Next Article in Journal
Seismic Vulnerability Assessment of Historic Centers with Two Fast Methods Based on CARTIS Survey Methodology and Fragility Curves
Previous Article in Journal
Tradition in Action-Traditional Costume Innovations
Previous Article in Special Issue
Overheating in Historic Buildings in the UK: An Exploratory Study of Overheating Risks, Building Performance, and Thermal Comfort
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Terrorism Risk Assessment for Historic Urban Open Areas

1
Department of Civil, Environmental, Building Engineering and Chemistry (DICATECh), Politecnico di Bari, 70126 Bari, Italy
2
Department of Construction, Civil Engineering and Architecture (DICEA), Università Politecnica delle Marche, 60121 Ancona, Italy
*
Author to whom correspondence should be addressed.
Submission received: 1 July 2024 / Revised: 11 September 2024 / Accepted: 23 September 2024 / Published: 26 September 2024
(This article belongs to the Special Issue Heritage under Threat. Endangered Monuments and Heritage Sites)

Abstract

:
Making cities resilient and secure remains a central goal in urban policy strategies, where established methods, technologies, and best experiences are applied or replicated when the knowledge of a threat is already well established. The scientific community and specialized bodies are invited to comprehend and evaluate disastrous events that are still not well explored to broaden the concept of resilient cities. Among these, terrorism in the European-built environment remains an underexplored topic, despite various studies assessing its economic, social, and political dimensions, exploring the radicalist matrix, or examining the post-effects of high-impact disastrous events. Within this framework, this work presents an algorithm for the risk assessment of historic urban open areas (uOAs) in Europe, combining theories of the terrorism phenomenon, the normative experiences, and the phenomenological results of violent acts in uOAs. Specifically, the algorithm is determined by studying physical qualities/properties and elements that usually feature the uOAs, using a limited set of descriptors. The descriptors and their formulation are set starting from their qualification, in compliance with the risk determinant (Hazard, Vulnerability, and Exposure), and discussed starting from participatory methods (Delphi and AHP). The algorithm is finally applied to Italian historic squares, testing the mathematical approach, verifying theories of the phenomenon, and setting up a comprehensive three-dimensional risk matrix for both soft and hard targets. This latest constitutes an operative tool to assess the investigated built environment exposed to terrorist threats aimed at developing more detailed mitigative strategies.

1. Introduction

Two main macro-dimensions connect the “Cultural Heritage” and “terrorism threat” in cities. The first is prevalently related to the ideological–political component of the extremist movement, aimed at exalting its own cultural supremacy and promoting armed conflict [1,2,3]. In that sense, the main terrorist activities aim at the intentional disruption or smuggling of Cultural Heritage. The second one describes and exhibits the operative dimension of violent acts in terms of maximization of the impact, considering the number of victims and/or the potential publicity [4]. Here, the discussion focuses on the touristic attraction of places or buildings, which increases the number of potential people involved in the attack or/and the mediatic relevance of the violent act. As is clear, the issues relate, respectively, to national and local sizes, involving legislative regulations in fighting/preventing radicalism [5,6,7] and promoting secure cities [8], extending the issue to all nations [9,10].
When the discussion on the terrorism threat focuses on the cultural/historical sites/buildings and their users, the main issues are related to secure cities and people’s safety. This trend is also a consequence of the increasing number of violent acts in less politically exposed nations, such as Europe [11]. Several national norms and guidelines have been promoted in order to manage the threat after, during, and before the attacks. The activation of national regulations has made Germany, the United Kingdom, and France represent the most prepared European states, due to several recent hazardous events. The USA and Australia are notable worldwide for their historical background on the issue [12]. Regarding the specificity of European countries’ activities, the focus is on mitigative strategies and the dissemination of good behavior for users and policy advisors in tracing suspicious individuals [13,14]. On the other hand, the UK has supported the discussion on secure cities and the invisibility of strategies as inherent argumentation for reducing the risk proneness of urban places, particularly safeguarding their image in cultural and historical sites [15,16,17]. This evidence was fully discussed and presented in recent works by Quagliarini et al. [12,18]. This study is appropriately focused on urban open areas, which constitute the most vulnerable areas in cities due to their minor attention to regulations and the exploitation of low levels of mitigation and prevention. In fact, the phenomenological analysis of previous events in Europe has highlighted how such places are prone to such events [18], as a consequence of the high level of likelihood and the low quality of security. Moreover, when these places are combined with the presence of strategic and cultural buildings or sites, the level of hazard is increased due to the nature of the phenomenon, which is mainly interested in maximizing the publicity of the violent act [4].

