarm System Inspection Phase

Chapter 23. Alarms Intrusion Detection Systems

Introduction

False Alarms

Components of Alarm Systems

Application

Alarm Equipment Overhaul

8

Additional Resources

Conclusion

Appendix 23A: Smoke Detectors

Appendix 23B: Alarm Certificate Services Glossary of Terms Certificate Types

Standards

Appendix 23C: Fire Classifications

Use of Fire Extinguishers

Appendix 1. Glossary of Terms

Index

9

Copyright

Butterworth-Heinemann is an imprint of Elsevier The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom 50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States

Copyright © 2017 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress

British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library

ISBN: 978-0-12-804462-9

For information on all Butterworth-Heinemann publications visit our website at https://www.elsevier.com/

10

http://www.elsevier.com/permissions
https://www.elsevier.com/
Publisher: Todd Green Acquisition Editor: Steve Merken Editorial Project Manager: Nate McFadden Production Project Manager: Stalin Viswanathan Designer: Matthew Limbert

Typeset by TNQ Books and Journals

11

Dedication

It is with great happiness that we dedicate this book to our two very special daughters- in-law, Annmarie Carr Fennelly and Janet Mansfield Fennelly. Both of these strong women are working mothers, have three beautiful children each, and are wonderful

Mothers, Wives, and our Daughters.

Larry and Annmarie Fennelly

12

Foreword

A manager designs and develops security, physical security, safety and investigative programs.

Louis A. Tyska, CPP

This book is your road map to decoding and developing an effective security strategy beginning with the design build phase and addressing everything in between including life safety issues. Larry Fennelly and Marianna Perry have the knowledge and experience to see these complicated and ever-changing security challenges from a unique and multifaceted viewpoint. They both share their insight with the reader and that is why every security practitioner needs to read this book. Most security books focus on one topic, i.e., Risk Analysis or Security Surveillance Systems (CCTV) and access control and biometrics. I love this text because it has so much material in it that we need to address our everyday problems.

The baby boomers are retiring and the millennium generation is taking over. The face of security is also changing. Research is being done to advance the security profession to provide the highest level of protection while at the same time, increasing the bottom-line profitability of the organization. College courses are changing. Going forward, the combination of business as a major field of study and security or information technology as a minor is becoming the new norm. This change is being implemented to prepare security professionals to properly protect corporate assets.

The new “buzz words” from 2015 to 2020 will be the following:

1. What kind of “skill set” does the candidate/officer have? 2. What “certifications and specializations” does the candidate/officer have? 3. Both “physical security and informational security” will be merging with the move toward certifications. 4. “Career pathways” will be used by way of “internships.” 5. Your “certifications” will be the bar for testing qualifications. 6. Education for a career in security is being “redesigned.” Are you ready? 7. The holistic approach is preferred over independent components or “silos” as a logical approach to security systems.

8. 5.0 Megapixel cameras on phones and monitors with full (or true) HDTV—1080 are standard. Do not be left behind! Plan for the future now! The top crime threat problems according to recent reports are (1) cyber/communications security,

(2) workplace violence, (3) business continuity, (4) insider threat, and (5) property crime.

We mention this because if you are going to be addressing crime problems you first need to know what they are. To make recommendations and solve problems, you first have to make sure that you have correctly identified the issue. If a security assessment is not completed to determine the root causes of a security issue or vulnerability, the security practitioner may simply keep putting policies or procedures in place that address the symptoms and countermeasures of a problem and not the actual problem itself. This will be a frustrating (and sometimes costly) situation that can be avoided if, before any action is taken, an assessment is completed by a knowledgeable security professional to accurately identify security vulnerabilities. This will ensure that the true issues and concerns are being addressed, not just the symptoms.

The most demanding problem for managers and supervisors within a protection department is the physical security devices under his/her control. The supervisor’s role should be to assist in enabling the manager to provide a level of support within the organization. Supervisors must take responsibility for corporate regulations, moral and ethical tone as well as providing the required level of security and customer service required.

