Aviation Security
It is important to note that the aviation industry is critical to global trade and industry. It is therefore sad that this also happens to be one of the industries that have in the past suffered the brunt of terror and other security threats. There is need to embrace more effective and efficient security and surveillance measures in seeking to not only discourage crime but also reduce opportunities for the same to occur. This text concerns itself with crime prevention through environmental design in airports. In so doing, it will largely focus on whether or not the principles of CPTED have been considered in Dubai International Airport’s terminal 3.
In basic terms, “crime prevention through environmental design (CPTED) incorporates security into design using cost-effective methods that increase security plans and procedures while maintaining aesthetics” (Center for Transport Services, 2011). To be able to determine to what extent the principles of CPTED have been utilized in Dubai international airport terminal 3, it would be prudent to tour the terminal and review how effective the design as well as layout and features of the terminal are in increasing the fear, and reducing the incidence of crime. In so doing, I will largely focus on three of the four CPTED strategies as highlighted by the Center for Transport Services (2011): use of natural surveillance, use of territorial reinforcement, and use of natural access control. The other CPTED concepts I will be looking into are listed by Atlas (2007) to include: management and maintenance, and activity support and generators.
Use of Natural Surveillance
This is intended to ensure that intruders are under constant observation. It is important to note that people with ulterior motives would not want to be seen executing their plans. For this reason, they select areas where their activities are well concealed. In that regard, therefore, the design strategy in this case is for users to be able to clearly observe what is happening around them. The design of Dubai international airport terminal 3 takes natural surveillance into consideration. It incorporates both mechanical and natural approaches to organized surveillance. Essentially, mechanical approaches to organized surveillance could in this case include, but they are not limited to, guard and police patrols, surveillance cameras, and lighting (Atlas, 2007). Natural strategies, as the author further points out, include raised entrances and windows.
Most of the terminal is glass-walled. This enhances visibility within the building, making it almost impossible for criminals and other elements with ill intentions to disguise their activities. It is also important to note that the utilization of plenty of clear glass makes it possible for those in vantage points to observe the activities of those below. The escalators also comprise of more than 40% clear glass, with the installation of the said escalators designed in such a way that the people inside have an excellent view of most of those around and those below. The lighting is also done in such a way that the entire terminal is well lit up. The top floors make use of both natural and artificial lighting. There are also plenty of open view places, meaning that most locations within the terminal have a “hall like” feeling. This is yet another design aspect that further enhances visibility and increases the risk of detection and apprehension for criminal elements. Security cameras are also installed at strategic points. It should be noted that most of the security cameras seem to be deliberately installed in locations that lack natural sight lines — i.e. In places where the view of those working around is, for some reason, obstructed.
Use of Territorial Reinforcement
This has got to do with the creation of an operational sphere for security personnel, delineation of private vs. public space, as well as clear definition of property lines (Center for Transport Services, 2011). There are numerous shops housed within the complex which are manned by attendants. There are also areas clearly marked “Authorized Personnel Only.” Although some of the areas could be regarded semi-public, i.e. In the case of the duty free shops, the presence of attendants and clear signs ensure that only those whose undertakings (like shopping) are legitimate are allowed access. Some measures like these, as Atlas (2007) points out do “not automatically oust criminals but, but they can render them more ineffective.” For instance, with regard to areas clearly marked “Authorized Personnel Only,” those who gain access without being cleared can be easily identified and challenged. It is also important to note that from time to time; uniformed personnel can be seen walking around. This is to ensure that intruders are put on the defensive so that they do not partake in tasks that they are not allowed to partake or gain access to areas that are out of bounds for those who do not work at the airport. It is easy to see that territorial reinforcement is critical to the terminal and travelers’ security.
Use of Natural Access Control
This has got to do with the proper channeling of traffic and utilization of clearly market routes (Center for Transport Services, 2011). In the words of Atlas (2007), “access control is a design concept directed at reducing the opportunity and accessibility for crime.” In that regard, therefore, we could have mechanical (i.e. card key systems and lock) and organized (security personnel) approaches to crime control. Outside the Airport’s terminal 3, one can see clear walls and what appear to be spikes atop the said walls. This means that all those who would want to access the terminal have to make use of the designated pathways. Given that these pathways are constantly monitored and that the spiked walls could easily thwart any attempt to escape, this creates in the intruder with an ill motive the perception of risk. It is also clear that most of the hallways in the Airport’s terminal 3 are designed to channel visitors to specific areas, i.e. shopping places, lounges, or waiting areas. There is no single straight line access to such critical areas as security surveillance and control rooms. There are also various screens located in pathways that indicate to users exactly where they are at any given point in time. Essentially, criminal elements like being in control. The Airport’s terminal 3 is designed in such a way that this sense of control is taken away from the said criminal elements. In total, Dubai International Airport’s terminal 3 has 26 gates, 59 passenger loading bridges, 52 immigration counters, and 14 remote stands (Arabian Business, 2008). All these deny control access to the terminal and limit the chances that those who have ulterior motives will gain access to the terminal.
Management and Maintenance
Crime, according to Atlas (2007), is likely to occur in places that appear abandoned, dilapidated, and unkempt. These, as the author further points out are areas that scream: No One Cares! Dubai International Airport’s terminal 3 is well maintained, decent, clean and very well designed. The terminal’s aura, ambience, as well as look are synonymous with zero tolerance to crime and vandalism. According to Atlas (2007), “management and maintenance go hand in hand.” The fact that some attendants can be seen directing cars is a clear indication that the airport terminal is also well managed, and thus criminals would find it difficult to commit crime.
Activity Support Generators
This is one of the most important and prominently applied CPTED concepts in Dubai International Airport’s terminal 3. Activity support, in the words of Atlas (2007), “involves the appropriate use of building functional spaces such as recreational facilities and common areas.” In this case, the intention or goal is often to ensure that the relevant areas are filled with legitimate users, such that illegitimate users feel pressured to either leave or suspend the commission of criminal acts. Dubai International Airport’s terminal 3 is designed in such a way that elevated vantage points have the greatest human traffic. This is largely accomplished by locating self-serve stores and other viewing areas that attract people in such places. It is also important to note that the fact that the airport terminal is designated as a major security installation, and designed as such, is likely to attract legitimate users and repel illegitimate ones.
Conclusion
As a crime control and prevention strategy, CPTED is of great relevance. Based on this evaluation, it is clear that, at the very least, CPTED succeeds in creating a perception of safety in terminal 3. It is important to note that although the airport terminal scores highly when it comes to the utilization of CPTED concepts to enhance security and minimize opportunities for criminal behavior, there is still room for more to be done. This is particularly the case given that today, criminals are more cunning and sophisticated than was the case a few decades ago. The terminal could, for instance, prominently display CCTV monitors in public places. This would assure all those who make use of the facility that they are being watched. This, combined with the excellent utilization of the other concepts of natural surveillance, would truly deter criminals and keep this key installation even safer.
References
Arabian Business. (2008). T3 Revealed. Retrieved on 21st October 2014 from http://www.arabianbusiness.com/t3-revealed-82995.html
Atlas, R. (2007). Designing Against Terror, Violence and Crime. Retrieved on 20th October 2014 from http://cpted-security.com/atlas/index2.php?option=com_docman&task=doc_view&gid=39&Itemid=63
Center for Transport Services. (2011). Airport Security about More Than Preventing Terrorism. Retrieved on 20th October 2014 from http://www.airtap.umn.edu/publications/briefings/2011/spring.pdf
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more