1.1. Previous Experience in Risk Assessment in Cities Prone to Terrorism

When the focus is on terrorist risk assessment for the promotion of secure cities, the latest scientific studies that correlate terrorism and risk assessment in cities discuss four key themes (the studies derived from the SCOPUS database focus on the keywords “risk assessment; terrorist; terrorism; city”, excluding medical and psychological research, and referring to the period 2018–2024):
  • New technologies and approaches to support counterterrorism agencies by means of innovative IoT tools [19,20,21] or social and collaborative approaches [22].
  • Risk assessment of terrorist threat focusing on specific infrastructures or cities and regions [21,23,24,25,26,27], with major applications referring to Asia and the USA, and very limited cases in Europe.
  • Vulnerability of buildings or the security assessment of human health when exposed to specific attacks in cities [28,29,30,31].
  • Risk assessment of specific classes of special cultural buildings [32,33] to protect cultural contents.
Consequently, this overview underlines the lack of a specific discussion on urban open areas; however, the importance of historical and cultural ones is emphasized by the concept that these places are not constituted only by unbuilt areas but are the result of a combination of infrastructure, buildings, and sights with a rigid and invariable shape [34,35].
At the same time, the analysis of the regulation framework determined by the European guidelines in supporting risk management and assessment [36,37,38] has highlighted the necessity to use a common method to measure terrorism risk in cities, favoring the focus on the local characterization of the phenomenon, which influences the weapon availability and the attack type [4]. As it is clear, the risk assessment of terrorism is a complex matter involving economic, political/religious conditions that change at national and local levels and affect people’s security and (psychological) health [39,40,41,42] in different ways. However, this investigation can be supported by the individuation of a limited set of conditions and well-considered aims.
Research on promoting risk disaster comprehension has highlighted the strong relevance of three main elements of risk, called “determinant” [43,44,45]: Hazard is related to the nature of the study events and their frequency; Vulnerability describes the propensity or predisposition to be adversely affected; and Exposure discusses the potential effects or damages (on people, services, buildings). For the qualification of such determinants, the phenomenon requires to be parametrized coherently with features, conditions, and properties that affect single determinants. This process is widely applied for assessing and qualifying other physical or anthropic events; moreover, the process is usually combined with participatory methods to discuss the interdependencies and single weights in the overall risk assessment [46,47,48,49,50]. Undoubtedly, the numerical assessment of risk allows for the quantification of any analyzed threat, offering the opportunity to re-iterate the procedure in assessing strategies or stressors that alter the starting state of observation of the phenomenon or conditions. However, the quantification of risk requires critical translation in terms of constraints and rules for its management, also taking into account suitable levels of acceptability of risk. In that sense, the use of qualitative methods for terrorism risk assessment offers the opportunity for easy re-iteration using a limited set of data and details, also limiting the goodness of quantitative results for specific analysis (e.g., economic damages, number of victims, behavioral quantification during the evacuation process) [51,52,53,54] or more complex goals (i.e., national strategies for counterterrorism prevention) [55].

1.2. Aim of This Study

According to the described framework featured by specific gaps in the literature and the relevance of the matter for European cities, this paper aims to present a fast formulation to support the risk assessment of historic urban outdoor areas (uOAs), such as squares, exposed to terrorist events, mainly applied to places located within historic centers of cities. This is a common thread and a progression activity related to previous studies by the authors on observing, analyzing, and assessing terrorist events in common public open spaces [18]. This is the result of recent events in Europe that have involved pubs, museums, theatres, as well as promenades and squares, affecting the security of citizens. As the phenomenological study by the authors has already highlighted [18], such public outdoor places, also combined with the inner uses of public, cultural, and strategic buildings, have a critical level of inherent hazardousness, determined by the higher frequency of events in Europe. Moreover, these scientific endeavors are related to the national project BE S2ECURe—(make) Built Environment Safer in Slow and Emergency Conditions through behavioral assessed/designed Resilient solutions. This project aims to evaluate multi-risk conditions for uOAs during common activities, addressing both sudden and slow onset disasters to human behaviors.
Specifically for the paper contents, this work is structured into the five following sections:
  • Method applied to determine the risk assessment formulation (Section 2).
  • Characterization of parameters affecting terrorism risk assessment, derived both from previous works and the scientific literature (Section 3), and algorithm setup (Section 4).
  • Calibration and test of the formulation in a set of real Italian case studies (Section 5), characterized by cultural/historical relevance.
  • Discussion of results related to matrices of terrorism risk for uOAs as both hard and soft targets (Section 6).

