PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY,...

62
PASSENGER STATION AND TERMINAL DESIGN FOR SAFETY, SECURITY AND RESILIENCE TO TERRORIST ATTACK Project nº: FP7-SCPO-GA-2011-266202 Funding Scheme: CP – Collaborative Project Call (part) identifier: FP7-SST-2010-RTD-1 D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE Due date of deliverable: 31/05/2012 Actual submission date: 31/05/2012 Start date of project: 01/06/2011 Duration: 36 months Organisation name of lead for this deliverable: JOHN MCASLAN & PARTNERS Contributors: JMP, MTRS3 Revision: 1.0 Project co-funded by the European Commission within the Seventh Framework Programme (2007-2013) Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services)

Transcript of PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY,...

Page 1: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

PASSENGER STATION AN D TERMINAL DESIGN FOR SAFETY, SECURITY AND RESILIENCE TO TERRORIST

ATTACK Project nº: FP7-SCPO-GA-2011-266202

Funding Scheme: CP – Collaborative Project

Call (part) identifier: FP7-SST-2010-RTD-1

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

Due date of deliverable: 31/05/2012 Actual submission date: 31/05/2012

Start date of project: 01/06/2011 Duration: 36 months

Organisation name of lead for this deliverable: JOH N MCASLAN & PARTNERS

Contribut ors: JMP, MTRS3

Revision: 1.0

Project co-funded by the European Commission within the Seventh Framework Programme (2007-2013)

Dissemination Level

PU Public X

PP Restricted to other programme participants (including the Commission Services)

RE Restricted to a group specified by the consortium (including the Commission Services)

CO Confidential, only for members of the consortium (including the Commission Services)

Page 2: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)
Page 3: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: Document ID: Revision:

31/05/2012 SECEST-WP2.4-JMP-DE-PU-v1.0 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 1 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Document Change Log

Revision Edition Date Author Modified Sections / Pages Comments

0.1 08/02/2012 JMP All Creation

0.2 16/04/2012 MTRS3 All Sections on US examples of guidelines

0.3 19/05/2012 USFD All Added introduction and EU examples of guidelines and editing of document

0.4 29/05/2012 JMP All Completion of questionnaires, conclusions and design and layout of the Constructive Design Handbook

0.5 30/05/2012 All All Integration of all of the consortium’s comments and corrections

1.0 31/05/2012 ISD Final Review

Page 4: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)
Page 5: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 3 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Table of Contents

1. Introduction ...................................... .................................................................................... 11

1.1. Background ......................................................................................................................... 11

1.2. Purpose and Scope ............................................................................................................. 11

1.3. Document Structure ............................................................................................................ 12

1.4. Applicable and Reference Documents................................................................................. 13

2. PUBLICATION FORMATS ............................... .................................................................... 14

2.1. Printed material ................................................................................................................... 15

2.2. Portable Document Format (PDF) and Interactive PDF ....................................................... 16

2.3. HTML/web format ................................................................................................................ 17

2.4. Other eBook formats ........................................................................................................... 18

2.5. App for mobile devices ........................................................................................................ 19

2.6. Video / Podcast ................................................................................................................... 20

2.7. Summary of the different formats ........................................................................................ 21

3. US DESIGN GUIDELINES DOCUMENTS ............................................................................ 23

3.1. TRANSIT SECURITY DESIGN CONSIDERATIONS (FTA) ................................................. 23

3.1.1. Document scope .................................................................................................. 23

3.1.2. Presentation methods of design guidelines .......................................................... 23

3.2. THE SITE SECURITY DESIGN GUIDE (GSA) .................................................................... 26

3.2.1. Document scope .................................................................................................. 26

3.2.2. Presentation methods of design guidelines .......................................................... 26

3.3. RECOMMENDED SECURITY GUIDELINES FOR AIRPORT PLANNING, DESIGN AND CONSTRUCTION (TSA) ............................................................................................. 32

3.3.1. Document scope .................................................................................................. 32

3.3.2. Presentation methods of design guidelines .......................................................... 32

4. EU DESIGN GUIDELINES DOCUMENTS ............................................................................ 35

4.1. REDESIGN ......................................................................................................................... 35

4.1.1. Document scope .................................................................................................. 35

4.1.2. Presentation methods of design guidelines .......................................................... 35

4.2. Network Rail Guide to Station Planning and Design ............................................................ 38

4.2.1. Document scope .................................................................................................. 38

4.2.2. Presentation methods of design guidelines .......................................................... 38

4.3. RIBA guidance on designing for counter-terrorism .............................................................. 41

4.3.1. Document scope .................................................................................................. 41

4.3.2. Presentation methods of design guidelines .......................................................... 41

4.4. Protecting Crowded Places: Design and Technical Issues, and Crowded Places: The Planning System and Counter-Terrorism ............................................................................. 44

4.4.1. Documents scope ................................................................................................ 44

4.4.2. Presentation methods of design guidelines .......................................................... 44

Page 6: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 4 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

5. COMPENDIUM OF EXISTING GUIDELINES ....................................................................... 47

6. ANALYSIS OF PRESENTATION METHODS .................. .................................................... 48

6.1. Document Format ............................................................................................................... 49

6.2. Document Structure ............................................................................................................ 50

6.3. Layout and Styles ................................................................................................................ 50

6.3.1. Colour scheme .................................................................................................... 50

6.3.2. Layout .................................................................................................................. 50

7. END-USER FEEDBACK ON GUIDELINE PRESENTATION METHODS ............................ 52

7.1. Workshop ............................................................................................................................ 52

7.2. Questionnaire/interviews ..................................................................................................... 52

7.2.1. Questionnaire/interviews methodology ................................................................ 52

7.2.2. Questionnaire/interview results and interpretation ................................................ 55

8. RECOMMENDED PRESENTATION METHODS FOR SECURESTATION GUIDELINES ........................................................................................................................ 57

8.1. Document Structure ............................................................................................................ 57

8.2. Layout and Styles ................................................................................................................ 58

9. Annex – Questionnaire results ..................... ..................................................................... 60

Page 7: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 5 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

List of Figures

Figure 1 : Screenshots of the same epub file on a) an e-ink eBook reader in black and white b) an Android phone using Amazon Kindle’s app in colour c) a desktop PC using eBook reader software. ..................................................................................................................... 18

Figure 2: Analysis of the different presentation formats ........................................................................... 22

Figure 3: Example of a table included in the Transit Security Design Considerations (FTA) ..................... 25

Figure 4: Example of a diagram included in the Transit Security Design Considerations (FTA) ................ 25

Figure 5: Example of a site diagram included in the Site Security Design Guide (GSA) ............................ 27

Figure 6: Example of a flow chart diagram included in the Site Security Design Guide (GSA) .................. 28

Figure 7: Example of delivery process included in the Site Security Design Guide (GSA) ........................ 29

Figure 8: Example of a summary included in the Site Security Design Guide (GSA) ................................ 29

Figure 9: Example of highlights/points of emphasis included in the Site Security Design Guide (GSA) ..................................................................................................................................... 30

Figure 10: Example of images included in the Site Security Design Guide (GSA) ..................................... 31

Figure 11: Example of images included in the Site Security Design Guide (GSA) ..................................... 31

Figure 12: Example of a table included in the Recommended Security Guidelines ................................... 33

Figure 13: Example of a diagram included in the Recommended Security Guidelines .............................. 34

Figure 14: REDESIGN layout showing the main section headings in the vertical tabs and sub sections in the horizontal tabs and Decision making flowchart ................................................ 36

Figure 15: Interactive Stakeholder map .................................................................................................... 37

Figure 16 Screen shot of an example evaluation framework ..................................................................... 38

Figure 17 Layout of the Network Rail Guide to Station Planning and Design ............................................ 40

Figure 18: Example of the layout in the RIBA guidance on designing for counter-terrorism ...................... 42

Figure 19: Example of a diagram used in the RIBA guidance on designing for counter-terrorism ............. 43

Figure 20: Example of the colour scheme and layout used in Protecting Crowded Places: Design and Technical ......................................................................................................................... 45

Figure 21: Example of a table used in Protecting Crowded Places: Design and Technical ....................... 46

Figure 22: Analysis of the example guidelines .......................................................................................... 48

Figure 23 Layout of the Network Rail Guide to Station Planning and Design ............................................ 49

Figure 24: Example of the colour scheme and layout used in a) RIBA guidance on designing for counter-terrorism and b) Protecting Crowded Places: Design and Technical .......................... 51

List of Tables

Table 1: Summary of different formats ...................................................................................................... 21

Table 2: Compendium of security guidelines ............................................................................................ 47

Page 8: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 6 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

LIST OF ACRONYMS

ALO Architectural Liaison Officers

APP Application

APTA American Public Transportation Association

CCTV Closed Circuit Television

CONOP Concept of Operations, Operational Concept

The United Kingdom’s Strategy for Counter Terrorism

COTS Commercial Off-The-Shelf

CPNI Centre for Protection of National Infrastructure

CT Counter Terrorism

CTSA Counter-Terrorism Security Advisors

DBT Design Basis Threat

DfT Department for Transport

DHS Department of Homeland Security

DOD Department of Defense

DOE Department of Energy

DOT Department of Transport

DVR Digital Video Recorder

E-book Electronic Book - a mobile electronic book

eink Electronic Ink - low power display technology, generally in monochrome that works well in a wide range of lighting conditions

epub Electronic Publication - free and open e-book format

FAA Federal Aviation Administration (US)

FEMA Federal Emergency Management Agency

FOV Field of View

FPS Frames per Second

FTA Federal Transit Administration

GSA General Services Administration (US)

HTML HyperText Markup Language

ID Identification

IM Infrastructure Manager

ISC Interagency Security Committee

ISO International Standards Organization

Page 9: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 7 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

mobi An ebook format used by MobiPocket readers it is the same format as the Amazon Kindle AZW format

NaCTSO National Counter Terrorism Security Office

NVR Network Video Recorder

NYPD New York Police Department

OS Operating System

PC Personal Computer

pdb Palm Doc electronic document format for Palm devices

PDF Portable document format

PSIM Physical Security Information Management

PTA Public Transport Authority

PTO Public Transport Operator

RIBA Royal Institute of British Architects

RU Railway Undertaking

SoA State of the Art

TCRP Transit Cooperative Research Program

TRB Transport Research Board

TSA Transportation Security Administration

VMS / VMX Video Management Software / Video Matrix

Page 10: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 8 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

LIST OF DEFINITIONS

Access Control (ACS) A system enabling an organisation to control access to areas and resources in a given physical facility or computer-based information system. The access control's functionality answers one or more of the following questions:

• Something I have (for example: a card, entry authorisation);

• Something I know (PIN code);

• Something I am (individual biometric identification).