13

Managers work with budgets and other resources (equipment, uniforms, technology, software, etc.) to ensure that the protective mission is achieved. Managers oversee processes (procedures) that accomplish organizational goals and objectives. Staff functions without a supervisory span of control over line employees may be performed by managers. Training, technical support, auditing, etc., are staff functions. A manager coordinates activities rather than supervises them. Turnover and job rotation can create overall improvement and a challenge. Staying current on industry trends and events by reviewing news sources, trade publications, and webinars and sources such as ASIS International and others.

Active shooter/active assailant’s incidents, stabbings, and random unthinkable acts of violence are happening in our workplaces and on our televisions everyday. We cannot escape these mindless crimes and thefts that impact every segment of the security management operation. “Security Matters” now more than ever! Trying to decide which security concepts are right for your organization is a daunting full-time task. However, I suggest that you start off with a professional security assessment, so you can identify your security needs.

This book is your road map to decoding and developing an effective security strategy beginning with the design build phase and addressing everything in between including life safety issues. The authors have the knowledge and experience to see these complicated and ever-changing security challenges from a unique and multifaceted viewpoint. They both share their insight with the reader and that is why every security practitioner needs to read this book. Most security books focus on one topic, i.e., Risk Analysis or Security Surveillance Systems (CCTV) and access control. I love this text because it has so much material in it that we need to address our everyday problems.

Today’s security books are more and more complicated and technical. We, as practitioners must stay ahead of the curve, to keep up. Books like this, and those of Thomas Norman, CPP, David Paterson, CPP, Sandi Davis (Women in Security), James F. Broder, CPP, Michael Fagel PhD, and Dr Jennifer Hestermann are security professionals and future educators along with Larry Fennelly and Marianna Perry. Writing a book listing 150 things…etc., is not an easy task. I commend these authors and those that I mentioned, for their vision and dedication that will keep us ahead of the curve.

Linda Watson, MA, CPP, CSC, CHS-V, Whirlaway Group LLC

14

Preface

We completed this book in about 6 months. Normally, this undertaking would take 18 months. We know that it is hard to believe, but it is true. We both know that the faster we could complete this book, get it published and into the hands of those who are responsible for those practitioners in security, then possibly the information will get out there and be of further help to our profession. This is basically a very hard book to finish. The first 35 are easy the next 35 are ok, then it gets harder and harder. We went through two drafts and then after having a strong handle on it, we keep adding and adding to the various pieces. A perfect example is the section on body cameras, I saw a report that was negative, then I found another report that was positive, so we add a piece I felt this was the best part of the book, because it was getting better and better.

Physical security is a big topic, cybercrimes and cyberterrorism, workplace violence, emergency management, and IT security issues will continue to be the top issues going forward.

Regulations and Compliances and security standards for your corporation will continue to be developed and aid in the improvement of your security assessment. Follow CPTED principles and security best practices and master plan development. After you have done so, call your local media to promote your accomplishments. Let the bad guys know that you take crime prevention and effective security at your school serious!

Times have changed and you must change as well, I was reading a deposition recently and the

security manager said quote “We have been doing it this way for 30 years.” Of course, you have that is why a man died and your being sued.

Social media need to monitored and included in your assessment process.

We are concerned because we know that many of you do not have good security and do not have adequate security in place to protect your assets. We are not advocating that you make your corporate or place of work a fortress into a cold, uninviting fortress. Instead, we want you to have not only a safe environment but also has effective security in place to address vulnerabilities and have continuous assessments to improve the process.

Enterprise risk management (ERM): (1) It looks at a holistic approach to ERM, which breaks down silos between physical and technological security and provides comprehensives risk management solutions. Eugene Ferraro recently said, (2) “We owe it not only to this country, but also to the free world, to think further ahead about future threats and what the solutions look like. And if we can reach consensus around these solutions, we will be in a better position to build them.”

We wish to sincerely thank all of our contributors who made this book possible. We truly believe that compiling the knowledge of many security professionals is a more comprehensive approach to addressing the issue of physical security. We thank you for your professionalism as well as your contributions to our profession.

Lawrence J. Fennelly

Marianna A. Perry, CPP 1Enterprise Security Risks and Workplace Competencies, ASIS, University of Phoenix & Apollo Education Group, 2016. 2Ibid.

