HOME | CHECKOUT | ABOUT | FAQ | CONTACT US |
 
Welcome Guest [create an account] or log-in:
email
password

Chapter 3 From Risk to Resilience Contemporary Issues in Event Risk Management (Peter Ashwin)

DOI: 10.23912/9781911635901-4827

ISBN: 9781911635901

Published: April 2021

Component type: chapter

Published in: Crisis Management and Recovery for Events: Impacts and Strategies

Parent DOI: 10.23912/9781911635901-4692

Abstract

In today’s volatile, uncertain, complex and ambiguous global risk society, national boundaries are blurred, inter-connected markets are exposed to delocalized risks with consequences that may stretch over extended or indefinite periods of time. Under these uncertain conditions, event organizers find themselves planning and delivering events in an environment characterized by disruptive effects of the Covid-19 pandemic and extant risks from home-grown violent extremism, cyber-criminal threats, supply chain disruptions and event cancellations (Beck, 2006; Hall, et al., 2019; Piekarz et al., 2015; Reid & Ritchie,2011; Rutherford Silvers, 2008; Tarlow, 2002). It is widely acknowledged that risk management should be viewed by event organizers and event professionals as a fundamental responsibility for planning and delivering a world class guest experience in a safe and secure environment (Berlonghi, 1990; Piekarz et al., 2015; Rutherford Silvers, 2008; Tarlow 2002;). However, in stark contrast, many event organizers concede that they do not have an event risk management plan (Ashwin & Wilson, 2020; Sturken, 2005 cited in Robson, 2009; Robson, 2009). In light of the recent proliferation of violent attacks on festivals and events, from the 2013 Boston Marathon bombing to the recent 2019 Gilroy Garlic Festival (California) shooting, there has been an increasing public discourse and emerging legislative requirements for event organizers to demonstrate an evidence-based approach to risk management decisions with the ability to explain the rationale behind those decisions in clear, objective and transparent terms (US Department of Homeland Security, 2020; UK Center for the Protection of National Infrastructure, 2020). Drawing upon the existing body of literature for event risk management, from Berlonghi (1990) to the recent 2019 event industry survey investigating event organizers approaches to risk management and resilience (Ashwin & Wilson, 2020), this chapter will explore contemporary risk issues in today’s volatile, ambiguous, complex and uncertain world. First, it will discuss the inter-related risk constructs pertaining to socio-cultural theoretical perspectives of risk and how an event organizer’s perception of risk influences their approach to risk management and decision-making. Then the chapter will address two contemporary risks, both of which present the potential for catastrophic consequences: cyber-criminals who are increasingly focusing their cyber-attacks on vulnerable, event digital eco-systems; and domestic terrorism and the threat from homegrown violent extremists, domestic violent extremists and unaffiliated lone offenders (‘lone wolves’). Finally, pragmatic, risk-based approaches to mitigating these risks will be discussed, specifically, preventative risk control measures and opportunities for enhancing organizational resilience to cyber-crime and terrorism.

Sample content

Click here to download PDF

Contributors

  • Peter Ashwin (Author)

For the source title:

Cite as

Ashwin, 2021

Ashwin, P. (2021) "Chapter 3 From Risk to Resilience Contemporary Issues in Event Risk Management (Peter Ashwin)" In: Ziakas, V., Antchak, V. & Getz, D. (ed) . Oxford: Goodfellow Publishers http://dx.doi.org/10.23912/9781911635901-4827

References

Anarumo, M. (2011) The practitioner's view of the terrorist threat, in Kennedy, L., & McGarrell, E. (eds) Crime and Terrorism Risk: Studies in Criminology and Criminal Justice. pp. 56-89.

Andress, J. (Ed.) (2011). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. London: Elsevier.

Ash, J., & Smallman, C. (2010). A case study of decision making in emergencies. Risk Management, 12(3), 185-207.

https://doi.org/10.1057/rm.2010.2

Ashwin, P., & Wilson, M. (2020) Event Industry Preparedness and Resilience Survey. https://www.blerter.com/lp/event-preparedness-resilience-survey-report.