Closed Circuit Television (CCTV)

A system using video cameras to capture / transmit / record a signal to a specific place, on a limited set of monitors, though a point to point (P2P), point to multipoint, or mesh wireless links. According to ISO/DIS 22300: Television system in which signals are not publicly distributed.

Field of View (FOV)

The part of the scene that is visible through the camera at a particular position and orientation in space; objects outside the FOV are not recorded. It is most often expressed as the angular size of the view cone, as an angle of view or as a ratio of lengths.

Geographic Information System (GIS)

A system designed to capture, manage, analyse, store, manipulate and display all types of geographically referenced information.

Human Machine Interface (HMI) / Graphical User Interface (GUI)

Graphics-based visualisation of a control and monitoring system.

Network Video Recorder (NVR)

A system receiving video input over a network and recording it in a digital format to a disk drive, USB flash drive, SD memory card or other mass storage device, and allowing for selective retrieval of the collected videos.

Physical Security Information Management (PSIM)

A category of products that integrate an organisation’s disparate security devices and systems into a single unified operating picture.

Public Address (PA) An electronic amplification system with a mixer, amplifier and loudspeakers, used to reinforce a sound source.

Security Control Centre (SCC) / Security Operations Centre (SOC)

A physical location at which command & control and communication systems are installed to enable security operation management.

User Requirements A set of needs and / or expectations of the user(s) from the product, system or service under development. The term ‘users’ encompasses any citizens, businesses or public authorities that may use the final product, system or service.

Video Analytics (VA) / Video Content Analysis (VCA) / Intelligent Video Analytics (IVA

The automated analysis of images or video streams, usually acquired through video surveillance systems, in order to create useful information about the content.

Page 11: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 9 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Video Surveillance Remote observation and/or recording of one or more persons or a certain area by means of connected video cameras (CCTV or other system).

VMS (Video Management Software) / VMX (Video Matrix)

Software operating on a computer or a server, which is used to manage monitoring, analysis and recording functions of monitoring / surveillance systems.

Page 12: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)
Page 13: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 11 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

1. Introduction 1.1. Background The SECURESTATION project has the overall aim of improving passenger station and terminal resilience to terrorist attacks and safety incidents through technologies and methodologies enabling design to reduce the impact of blast, fire, and the dispersion of toxic agents on passengers, staff and infrastructure. The project will achieve this aim through the following objectives:

1. To increase resilience of passenger stations and terminals through structural design, interior design and building services design, realising everyday benefits while designing for security

2. To ensure cost-effectiveness of countermeasures through application of risk analysis methodologies to prioritise actions taken in design and operation of passenger stations and terminals

3. To deliver a Constructive Design Handbook addressing new build and retro-fit cases to serve as a powerful decision support tool for owners and operators to increase station security and safety from terrorist bomb blast, CBRN attacks involving particle dispersion, and fire events.

4. To create harmonisation and the standardisation of risk assessment methodologies, technologies and design solutions thereby supporting wide application by the numerous EC public transport organisation and associated key stakeholders

The Constructive Design Handbook is one of the major outputs from this project and will be the main method through which the knowledge developed in this project will be disseminated to the end-users. It expected that the Constructive Design Handbook will collate all of the relevant technologies and provide guidance on their use. It will include the risk assessment methodologies developed within WP3 of this project and also all of the recommendations developed in WP5 and WP6 of this project. To achieve a high take up of the results of this project the Constructive Design Handbook must be accessible to the end user, with a format and layout which allows them to easily use this document in their everyday working environment. 1.2. Purpose and Scope The purpose of this document is to prepare for WP4 which will be responsible for producing the Constructive Design Handbook and will analyse examples of existing guidance documents identifying best practice from these in terms of design, publication format, structure and layout. These factors must be assessed in terms of accessibility and usability for the end user, as well as controllability (it may be appropriate for the handbook to be under controlled circulation), the ability to update and control versions of the document, the longevity of the format and the ability to access it in the future, and the ability to translate the document if necessary to other languages for use across Europe.

Page 14: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 12 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

The purpose of this document can be summarised as:

•• Identify the most appropriate publication format

•• Identify the appropriate structure for the handbook

•• Identify design and themes criteria for the document

Deliverable D4.1 will further the work carried out in this study into the most appropriate publication format, structure and design for the handbook and supporting materials. D4.1 will produce samples documents and media which will be sent to the end user groups for further feedback and to test the usability of each form of the handbook.

1.3. Document Structure This document is comprised of the following main parts:

Publication formats

o This section explores the different publication formats which could be used to convey the results of the SECURESTATION project and assesses each format according to set criteria

Examples of existing design guidelines documents

o This section provides examples of guidelines from the US and Europe explaining the purpose of the document being considered and explaining the layouts and formats which have been used

Analysis of presentation methods

o The analysis of presentation methods explains the key points from the sections on publication formats and the sections of examples of existing guidelines highlighting features from the existing guidelines which should be adopted in the Constructive Design Handbook

End-user feedback on the formats that should be use d for the SECURESTATION guidelines

o This section reports and analyses the end user feedback which has been gathered from the SECURESTATION end users workshop and a specific questionnaire

Recommended presentation methods for SECURESTATION guidelines

o This final section makes recommendations for the format, design and layout and structure of the Constructive Design Handbook

Page 15: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 13 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

1.4. Applicable and Reference Documents

R[1] SECUR-ED, D21.1 – Public Transport Security Terminology & Definitions

R[2] COUNTERACT / PT5: Public transport Security Planning – Organisation, Countermeasures & Operations guidance; Available at http://www.uitp.org/knowledge/projects-details.cfm?id=433

R[3] Transit Security Design Considerations - FTA Office of Research Demonstration and Innovation, U.S. DOT, 2004 and Facilities standards for the public building service - GSA, 2000

R[4] The Site Security Design Guide, U.S. General Services Administration Public Buildings Service, 2007

R[5] Recommended security guidelines for airport planning, design and construction, US, TSA, 2011

R[6] Safer Places: A Counter Terrorism Supplement, Home Office, UK, 2009

R[7] REDESIGN, REDESIGN consortium, UK, 2012

R[8] Guide to Station Planning and Design, Network Rail, UK, 2011

R[9] RIBA Guidance on Designing for Counter-Terrorism, RIBA, UK, 2010

R[10] Protecting Crowded Places: Design and Technical Issues, Home Office, UK, Jan 2012

R[11] Crowded Places: The Planning System and Counter-Terrorism, Home Office, UK, Jan 2012

Page 16: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 14 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

2. PUBLICATION FORMATS Preferred publication formats will be subjective and based on an individual’s preference, the resources and devices that they have available to them, and also their working environment. For many end users reading print on paper is their main preference, however, as companies instigate paperless offices and hot desk policies the ability to print documents or store reference books becomes more limited. The rise in mobile devices such as iPads, iPhones, Kindles and other smart phones and e-reader devices presents new opportunities in delivering documentation to end users in a more convenient form. Also electronic formats can significantly reduce the costs of distribution, allow for better version control and offer greater accessibility. However, there are numerous examples of where electronic formats have become obsolete and inaccessible, with examples from NASA and the UK Doomsday project, where the data has become inaccessible due to being stored on media or in formats which have become obsolete. This section aims to identify the advantages and disadvantages of each document format based on the criteria of:

� Usability

o How user friendly is that particular document format?

o Is it searchable and easy to navigate?

o Is it portable and can be used on the hardware which most suits the end-user?

� Controllability

o Is it possible to control the distribution of the document for each particular format?

o Updateability and version control

o Is it possible to automatically inform users as new versions of the documentation or ensure that they are referring to the latest version?

� Translatability

o How easy is it to translate the documentation format into two different languages?

� Longevity

o How long will the document format be readable? Will the software or media required become obsolete and if so what is the timescale for it becoming obsolete?

� Cost and delivery

o What are the costs associated with publishing and distributing in this particular format? Does there need to be any continuous maintenance for the distribution of material?

Page 17: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 15 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

2.1. Printed material

� Usability: Good Printed material in the form of a book, booklet or other published material such as prompting cards or posters may be useful for end users, to refer to the SECURESTATION processes and methodologies in their everyday working environments. The printed form allows for quick reference and for many users it is easier to read and concentrate on printed documents than on screen. However, printed formats do not offer the ability to search or navigate the document through links. Printed documents do, however, allow searching by flicking through the document for fast scanning. Also as modern work places are moving towards paperless and hot desk office spaces printed documents become difficult for storage and are less portable for the mobile worker. Printed documents also do not offer the ability to include multimedia components.

� Controllability: Good Printed material is easier to control than electronic media, it can be distributed to specific audiences and duplication is not as easy and as convenient compared to electronic media.

� Updateability and version control: Poor Unlike electronic media it is difficult and expensive to migrate users to the latest version. Normally printed material is produced in large print runs and each edition will be used until the previous edition has sold out. Also users may be unwilling to invest in the latest edition unless very significant changes have been made. However, users can self-print if they are supplied with an electronic version of the document and the rise of print on demand services has made publishing booklets in small batches cheaper and more feasible.

� Translatability: Average Printed materials will be produced originally in electronic form. This original can be translated in electronic form and then published accordingly. Publishing in large print runs will make it expensive to distribute a small number of translated documents, but again the in rise print on demand services makes small print runs in minority languages more feasible.

