Search results

1 – 10 of over 96000
Article
Publication date: 30 September 2013

Nick Goldby and Ian Heward

The purpose of this paper is to provide a commentary on the design and development of the Queen Elizabeth Olympic Park in preparation for the London 2012 Olympic Games and its…

Abstract

Purpose

The purpose of this paper is to provide a commentary on the design and development of the Queen Elizabeth Olympic Park in preparation for the London 2012 Olympic Games and its legacy.

Design/methodology/approach

The paper is an invited opinion piece and comment based upon documentation the specialist experience of the authors who were both involved in the planning, design and development of the Queen Elizabeth Olympic Park and who continue to be involved with the development through legacy.

Findings

The paper describes the process through which designing out crime was considered throughout the planning, design and development of the Queen Elizabeth Olympic Park.

Originality/value

The paper provides comment on the planning, design and development of the Queen Elizabeth Olympic Park from individuals who were involved in the planning, design and development of the Queen Elizabeth Olympic Park.

Details

Safer Communities, vol. 12 no. 4
Type: Research Article
ISSN: 1757-8043

Keywords

Article
Publication date: 17 March 2020

Laurence Kimmel, Mike Barnard and Aysu Kuru

The cultural imperative for public buildings in countries like Australia to maintain their intrinsic “openness” – physically and symbolically – faces particular challenges in the…

Abstract

Purpose

The cultural imperative for public buildings in countries like Australia to maintain their intrinsic “openness” – physically and symbolically – faces particular challenges in the context of current global terrorism concerns. Building regulations and counter-terrorism guidelines coexist uneasily, with implications for both public amenity and safety. This is particularly evident in the context of current approaches to hostile vehicle (HV) mitigation.

Design/methodology/approach

Based on a review of comparative literature, this multidisciplinary project assimilates design aesthetics and security expertise to assess the advantages and limitations of current counter-terrorism design approaches in Australia, the UK and the USA. The research focusses on public buildings of high cultural symbolic value (e.g. concert halls) in the context of HV mitigation.

Findings

Two key recommendations emerge. The first presents the benefits of adopting a layered security strategy tailored to a building's security and symbolic profile mix. The second proposes enhancements to the existing counter-terrorism guidelines based on a model that accounts for both symbolic value and openness.

Originality/value

The research presents new strategies for urban design and security stakeholders to balance openness and security in the design of publicly accessible buildings. While existing research addresses the challenges of terrorism in the design of public space, a literature (and practice) gap exists in Australia, the UK and the USA regarding current approaches to the design of public buildings. Using Australia as a case study, the findings will inform government and industry practitioners seeking more complementary approaches to public amenity and safety in comparable counter-security design contexts globally.

Details

Archnet-IJAR: International Journal of Architectural Research, vol. 14 no. 2
Type: Research Article
ISSN: 2631-6862

Keywords

Article
Publication date: 1 August 2001

M.T. Chan and L.F. Kwok

Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance…

5060

Abstract

Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance. Non‐functional requirements such as performance added to the system as an after thought would lead to extremely high cost and undesirable effects. Security, rarely regarded in the past as one of the non‐functional requirements, has to be integrated into the software development process due to its impact on e‐commerce systems. In this paper, a design methodology based on systems security engineering capability maturity model (SSE‐CMM) is proposed to specify design details for the three defined processes: risk, engineering and assurance. By means of an object‐oriented security design pattern, security design covering impact, threats, risks and countermeasures for different parts of an e‐commerce system can be examined systematically in the risk process. The proposed software development process for secured systems (SDPSS), representing the engineering process, consists of four steps: object and collaboration modeling, tier identification, component identification and deployment specification. Selected unified modeling language notations and diagrams are used to support the SDPSS. Using a simplified supply‐chain e‐commerce system as an example, integration of security design into the software development process is shown with discussions of possible security assurance activities that can be performed on a design.

Details

Information Management & Computer Security, vol. 9 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Open Access
Article
Publication date: 13 February 2023

Elham Rostami, Fredrik Karlsson and Shang Gao

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

1175

Abstract

Purpose

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

Design/methodology/approach

This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.

Findings

This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.

Research limitations/implications

The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.