15

16

C H A P T E R 1

17

Encompassing Effective CPTED Solutions in 2017 and Beyond

Concepts and Strategies Lawrence J. Fennelly, CPOI, CSSI, CHS-III, CSSP-1, and Marianna A. Perry, MS, CPP, CSSP-1

18

Abstract We are delighted to be a part of the series of white papers for School Dangers.Org. It is appropriate to say a few words about Tim Crowe and Crime Prevention through Environmental Design (CPTED), before you read our paper. Tim Crowe wrote Crime Prevention Through Environmental Design (1991) based on a security assessment that he conducted for a school district in Florida. Tim's book (which was updated and modernized by Lawrence Fennelly in 2013) was and is still considered a primary resource for crime prevention practitioners in the security industry to help them better understand the relationship between design and human behavior. CPTED is a proactive approach to manipulate the physical environment and bring about the desired behavior of reduced criminal activity as well as reduced fear of crime. Tim Crowe and Larry Fennelly lectured for Rick Draper in Australia on the concepts of CPTED.

Keywords CPTED color; Design; Design concept; Deterrences; Environment; Fear of crime; Hot spots; Landscape security; LED; Maintenance; Measuring and evaluation; Methods; Police procedures; Programs Tim Crowe; QR code; Rick Draper; Strategies; Target hardening; Three-D concept

Deterrence’s, CPTED Design, Policies and Procedures, Training Programs and Security Awareness Programs.

Thomas L Norman, CPP, PSP, CSC 2016.

19

Introduction We are delighted to be a part of the series of white papers for School Dangers.Org. It is appropriate to say a few words about Tim Crowe and Crime Prevention through Environmental Design (CPTED), before you read our paper.

Tim Crowe wrote Crime Prevention Through Environmental Design (1991) based on a security assessment that he conducted for a school district in Florida. Tim’s book (which was updated and modernized by Lawrence Fennelly in 2013) was and is still considered a primary resource for crime prevention practitioners in the security industry to help them better understand the relationship between design and human behavior. CPTED is a proactive approach to manipulate the physical environment and bring about the desired behavior of reduced criminal activity as well as reduced fear of crime. Tim Crowe and Larry Fennelly lectured for Rick Draper in Australia on the concepts of CPTED.

Tim Crowe’s comprehensive set of guidelines were developed with one goal in mind—to reduce opportunities for crime in the built environment. His work is the “gold standard” for security practitioners and others who implement CPTED concepts as a crime prevention tool. Crowe’s work is frequently used as a training tool for law enforcement, town planners, and architects. These guidelines have been used in hundreds of training sessions and cited in numerous publications.

Tim Crowe was a professor at the National Crime Prevention Institute (NCPI) at the University of Louisville in Louisville, Kentucky. Marianna Perry is the former Director of NCPI and together both she and Tim have presented training sessions on CPTED.

We included this information because we want you to understand the origination of Tim Crowe’s work on CPTED.

20

Environment The conceptual thrust of a CPTED program is that the physical environment can be manipulated to produce behavioral effects that will reduce the incidence and fear of crime, thereby improving the quality of life. These behavioral effects can be accomplished by reducing the propensity of the physical environment to support criminal behavior. Environmental design, as used in a CPTED program, is rooted in the design of the human–environment relationship. It embodies several concepts. The term environment includes the people and their physical and social surroundings. However, as a matter of practical necessity, the environment defined for demonstration purposes is that which has recognizable territorial and system limits.

The term design includes physical, social, management, and law enforcement directives that seek to affect positively human behavior as people interact with their environment.

Thus, the CPTED program seeks to prevent certain specified crimes (and the fear attendant on them) within a specifically defined environment by manipulating variables that are closely related to the environment itself.

The program does not purport to develop crime prevention solutions in a broad universe of human behavior but rather solutions limited to variables that can be manipulated and evaluated in the specified human/environment relationship. CPTED involves design of physical space in the context of the needs of legitimate users of the space (physical, social, and psychological needs), the normal and expected (or intended) use of the space (the activity or absence of activity planned for the space), and the predictable behavior of both legitimate users and offenders. Therefore, in the CPTED approach, a design is proper if it recognizes the designated use of the space, defines the crime problem incidental to and the solution compatible with the designated use, and incorporates the crime prevention strategies that enhance (or at least do not impair) the effective use of the space. CPTED draws not only on physical and urban design but also on contemporary thinking in behavioral and social science, law enforcement, and community organization.