� Longevity: Good Printed form also has very best chance of longevity of the document than any other format of document. The printed form will be readable as long into the future as the paper and ink life, which can be hundreds of years, if the quality of the paper and the environmental conditions are good. However, the longevity of printed material may be hampered by its poor portability leading to it being disposed of during office moves or tidying.

� Cost and delivery: Poor The cost of printed documents will always be higher than the cost of producing and distributing electronic documents. Costs to the publisher may be reduced by providing the document in electronic format (eg PDF) or via a print on demand service.

Page 18: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 16 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

2.2. Portable Document Format (PDF) and Interactive PDF

� Usability: Good Portable document format (PDF) provides good usability, they can be used both on screen and are designed for ease of printing, providing consistent layouts on which ever medium they are viewed. Most PDF documents are sized for A4 or US letter sized layouts, which if viewed on screen can sometimes be difficult to view and layouts such as multiple column layouts can require a larger amount of scrolling to comfortably read. Interactive PDFs can add additional features aiding navigation and including interactive elements, however, some interactive elements may not work well in printed form. PDF reader software is generally provided on most PCs and electronic devices making the document very portable. PDF documents allow for offline access and can be viewed on most electronic devices including PCs, tablets, smart phones and eBook readers. However, due to the fixed formatting of PDF documents viewing can be difficult on small screen devices.

� Controllability: Average Document controllability is difficult with PDF documents. It is possible to control the initial recipients and send them a version by email or controlled access from a website. However, after that point it is difficult to prevent the PDF file from being forwarded on to other people or organisations. It is possible to password protect PDF documents, however, there would just be one single password and this password may be distributed with document. This type of control can be applied to all electronic documents through encryption software.

� Updateability and version control: Average If a PDF document is accessed from a website, it can be controlled to the latest version especially if viewed through the browser. There is also no cost to the end user to update to the latest version. However, due to the ability and the desire of some users to view offline there is the possibility of users working from outdated versions. It is possible with all of the electronic document formats to request users to register on a website and then be notified of updates by email, however, some security personnel and organisations may be wary about their details being stored.

� Translatability: Average With any electronic formatted document translations can easily be applied and redistributed.

� Longevity: Average Portable Document Format is released as an open standard, ISO 32000-1:2008. This ensures that tags to the document and the format are well published and if necessary there is the information published to recreate software to read this format. The PDF format is a standard form of publication and software to read. This format is produced by a number of different organisations, which reduce the chances of this format becoming obsolete for a long period of time. However, as the PDF format is designed for providing a good printing experience rather than on reading screen, it’s inability to reflow text to allow for better viewing on a range of electronic devices may lead to its popularity being superseded by an eBook format.

� Cost and delivery: Good PDF documents are very cheap and easy to produce with many desktop publishing software packages, word processors and graphics software being able to publish to PDF format. They are easily distributable either by email or from the web.

Page 19: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 17 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

2.3. HTML/web format

� Usability: Average HTML/webpage documents are viewable on all internet connected devices with web browsers supplied almost universally as part of the operating system. HTML will reflow text allowing documents to read easily even on small screen devices. Webpages are searchable and can provide navigation controls and other interactive features. Also they are also easily printable. The ability to view offline can be problematic with some web browsers; however, a download of a zipped HTML file is readable on most eBook readers. HTML is also excellent for disability access with most text to speech software working with HTML formatted documents and the ability to resize text for users with poor eyesight. Webpages also include the ability to embed multimedia such as video clips to enhance the end user experience.

� Controllability: Good Webpages provide excellent controllability, with the ability to control access only to registered users. Breaking up the content over multiple pages can make it time consuming to download or copy content. It is also possible to log users IP addresses, in the case of suspicious activity. However, a security issue does arise with a “logging in” system, personal details of the users will be captured and stored on the webserver. This system could potentially be hacked and as a result give the hacker the details of the users within the end user organisations and possibly an indication of the material that they have been reading, from this a hacker may be able to surmise the security holes and the security strategies of that organisation. Some users may simply not wish to use such a system if they feel that there actions and details are being logged and stored.

� Updateability and version control: Good The web provides the best method of ensuring that users are always access the most up to date version.

� Translatability: Good The web provides the easiest method of translation, with algorithms available to automatically translate your website or by using webpage translation services such as Google Translate, Babelfish or Worldlingo.

� Longevity: Average HTML is a defined international standard and is well documented. Most web browsers are backward compatible with earlier versions of HTML and therefore it is likely that any HTML written now should be accessible and useable for a long time into the future.

� Cost and delivery: Average The cost of delivering a webpage is very low; however, domain name registration and hosting fees must be maintained otherwise the content will lost.

Page 20: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 18 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

2.4. Other eBook formats Other eBook formats such as epub, mobi, azw and pdb provide another potential publishing format.

� Usability: Average E-book formats are searchable and depending upon the eBook reader device or software they can be annotated with comments and bookmarks and can contain interactive elements to support navigation through embedded links which in a document and a table of contents. Most eBook formats provide reflow able text allowing them to be easily read on small screen devices and like HTML, eBook formats are suitable for disabled access, allowing font resizing and text to speech software will work with most eBook formats. EBook formats support full colour, however, most eBook readers such as Kindles and Kobos which use the e-ink screens are only capable of displaying the content in shades of black and grey, which would not get the full benefit of the colour required in the SECURESTATION guidelines. E-book formats may, however, with the relevant apps be used on tablets such as the Kindle Fire, Kobo Vox, iPad and Android tablets, as well as all smart phones and any device with a colour screen will be able to see the full colours in the eBook format, as well as benefit from the font resizing and text reflow that allows eBook formats to be readable on small screen devices.

a) b) c)

Figure 1 : Screenshots of the same epub file on a) an e-ink eBook reader in black and white b) an Android phone using Amazon Kindle’s app in colour c ) a desktop PC using eBook reader software.

These images demonstrate the automatic resizing and reflow of text and images to suit each device and screen size that an eBook format allows. However, not every eBook format will work on every device and therefore it may be necessary to publish in multiple formats to ensure that documents are accessible by most users. Also eBook reader software is rarely provided as standard on PCs, smartphones and tablets, and therefore may be needed to be installed separately, this can be problematic in large organisations which tightly control desktop pc software and may make any document in an eBook format inaccessible to large corporations.

Page 21: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 19 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

� Controllability: Average

The easiest way for people to access eBooks is through an eBook store in which case this would mean making the document available to the public to access. To better control access, it is possible to make the documents available either by email or downloadable from an access controlled website and then the user must side load this document onto their device.

� Updateability and version control: Average The eBook will be stored offline on any device and therefore will remain at the version downloaded, however, publishing on an eBook store could make it possible for users to be informed of revised versions.

� Translatability: Average Similar to PDF documents, eBooks can be translated at source before being compiled into the appropriate format.

� Longevity: Average Most eBook formats comply to open standards which are well documented, allowing the documents to viewed or converted using software from a variety of publishers. However, as devices change any particular format could become obsolete.

� Cost and delivery: Good EBook documents can be made readily available on a website, distributed by email or via an eBook store at little or no cost to the publisher. 2.5. App for mobile devices

� Usability: Good Apps for mobile devices can designed to produce a very good end user experience with easy navigation and can include search. Apps also have much greater potential to include multimedia such as video clips. However, an app would have to be developed for each of the main mobile operating systems and each version; it would also need testing on a range of devices to check compatibility. An alternative is to write an HTML 5 app, which should be compatible with most devices.

� Controllability: Poor Most mobile apps are distributed through an app store which would mean opening the availability of the app to the general public.

� Updateability and version control: Good Most app stores will provide notifications of updates to apps. However, these can sometimes force the user to update. It may also be necessary to maintain a team of developers to ensure compatibility with new devices and platforms.

� Translatability: Average The app text would need to be translated at source, similar to translating PDFs and eBooks.

Page 22: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 20 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

� Longevity: Poor

Native apps would be written for a particular operating and a particular version of that operating system and would become obsolete rapidly. A HTML 5 app would provide a standards based format which should protect against the app becoming obsolete.

� Cost and delivery: Good The distribution of the native app through an app store would be low cost with the store taking a percentage cut on any sales cost of the app. A HTML 5 app can be distributed via a website, bypassing the app store, but would require domain names and hosting to be maintained. 2.6. Video / Podcast Videos and podcasts have potential as learning materials to complement the main Constructive Design Handbook. These may be hosted and distributed via the SECURESTATION website.

� Usability: Average Videos and audio available for download or embedded on websites can require specific browser plugins, codecs or other software to allow them to play. This can be problematic for users within large corporations who may be restricted on the software which they can install on their PCs. Corporations sometimes block video and audio streams to reduce demand on their bandwidth. Similarly on mobile devices video can require specific software to enable playback. However, video and audio provide an additional easy to digest learning method, which could be used to teach users specific methodologies and processes which are contained in the handbook. Downloadable media such as podcasts can be listened to offline during commutes or other non-productive periods of time.

� Controllability: Average Media can be embedded in websites with login controls to provide access only to registered users. Embedded media can be difficult to download discouraging unauthorised distribution. Downloadable media such as podcasts for offline consumption, can be accessed through login controls, but once downloaded it is difficult to then prevent further unauthorised distribution.

� Updateability and version control: Good Embedded webpage elements will always maintain the latest version. However, for downloaded media for offline consumption, version control can be poor.

� Translatability: Average Any translation of video or audio stream would require either the addition of subtitles to video or a recording of the audio stream. This would require the aid of a fluent speaker of that language to provide the audio stream.

� Longevity: Average Most popular video and audio codecs are proprietary and therefore subjective to licensing agreements in end user software and therefore risk becoming obsolete or inaccessible if future software or device vendors do not license the codec when it has largely been superseded by an improved format in the future. Although open standards are available for audio stream, ogg vorbis format, and for video, WebM

Page 23: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 21 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

or ogg, these are not generally included with the OS on most PCs or devices so would require the installation of additional codecs.

