4,555
Views
13
CrossRef citations to date
0
Altmetric
Articles

Threat detection: a framework for security architects and designers of metropolitan rail systems

, , &
Pages 173-194 | Received 06 Mar 2014, Accepted 24 Mar 2014, Published online: 30 Apr 2014

References

  • Adey, P. (2003). Secured and sorted mobilities: Examples from the airport. Surveillance & Society, 1, 500–519.
  • Association of the European Rail Industry. (2012). Worldwide rail market study 2012. Retrieved from http://www.unife.org/page.asp?pid=66
  • Beynon-Davies, P. (2011). The UK national identity card. Journal of Information Technology Teaching Cases, 1, 12–21.10.1057/jittc.2011.3
  • Blejcharova, N., Cheu, R. L., & Bina, L. (2012). Framework for selecting screening technologies for checked baggage inspection systems at airports. Journal of Transportation Security, 5, 239–252.10.1007/s12198-012-0094-7
  • Bocchetti, G., Flammini, F., Pragliola, C., & Pappalardo, A. (2009, August). Dependable integrated surveillance systems for the physical security of metro railways. Paper presented at Distributed Smart Cameras, 2009. ICDSC 2009. Third ACM/IEEE International Conference on Digital Object Identifier.
  • Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2, 6–18. 10.1186/2193-7680-2-6
  • Clarke, R. V., & Newman, G. R. (2006). Outsmarting the terrorists. Westport: Praeger Security International.
  • Cook, J. G. (1971). The art of frisking. Fordham Law Review, 40, 789–803.
  • Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. Crime Prevention Studies, 3, 151–196.
  • Cozens, P., Neale, R., Hillier, D., & Whitaker, J. (2004). Tackling crime and fear of crime while waiting at Britain’s railway stations. Journal of Public Transport, 7, 23–41.
  • Davis, D. W., & Silver, B. D. (2004). Civil liberties vs. security: Public opinion in the context of the terrorist attacks on America. American Journal of Political Science, 48, 28–46.10.1111/ajps.2004.48.issue-1
  • Dwyer, A. S. (2010). Intending to travel. Benefit, cost, and active management of terrorism-related risk in the railway environment. British Transport Police. Unpublished.
  • Ekblom, P. (1994). Proximal circumstances: A mechanism-based classification system of crime prevention. In R. Clarke (Ed.), Crime prevention studies (Vol. 2, pp. 185–232). Monsey, NY: Criminal Justice Press.
  • Ekblom, P. (2011). Crime prevention, security and community safety using the 5Is framework. Basingstoke: Palgrave Macmillan.
  • Emil, W. O., René, L., & Franziska, H. (2009, October). A comparison between two leadership models for security checkpoints. In Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on, 59–67 (IEEE).
  • European Commission (EC). (2009). White Paper on professional cross-border transportation of euro-cash by road between Member states in the Euro Area. Retrieved from http://www.europeanpaymentscouncil.eu/knowledge_bank_detail.cfm?documents_id=352
  • Federici, J. F., Schulkin, B., Huang, F., Gary, D., Barat, R., Oliveira, F., & Zimdars, D. (2005). THz imaging and sensing for security applications—Explosives, weapons and drugs. Semiconductor Science and Technology, 20, S266.10.1088/0268-1242/20/7/018
  • Frank, M. G., Maccario, C. J., & Govindraju, V. (2009). Behaviour and security. In P. Seidenstat, & F. X. Splane (Eds.), Protecting airline passengers in the age of terrorism (pp. 86–106). Santa Barbara, CA: Greenwood.
  • Funato, T. (2005, March). Lessons learned from Tokyo subway sarin gas attack and countermeasures against terrorist attacks. Presentation made to Workshop on Implementing Sustainable Urban Travel policies in Japan and other Asia-Pacific Countries, Tokyo.
  • Furton, K. G., & Myers, L. J. (2001). The scientific foundation and efficacy of the use of canines as chemical detectors for explosives. Talanta, 54, 487–500.10.1016/S0039-9140(00)00546-4
  • Government Accountability Office. (2010). Technology assessment: Explosives detection technology to protect passenger rail. United States Government Accountability Office. Retrieved from http://www.gao.gov/new.items/d10898.pdf
  • Gregson-Green, L., Dainty, A., & Bosher, L. (2013). Understanding the impacts of multiple stakeholders on the future security of main English railway stations. Infrastructure Risk and Resilience, 2013, 34–40.