2. Materials and Methods

As mentioned in the previous section, this work’s aim is to set up a rapid formulation for the qualification of risk assessment in uOAs intended as soft targets within the overall urban extension. The conceptual basis of the goal relates to the necessity of discussing the uOAs as systems of buildings, infrastructures, unbuilt areas, and people, focusing on material and immaterial properties and qualities. In that sense, human behavior is ignored due to the dynamic relations among people; however, the possible interferences between physical elements of the uOAs and users are discussed, starting from the existing regulations on mitigative strategies. All the international regulations and guidelines are referenced in Section 3. However, the focus of the formulation setup is on European uOAs. For them, previous phenomenological analysis [18] is pursued, starting from the recorded violent events in Europe within the Global Terrorism Database [56], which became the basis of the frequentist details within the formulation. Finally, it is useful to remark that the formulation is centered on the built environment in an as-built approach.
The methodological process is structured into two functional phases (Figure 1) for the purpose of formulating the setup:
  • The parametrization process and formulation hypothesis where factors to be considered in the terrorism risk assessment for uOAs, and their qualification in terms of association with the risk determinant (Hazard, Vulnerability, Exposure) is identified. That is, it starts from the first results discussed in [12,18] for specific boundary conditions of the matter (attack types and the relevance of building and place usage) (Section 3).
  • The collaborative validation of factors and formulations is identified in the previous phase by means of the Delphi technique, while the relationships among them are quantified using the Analytic Hierarchy Process (AHP) (Section 4).
Specifically for the structured methods, the Delphi technique allows us to analyze and describe a phenomenon or a problem that is still not fully supported by argumentation, as well as where experts’ judgment is required. The proposed technique is based on delivering anonymous questionnaires through controlled feedback to a specific group of experts [57,58]. Specific notes regarding the experts and their numbers are offered in the literature. The survey may involve from 10 to more than 1000 people who have relevant knowledge and experience related to urban risk. As far as the application of the Delphi technique to this work’s goals is concerned, the Delphi questionnaire is structured into three main round surveys, mainly applied for the following:
  • Validating and implementing the recognized factors (previous operative phase) in the first round of the survey, including association with risk determinants (Hazard, Vulnerability, Exposure).
  • Validating the dependencies of elements and properties in the formulation during the second survey round.
  • Finally, the validation of influencing factors.
Particularly for the second and third rounds, all the answers can be validated considering the Lawshe Content Validity Ratio (CVR) [59], as usually noted in Delphi applications [60,61,62]. Clearly, the involved experts were informed about boundary conditions and previous results [12,18] of this study, ensuring a well-thought analysis.
In addition to validating the concerns regarding the influence factors, the AHP was applied. Specifically, similar to the Delphi method, the AHP method is based on the multicriteria theory formulated by Saaty [63], aiming at defining priority scales among a set of elements according to individual judgment. AHP is also based on questionnaires centered on the pairwise comparison among the involved elements, administered to a set of experts. Therefore, as in the Delphi method, all the results are analyzed in terms of consistency ratio (CR): a CR equal to 0% reflects a fully consistent element, while a CR > 10% corresponds to the superior limit of acceptability of consistency. The AHP process for the presented study is applied to the class of elements derived from the third survey round of the Delphi method, deriving their specific weight in the formulation [63]. It is worth noting that both Delphi and AHP are participatory methods and they constitute valid systems in supporting and considering expert judgment in risk identification, assessment, and management [36,37,38].
At the end of its setup, the formulation is tested on a real sample of squares (Figure 1) in order to validate it and, if required, calibrate it. In addition, its testing allows to determine the reduced risk matrices to describe the uOAs. Here, the testing phase takes advantage of real case studies as part of historic squares in Italy that have already been considered for the same project BE S2ECURe.