� Cost and delivery: Average The cost and delivery is the same as for a website. A website would be required to be maintained as a source of these media and that would require continued fees for domain name registration and hosting. 2.7. Summary of the different formats

Usa

bilit

y

Con

trolla

bilit

y

Ver

sion

con

trol

Tra

nsla

tabi

lity

Long

evity

Cos

t and

del

iver

y

Printed manual

Portable document format PDF

HTML webpage

Other ebook formats

App

Video / podcast hosted on web

Scores highly in these criteria

Scores average in these criteria

Scores poorly in these criteria

Table 1: Summary of different formats

Page 24: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 22 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Usability

Controllability

Version control

Translatability

Longevity

Cost & delivery

Printed manual Portable document format HTML webpage

Other e-book format App Video / podcast hosted on web

Figure 2: Analysis of the different presentation f ormats

From this initial analysis of different document formats it can be concluded that PDF format and HTML overall provide the best balance of usability, controllability, version control, translatability, longevity and cost and delivery. Also both of these formats are complementary with pdf documents scoring the highest for usability and cost and delivery and HTML scoring highest for controllability, version control and translatability. PDF format also allows for the end user to print their own copies and the PDF format ensures that all layouts are maintained. Webpages and PDF formatted documents are also the most familiar to end-users and can be used almost universally without requiring specialist apps or software to be installed, both of these formats are specified by international standards and the format is well documented which will ensure their longevity.

Page 25: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 23 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

3. US DESIGN GUIDELINES DOCUMENTS 3.1. TRANSIT SECURITY DESIGN CONSIDERATIONS (FTA) 3.1.1. Document scope

The Federal Transit Administration (FTA), in collaboration with the Volpe National Transportation Systems Center of the U.S. Department of Transportation (the Volpe Center), the Transit Cooperative Research Program (TCRP) of the Transportation Research Board (TRB), the American Public Transportation Association (APTA), and other stakeholders have developed an approach for protecting public transit systems, with emphasis placed on their fundamental interconnectivity.

The Transit Security Design Considerations document aims to assist transit agencies in providing the public with transport services at an enhanced level of security and safety, by relaying information and ideas on security-oriented design modifications. It provides guidance on three major components of transit systems: bus vehicle, rail vehicles and transit infrastructure; covering systems integration, access management and communications, all of which are crucial to the protection of transit assets.

The document is intended for transit executives, transit senior managers, members of transit design and construction departments, operations departments, and security and law enforcement personnel.

3.1.2. Presentation methods of design guidelines

The Transit Security Design Considerations document consists of nine chapters, seven appendices and also references and acronyms.

The chapters are:

• Introduction;

• A Systems Approach to Security Design – Adopting and Inclusive View;

• Security in the Transit Environment;

• Developing a Security Strategy;

• Access Management;

• Infrastructure;

• Vehicles;

• Communications; and

• Security Systems Integration.

The first four chapters present a macro view of transit security, beginning with a discussion of FTA’s rationale for developing security design considerations. The introductory chapters address the dilemma transit agencies face: maintaining open systems vs. making transport systems more secure. They also discuss the multiple ways in which public transit systems are connected not only physically, but also through an intricate network of technology, law, and regulation, linked together and to other elements of the regional transportation network.

The subsequent chapters present specific design considerations relating to an agency’s physical assets, and also include a discussion of the tools necessary for building an integrated security system – access

Page 26: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 24 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

management, communications and systems integration. Each chapter covers one major topic; The Transit Security Design Considerations discusses each of the transit system's major component group – access management; infrastructure; vehicles and communications.

Each of the chapters begins with an overview covering definitions, parameters and/or characteristics. It then addresses additional topics, including relevant challenges in the public transport environment, the transit system component dealt with as part of an enterprise wide strategy and comprehensive plan, and integration of systems to produce enhanced effectiveness. Concepts are also reviewed as part of the overview.

The chapters then address tools and techniques. Policies and procedures are discussed in this context, followed by a detailed review of the various means – what they do, how they operate, what they are constructed of, etc. – with links to other sections in the documents, which deal with complementary means, for example: barriers as part of access control management, with links to CCTV as an element that it would be advantageous to integrate with the barriers and other access control means.

Design considerations are then offered, following a description of the threats specific to the component being discussed, and their potential impacts if these threats materialise. Examples: the discussion on progressive collapse of infrastructure resulting from an explosion includes a review of means that would reduce the chances that such an outcome would occur; also, when discussing perimeter security, the document points out that buildings can serve as elements in perimeter protection, detailing the characteristics they must meet in order to do so effectively. Emphasis is placed on the importance of systems integration throughout the document.

The guidance offered explains how design can reduce known security risks or their impacts and how decisions might affect other functions and/or other components of a transit system. Links to sources external to the document are also provided from time to time, such as: www.transit-safety.volpe.dot.gov.

The appendices relate to the following issues: Chronology of Terrorist Attacks against Public Transit; Case Studies of Transit Security Initiatives; Performance Measures; Vehicle Barrier Types and Effectiveness; Vehicle Barrier Selection and Implementation Considerations; Codes and Standards; and Lessons Learned from Communications Emergencies.

The information is relayed mainly in the form of text, and in sections – with some information provided in separate "framed text boxes". In some cases this information is complementary, for example: when discussing security system lifecycle ownership and operation costs that should be considered, a text box appearing alongside the list of costs (equipment, etc.) outlines the costs of a security breach (injuries and fatalities, etc.). In other cases, the text boxes summarise the section in several points.

The text is interspersed with tables and figures, for example:

Page 27: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 25 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Figure 3: Example of a table included in the Transi t Security Design Considerations (FTA)

Figure 4: Example of a diagram included in the Tran sit Security Design Considerations (FTA)

The appendices include a chronology of terrorist attacks against public transit, case studies of transit security initiatives (3 transit agencies and a US government agency), performance measures, vehicle barrier selection and implementation, vehicle barrier types; codes, standards, and regulations; fire safety recommendations, lessons learned from transit communications emergencies, and a list of transit industry working groups, references, and acronyms.

Page 28: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 26 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

3.2. THE SITE SECURITY DESIGN GUIDE (GSA) 3.2.1. Document scope

The Site Security Design Guide prepared by the US General Services Administration (GSA) focuses on federal office buildings, courthouses, border stations and others. It is based on the GSA's approach that the need for security should be viewed as an opportunity to achieve the best design, contribute to the sustainability of the environment, provide safe and located federal workplaces, and improve the communities in which these buildings are found.

Numerous internal and external stakeholders contributed to the development of the guide, including the Department of Homeland Security, the US Marshals Service, the National Capital Planning Commission, nationally recognised private-sector designers, and various professional organisations, such as the American Institute of Architects and the American Society of Landscape Architects. Working with a similarly wide range of stakeholders on such projects is recommended in the guide.

The guide suggests principles, tools, and processes for implementing successful site security projects at federal buildings – those existing (numbering several thousand, where more than 1 million people work every day), and those yet to be built. It provides a principled starting point, sample solutions, and a proven process for balancing effective security with good urban design and efficient use of resources.

The document is intended for security professionals, designers, project and facility managers, and project teams.

3.2.2. Presentation methods of design guidelines

The Site Security Design Guide comprises four chapters:

−−−−−−−−−−−− Chapter 1: Vision and Hallmarks – covers principles for effective site security design, emphasising the importance of a strategic, comprehensive, collaborative, and long-term approach to site security.

−−−−−−−−−−−− Chapter 2: Guidelines for Elements and Innovation – further develops these principles by showing how they apply within six site “zones” that are common to most facilities. It highlights familiar and innovative security elements and describes how to integrate them into various urban design contexts.

−−−−−−−−−−−− Chapter 3: The Site Security Design Process – explains how a project team can bring together a sufficiently broad stakeholder group to assess a site’s context, evaluate risk factors, and collaborate to develop design solutions, beginning at the earliest stages of project planning. This process is applicable to security projects of any size or budget.

−−−−−−−−−−−− Chapter 4: Test Cases – applies the guide's recommended tools and processes to several scenarios that cover the range of expected site conditions. The specific design solutions and overall process of each of the test cases provide strategies for implementation at diverse types of facilities.

Each of the first three chapters begins with a table of contents and an introduction, and ends with conclusions. The chapters are divided into multiple sections and include summaries, diagrams, lists, a check list, a flow chart, project time line, etc. – as applicable.

Page 29: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 27 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Figure 5: Example of a site diagram included in the Site Security Design Guide (GSA)

Page 30: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 28 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Figure 6: Example of a flow chart diagram included in the Site Security Design Guide (GSA)

Page 31: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 29 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Figure 7: Example of delivery process included in t he Site Security Design Guide (GSA)

Figure 8: Example of a summary included in the Site Security Design Guide (GSA)

Page 32: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 30 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

In a large number of the pages, highlights and points of emphasis are included – these appear in a different colour, in the margins, and are useful for directing the readers' attention to additional points that need to be considered, refer them to relevant sections in the document, etc.

Figure 9: Example of highlights/points of emphasis included in the Site Security Design Guide (GSA)

Numerous photographs are included to illustrate the use of the various means and the design considerations. They are all accompanied by explanations.

Chapter 4 is divided into five sub chapters. Each sub chapter covers a test case, and they all share the same structure: Existing condition / site context plan; Site security assessment plan; Conceptual strategy plan; Project area design studies; and final concept plan. The test cases also include a large number of diagrams and photographs.

Page 33: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 31 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Figure 10: Example of images included in the Site S ecurity Design Guide (GSA)

Figure 11: Example of images included in the Site S ecurity Design Guide (GSA)

Page 34: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 32 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

3.3. RECOMMENDED SECURITY GUIDELINES FOR AIRPORT PL ANNING, DESIGN AND CONSTRUCTION (TSA)

3.3.1. Document scope

The Recommended Security Guidelines for Airport Planning, Design and Construction consolidates information developed through the participation of the Transportation Security Administration (TSA), and other government and aviation industry and airport professionals. It was prepared in the interest of focusing attention to the serious security concerns that should be considered at the earliest airport planning and design stage, in order to promote the development and implementation of the most efficient and cost-effective security solutions and provides guidance for the planning design and integration of security into airport facilities. The document is meant to be a primer on these security issues and a check-list of the more important things one should consider when deciding which of the many potential security approaches may be appropriate to a particular airport’s circumstances and requirements.