  • Haines, A. (2009). The role of automatic number plate recognition surveillance within policing and public reassurance (Doctoral dissertation). University of Huddersfield.
  • Hale, C., & Charles, P. (2009, September). Managing peak demand for passenger rail: A literature review. In 32nd Australasian Transport Research Forum (ATRF), Auckland.
  • Hardmeier, D., Hofer, F., & Schwaninger, A. (2005, October). The X-ray object recognition test (X-ray ORT)-a reliable and valid instrument for measuring visual abilities needed in X-ray screening. In Security Technology, 2005. CCST’05. 39th Annual 2005 International Carnahan Conference on, 189–192 (IEEE).
  • Hofer, F., & Wetter, O. E. (2012). Operational and human factors issues of new airport security technology—Two case studies. Journal of Transportation Security, 5, 277–291.10.1007/s12198-012-0096-5
  • Heuer, R. J., & Pherson, R. H. (2011). Structured analytical techniques for intelligence analysis. Washington, DC: CQ Press.
  • International Organization for Standardization (ISO). (2011). ISO/IEC/IEEE 29148:2011 – Systems and software engineering — Life cycle processes — Requirements engineering. ISO/IEC/IEEE Switzerland: ISO.
  • Jacobson, S. H., Lee, A. J., & Nikolaev, A. G. (2009). Designing for flexibility in aviation security systems. Journal of Transportation Security, 2(1–2), 1–8.
  • Jenkins, B. M. (2007). The terrorist threat to surface transport. San Jose, CA: Mineta Transport Institute. Retrieved from http://frequency.transportation.org/sites/security/docs/Jenkins–The%20Terrorist%20Threat%20to%20Surface%20Transportation.pdf
  • Jenkins, B. M., Butterworth, B. R., & Gerston, L. N. (2010). Supplement to MTI study on selective passenger screening in the mass transit rail environment. San Jose, CA: Mineta Transportation Institute. Retrieved from http://www.transweb.sjsu.edu/MTIportal/research/publications/documents/Selective%20Screening%20Supplement%20%28with%20Covers%29.pdf
  • Jenkins, B. M., & Trella, J. (2012). Carnage Interrupted: An analysis of fifteen terrorist plots against public surface transportation (Report No 11 – 20). San José, CA: Mineta Transportation Institute.
  • Kirschenbaum, A. A., Mariani, M., Gulijk, C. V., Rapaport, C., & Lubazs, S. (2012). Airports at risk: The impact of information sources on security decisions. Journal of Transportation Security, 5, 187–197.10.1007/s12198-012-0091-x
  • Kirchhoff, G. F., Morosawa, H., Barkhuizen, J., Bussinger, C., Sutseyo, H., & Bey, J. F. (2007). The Asian passengers’ safety study of sexual molestation on trains and buses: The Indonesian pilot study. Acta Criminologica, 20, 1–13.
  • Kraft, E. R. (1987). A branch and bound procedure for optimal train dispatching. Journal of the Transportation Research Forum, 28, 263–276.
  • Krouse, W. J. (2010). Terrorist watchlist checks and air passenger prescreening. Collingdale, PA: Diane Publishing.
  • Kydd, A. H., & Walter, B. F. (2006). The strategies of terrorism. International Security, 31, 49–80.10.1162/isec.2006.31.1.49
  • Lee, H., Smeaton, A. F., O’Connor, N., & Murphy, N. (2005). User-interface to a CCTV video search system. IEEE International Symposium on Imaging for Crime Detection and Prevention (ICDP 2005), January, 39–43.
  • Li, S. M., & Wong, F. C. (1994). The effectiveness of differential pricing on route choice. Transportation, 21, 307–324.
  • Litman, T. (2007). Evaluating rail transit benefits: A comment. Transport Policy, 14, 94–97.10.1016/j.tranpol.2006.09.003
  • Lyons, G., & Chatterjee, K. (2008). A human perspective on the daily commute: Costs, benefits and trade‐offs. Transport Reviews, 28, 181–198.10.1080/01441640701559484
  • McCoy, T., Bullock, R. J., & Brennan, P. V. (2005). RFID for airport security and efficiency. IEE Seminar on Signal Processing Solutions for Homeland Security, January, 8.