Australian Cyber Security Centre. (2020) Cyber Security and Australian Small Businesses Survey Results. https://www.cyber.gov.au/sites/default/files/2020-07/ACSC%20Small%20Business%20Survey%20Report.pdf (Accessed: 22 August 2020).

Aven, T., & Renn, O. (2009) The role of quantitative risk assessments of characterizing risk and uncertainty and delineating appropriate risk management options with special emphasis on terrorism risk, Risk Analysis, 29 (4), pp. 587- 600.

https://doi.org/10.1111/j.1539-6924.2008.01175.x

Beck, U. (1999) World Risk Society. Cambridge: Polity Press.

Beck, U. (2006). Living in the world risk society. Economy and Society, 35(3), 329-345.

https://doi.org/10.1080/03085140600844902

Berlonghi, A. (1990) The Special Event Risk Management Manual. Dayton, CA: Bookmasters Inc.

Bjorgo, T., & Silke, A. (2019). Root causes of terrorism. In A. Silke (Ed.) Routledge Handbook of Terrorism and Counterterrorism (pp.57-65). New York: Routledge.

https://doi.org/10.4324/9781315744636-5

Boba, R. (2009) 'EVIL DONE', in Freilich, J. and Newman, G. (eds). Reducing Terrorism through Situational Crime Prevention. pp.71-91, Monsey, NY: Criminal Justice Press. Bouhana, N., Malthaner, S., Schuurman., Lindekilde, L., Thornton, A., & Gill, P. (2019) Lone actor terrorism: Radicalization, attack planning and execution, in Silke, A. (ed.) Routledge Handbook of Terrorism and Counterterrorism. New York: Routledge, pp.112-121.

https://doi.org/10.4324/9781315744636-10

Boyd, J. (1979). New Conception for Air-to-Air Combat. (Unpublished paper). Available at: http://dnipogo.org/john-r-boyd/.

Cavelty, M. (2014) Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities, Science, & Engineering Ethics, 20(3), 701-715.

https://doi.org/10.1007/s11948-014-9551-y

Chang, L., & Graboksy, P. (2014) Cybercrime and establishing a secure cyber world, in Gill, M. (ed) The Handbook of Security. 2nd edn. Basingstoke: Palgrave MacMillian, pp.331-339.

https://doi.org/10.1007/978-1-349-67284-4_15

Clark, J., & Saviour, S. (2018) Negligence: What is Reasonably Foreseeable. https://stewartmckelvey.com/thought-leadership/client-update-negligence-what-is-reasonably-foreseeable, (Accessed:15 December 2020).

Clarke, R., & Newman, G. (2006) Outsmarting the Terrorists. Westport, Connecticut: Praeger Security International.

Department for Digital, Culture, Media and Sport. (2019) Cyber Security Breaches Survey 2019. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/(Accessed: 12 August 2020).

Ellis, R., Fabtz, A., Karimi,F., & McLaughlin, E. (2016) Orlando Shooting: 49 Killed, Shooter Pledged ISIS Allegiance. Orlando shooting: 49 killed, shooter pledged ISIS allegiance (cnn.com) (Accessed: 1 December 2020).

Ezell, B., Bennett, S., Von Winterfelt, D., Sokolowki, J., & Collins, A. (2010) Probabilistic risk analysis and terrorism risk, Risk Analysis, 30 (4), 575-589.

https://doi.org/10.1111/j.1539-6924.2010.01401.x

Ferrara, D. (2020) Judge Approves $800 million Settlement for Route 91 Victims. https://www.reviewjournal.com/crime/courts/judge-approves-800m-settlement-for-route-91-victims-2133490/(Accessed:15 December 2020).