The guidelines also identify areas requiring special attention in the planning process, with the aim of developing systems that will not hamper operations, cause undue economic burdens, or turn airports into “armed fortresses.” They include alternate solutions to any security challenge, and architects, planners, and designers are urged to examine and consider all potential avenues before selecting the solution that best addresses their airport’s unique local needs and operational environment in a responsive and cost-effective manner.

The document emphasises that the installation of physical security, access control, screening, and detection equipment, and structures (and barriers, access control, screening, and detection equipment) are fully effective only if supported by similarly effective human procedures, including access and identification (ID) media systems, challenge procedures, personnel security training and procedures, maintenance training and procedures, as well as constant supervision and vigilance.

With regard to new construction of airports or extensive renovation, the document encourages airport facility planners and designers to form an Airport Security Committee at the earliest possible stage, including the affected aircraft operators and tenants, fire code officials, building code officials, and local FAA and TSA officials, local emergency response personnel, and aviation security and other regulatory officials. The Committee's role will be to assist planners and designers to factor the appropriate security and safety perspective into designs for current security concerns, and to accommodate anticipated long-term expansion and regulatory changes where possible.

The guidelines are intended for airport operators, airport planners and consultants, designers, architects, and engineers engaged in renovations and new airport facility planning, design or construction projects.

3.3.2. Presentation methods of design guidelines

The document comprises 4 chapters:

• Overview; • Initial Planning and Design Considerations (dealing with protection of facilities); • Recommended Guidelines; and • Appendices.

The recommended guidelines chapter is divided into 9 sections, each covering, in great detail, different topics. The first topic addressed is the airport layout and boundaries, followed by the different areas: airside; landside; terminal; baggage systems; passenger screening; access control; video surveillance, detection and distribution systems; power, communications, cabling, infrastructure and cyber security.

Page 35: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 33 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

There are 8 appendices: Airport vulnerability assessment process; airport chem/bio protection and response; airport blast protection; general aviation; planning and design support of command and control; international aviation security and implications for US airports; glossary; and bibliography.

The text throughout the document contains hyperlinked text referring the reader to other related sections, topics and graphics. There are also a large number of active links to relevant external resources and web sites such as regulatory references, government and industry publications and reports, and technical standards, and many more.

The document text contains check lists in each chapter, to ensure the coordination, consideration and inclusion of security features in an efficient and effective manner. It also includes diagrams, tables and a relatively limited use of photographs.

Figure 12: Example of a table included in the Recom mended Security Guidelines

Airport Planning, Design and Construction (TSA)

Page 36: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 34 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Figure 13: Example of a diagram included in the Rec ommended Security Guidelines

Airport Planning, Design and Construction (TSA)

Page 37: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 35 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

4. EU DESIGN GUIDELINES DOCUMENTS 4.1. REDESIGN 4.1.1. Document scope The REDESIGN project was collaboration between University of Birmingham, University of Sheffield, University of Loughborough and CPNI (Centre for Protection of National Infrastructure) and NaCTSO (National Counter Terrorism Security Office).

The REDESIGN tool is aimed at key decision makers to consider the appropriate use of counter terrorism design features for new and existing developments in public spaces. The tool identifies different stages of the design and build process (Concept, Feasibility, Construction, Operation and Refurbishment) and for each stage shows the stakeholders and the considerations at that stage in the process. The tool aims to help decision makers for infrastructure projects to develop the design and construction strategy for a cost-effective solution.

The stakeholder map and toolkit has been developed to aid developers, designers, construction engineers, Architectural Liaison Officers (ALO) and Counter-Terrorism Security Advisors (CTSA) meet the challenges of a rapidly evolving security environment providing practical advice and tools.

The REDESIGN guidance is also underpinned and partly based on the following guidelines:

• Crowded places: The Planning System and CT (Home Office)

• Protecting Crowded Places: Design and Technical Issues (Home Office)

• Integrated Security (CPNI )

• Guidance on Designing for Counter Terrorism (RIBA)

• Links to these documents can be found in the 'Further Reading' section

4.1.2. Presentation methods of design guidelines

The REDESIGN tool is constructed as an interactive PDF file to be used on the computer screen, rather than printed, and although it is possible to print in landscape orientation, the inclusion of the tabs and shortcuts work better on screen. The interactive elements of the stakeholder map also do not work well in printed form.

The REDESIGN tool has the following basic structure:

• Introduction

• Good Practice Examples

o Example 1 – Rail o Example 2 – Shopping Centre

• Decision Making Flow Chart

• Key Design Principles

Page 38: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 36 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

• Typology of Counter Terrorism (CT) Measures

o Hostile Vehicle Mitigation o Protective Construction o Planning, Detection and Procedures

• Broader CT considerations

o Dual use of CT measures o Public acceptability o CT for heritage sites o The ‘branding’ of security

• Key stages of a project

o Concept o Feasibility o Construction o Operation o Refurbishment

• Key Stakeholders

o Interactive stakeholder guidance The REDESIGN tool starts with two case study examples, before introducing a decision making flowchart, which demonstrates the decision making process which should be carried out at each stage within the design and construction process, ensuring that counter terrorism has been considered and the correct advice and personnel are available.

Figure 14: REDESIGN layout showing the main section headings in the vertical tabs and sub sections in the horizontal tabs and Decision making flowchar t

Page 39: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 37 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

The following sections offer a simple 6 point list of key design principles and then definitions and descriptions of counter terrorism measures and considerations and also descriptions of the key stages within the project. The interactive stakeholder map then allows the user to click on their relevant stage of the project and see which stakeholders should be involved and by clicking on the stakeholder more information about that stakeholder will be displayed.

Figure 15: Interactive Stakeholder map

The interactive PDF produced by the ReDesign project is designed for use on screen and to that end although it is possible to print these guidelines, the interactive stakeholder map overlays different text in the central zone depending upon the position of the mouse, therefore when printing it will not be possible to view all of the information available in the interactive PDF document.

Information panel about the relevant stakeholder is displayed when the stakeholder has been clicked on

Click on the different stages in the process to show which stakeholders should be involved

Relevant stakeholders are displayed. Click on a stakeholder for more information about them and their role

Page 40: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 38 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

4.2. Network Rail Guide to Station Planning and Des ign 4.2.1. Document scope The Network Rail Guide to Station Planning and Design was written by the GB railway infrastructure manager, Network Rail. Network Rail own majority of the railway stations in the GB and also operate a proportion of these; the remaining are operated by train operating companies. This guidance describes not just security best practice, but is an overall guide to station design also considering aspects such as usability, operability, quality and value. The target audience for these design guidelines are support sponsors and project managers, both internal to Network Rail and within external organisations working on GB station design. The purpose of these guidelines is to provide guidance on stations to consistently meet the needs of all station users and the various stakeholders involved in the station operation. The guide is designed to be relevant to new buildings or refurbishment or enhancement projects and can be used at all stages in the design process, from developing the design brief and concepts right through to evaluating and assessing proposed design solutions. The guide also includes a design framework based on current best practice. These guidelines are designed to complement existing standards and guidance for detailed design which are contained in various GB standards and specific railway related components are specified in the Network Rail Design and Construction Handbook. 4.2.2. Presentation methods of design guidelines The Network Rail guidelines are presented in an interactive PDF format primarily for use on screen although it can be printed in landscape. Also the Appendix contains forms for an evaluation framework which are designed for printing. The guidelines are structured with an initial introduction which also discusses the priorities of the end users of the station and the importance of station design. The section on design guidelines then goes on to discuss the methodology and approach recommended by Network Rail to the Design and Evaluation framework. The Design and Evaluation Framework is based on a series of questions relating to the Usability, Operability, Quality and Value of a station design. Each individual question is then answered with a colour ranking or either green, amber or red. Where green signifies that all criteria under that principle have been addressed, amber some of the criteria have been considered and addressed and red signifies that few if any of the consideration for that criteria have been addressed.

Figure 16: Screen shot of an example evaluation fra mework

Page 41: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 39 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

The sections following then describe in more detail the background and philosophy behind the different criteria and key factors which should be considered in station design. The resulting structure of the guideline document is therefore as follows:

• Introduction

o About Network Rail o Purpose of the Guide to Station Planning and Design o The importance of good station design o User priorities o Spatial Priorities

• Design Guidelines

o Design Framework and Themes o Design and Evaluation Framework o Example Evaluation Framework o Post Delivery Evaluation

• Usability

o Movement o Access and inclusivity o Wayfinding and Passenger Information o Comfort and attractiveness

• Operability

o Station operations o Management and maintenance o Passenger safety o Be secure by design

• Quality

o Integration with context o Promote good design o Sense of Place o Anticipate passengers’ dynamic changing needs

• Value

o Whole-life costs o Positive economic, social and environmental impact o Respect and conserve natural systems o Act as a catalyst for regeneration

−−−−−−−−−−−− Appendices – including the forms required to carry out the recommended assessment methodology

The layout of the document consists of a side navigation bar positioned on the left hand side of the screen which allows the user to jump between sections and pages as well as zoom in and out for ease of reading. The panel on the right contains the relevant text and information. Each section also has a colour theme, usability – blue, operability – purple, quality – green and value – orange. These colour themes run throughout the sections and are the base colour of any diagrams and header text improving navigation

Page 42: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 40 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

through the document. These colour themes are also consistent with the relevant criteria in the assessment form, allowing for quick reference from the form back to the relevant section within the main guideline document.