3. Setting up the Formulation for the Terrorist Risk Assessment for uOAs

3.1. The Translation of uOA as a System of Open Space and Uses of Buildings

As described in the introduction, the main goal of the intended rapid formulation is to support the risk assessment of real uOAs exposed to terrorism events. However, as previously demonstrated in [18], a close relationship exists between open spaces and functions or uses of buildings facing the uOAs in the selection of places by perpetrators. A recent study about the issue [64] has introduced the Space of Relevance (SoR) as the interface of the internal function of buildings and external public uses of uOAs. It is borrowed from the Space of Interferences introduced by Li Piani [65] who has already introduced the concept of interferences among buildings and spaces during violent acts. Each SoR can be delimited on the floor as the external area of the building facing open places, located along the facades with access; the SoR extension is calculated [64] in the following Equation (1):
ASoR [m2] = ACommBuild [m2] × CB [pp/m2]/COUT [pp/m2]
where
  • ACommBuild is the commercial extension of the building.
  • CB is the maximum density capacity of people in the buildings [pp/m2].
  • COUT the maximum density of people when public activities are conducted outside, as considered for public buildings.
CB and COUT follow the Italian regulations (D.M. 03/08/2015 and National Ministerial Decree 19/8/1996) but can be extended for other cases in European countries, using the local values.
SoRs identification and qualification, as for position and extension, became functional in assessing real uOAs as complex open and public spaces where their uses and distribution of people may change during the day.

3.2. Selection and Determination of Factors Influencing the Terrorist Threat in uOAs

As described in the previous sections, the terrorist threat is a controversial issue. Due to the project goals, the related risk assessment has to determine a simple formulation based on the risk triangle that is useful in describing the terrorism risk of urban Open Areas (uOAs) in European countries. Previous studies by the authors have defined two main elements to delineate the complex theme. Specifically, in Cantatore et al. [18] the phenomenological analysis of the European threat in the last 20 years has highlighted that the most dangerous and frequent events in uOAs are prevalently featured by the following:
  • Attacks in squares and streets (identified as Environmental class “F”) where public activities are present (pubs, museums) (Environmental class “B”) or representative and/or strategic buildings (Environmental class “D”).
  • Type of attacks (T) to maximize the relevance of the damages referring to the armed assault (identified as T2) and car-bombing (T3).
Moreover, starting from the same literature framework, the same work [18] has already discussed the set of indexes (properly codified) that describe the determinant macro-properties (see Table 1). Their factorization is discussed in the following sections.
Starting from such classification, all the indexes have been matched again with regulations and scientific literature in order to determine their relations with specific descriptors (K-types). For each K-descriptor, a formulation of calculation or assessment is introduced to be shared and validated with the panel of experts for the Delphi and AHP methods. Moreover, the formulation aims to simplify the matter, identifying specific features that are useful for translating indexing into quantitative characteristics. Descriptors and association with indexes are schematized in Figure 2, while a summary of their formulation is provided in Table 2. A detailed description of descriptors and indexes follows in subsequent sections.

3.2.1. Descriptors Affecting the Hazard Indexes

Previous studies on European terrorism events have underlined the main relevance of ideology based on the phenomenon. The concept of “target” includes the necessity for perpetrators to understand the attack objective to guarantee the goals and the significance of the attack. These results allow us to understand which elements or features may affect perpetrators in choosing a uOA or a specific component. As the main findings from the literature on the topic, the elements affecting choice are related to (i) the political, religious, and/or cultural symbolism of the place or its components in order to maximize media impact, also considering the resonance of the target type (target index); (ii) the possibility to maximize the effect in terms of the number of potential people involved as an indirect consequence of the uOA uses (use index); and (iii) the level of protection within or along the frontier of the area to attack (protection index) [18].

Target Index [H_I.1]

Considering the target index [H_I.1], the phenomenological analysis in the European continent has highlighted that an inherent level of proneness exists for each class of uses of urban spaces and buildings, particularly concerning the weapon type. In Cantatore et al. [18], the frequency of events for classes of uses and attack types was standardized focusing on “Environmental uses” classes to which a specific level of likelihood is associated. Thus, the following points are important to consider:
  • KENV is introduced as a descriptor of the statistical relevance of attacks for each environmental class combined with the attack in equivalent levels of likelihood, as already qualified in Cantatore et al. [18], with the following five levels: remote, unlikely, possible, likely and very likely classes. On the other hand, for similar classes of uses, the target choice can be associated with different levels of significance of places due to the political, social, cultural, and/or religious relevance [66,67].
  • KSYMB, as a descriptor of such features, may describe the variation in symbolic relevance of spaces; in fact, if some uOAs have a permanent (as inherent) symbolic significance for the institution and population, for others, the symbolic significance may be considered contingent on the presence of specific events [68]. For the description of this characteristic, five main classes can be introduced, ranging from negligible to very high symbolism classes.

