Crime and Terrorism Risk
eBook - ePub

Crime and Terrorism Risk

Studies in Criminology and Criminal Justice

Leslie W. Kennedy, Edmund F. McGarrell, Leslie W. Kennedy, Edmund F. McGarrell

Condividi libro
  1. 284 pagine
  2. English
  3. ePUB (disponibile sull'app)
  4. Disponibile su iOS e Android
eBook - ePub

Crime and Terrorism Risk

Studies in Criminology and Criminal Justice

Leslie W. Kennedy, Edmund F. McGarrell, Leslie W. Kennedy, Edmund F. McGarrell

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

Crime and Terrorism Risk is a collection of original essays and articles that presents a broad overview of the issues related to the assessment and management of risk in the new security age. These original articles show how researchers, experts and the public are beginning to think about crime and terrorism issues in terms of a new risk paradigm that emphasizes establishing a balance between threat and resources in developing prevention and response strategies.

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Crime and Terrorism Risk è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Crime and Terrorism Risk di Leslie W. Kennedy, Edmund F. McGarrell, Leslie W. Kennedy, Edmund F. McGarrell in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Politik & Internationale Beziehungen e Bürgerrechte in der Politik. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Editore
Routledge
Anno
2012
ISBN
9781135851910

PART I

OVERVIEW OF RISK ASSESSMENT

In the years since the terrorist attacks of September 11, 2001, the continuing threat has raised significant issues related to risk source assessment, analysis, management, communication, decision making, and values in the context of uncertainty. Yet, to a significant extent, law enforcement agencies confronting these hazards do not have the level of experience with risk assessment and management as have organizations in domains such as environment, food, and health. More accurately, although security agencies deal with risk continually, the tendency has been to do so from a closed-system perspective. In contrast, multidisciplinary research has consistently demonstrated that risk assessment is a highly complex process, dependent on the effective integration of scientific and human dimensions and involving sociopolitical factors that constrain or facilitate risk-based practices and policies (National Research Council, 1983; Stern and Fineberg, 1996).
As we have indicated, the interest in risk in the new research on public security can be divided into two analytical parts: risk assessment and risk management. In risk assessment (covered in Part I) attention is paid to the threats that are perceived in the environment, the opportunities that provide targets, and the calculations that are made by individuals and agencies to balance risk against the demands of routine daily activities. This assessment is influenced by the stage at which we judge risks relative to an actual incident where prevention, preparedness, response, and recovery all affect our risk balance calculation.
Risk management, which we cover in Part II, addresses the ways in which agencies plan for and react to threats and incidents, in particular, in the judgments that they make about resource allocations. This process has important effects, as well, depending on the level of impact of incidents where different levels of jurisdiction may influence the ways in which resources are managed, the ways in which information about threat is used, and the authority that is applied in responding to and coordinating response.
Risk analysis is probabilistic but also must account for uncertainty, where we have more difficulty in make firm assessments of what might occur. The extent to which we can remove uncertainty will influence how well we are able to anticipate hazards and threats and their consequences. Probabilistic risk analysis, based on Bayesian inference, is a well-developed method that has been shown to provide risk management models despite limited data. Similarly, stochastic risk modeling has been used to develop warning systems that can generate testable hypotheses. The National Infrastructure Advisory Council also recommends consideration of the application of the COSO financial risk management model to security risks (see www.coso.org). The COSO model includes risk assessment, risk response, and governance and the development of metrics to assess risk and the integration of the model throughout the enterprise (Marsh and Noonan, 2005).
The RAND Corporation advocates event-based models that include detailed analysis of vulnerability and consequence of specific terrorist attack scenarios (Willis et al., 2005). In this context of uncertainty, the goal of event-based models is to reduce “egregious errors” in risk estimates as opposed to identifying optimal estimates. The point is that risk modeling is a well-developed approach in the private sector and comparative research assessing the use of these models in security organizations offers significant value to policymakers and leaders of organizations such as the Department of Homeland Security.
There is an extensive literature on risk and risk management that has dealt with a range of topics from health security (Glass and Schoch-Spana, 2002), to property protection (O’Malley, 1992), to crime control (Simon, 1988), to crime prevention (Bradley and Morss, 2002), and to environmental threats (Douglas and Wildavsky, 1982; Dimitrov, 2002). Increasingly, researchers are beginning to apply the risk models to the study of terrorism (Cummins and Lewis, 2003; Viscusi and Zeckhauser, 2003). These approaches can be typified as concentrating on applications of a perspective that has become a more prevalent part of criminal justice thinking, beginning with the idea that we are living in a “risk society”, where hazards and threats become a focus of agencies to control through selective application of resources (see Beck, 1992). These controls are calculated through an application of probabilistic reasoning that incorporates the value of information, surveillance, and insurance (or some other form of mitigation) as key components in risk management of crime and terrorism (Simon, 1988). What this means is that agencies become more aware of the need to determine the dangers in an environment and marshal resources to repair damage that come from these dangers. Agencies must also enlist the support of the public in managing their own risks and in allowing the institutional interventions that attack the threats, sometimes at the cost of privacy and freedom of movement.
The calculus for risk management has not had an explicit focus of discussions around counter-terrorism until recently. This has emerged in the United States primarily through the ongoing political debate surrounding the distribution of homeland security funds across the country. While the discussion began as one of fairness, arguing that the areas most vulnerable should receive most funding, this debate has become more focused around how vulnerability can actually be calculated. In these deliberations, US government agencies have offered the formulation that risk is a product of threat, vulnerability, and consequence. In examining these factors, risk is profiled as “relative,” with the direct acknowledgment that resources must be applied unevenly and that not all threats will be addressed. In fact, some have argued that too much protection against loss creates loss. Baker and Simon (2002) state that society should embrace some risks. This view flies in the face of thinking that “we need to be right all the time, the terrorist needs only be right once,” a form of thinking that says that we cannot afford to make a mistake and must take action to impede all possible attacks. This strategy is used in airport screening but not applied successfully in any other instance of broad-based terrorism control (see Lum, Kennedy, and Sherley, 2006; Mueller, 2006).
In articulating risk management procedures, there has been much talk about prevention, response, and recovery (these phrases appear in many different forms in documents prepared by a range of agencies involved in crime prevention, emergency preparedness, terrorism response, and so on). In the case of terrorism, these procedures are based on a view that if attacks can be anticipated, we can quickly respond and recover from these events. But many problems emerge in the prediction of terrorism acts, the most difficult being the fact that these are low incident occurrences that are difficult to plan for. Despite this, the cases where events have occurred have provided important models for response and recovery and are giving us some important insights into how we might better prevent these events (as we have seen in the aftermath of the London transit bombings and the break up of the threatened attacks on airlines in Britain).
In the discussions of risk assessment, there have been conversations about the importance of values and institutional expertise in influencing the success of programs addressing threats and balancing risks (Van Brunschot and Kennedy, 2008). An interesting example of the contrast across societies concerning the tension that develops between experts and the public concerning risks (characterized as the “precautionary principle”) is the aversion of Europeans to genetically modified food, despite continuous claims about its safety, a reaction not reflected in North America. In similar ways, discussions about risk management in responding to terrorism, on the face of it, varies dramatically from country to country. Part of this is determined by the local experiences with threats but it is in part a function of the degree of trust that the public puts in law enforcement and its ability to counter dangers in an effective way. The judgment about the success of risk management in counter-terrorism, then, is dependent on not just reducing incidents but also by delivering programs in which the public has confidence. This success also depends on the degree to which the public becomes a partner in the risk management process, working with agencies to deter terrorism. This can take on many different forms but two examples that illustrate this are the actions taken within ethnic communities that are vulnerable to terrorism recruitment to address these threats and the voluntary participation of industry in securing their supply chains in collaboration with customs and border patrol (Closs and McGarrell, 2004).
An important element in this cultural approach relates to the social construction of risk and the management of risk communications (Wildavsky, 1995; Glassner, 1999). Social construction relates to the ways in which risk and security are discussed in the media, by politicians, in local communities, and in small circles of family and friends. How risk is constructed can have important implications for the steps that we take to mitigate it. In addition, the ways in which we manage risk communication can influence our views of threat. Agencies play an important role in this communication and this needs to conform to their actions in preparing for and responding to crime and terrorism.
In sum, in developing risk assessments strategies, we have to address a number of issues. We can summarize the major ones by posing questions that will be the subject of the articles that we have included in this book:
1. What are the common features of risk assessments of crime and terrorism, natural disasters, and health events and how do they differ?
2. How do we assess the risks of “all hazards” in the ever-changing global environments in which we now live?
3. How do we go about finding out what are the threats to security?
4. How do we keep it from getting too complicated to understand?
5. How do we make sure that we leave no stone unturned in identifying threats to security?
6. How do we determine that what we are told about security and threats is correct and valid (trust)?
7. How do we make sure that everyone understands our results?
8. How do we address different levels of security by circumstance (I’m safe, are you?)?
9. How do we establish trust in prescribing solutions or strategies based on our results?
10. How do we account for changes in security over time?
11. How do we contain the consequences of threats so that we minimize the damage that comes from hazardous events such as terrorist attacks?
12. How do we know that the things that we do actually change the final outcome of security (efficacy)?
13. How do we avoid attributing blame to those who are not involved in compromising our security?
14. How do we get people to return to “normal”, i.e., resume regular routines, without getting too comfortable in their security?
In setting the context for examining risks in modern society, we must also look at the changes that have occurred in global security where the shifting character of national borders and the forces of globalization have brought on new challenges for agencies responsible for addressing threats and hazards.