Figure 17: Layout of the Network Rail Guide to Stat ion Planning and Design

The Network Rail interactive PDF provides navigational features in a task bar down the side, and also links within the document text. There is no overlaying which allows the document to be printed with no information missing. Network Rail also provide a printed booklet version of their guidance document which consists of just the main panel, which has the correct aspect ratio for landscape A4 pages, without the side navigation panel. Allowing the same PDF document to work well as an interactive PDF for use on screen as well as in a printed form.

Page 43: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 41 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

4.3. RIBA guidance on designing for counter-terrorism 4.3.1. Document scope The RIBA (Royal Institute of British Architects) guidance on designing for counter-terrorism is a short 22 page booklet to introduce architects to the topic of designing public spaces with consideration of counter-terrorism implications. It highlights the relevant UK government guidelines concerning crowded places and includes details of documents and people to be consulted at each stage in the design and build process. The guidance emphasises the importance of balancing aesthetics with the safety and security measures to make spaces more inclusive. The document then details specific considerations which should be considered in the design and specification of a new urban development. These design considerations are supported with case studies. 4.3.2. Presentation methods of design guidelines The RIBA guidance on designing for counter-terrorism is split up into two parts:

−−−−−−−−−−−− Part 1 of the document informs built environment professionals of recent government work to protect crowded places. It has particular relevance for the design of large new developments, and places where large numbers of people gather. Part 1 introduces the UK Home Office Crowded Places document series and defines what is meant by a “Crowded Place and High Risk” sites. The section on Proportionality and risk introduces the government security agencies risk categories and advises that “protective security measures should be proportionate to the risk of terrorist attack”. Part 1 also contains a section on “Who to talk to?”, which contains a list of the relevant Counter-terrorism security organisations which should be consulted and will offer advise on the degree of security counter measures required. Part 1 concludes with a plan of the RIBA work stages from preparation of design through to final use and briefly it describes how counter-terrorism guidance should fit within this process.

−−−−−−−−−−−− Part 2 of the document sets out the most common considerations when designing for counter-

terrorism in the built environment. These are set alongside case studies that show the different ways built environment professionals are responding to the challenge of creating high quality places that are safer from the risk of terrorism yet still attractive to the public. Part 2 of the document begins with a plan of a building space and it discusses relevant threats and counter measures to each location. This part of the document then proceeds to discuss particular technologies related to glazing, vehicular access, landscaping, evacuation and design to prevent augmentation of blast effects. Part 2 is concluded with a discussion on where to draw the line as the design of a particular building may have an impact on counter-terrorism measures for the neighbouring communities and describes an area based approach to counter-terrorist prevention. Throughout Part 2 case studies have been included to emphasise how security measures have been implemented in practice.

Page 44: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 42 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Structure of the document

Part 1

o Counter-terrorism and the built environment o The crowded places document series o Crowded places and other high risk sites o Proportionality and risk o Who to talk to? o RIBA plan of works

Part 2

o Embedding material consideration in the design process o Reducing vulnerability to the threat

� Case study: National Assembly for Wales, Cardiff o Containing damage: glazed facades and security

� Case study: Cabot Circus Shopping Centre, Bristol o Counter-terrorist measures and general security provision

� Case study: Corporation of London, an area based approach o The public and private realm of counter-terrorism o Conclusions and going forward o Appendix

The document is formatted in a double page PDF and published in printed form. There are no interactive features to the PDF document and it designed for either printing or reading on screen.

Figure 18: Example of the layout in the RIBA guidan ce on designing for counter-terrorism

Page 45: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 43 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

A common colour theme of different shades of grey, black, orange and white is maintained throughout the document, in the front and background colours and for diagrams created for the document. The text is broken up with photos from case studies, diagrams and plans. Coloured boxes are used to contain separated notes or further details.

Figure 19: Example of a diagram used in the RIBA gu idance on designing for counter-terrorism

Page 46: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 44 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

4.4. Protecting Crowded Places: Design and Technical Issues, and Crowded Places: The Planning System and Counter-Terrorism

4.4.1. Documents scope These two documents Protecting Crowded Places: Design and Technical Issues, and Crowded Places: The Planning System and Counter-Terrorism are a set of documents which are published by the Home Office in partnership with the Centre for the Protection of National Infrastructure and the National Counter-Terrorism Security Office. These documents are aimed at professionals involved in the planning, design and development of the urban built environment, these were specifically designed for use within England, however, much of the guidance is generic and may be of interest or use outside of England. 4.4.2. Presentation methods of design guidelines The two documents are structured as shown below: Protecting Crowded Places: Design and Technical Iss ues – Contents

• Introduction • Terrorist methodology • The challenge of blending counter-terrorism protective security measures with urban design

principles • Public and private space: design, management and maintenance • Annex A: Typical counter-terrorism design attributes - design of structures • Annex B: Typical counter-terrorism design attributes - design of hostile vehicle mitigation measures • Annex C: Case studies • Annex D: Sources of counter-terrorism protective security advice • Annex E: Role of architectural liaison officers/ crime prevention design advisers • Annex F: Police led initiatives raising awareness of counter-terrorism protective security • Annex G: Useful publications • Glossary and definitions • End notes

Crowded Places: The Planning System and Counter-Ter rorism – Contents

• Contents • Introduction • Counter-terrorism and good design • Counter-terrorism and the planning process • Annex A: Sources of counter-terrorism advice • End notes

Both documents begin with an introduction into CONTEST, the UK governments strategy for countering terrorism and a definition of a crowded place. The document, Protecting Crowded Places: Design and Technical Issues, then introduces and describes the different terrorist threat types, before discussing design considerations for modern and new buildings and the challenges of retrospectively fitting countermeasures to historical buildings. Following on the document describes issues around management and maintenance of public spaces, personnel security and good implementation of CCTV.

Page 47: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 45 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

The annexes then describe in detail particular design considerations for the different threats considered within the document. The document, Crowded Places: The Planning System and Counter-Terrorism, following on from the introduction, proceeds to discuss the UK government risk levels and high level counter-terrorism design principles. The section on the planning process discusses issues such as sensitivity of information to be included in the public planning process and issues around applications in a historic environment. The Annex contains details of organisations to be consulted in the planning process. These Home Office documents are designed with a green, black and white colour theme, this colour scheme is consistently used in all diagrams and tables. These guidelines are published as a flat PDF in A4 portrait size, there are no interactive features, but the documents are designed principally for printing or for viewing on screen. The text is inter-dispersed with images, diagrams and tables to break up the text.

Figure 20: Example of the colour scheme and layout used in Protecting Crowded Places: Design and

Technical

Page 48: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 46 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Figure 21: Example of a table used in Protecting Cr owded Places: Design and Technical

Page 49: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 47 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

5. COMPENDIUM OF EXISTING GUIDELINES

Compendium of regulations and guidelines

Title Year Country Author organisation Format

Accessible Train Station Design for Disabled People: A Code of Practice 2010

Department for Transport

DESIGN GUIDELINES. Guide to Station Planning and Design Issue 1;

2011

Network Rail interactive

Working Together to Protect Crowded Places. 2010

Home Office

Protecting Crowded Places: design and technical issues. 2010

Home Office

Safer Places : a counter – terrorism supplement. 2011

Home Office

RIBA guidance on designing for counter-terrorism 2010

RIBA (Royal Institute of British Architects)

CCTV Operational Requirement Manual 5.0 Publication 28/09 2009

Home Office

How to mitigate Potential Terrorist Attacks against buildings. s.l. : FEMA, 2005 2005

FEMA - Federal Emergency Management Agency

Document 426- Reference manual to mitigate potential terrorist attacks against buildings. s.l. : FEMA, 2006

2006

FEMA - Federal Emergency Management Agency

Document n.430-Site and urban design for security. s.l. : FEMA, 2007. 2007

FEMA - Federal Emergency Management Agency

Engineering security- Protective design for high risk buildings. New York : NYPD, 2009. 2009

New York Police Department

Minimum antiterrorism standards for buildings. US : UFC, Department of Defense, 2007. 2007

Department of Defense

CONTEST: The United Kingdom's Strategy for Countering Terrorism 2011

HM Government

Protecting Against Terrorism 2010

CPNI

Secure in the Knowledge 2005

NaCTSO/Security Service

Expecting the unexpected 2003

NaCTSO/Business Continuity Institute

Counting the Cost 2010

NaCTSO

Transit Security Design Considerations - FTA 2005

FTA

Recommended Security Guidelines for Airport Planning, Design and Construction 2011

TSA

REDESIGN 2012

Consortium of UK Universities

interactive

Spanish Security Strategy – Everyone’s responsibility 2011

Spanish Government

White Paper on domestic security against terrorism 2006

French Government

Act of 23rd January 2006 on the fight against terrorism 2006

French Government

Key: PDF document format interactive Interactive PDF document format Web based document Note: This table has been compiled from the guidance and strategies that the consortium have been informed of via the deliverable D2.1 and the questionnaire in D2.2, this is not an exhaustive list

Table 2: Compendium of security guidelines

Page 50: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 48 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

6. ANALYSIS OF PRESENTATION METHODS This section will study the presentation formats in section 2 of this document and the examples of guidelines given in sections 3 and 4 of this report. Using these examples this section will identify the best practice from these documents with regard to document format, structure and layout and style.