Freilich, J., Chermak, S., & Hsu, H. (2019) Deterring and preventing terrorism, in Silke, A. (ed.) Routledge Handbook of Terrorism and Counterterrorism. New York: Routledge, pp. 434-443.

https://doi.org/10.4324/9781315744636-38

Furnell, S., Emm, D., & Papadaki, M. (2015) The challenge of measuring cyber- dependent crimes, Computer Fraud, & Security, 10, 5-12.

https://doi.org/10.1016/S1361-3723(15)30093-2

Getz, D. (1997) Event Management and Event Tourism. New York: Cognizant.

Goldblatt, J, Dr. (2011). Special Events: A New Generation and the Next Frontier. 6 th edn. New Jersey: John Wiley, & Sons Inc.

Gordon, S., & Ford, R. (2006) On the definition and classification of cybercrime, Journal of Computer Virology, 2, 13-20.

https://doi.org/10.1007/s11416-006-0015-z

Haberfeld, M., & von Hassell, A. (2011). Proper proactive training to terrorist presence and operations in friendly urban environment. In M. Haberfeld, & A. von Hassell (Eds.), A New Understanding of Terrorism: Case Studies, Trajectories and Lessons Learned (pp. 9-22). New York: Springer.

https://doi.org/10.1007/978-1-4419-0115-6_2

Hackread. (2017) Coachella Festival Website Hacked; User Data at Risk. https://www.hackread.com/coachella-festival-website-hacked-user-data-at-risk/(Accessed: 15 August 2020).

Hall, S., Manning, D., Keiper, M., Jenny, S., & Allen, B. (2019). Stakeholders perception of critical risks and challenges hosting marathon events: An exploratory study. Journal of Contemporary Athletics, 13(1), 11-22.

Hesterman, J. (2015) Soft Target Hardening: Protecting People from Attack. Boca Raton, FL: CRC Press.

https://doi.org/10.1201/b17914

Hillson, D. (2016) The Risk Management Handbook: A Practical Guide to Managing the Multiple Dimensions of Risk. London: Kogan Page Ltd.

Hinduja, S., & Kooi, B. (2013) Curtailing cyber and information security vulnerabilities through situation crime prevention', Security Journal, 26(4), 383-402.

https://doi.org/10.1057/sj.2013.25

Hopkin, P. (2010). Fundamentals of Risk Management: Understanding, evaluating and implementing effective risk management (2nd edn). London: Kogan Page.

IBM Security and Ponemon Institute (2020). Cost of a Data Breach Report 2020. New York: IBM Security.

International Organization for Standards. (2018). ISO 31000: Risk Management - Guidelines. 2nd ed. Zurich: International Organisation for Standards (ISO).

Khir, M.M. (2014). Developing an Event Safety Typology: A Qualitative Study of Risk Perception amongst Event Planners and Venue Managers in Malaysia. PHD Thesis. Liverpool John Moores University. Available at: http://researchonline.ljmu.ac.uk/id/eprint/4441/1/157529_2014masrurphd.pdf.

Kirlappos,I., Parkin, S., & Sasse, A. (2014). Learning from Shadow Security: Why understanding non-compliant behaviors provides the basis for effective security. Available at: https://discovery.ucl.ac.uk/id/eprint/1424472/1/Kirlappos%20et%20al.%20-%202014%20-%20Learning%20from%20%E2%80%9CShadow%20Security%E2%80%9D%20Why%20understanding.pdf.

Klein, G. (1993). A Recognition-Primed Decision (RPD) Model of Rapid Decision Making. In G. Klein, J. Ornaanu, R. Calderwood, & C. Zsambok (Eds.), Decision Making in Action: Models and Methods (pp. 138-147). Norwood, NJ: Ablex Publishing Corp.

Klein, G. (2008). Naturalistic decision making. Human Factors: The Journal of Human Factors and Ergonomic Society, 50(3), 456-460. Available from: https://journals-sagepub-com.ezproxy4.lib.le.ac.uk/doi/pdf/10.1518/001872008X288385.

https://doi.org/10.1518/001872008X288385

Lakhani, A. (2019) Ensuring Cybersecurity at Big Events this Summer. https://www.fortinet.com/blog/business-and-technology/cybersecurity-big-summer-events (Accessed at: 26 August 2020).