  • Meyer, S. (2012). Reducing harm from explosive attacks against railways. Security Journal, 25, 309–325.10.1057/sj.2011.23
  • Meyer, S., & Ekblom, P. (2012). Specifying the explosion-resistant railway carriage—A ‘bench’ test of the security function framework. Journal of Transportation Security, 5, 69–85.10.1007/s12198-011-0082-3
  • Monahan, T. (Ed.). (2006). Surveillance and security: Technological politics and power in everyday life. Oxford: Routledge.
  • National Counter Terrorism Security Office (NaCTSO). (2012). Counter terrorism protective security advice for general aviation v2. London: Association of Chief Police Officers.
  • NDTV. (2013, August 12). Increased security at Delhi’s airport and metro ahead of Independence day. Retrieved from http://www.ndtv.com/article/cities/increased-security-at-delhi-s-airport-and-metro-ahead-of-independence-day-404729
  • O’Flynn, D., Desai, H., Reid, C. B., Christodoulou, C., Wilson, M. D., Veale, M. C., & Speller, R. D. (2013). Identification of simulants for explosives using pixellated X-ray diffraction. Crime Science, 2(1), 1–6.
  • O’Neill, C., Robinson, A. M., & Ingleton, S. (2011). Mitigating the Effects of Firebomb and Blast Attacks on Metro Systems. Procedia – Social and Behavioral Sciences, 1–10. Retrieved from http://www.ncl.ac.uk/newrail/assets/docs/ONeilletal-Mitigatingtheeffectsoffirebomb.pdf
  • Peterman, D. R. (2006). Passenger rail security: Overview of issues. Congressional Research Service. Retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl32625.pdf
  • RAND’s Database of Worldwide Terrorist Incidents (RDWTI). Retrieved from http://www.rand.org/nsrd/projects/terrorism-incidents.html
  • Riley, J. (2004). Terrorism and rail security. Santa Monica, CA: RAND. Retrieved from http://www.rand.org/pubs/testimonies/2005/RAND_CT224.pdf
  • Siemiatycki, S. (2006). Message in a metro: Building urban rail infrastructure and image in Delhi, India. International Journal of Urban and Regional Research, 30, 277–292.10.1111/ijur.2006.30.issue-2
  • Singh, S., & Singh, M. (2003). Explosives detection systems (EDS) for aviation security. Signal Processing, 83, 31–55.10.1016/S0165-1684(02)00391-2
  • Smith, L., & Louis, E. (2010). Cash in transit armed robbery in Australia. Trends and Issues in Crime and Criminal Justice, 397, 1–6.
  • Sweet, K. M. (2009). Aviation and Airport Security. Terrorism and Safety Concerns. Boca Raton, FL: CRC Press.
  • Taylor, B., Loukaitou-Sideris, A., Liggett, R., Fink, C., Wachs, M., Cavanagh, E., Cherry, C., & Haas, P. J. (2005). Designing and operating safe and secure transit systems: Assessing current practices in the United States and abroad (Report No. 04-05). Mineta Transportation Institute: San Jose, CA.
  • UITP: International Association of Public Transport. (2013). What are metros? Retrieved November 19, 2013, from http://www.uitp.org/Public-Transport/metro/index.cfm
  • Vuchic, V. R. (2005). Urban transit: Operations, planning, and economics. Hoboken, NJ: Wiley.
  • Wetter, O. E., Laube, R., & Hofer, F. (2009, October). A comparison between two leadership models for security checkpoints: Enhancing processes by optimizing crew performance. Paper presented at Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference.
  • Wetter, O. E., Lipphardt, M., & Hofer, F. (2010, October). External and internal influences on the security control process at airports. Paper presented at Security Technology (ICCST), 2010 IEEE International Carnahan Conference.
  • Wilson, J. M., Jackson, B. A., Eisman, M., & Riley, K. J. (2007). Securing America’s passenger rail systems. Santa Monica: RAND. Retrieved from http://www.rand.org/pubs/monographs/2007/RAND_MG705.pdf
  • World Metro Database. (2013). Retrieved from http://mic-ro.com/metro/table.html
  • Yoo, K. E. (2009). Screening on the ground, security in the sky. In P. Seidenstat & F. X. Splane (Eds.), Protecting airline passengers in the age of terrorism (pp. 63–85). Santa Barbara, CA: Greenwood.