Appropiate context (rail passenger

terminals)

Appropriate guidelines (design for counter-

terrorism)

Usability

Clarity

Transit Security Design Considerations (FTA)

The Site Security Design Guide (GSA)

Recommended Security Guidelines for Airport Planning, Design and Construction (TSA)

REDESIGN

Network Rail Guide to Station Planning and Design

RIBA guidance on designing for counter-terrorism

Protecting Crowded Places: Design and Technical Issues, and Crowded Places (Home Office)

Appropiate context (rail

passenger terminals)

Appropriate guidelines

(design for counter-

terrorism)

Usability Clarity

Transit Security Design Considerations (FTA) 3 2 1 3

The Site Security Design Guide (GSA) 2 3 2 3

Recommended Security Guidelines for Airport

Planning, Design and Construction (TSA) 1 2 2 2

REDESIGN 3 2 2 2

Network Rail Guide to Station Planning and Design 3 1 3 3

RIBA guidance on designing for counter-terrorism 2 3 2 3

Protecting Crowded Places: Design and Technical

Issues, and Crowded Places (Home Office) 2 3 2 2 Figure 22: Analysis of the example guidelines

An analysis has been carried out on the six examples of guidelines which have been studied to understand which features of the documents are should be studied in more depth and possibly be adopted in the SECURESTATION documentation. Each guideline has been assigned a score for appropriate guidance, appropriate content, usability and clarity. The documents with the highest scores for appropriate guidance and appropriate content should be considered for reference in the SECURESTATION Constructive Design Handbook. The guidelines which scored most highly for clarity and usability should be considered when deciding upon the format and structure of the Constructive Design Handbook. Of the examples the Network Rail Guide to Station Planning and Design scored the highest for usability, as an interactive pdf designed for use on screen as well as for print. For clarity the highest scoring documents were the Transit Security Design Considerations (FTA) document, The Site Security Design Guide (GSA), The Network Rail Guide to Station Planning and Design and the RIBA

Page 51: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 49 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

guidance on designing for counter-terrorism; these documents should be considered in deciding the structure, layout and colour schemes of the SECURESTATION guidelines. 6.1. Document Format The PDF format is almost universally used in all of the case studies and in our longer compendium Table 2 of relevant guidelines. In the majority of cases the PDF is formatted for optimised printing with the document sized for A4 or US letter in portrait orientation and it reflects the printed versions of the documents. The exceptions to this are interactive PDF documents which have been considered and they have been designed in landscape orientation for optimised on screen viewing. Depending upon the design of the interactive PDF it can also be optimised print layouts. A good example of this is the Network Rail Guidelines which have a landscape page with the aspect ratio of A4 paper in which the main content is displayed and then added on in a side panel there are additional navigational features, as part of the interactive PDF. This allows the printed version to simply exclude this side panel and provide a document optimised for both on screen viewing and print.

Figure 23 Layout of the Network Rail Guide to Stati on Planning and Design

A few of the documents also provided a HTML formatted version of their documents in addition to the PDF version these include Engineering security- Protective design for high risk buildings. New York: NYPD, 2009, and the FTA’s Transit Security Design Considerations.

Page 52: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 50 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

6.2. Document Structure

Most of the documents considered in the examples structure their documents along the lines of the following broad categories:

1. Introduction and background to the document and terrorism risks

2. Methodology – either design or assessment process

3. Detailed information regarding counter terrorism technology, risks, design criteria or process steps

4. Examples and case studies

The structure of the section on detailed information will be dependent upon the context and purpose of the overall document and will reflect how a particular methodology of working is broken down. 6.3. Layout and Styles 6.3.1. Colour scheme Most of the documents considered in this report maintain a particular colour theme throughout the whole report based on just three or four colours, e.g. Home Office documents, green, black and white; RIBA documents orange, shades of grey, black and white. This simple colour scheme is then used in the text, using colour to indicate titles or to emphasise particular point. It is consistently used in any tables or diagrams, to ensure that the document has the same look and feel throughout. An exception to this is the Network Rail guidance which selects a particular colour theme for each chapter in the document relating to a particular design theme, e.g. usability – blue, operability – purple, quality – green and value – orange. These colour themes run throughout the sections and are the base colour of any diagrams and header text improving navigation through the document. These colour themes are also consistently used for the relevant criteria in the assessment form included in the appendix, allowing for quick reference from the form back to the relevant section within the main guideline document. 6.3.2. Layout All of the documents considered laid out their document based on the aspect ratio of A4 or US Letter paper, in the majority of cases the documents have been laid out with a portrait orientation, with just the interactive PDF documents laid out in landscape. Most documents have used a multi-column layout with tables and images inlaid or across the columns. However, multicolumn layouts on portrait orientated pages can be difficult to use for on screen reading, requiring the user to scroll up and down the page.

Page 53: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 51 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

a) b)

Figure 24: Example of the colour scheme and layout used in a) RIBA guidance on designing for counter-terrorism and b) Protecting Crowded Places: Design and Technical

Page 54: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 52 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

7. END-USER FEEDBACK ON GUIDELINE PRESENTATION METH ODS 7.1. Workshop A SECURESTATION end-users workshop was held on 25th November 2011 at WallaceSpace – St Pancras, London, UK. This event was used to gather input from end users and other experts into the direction of the project and to inform them of the consortium’s plans. A detailed description of the workshop can be found in SECURESTATION deliverable D8.7. As part of this workshop there were 21 users and experts from Belgium, France, Israel, Poland, Spain and UK, who represented European rail infrastructure managers and operators, transport police, public transport associations and research organisations, security organisations and government departments as well representatives from other rail and security R&D projects. As part of the workshop the working groups were asked what format they would find most useful for the end Constructive Design Handbook presented in. The responses from the groups were as follows: “Interactive with a good search function. More lik e Google than a book. Target everything as help for decision makers (not too technical). Emphasis o n the points of success – communication is the key” “Something interactive webpage or an interactive PD F, but should also be printable” “Should be limited and not be on the web open to al l (including potential terrorists)” 7.2. Questionnaire/interviews 7.2.1. Questionnaire/interviews methodology Interviews and questionnaires have been carried out to seek end user feedback on the most appropriate format in which the guidelines should be published. 17 questionnaires have been received from UK, France, Spain, Italy and Poland with feedback from metro operators, architects, operator and infrastructure associations, rail industry associations and security consultants. Two questionnaires were prepared, one basic (type A) and one more complex (type B) for the users who were able to offer more of their time. The basic questions aimed to rate user demands for specific formats in and out of office, portability and costs. The more elaborated questionnaire sought to find answers to more indirect questions to analyse typical user work behaviour, learning tactics and acceptance of new technology. As such, the latter was devised in three parts concerning attitudes in the work space, means of acquiring new information and specific expectations of new documentation structure.

Page 55: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 53 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Type A (basic version)

Person

Job/Role

Department

Organisation

Please number from 1 to 7

Please number from 1 to 7

Please use a 'X' to indicate preference

Yes No

Please use a 'X' to indicate preference

Yes No

Please use a 'X' to indicate preference

Prefer printed version Electronic only

Q6, Do you prefer to have a printed version of documentation for use in the office or are happy

to use purely electronic documents?

PDF

Interactive PDF

Webpage

Mobile app for iPhone, iPad or other mobile device

Ebook reader format (Kindle/Kobo etc) also clearly

readable on small screen mobile devices eg, iPhone,

Blackberry, Android

Printed book

Videos and podcasts

Q3, Please express any preferences for particular document formats and where and when

different formats are particularly useful.

Q4, Is portability of material an important factor for you?

Q5, Is the cost purchasing printed material a concern for your organisation?

Please rank the following in order of preference, with 1 being your most prefered format and 7

PDF

Interactive PDF

Webpage

Mobile app for iPhone, iPad or other mobile device

Ebook reader format (Kindle/Kobo etc) also clearly

readable on small screen mobile devices eg, iPhone,

Blackberry, Android

Printed book

Videos and podcasts

Q1, When working in the office which format of document would you prefer working with?

Please rank the following in order of preference, with 1 being your most prefered format and 7

being your least prefered format

Q2, When working out of the office/on site which format of document would you prefer working

with?

Questionnaire to receive End User feedback on the formats

that should be used for the SecureStation guidelines

Page 56: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 54 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Type B (elaborated version) A. How do you use your work space?

1. Where do you mostly exercise your work? - Office - On site

2. If/when on site: do you have an IPhone, Ipad, Blackberry, etc. which you use frequently? 3. If/when in the office: how much of your work involves using a computer?

- All the work - Part computer, part other means (like other media or more practical things – human

interaction) - Use of computer only for communication and partly information (very little)

4. What do you use computer for? - Emails (communication with work related partners), certain programmes that are specifically

configured for what I have to do - Work related email and programmes + information (internet browsing) for work - Everything: communication, information, social media, entertainment, etc.

5. Do you like to customise your work space so that you feel more comfortable and focused? 6. How often do you clean your computer: upgrade, store, refresh operating system? (Or how often

do you expect this to happen in the office?) B.How do you receive news?

7. How do you receive news? - Paper - Online paper (internet) - Radio - TV

8. Do you receive your paper/newsletter periodically, or do you like browsing for news and going out to get the paper?

9. Do you have preferred papers/sites/radio stations/TV channels that you always follow, or do you change often to be offered different points of view?

C.How do you work with reference material? 10. When getting informed on a subject matter that is relevant to your job, do you do thorough

research, or do you prefer having consultants, and then get informed through talks as work develops?

11. Is portability of material a significant factor for you? 12. Are you concerned with the cost of having/maintaining documentation (reference material)? 13. Do you look for information that’s particularly relevant to you, and learn about other fields from

specialists you work with? Or do you like having an overview of all fields, and then confirm with specialists?

14. Do you have a print version in office or are you happy using a digital format? 15. With new documentation, do you read everything upfront or do you ease into it, reading about

what’s relevant to you for each stage?

Page 57: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 55 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

16. Do you prefer having the latest updates on the subject matter and discard old versions, or do you like keeping track of everything that’s been published?

17. Do you mark the sections that are of at most importance to you so that you quickly find them? Or do you just find it helpful, but don’t really bother doing this?

18. Do you shuffle through information (turning pages, have more tabs opened, etc) or do you just focus on one piece of documentation until you’re satisfied with how much you know about it?

19. When reading a map (or complex image) do you prefer having it unfolded in front of you, or are you happy to zoom in and out at your convenience?

20. Do you like to have the feeling that you control what information and how much of it you receive? Or do you prefer to have a lot of information on everything and then start browsing through it and setting references for yourself?