Lal, A. (2020) Building Cyber Resilience Post COVID-19 19. https://www.cpomagazine.com/cyber-security/building-cyber-resilience-post-covid-19/(Accessed: 28 August 2020).

Laybourn, P. (2003) Risk and decision making in events management, in Yeoman, I. (ed). Festival and Events Management: An International Arts and Culture Perspective. New York: Routledge.

https://doi.org/10.1016/B978-0-7506-5872-0.50024-7

Levi, M., Doig, A., & Gundur, R. (2017) Cyberfraud and the implications for effective risk-based responses: Themes from UK research, Crime Law Society Change, 67, 77-96.

https://doi.org/10.1007/s10611-016-9648-0

Lupton, D. (2013). Risk. 2 nd edn. New York: Routledge.

https://doi.org/10.4324/9780203070161

McGuire, M., & Dowling, S. (2013) Cybercrime: A review of the evidence, Home Office Research Report 75. London: Home Office Science. Mcllhatton, D., Allen, A., Chapman, D., Monaghan, R., Ouillon, S., &

Bergonzoli,,K. (2019). Current considerations of counter terrorism in the risk management profession. Journal of Applied Security Research, 14(3), 350-368.

https://doi.org/10.1080/19361610.2018.1545196

Mercury News (2020). Coachella Festival Website Hacked, Users Personal Data Stolen. https://www.mercurynews.com/2017/03/01/coachella-festival-website-hacked-users-personal-data-stolen/(Accessed: 20 August 2020).

Millaire, P. Sathe, A., & Thielen, P. (2017) What all Cyber Criminal Know: Small and Midsize Businesses with Little or No Cybersecurity are Ideal Targets. https://www.chubb.com/us-en/_assets/doc/17010201-cyber-for-small_midsize-businesses-10.17.pdf (Accessed: 21 August 2020).

Ostrom, L., & Wilhelmsen, C. (2012). Risk Assessment: Tools, Techniques and their Application. New York: John Wiley, & Sons Inc.

https://doi.org/10.1002/9781118309629

Payne, B., David C. May, D., & Hadzhidimova, L. (2019) America's most wanted criminals: Comparing cybercriminals and traditional criminals, Criminal Justice Studies, 32(1), 1-15.

https://doi.org/10.1080/1478601X.2018.1532420

Piekarz, M., Jenkins, I., & Mills, P. (2015) Risk and Safety Management in the Leisure, Events, Tourism and Sports Industries. Oxfordshire: CAB International Inc.

https://doi.org/10.1079/9781780644493.0000

Plous, S. (1993). The Psychology of Judgment and Decision Making. NY: Mcgraw-Hill Book Company.

Reason, J. (1990). The contribution of latent human failures to the breakdown of complex systems. Philosophical Transactions of the Royal Society of London. Series

B, Biological Sciences, 327(1241), 475-484. doi:10.1098/rstb.1990.0090.

https://doi.org/10.1098/rstb.1990.0090

Reason, J. (1997). Managing the Risk of Organizational Accidents. Surrey, UK: Ashgate Publishing Ltd.

Reid, S., & Ritchie, B. (2011) Risk management: Event managers' attitudes, beliefs and perceived constraints, Event Management,15, 329-341.

https://doi.org/10.3727/152599511X13175676722528

Robson, L. (2009) Perceptions of Risk at Meetings and Conferences: An Event Planners Perspective. PHD Thesis. University of Waterloo. https://uwspace.uwaterloo.ca/bitstream/handle/10012/4509/Robson_Linda.pdf.