21

Space The continuum of space within a residential complex (that is, a property consisting of one or more buildings containing dwelling units and associated grounds or, more broadly, a neighborhood consisting primarily of residential uses) may be divided into four categories: • Public. Space that, whatever its legal status, is perceived by all members of a residential area or

neighborhood as belonging to the public as a whole, which a stranger has as much perceived right to use as a resident.

• Semipublic. Space accessible to all members of the public without passing through a locked or guarded barrier. There is thought to be an implied license for use by the public, and strangers will rarely be challenged. This is generally associated with multifamily housing.

• Semiprivate. Space restricted for use by residents, guests, and service people on legitimate assignments. In multifamily housing, this is usually secured by protection officers (or doormen), locks, or other forms of physical barriers. Strangers can be expected to be challenged as potential trespassers.

• Private. Space restricted for use by residents of a single dwelling unit, their invited guests, and service people, with access generally controlled by locks and other physical barriers. Unauthorized use is always challenged when the opportunity for challenge presents itself.

22

Target Hardening The emphasis on design and use deviates from the traditional target-hardening approach to crime prevention. Traditional target hardening focuses predominantly on denying access to a crime target through physical or artificial barrier techniques (such as locks, alarms, fences, and gates). Target hardening often leads to constraints on use, access, and enjoyment of the hardened environment. Moreover, the traditional approach tends to overlook opportunities for natural access control and surveillance. The term natural refers to deriving access control and surveillance results as a by- product of the normal and routine use of the environment. It is possible to adapt normal and natural uses of the environment to accomplish the effects of artificial or mechanical hardening and surveillance. Nevertheless, CPTED employs pure target-hardening strategies either to test their effectiveness as compared with natural strategies or when they appear to be justified as not unduly impairing the effective use of the environment.

As an example, a design strategy of improved street lighting must be planned, efficient, and evaluated in terms of the behavior it promotes or deters and the use impact of the lighted (and related) areas in terms of all users of the area (offenders, victims, other permanent, or casual users). Any strategies related to the lighting strategy (e.g., block-watch or neighborhood watch, 911 emergency service, police patrol) must be evaluated in the same regard. This reflects the comprehensiveness of the CPTED design approach in focusing on both the proper design and effective use of the physical environment. Additionally, the concept of proper design and effective use emphasizes the designed relationship among strategies to ensure that the desired results are achieved. It has been observed that improved street lighting alone (a design strategy) is ineffective against crime without the conscious and active support of citizens (in reporting what they see) and of police (in responding and conducting surveillance). CPTED involves the effort to integrate design, citizen and community action, and law enforcement strategies to accomplish surveillance consistent with the design and use of the environment.

CPTED Strategies There are three overlapping strategies in CPTED (as shown in Fig. 1.1): 1. Natural access control 2. Natural surveillance 3. Territorial reinforcement

Access control and surveillance have been the primary design concepts of physical design programs. At the outset of the CPTED program, access control and surveillance systems— preexisting as conspicuous concepts in the field of CPTED—received major attention. Access control and surveillance are not mutually exclusive classifications since certain strategies achieve both, and strategies in one classification typically are mutually supportive of the other. However, the operational thrust of each is distinctly different, and the differences must be recognized in performing analysis, research, design, implementation, and evaluation.

23

FIGURE 1.1 Overlapping strategies in CPTED.

Access control is a design concept directed primarily at decreasing crime opportunity. Access control strategies are typically classified as organized (e.g., security officers), mechanical (e.g., locks, lighting, and alarms), and natural (e.g., spatial definition). The primary thrust of an access control strategy is to deny access to a crime target and to create a perception of risk in offenders. Surveillance is a design concept directed primarily at keeping intruders under observation. Therefore, the primary thrust of a surveillance strategy is to facilitate observation, although it may have the effect of an access control strategy by effectively keeping intruders out because of an increased perception of risk. Surveillance strategies are typically classified as organized (e.g., police patrol), mechanical (e.g., lighting, locks, and alarms), and natural (e.g., windows).