7.2.2. Questionnaire/interview results and interpretation

a. Formats When asked directly what platforms they would use for the guidelines, 65% of the users answered they preferred PDF (static and interactive) both in the office and on site. Portability was an important factor for 90% of the users, whereas the cost for acquiring and maintaining documentation was of concern only to people in management functions. All the users spend at least 50% of their time in the office, and perform at least 50% of their work on the computer. The rest of the time is primarily used for site visits and tasks requiring human interaction. The computer is used by 80% for functions that exceed work assignments. When in office from all users questioned, 35% preferred to have a printed version of the documentation and access to a webpage (30%). Most answered that videos and podcasts would be helpful only if they presented concise essential information on the website. Only 5% of the users said they would use mobile devices and respective platforms when in office. When out of office users answered that after PDF format, they would use mobile device platforms (30%), fewer would use the webpage (15%) and very few said they would like the printed version (10%). Videos and podcasts were not considered an option, except when integrated with the website and for targeted information.

b. User profiles and structure requirements Regarding how they like to acquire new information, users were assessed based on:

- How assertive they were in attaining new information - Whether they were detail oriented or more keen on general understanding - Adaptability to new technology

All users answered they preferred to browse for information and to have more sources which they sought themselves. All use online news channels followed by paper. Also, 80% answered that they liked shuffling information (having more sources at disposal, more tabs opened). This would indicate that users would

Page 58: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 56 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

adapt well to a web format, or one that is used on the computer and would allow quick references to web links (webpage and interactive PDF). On how they structure new information in order to learn it, 80% said they liked having an overview of all information and then thoroughly read only sections of direct interest. Of course, this was closely related to the professional roles: managers insisted on the need to see connections, whereas experts were more focused on their own fields. The answers revealed a need to have a structure that would allow both a quick understanding of content as a whole with the possibility to find target content easily, in order to read it thoroughly. As such, the structure needs to be configured in a rigorous hierarchy (from general to detail), and needs to be able to allow for quick search and filtering of information. In a printed version and PDF this translates into numerous small but very specific chapters, as on a website it should allow filters and possibility of tagging relevant content. As 90% of users specified the need for portability, it is clear that the guidelines should be adapted to digital devices (whether with connection to internet or not). However only 50% of the users answered that they were happy only with a digital format; the rest felt the need to have at least part of the information printed. This means that the format should allow the possibility for print. The preference for using printed forms was expressed with regard to the parts of documentation with the most specific relevance, whereas the website and PDF were preferred for the general understanding of content.

Page 59: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 57 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

8. RECOMMENDED PRESENTATION METHODS FOR SECURESTATION GUIDELINES

The purpose of this document is to establish the framework for the future design handbook, later developed in WP4. The main categories of users and their subsequent requirements of new documentation are the factors that will define the layout and outlook of the final document. 8.1. Document Structure Based on the conclusions drawn from analysing similar documentation, the structure of this handbook will follow the three main themes identified as recognisable for specialised end users:

- Context analysis – to explain the need for the guidelines - Design proposals – emerged from the conclusions in the analysis - Appropriate guidelines – which take into account all positive existing design features combined

with the design proposals for improvements and change.

These main three chapters will be divided in subchapters that will comprise the topics described in the deliverables. The initial structure in the work packages will be altered slightly in order to ensure that the text in the handbook is easy to read by end users, as the deliverables will be grouped more appropriately by theme. Consequently, the proposed structure for the handbook is presented in the following table of contents:

A. Design Process A.1 Introduction A.1.1 Vision A.1.2 Target audience A.2 Project stages A.2.1 Feasibility A.2.2 Concept A.2.3 Design A.2.4 Construction A.2.5 Evaluation

B. Risk Identification and Assessment

B.1 Context (D 2.1) – contains an inventory of the following:

B.1.1 Threats B.1.2 Design B.1.3 Risk

B.2 Risk definition (D.3.1) – what ‘risk’ means

B.2.1 Risk scenarios (D 3.2, D 3.3) - Target – categories of people targeted in an attack - Design – the way physical distribution of space influences attacks B.2.2 User requirements (D 2.2)

B.2.3 Technical compendium (D 2.3)

B.3 Consequences (D 3.3) – who and what gets affected by an attack and how

Page 60: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 58 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

C. Design Considerations

C.1 Physical and functional resilience – how does one define the proper distribution of space? C.1.1 Structural factor (D.5.1) C.1.2 Functional factor (D 5.2) C.1.3 Socio-economic factor (D 7.1, D 7.2) C.1.4 Design strategies (D.5.3) C.2 Pedestrian behaviour – how does one distribute land use to enhance security? C.2.1 Simulations - Social aspect (D 6.2) - Technical aspect (D 6.1, D 6.3) C.2.2 Design strategies (D 6.4) – design to create clear flows for quick evacuation

D. Roadmap/ Guidelines

D.1 Gap analysis (D 7.3) D.2 Recommended guidelines (D 7.4)

The handbook will be divided in four parts, corresponding to each main chapter, and these will form the basis for the documentation. As such, they will be presented in a table of content, without the subchapters at the beginning of the guideline. This will be followed by the detailing of each part. The subject matter of each chapter will be presented in separate tables of content, and for each subchapter with more divisions, respective tables of content will be produced. A compendium of all this complete structure will be presented in the handbook index. This incremental presentation of structure is to help the user find exactly the information he/she needs, without having to digest irrelevant material. This is important given the high volume of data, which will be difficult to assimilate entirely given the variety of different end users for this document. 8.2. Layout and Styles To assist the users in identifying more accurately the kind of information they look for, the content will be labelled according to three themes according to the different user types:

- The human factor – will refer to all information of social nature (such as human behaviour in critical moments, human reaction to new technology, etc.)

- The technical factor – will comprise all the information on technical equipment with its implementation, use and consequences (or expected results)

- The design factor – will take into account all spatial considerations, the information regarding built environment configuration materials, land use, etc.

These themes will sometimes overlap, so to make clear what data is presented, visual logos will be used for each. For example, the chapter which presents the context for risk assessment (B.1) will be associated with logos for all three themes, but the subchapter on design (B.1.2) will only be presented under the design theme logo. The logos will be defined in WP4.

Page 61: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 01/06/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE - 59 -

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

Apart from the themes, the handbook needs to be useful to a set of professional categories. Three user group categories have been identified, which helps structure information:

- The ‘planning’ group (all experts that are involved in the project phase - planners, architects, designers, financial experts, etc.)

- The ‘executive’ group (all experts that are related to the construction phase, and later during evaluation – builders, technical engineers, etc.)

- The ‘users’ group (the groups of people who will actually use the station after construction – managers, the administrative staff, rail operators, etc. This group represents the project clients.)

The guidelines will address all these groups, but each will be interested in certain aspects presented. Even if all the information is available, and an overview is required, some chapters will be relevant to some readers more than others. In order to create a straightforward structure of content for each type of end-user, a colour code will be used. Each group of users will be assigned a colour, and the concerning sections will use the respective colours. For example, in chapter C on Design considerations, the functional factor (C.1.2) is most relevant to the ‘users’ and then the ‘executive’ groups, and less so for the ‘planners’. The theme is technical, but concerns members of the non-technical team as well. Diagrams with the structure of content for each group will be produced, to better guide the users. Also, the participation of each stakeholder in the project stages in chapter 1 will also be marked by the adequate colours. In order to make the information clear and easy to follow, the content will be structured in diagrams where possible and photographic support will be supplied. The important ideas in each chapter will be highlighted through careful positioning and fonts. The colour codes and the theme logos will act as visual references, together with a unitary use of fonts, text size and similar positioning. The structure of content will be the same regardless of media used, and will create the SECURESTATION Handbook Theme. The well-structured content and the created visual code will be repeated across different media, regardless of technical considerations. These handbook design elements are adaptable to any platform, current or future.

Page 62: PASSENGER STATION AN D TERMINAL DESIGN FO R SAFETY, …securestation.group.shef.ac.uk/documents/securestation_d2_4.pdf · Funding Scheme: CP – Collaborative Project Call (part)

Date: 31/05/2012

Document ID: SECEST-WP2-JMP-D2.4-PU-v1.0

Revision: 1.0

- 60 - D2.4 – ANALYSIS OF PRESENTATION OF METHODS FOR DESIGN GUIDANCE

This project has been carried out under a contract awarded by the European Commission No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project

partners. © 2011 – All rights reserved

9. Annex – Questionnaire results

Questionnaire respondant 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

1 Where do you mostly exercise your work?

office on site

2 If/when on site do you have an Ipad, Iphone, etc. that you use frequently?

yes no

3 If/when in office how much of your work involves using a computer?

1 0

4 What do you use the computer for? everything don't use5 Do you like to customise your work

space?yes no

6 How often do you clean your computer?often never

7 How do you receive your news?paper

online paper mostradio

TV least

8 Do you receive newsletters or do you browse and go out for the paper?

browse newsletter

9 Do you have preferred channels to receive news?

yes change

10 When getting informed on a new subject matter, do you do thorough research or do you prefer having consultants and get informed through talks as work develops?

consultants research

11 Is portability of material an important factor to you?

yes no

12 Are you concerned with the cost of having/maintaining documentation?

no yes

13 Do you look for specific data or do you like having an overview of all fields?

overview specific

14 Do you have a print version in office or are you happy using a digital form?

digital print

15 With new doc do you read everything upfront or learn what you need with each stage?

gradual upfront

16 Do you prefer discarding the old versions or do you want to hang on to everything?

discard archive

17 Do you actually mark sections that are relevant to you or you can't be bothered?

yes no

18 Do you shuffle info or do you focus on one thing?

shuffle focus

19 When reading a map do you want it unfolded or do you zoom in/out?

zoom unfold

20 Do you want filtered info or do you want everything so you can organise yourself?

filter everything

21 In office - preferred formatsPDF 1Interactive PDF 2Webpage 3Mobile app for iPhone, iPad, etc 4Ebook reader format (Kindle/Kobo etc) 5Printed book 6Videos and podcasts 7

22 Out of office - preferred formatsPDF 1Interactive PDF 2Webpage 3Mobile app for iPhone, iPad, etc 4Ebook reader format 5Printed book 6Videos and podcasts 7

Key