Index of Uses [H_I.2]

As far as the Index of Uses [H_I.2] is concerned, the required descriptors for the “Hazard” have to discuss the attractiveness of the places, leaving the feature independent of the number of people involved. In fact, if the number of people affects the dimension of “Exposure” in risk assessment, the attractiveness of the real place influences the choice of place by perpetrators for soft or hard targets (Gordon Woo defines [4] it as “Inter-dependence and replacement of targets”). Specifically, the following points are important to consider:
  • The KTUR may be discussed for risk evaluation, as a descriptor of the inherent and potential reflection of representativeness of the place and the city. The touristic inflow usually correlates inhabitants to arrivals, and it may be considered at the city scale for annual, seasonal, or daily references, according to the primary nature of tourism. This is due to previous scientific outcomes in studying the interrelation between the touristic inflow and violent acts, even if their discussion has economic and political reflections [69,70,71].
  • KUSE describes the standard use of the uOA and a single SoR. In fact, alongside the external level of attractiveness of places, the inherent vulnerability of uOAs and their sub-parts (SoRs) to attacks by perpetrators should also consider their use by inhabitants. Some daily conditions of use derived by the nature of the place (e.g., rendezvous points for people) and the use of buildings that border the uOA may also alter the potential level of assault, considering the daily variation (nocturnal, diurnal, evening).
For both descriptors, any normative requirements and ranges exist at the European scale; thus, a system of classes is considered, describing qualitatively the touristic intensity and use of places (Table 2).

Prevention Index [H_I.3]

Finally, focusing on the prevention index [H_I.3], the main significance is related to the presence of prevention strategies or solutions. As it is fully argued in the literature about the theme, the choice of place also depends on the fulfillment capability, according to the meaning and differences between hard and soft targets. In addition, as Quagliarini et al. [12] recently summarized, such solutions must be related to the attack type to consider their efficaciousness. In fact, as their main results, the review of major guidelines in documenting the compatibility and efficacy of preventive solutions, such as remote control, direct/local control, video surveillance, and innovative systems (i.e., face-detecting videos [72]) are recognized as efficient control along the boundaries of uOAs for the T2 attack type; on the other hand, innovative systems, reinforced urban furniture, barriers and bollards for the T3 attack type (see Table 2) [73]. Thus, a quantitative descriptor of the prevention index, such as KCON, should be introduced to describe the presence and the number of protective systems for each possible access point. This involves comparing Zi, the number of effective protective systems, to the maximum number of systems (Zeff = 4) for each access of uOAs and each attack type analyzed in the present study (T2 and T3) (Table 2).

3.2.2. Descriptors Affecting the Vulnerability Indexes

Three major indexes are identified for Vulnerability (Table 1). When the analysis is focused on this determinant, the discussion relates to the main elements or features, which are independent of the perpetrator’s will; however, these elements describe the inherent propensity of exposed uOAs to suffer adverse effects when impacted by hazardous events. In detail, the analysis of the Vulnerability aspects of uOAs highlights three main features: (i) the geometric shape of spaces that may affect the potential of the arms (index of shape), (ii) the inherent capacity of places to be accessed by perpetrators (accessibility index), and (iii) the presence of sub-areas or places that can locally increase the crowd levels independently from the main use of places and buildings along the borders (obstacle index).

Index of Shape [V_I.1]