Photos 1.1–1.3 reflect good natural surveillance. Traditionally, access control and surveillance, as design concepts (Fig. 1.2), have emphasized

mechanical or organized crime prevention techniques while overlooking, minimizing, or ignoring attitudes, motivation, and use of the physical environment. More recent approaches to physical design of environments have shifted the emphasis to natural crime prevention techniques, attempting to use natural opportunities presented by the environment for crime prevention. This shift in emphasis led to the concept of territoriality.

The concept of territoriality (elaborated most fully to date in the public housing environment) suggests that physical design can contribute to a sense of territoriality. That is, physical design can create or extend a sphere of influence so that users develop a sense of proprietorship—a sense of territorial influence—and potential offenders perceive that territorial influence (Photo 1.4).

24

PHOTO 1.1

25

PHOTO 1.2

26

PHOTO 1.3

FIGURE 1.2 Typical access control and surveillance concepts as well as classifications.

27

PHOTO 1.4 Reflects physical design based on territoriality.

At the same time, it was recognized that natural access control and surveillance contributed to a sense of territoriality, making it effective for crime prevention. Natural access control and surveillance will promote more responsiveness by users in protecting their territory (e.g., more security awareness, reporting, and reacting) and promote greater perception of risk by offenders.

Maintenance Finally, care and maintenance allow for the continued use of a space for its intended purpose, as well as contributing to territorial reinforcement. Deterioration and blight indicate less concern and control by the intended users of a site and indicate a greater tolerance of disorder. Proper maintenance protects the public health, safety, and welfare in all existing structures, residential and nonresidential, and on all existing premises by establishing minimum standards, best practices, as well as a master plan. Maintenance is the responsibility of the facilities manager, owners, and occupants.

Furthermore, the effort to achieve a balance between design for crime prevention and design for effective use of environments contributed to the shift in focus from organized and mechanical strategies per se to natural strategies. This was because natural strategies exploited the opportunities of the given environment both to naturally and routinely facilitate access control and surveillance and to reinforce positive behavior in the use of the environment. The concept reflects a preference, where feasible, to reinforce existing or new activities, or to otherwise reinforce the behavior of environment users so that crime prevention flows naturally and routinely from the activity being promoted.

The conceptual shift from organized and mechanical to natural strategies has oriented the CPTED program to develop plans that emphasize natural access control and surveillance and territorial reinforcement (Photo 1.5).

28

PHOTO 1.5 Reflects mechanical layout of mounted camera with street light and roof lighting.

Although conceptually distinct, it is important to realize that these strategy categories tend to overlap in practice. It is perhaps most useful to think of territorial reinforcement as the umbrella concept, comprising all natural surveillance principles, which in turn comprises all access control principles. It is not practical to think of territorial reinforcement, natural surveillance, and access control as independent strategies because, for example, access control operates to denote transitional zones, not necessarily impenetrable barriers. If these symbolic or psychological barriers are to succeed in controlling access by demarcating specific spaces for specific individuals, potential offenders must perceive that unwarranted intrusion will elicit protective territorial responses from those who have legitimate access. Similarly, natural surveillance operates to increase the likelihood that intrusion will be observed by individuals who care but are not officially responsible for regulating the use and treatment of spaces. If people observe inappropriate behavior but do nothing about it, then the most carefully planned natural surveillance tactics are useless in terms of stopping crime and vandalism (Photo 1.6).

29

PHOTO 1.6 Can you see the man hiding in the bushes?

The Three-D Approach1 For CPTED to be a success, it must be understandable and practical for the normal users of the space. That is, the normal residents of a neighborhood and the people who work in buildings or commercial areas must be able to use these concepts. Why? Because these people know more about what is going on in that environment and they have a vested interest (their own well-being) in ensuring that their immediate environment operates properly. The technologist or specialist, who may be a traffic engineer, city planner, architect, or security specialist, should not be allowed to shoulder the responsibility alone for safety and security. The specialist needs to follow the dictates of the users of the space because he/she can often be swayed by misperceptions or by the conflicting demands of his professional competition.