References

Baker, Tom and Jonathan Simon, eds. 2002. Embracing Risk: The Changing Culture of Insurance and Responsibility. Chicago: University of Chicago Press.
Beck, U. 1992. Risk Society: Toward a New Modernity. London: Sage.
Bradley, Ben S. and John R Morss. 2002. “Social Construction in a World at Risk: Toward a Psychology of Experience.” Theory & Psychology 12:509–532.
Closs, D. J. and E. F. McGarrell. 2004. Enhancing Security Throughout the Supply Chain. Washington, DC: IBM Center for the Business of Government.
Cummins, J. David and Christopher M. Lewis. 2003. “Catastrophic Events, Parameter Uncertainty and the Breakdown of Implicit Long-Term Contracting: The Case of Terrorism Insurance.” The Journal of Risk and Uncertainty 26:153–178.
Dimitrov, Radoslav S. 2002. “Water, Conflict, and Security: A Conceptual Minefield.” Society & Natural Resources 15:677–691.
Douglas, Mary and Wildavsky, Aaron. 1982. Risk and Culture. Berkely, CA: University of California Press.
Glass, Thomas A. and Monica Schoch-Spana. 2002. “Bioterrorism and the People: How to Vaccinate a City against Panic.” Clinical Infectious Diseases 34:217–223.
Glassner, Barry. 1999. The Culture of Fear: Why Americans Are Afraid of the Wrong Things. New York: Basic Books.
International Risk Governance Council. 2005. Risk Governance: Towards an Integrative Approach Geneva, Switzerland: International Risk Govern...

Indice dei contenuti