Practical implications

Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.

Originality/value

The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 12 October 2015

Shamal Faily

This paper aims to present an approach where assumption personas are used to engage stakeholders in the elicitation and specification of security requirements at a late stage of a…

1406

Abstract

Purpose

This paper aims to present an approach where assumption personas are used to engage stakeholders in the elicitation and specification of security requirements at a late stage of a system’s design.

Design/methodology/approach

The author has devised an approach for developing assumption personas for use in participatory design sessions during the later stages of a system’s design. The author validates this approach using a case study in the e-Science domain.

Findings

Engagement follows by focusing on the indirect, rather than direct, implications of security. More design approaches are needed for treating security at a comparatively late stage. Security design techniques should scale to working with sub-optimal input data.

Originality/value

This paper contributes an approach where assumption personas engage project team members when eliciting and specifying security requirements at the late stages of a project.

Details

Information & Computer Security, vol. 23 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 30 November 2020

Ali Akbulut and Gökçen Firdevs Yücel Caymaz

Today, the presence of unwanted activities threatening the safety of the field, which has negative effects on daily life and social psychology, is increasing day by day. There is…

Abstract

Today, the presence of unwanted activities threatening the safety of the field, which has negative effects on daily life and social psychology, is increasing day by day. There is no doubt that it is inevitable to avoid these threats, but it is possible to take some measures to reduce the destructive power of these threats. Nowadays, increasing terrorist attacks increase the importance of field safety design in urban areas. There is a loss of life in attacks around the world. The subject of this study is to investigate the design criteria related to the built environment and the measures to be taken in the case of bomb attacks in the built environment. In this study, a checklist will designed to measure the security design process around the building. The checklist titles are taken mainly from the “Safety design and Landscape Architecture” series of the Landscape Architecture Technical Information Series/LATIS publications by the American Society of Landscape Architects (ASLA) and the Risk Management Series of the Federal Emergency Management Agency/FEMA (FEMA, 2003, 2007; LATIS, 2016) and others. The checklist created as a result of literature review will be tested in Istanbul Sultanahmet Square. As a result of the study, it was determined that improvements should be made in the areas of vehicular and pedestrian access, parking lots, lighting and trash receptacle designs around Sultanahmet Square.

Details

International Case Studies in the Management of Disasters
Type: Book
ISBN: 978-1-83982-187-5

Keywords

Article
Publication date: 3 August 2015

Jasmine Siu Lee Lam and Jing Dai

Supply chain security has been recognized as an important part of managing business risks. The purpose of this paper is to propose a methodology with systematic metrics for…

2255

Abstract

Purpose

Supply chain security has been recognized as an important part of managing business risks. The purpose of this paper is to propose a methodology with systematic metrics for logistics service providers (LSPs) to develop their security design to meet customer demands.

Design/methodology/approach

The study is based on a three-stage process of desk research, content validation test, and in-depth case study. The study demonstrates an integrated analytical approach which combines analytical network process (ANP) with quality function deployment (QFD), and then applies the approach to an international LSP.

Findings

A case study of an international LSP shows how the ANP-QFD approach can be deployed to understand customers’ expectation for security and develop tactics and measures with the aim to achieve the desirable outcome for LSPs’ security design.

Originality/value

The paper contributes to supply chain security literature and practice. This study is among the research taking the first step to use ANP-QFD to translate the customer requirements (CRs) for supply chain security into systematic metrics for LSPs to develop their security design. Results from such research into the development of security performance can benefit LSPs in terms of increasing the effectiveness and improving the customer orientation of security efforts. By extension, other firms can enhance their security design by referring to the case study and the integrated analytical method. The flexibility of this ANP-QFD approach offers leeway for firms to change the CRs and design requirements based on their unique circumstances.

Details

International Journal of Physical Distribution & Logistics Management, vol. 45 no. 7
Type: Research Article
ISSN: 0960-0035

Keywords

Article
Publication date: 1 October 2006

David G. Rosado, Carlos Gutiérrez, Eduardo Fernández‐Medina and Mario Piattini

The purpose of this paper is that of linking security requirements for web services with security patterns, both at the architectural and the design level, obtaining in a…

2478

Abstract

Purpose

The purpose of this paper is that of linking security requirements for web services with security patterns, both at the architectural and the design level, obtaining in a systematic way a web services security software architecture that contains a set of security patterns, thus ensuring that the security requirements of the internet‐based application that have been elicited are fulfilled. Additionally, the security patterns are linked with the most appropriate standards for their implementation.