The Three-D approach to space assessment provides a simple guide for the layperson to use in determining the appropriateness of how his/her space is designed and used. The Three-D concept is based on the three functions or dimensions of human space: 1. All human space has some designated purpose. 2. All human space has social, cultural, legal, or physical definitions that prescribe the desired and acceptable behaviors. 3. All human space is designed to support and control the desired behaviors.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Solutions Store
Instant Homework Helper
Math Specialist
Quality Homework Helper
Best Coursework Help
Smart Homework Helper
Writer Writer Name Offer Chat
Solutions Store

ONLINE

Solutions Store

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$33 Chat With Writer
Instant Homework Helper

ONLINE

Instant Homework Helper

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$25 Chat With Writer
Math Specialist

ONLINE

Math Specialist

I have read and understood all your initial requirements, and I am very professional in this task.

$34 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

I will cover all the points which you have mentioned in your project details.

$30 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I have read and understood all your initial requirements, and I am very professional in this task.

$36 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

I have read and understood all your initial requirements, and I am very professional in this task.

$40 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Which statement describes a characteristic of a converged network - DQ Reply 15 634 - Absolutely Zero PLAGIARISM - Culture and Leadership - Wifi acceptance test plan - A view from the bridge cherokee paul mcdonald - How to draw a pond ecosystem - Cube root of unity - How to get rid of stags bluekai on mac - Nojo original baby sling recall - 2 page paper - Pestle analysis for airbnb - Discussion - Shockley read hall recombination - Another one bites the dust superbowl commercial - 5/2 - What does the poem grass by carl sandburg mean - Animal farm discussion questions - Operational Excellence Module 8 Final Assignment - Research paper - C-leg 4 battery life - Bras for charity freepost - Partial dependencies are dependencies on only a portion of the ____. - Successful licence suspension appeal - Head to toe nursing assessment - Creative finish carpentry the villages fl - How to cite website - Keurig case study solution - Subnetting practice questions pdf - Human Resources - Kounin classroom management - Week 2 Discussion - Why is this a problem? - Philosophy in the tragic age of the greeks - Cessna 172 alternator failure - Monash university core values - What is “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college. - How many atoms are in silicon - What is relation between cp and cv - Artificial Intelligence in Security - 20th century art movements ppt - Jetblue and the veterans administration case study - Rhs steel span tables - Baddeley and hitch 1976 - I want to become a soldier essay - Polarization index test results - How to find angle of banked curve - Are pad mounted transformers dangerous - Ancient india and greece sculptures - Evalueserve circle of experts - Clarke belt sander parts - Interrogations-- CJT202 DICUSSON BOARD - Thursford christmas spectacular seating plan - How to draw m ei diagram - Essay--psychological intervention - Compare and contrast essay of Followership and Servant Leadership - Carl rogers 1959 self concept - Build your own sten gun - What computer system does troy university use to prevent plagiarism - Essay - Fly chicago skydiving - 3 step problem solving approach and organizing framework - Nyassa enterprises - Man 1111 week 6 - Approaches to Black Studies - What is aesthetic development - Avila college winter uniform - World Lit II Test 2 - It security assessment report template - Walmart is good for the economy by john semmens - BUSN601 - Coso internal control framework 2017 pdf - Atomic fluorescence spectroscopy instrumentation - Test 7 segment display - Assigning oxidation numbers worksheet part b answer key - Year 8 food technology - Week 4 Discussion BIO2070 MICROBIOLOGY SU01 - 2.95 kg to lbs - Python homework sheet 1 answers - Financial ratio analysis assignment - Chick fil a international expansion - Cs2 gas protection measures - Team operating principles examples - Chapter 7 constructing bar graphs data analysis practice answers - An object is a ____ of a class - Apa citation of the aca code of ethics - CPO 2100 European Democracies discussion Board about chapter 3 - IOM Future of Nursing Report and Nursing - The norton introduction to philosophy 2nd edition - Sql data analyst resume - Northern territory drivers licence - Activation energy of persulfate iodide reaction - How to set snagit as default print screen - It 145 final project zookeeper - Integrated skills lesson plan - Siemens power transmission and distribution - Research paper on Solar Panels - Hyundai case study ppt - Ezna cycle pure kit - Susan scott fierce conversations