Rogers, G. (1997) The dynamics of risk perception: How does perceived risk respond to risk events? Risk Analysis,17(6), 745 - 757.

https://doi.org/10.1111/j.1539-6924.1997.tb01280.x

Rule, J. (2013) A Symbiotic Relationship: The OODA Loop, Intuition, and Strategic Thought. Master of Strategic Studies, Dissertation. United States War College. https://www.scrummaster.dk/lib/AgileLeanLibrary/Topics/OODALoop/OODAASymbioticRelationship.pdf.

Rutherford Silvers, J. (2008) Risk Management for Meetings and Events. Oxford: Butterworth- Heinemann.

https://doi.org/10.4324/9780080560731

Slovic, P. (2000) The Perception of Risk. London: Earthscan Publications Ltd.

Slovic, P., & Peters, E. (2006). Risk perception and affect. Current Directions in Psychological Science, 15(6), 322-325.

https://doi.org/10.1111/j.1467-8721.2006.00461.x

Stratton, G., Powell, A., & Cameron, R. (2017). Crime and justice in digital society: Towards a 'Digital Criminology'?. International Journal for Crime, Justice and Social Democracy, 6(2), 17-33.

https://doi.org/10.5204/ijcjsd.v6i2.355

Talbot, J. (2011) .What Right with Risk Matrices? Available at: https://31000risk.wordpress.com/article/what-s-right-with-risk-matrices-3dksezemjiq54-4/

Tarlow, P. (2002) Event Risk Management and Safety. New York: John Wiley, & Sons Inc.

UK Centre for the Protection of National Infrastructure. (2020) Recognizing Terrorist Threats Guide. https://www.cpni.gov.uk/recognising-terrorist-threats-guide-0 (Accessed: 10 December 2020).

UK Federation of Small Businesses (2016). Cyber Resilience: How to Protect Small Firms in the Digital Economy. Available at: https://www.fsb.org.uk/resources-page/small-businesses-bearing-the-brunt-of-cyber-crime.html. US Department of Homeland Security, Cybersecurity and Infrastructure Security

Agency. (2011). Risk Management Fundamentals. Available at: https://www.dhs.gov/xlibrary/assets/rma-risk-management-fundamentals.pdf. US Department of Homeland Security, Cybersecurity and Infrastructure Security

Agency. (2019) CISA Cyber Essentials. https://www.cisa.gov/publication/cisa-cyber-essentials (Accessed: 22 July 2020). US Department of Homeland Security, Cybersecurity and Infrastructure Security

Agency. (2020) COVID-19 Exploited by Malicious Cyber Actors. https://us-cert.cisa.gov/ncas/alerts/aa20-099a (Accessed: 22 August 2020)

US Department of Homeland Security. (2020) Homeland Threat Assessment. https://www.dhs.gov/sites/default/files/publications/2020_10_06_homeland-threat- assessment.pdf (Accessed: 30 November 2020).

US National Counterterrorism Center. (2020) Counter Terrorism Guide for Public Safety Personnel. https://www.dni.gov/nctc/jcat/index.html (Accessed: 20 November 2020).

Verizon. (2020) 2020 Data Breach Investigations Report. https://enterprise.verizon. com/resources/reports/2020-data-breach-investigations-report.pdf (Accessed: 13 August 2020).

https://doi.org/10.1016/S1361-3723(20)30059-2

Wall, D. (2001) Cybercrimes and the Internet, in Wall, D (ed) Crime and the Internet. New York: Springer.

Whitman, M., & Mattord, H. (2005) Principles of Information Security, 2nd edn. Boston: Thompson Course Technology.

Willis, H. (2007). Guiding resource allocations based on terrorism risk. Risk Analysis, 27(3), 597-606.

https://doi.org/10.1111/j.1539-6924.2007.00909.x

Xu, L., Xu, E., & Li, L. (2018) Industry 4.0: State of the art and future trends, International Journal of Production Research, 56(8), 2941-2962.

https://doi.org/10.1080/00207543.2018.1444806

Available

Published in Crisis Management and Recovery for Events: Impacts and Strategies

Paperback format [Details]Price: £34.99Copies / Delivery by post
Terms and conditions of purchase | Privacy policy