Design/methodology/approach

To develop secure WS‐based applications, one must know the main security requirements specified that applications have to fulfil and find appropriate security patterns that assure, through combination or relationships between them, the fulfilment of the implicated security requirements. That is why a possible link or connection between requirements and patterns will have to be found, attempting to select for a determined security requirement the best security patterns that solve this requirement, thus guaranteeing the security properties for internet‐based applications.

Findings

Using security patterns, that drive and guide one towards a secure development as well as towards security software architecture, one can be sure that this design based on these patterns fulfils and guarantees the most important security requirements of the internet‐based applications through the design and implementation of security solutions that provide reliable security services.

Practical implications

Security architecture for internet‐based applications and web services can be designed considering the security requirement types that it must fulfil and using the most appropriate security patterns.

Originality/value

This paper proposes a relationship between security requirements that can be specified for internet‐based applications and the possible security patterns that can be used in the design and implementation of the secure system based on the internet, guaranteeing that these security requirements are fulfilled.

Details

Internet Research, vol. 16 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 24 August 2010

Sarel Lavy and Manish K. Dixit

The purpose of this paper is to identify key risks that are posed to the security of a site and building perimeters in the first and second lines of defense against terrorism, and…

1060

Abstract

Purpose

The purpose of this paper is to identify key risks that are posed to the security of a site and building perimeters in the first and second lines of defense against terrorism, and are relevant to facility managers.

Design/methodology/approach

A qualitative approach to the literature review was applied. This involved an extensive literature search of existing peer‐reviewed research papers, as well as state and federal reports to mark crucial issues relating to the security of a facility. Strategies to deal with the critical issues pertaining to the security of a facility were reviewed, based on the literature.

Findings

The paper identifies major security risks suggested by the literature and lists strategies to address those risks. The paper also proposes recommendations made by the literature; their implementation may provide a higher level of security to key areas located in the first and second lines of building defense.

Practical implications

The site and building perimeter areas that offer great potential for avoiding and deterring terror attacks are often neglected in terms of security planning, which seriously hampers efforts to provide an enhanced level of security to the facility. The paper points out these areas and major security issues related to them, so they can be taken care of by design professionals as well as facility managers.

Originality/value

The paper provides a comprehensive and detailed review of various aspects tied to the security level of critical areas of the building and site perimeters that could be useful to facility managers of critical facilities.

Details

Facilities, vol. 28 no. 11/12
Type: Research Article
ISSN: 0263-2772

Keywords

Open Access
Article
Publication date: 30 March 2023

Areej Alyami, David Sammon, Karen Neville and Carolanne Mahony

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA…

3304

Abstract

Purpose

This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence of empirical studies on the CSFs for SETA program effectiveness is the key motivation for this study.

Design/methodology/approach

This exploratory study follows a systematic inductive approach to concept development. The methodology adopts the “key informant” approach to give voice to practitioners with SETA program expertise. Data are gathered using semi-structured interviews with 20 key informants from various geographic locations including the Gulf nations, Middle East, USA, UK and Ireland.

Findings

In this study, the analysis of these key informant interviews, following an inductive open, axial and selective coding approach, produces 11 CSFs for SETA program effectiveness. These CSFs are mapped along the phases of a SETA program lifecycle (design, development, implementation and evaluation) and nine relationships identified between the CSFs (within and across the lifecycle phases) are highlighted. The CSFs and CSFs' relationships are visualized in a Lifecycle Model of CSFs for SETA program effectiveness.

Originality/value

This research advances the first comprehensive conceptualization of the CSFs for SETA program effectiveness. The Lifecycle Model of CSFs for SETA program effectiveness provides valuable insights into the process of introducing and sustaining an effective SETA program in practice. The Lifecycle Model contributes to both theory and practice and lays the foundation for future studies.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 10 of over 96000