Specifically regarding the shape of BE [V_I.1], the main correlation to the literature is related to the dimension of places and the means of the attack, requiring two factors to assess KSHP.
  • The first factor qualifies the extension of the uOA (fEXT) coherently with the ratio between its perimeter (2P) and area (A) extension, which usually describes the similarity between polygons. As in the other previous cases, five ranges of values are introduced, following the results of [35] (see Table 2).
  • Discussing the relationship between the shape of uOA and T2 and T3 attack types, prevalent differences are recognized in the weapon classes: centralized or in movement [74]. All the weapons in T2 (armed assault) can be categorized as “centralized” arms, where the capacity for an attack is related to the maximum achievable distance of cold steel or firearms, including gunshots/ thrown weapons within a 360° range. While considering T3, the focus is on the vehicle that moves into the uOA excluding the possible range of associated arms (e.g., for car bombing). In this case, the ability to achieve and sustain high speeds during motion is a key feature of significance for vehicles [73,75]. Due to that, the index of shape describes the geometric employing the shape factor (fSHP) that relates the width and the length of the places according to the following ratio:
fSHP = f(w/l)
However, three classes of geometric shapes can be determined in qualitative ranges, as properly described for open areas in Rosso et al. [35], where fSHP < 0.7 describes elongated or very elongated shapes, while fSHP > 0.7 I is used for compact ones.
The relationship between the value of the shape factor and the associated index is influenced by their interactions with the weapon types. Specifically, for centralized attacks, elongated and very elongated spaces reflect high levels of Vulnerability when exposed to attacks involving moving vehicles [73], while the effect is the opposite when the weapon is centralized. In that sense, for both morphology classes, KSHP is considered either non-influential or influential in terms of Vulnerability, assuming specific coefficients (see Table 2).

Accessibility Index [V_I.2]

Following the assessment of uOA Vulnerability, the second geometric feature is place accessibility [V_I.2]. In this case, the focus is centered on the possibility of the perpetrator accessing the places, thus the index may describe the intrinsic capacity of accesses to facilitate entrance. In this case, two main factors are found to describe the property:
  • The physical and geometric accessibility of the perimeter of BE as inherent features for continuous or discontinuous fronts, called KPER (perimeter factor). It correlates specific values to the ratio (r) between the sum of the width of entrances (Avi) and the total perimeter (2P) of squares. Specifically, r values may vary within the limits of 0 (enclosed places) and 1 (open places), even though no major classifications are found in the literature for European uOAs.
  • The accessibility to uOAs considers the width of entrances, the urban mobility features, and the presence of physical elements along the entrances, described as KACC. In detail, it should consider the width (Avi) and the accessibility level (fACC) of the i-entrance, properly assessed according to the attack types. Specifically, for T2 attack types, all the entrances can be considered always accessible due to the inherent significance of the entrance, while for T3 attacks, where perpetrators move in vehicles, ease of access is related to the possible levels of car accessibility, defined by urban regulation (e.g., traffic-restricted zone, hourly accessibility, …) or geometric restrictions.

Obstacle Index [V_I.2]

Finally, the third element assessed for the Vulnerability of uOAs is described by obstacles [V_I.3]. In detail, the attention is on the physical objects of uOAs that may influence meeting and temporal attractiveness in specific sub-areas. Sights, urban furniture, bar-covered terraces, geomorphological or physical discontinuities (i.e., stairs), and gardens may be considered. Their relevance is not related to the protection level but to the generated attractiveness, which may locally alter the general conditions of risk. For these purposes, all elements are assessed in terms of the number of obstacles, their extension, and the factor of influence as meeting points [75]. Specifically, the obstacle factor is determined considering the ratio between the extension of the i-th type of obstacle and the total surface area of obstacles in the uOA (di). This ratio is then multiplied by the associated relevance of each obstacle in terms of attractiveness influence (fINF), which is described as an increasing factor, an average increasing factor, or not influential (Table 2).

3.2.3. Descriptors Affecting the Exposure Indexes

Considering the discussion of the last risk determinant, the Exposure to terrorism threat in this study is centered on victims, excluding building damages, in line with the data available from events recorded in the GTD database [56]. The qualification of elements that affect exposure in the risk assessment is carried out focusing on the properties that may affect the events before and during the event, overlooking the behavioral response of the people involved and the emergency phase (post-traumatic event). According to the summary in Table 1 and in line with the results discussed in previous studies [12,18], the number of people involved (including victims and the injured) may be considered as a consequence of (i) the attack type as the phenomenology has underlined, (ii) the number of bystanders in the place, and (iii) the presence of protective elements. Besides these elements, three descriptors have been identified and quantified, translating the reference indexes in Table 1.

Attack Index [E_I.1]

When the discussion is centered on the attack type [E_I.1], the focus is on the potential level of people in relation to recurrent boundary conditions. As it is usually reflected by risk management, Exposure includes the level of damage resulting from the phenomenological analysis of previous events. For this study, the relevance of attack typologies in the determinant is related to the phenomenological analyses conducted by the authors. Specifically, in line with the descriptor of the environmental factor, the KATT (attack factor) is introduced to describe the effect of the weapon type. Specifically, for each attack type, KATT relates the statistical relevance of the impact for each combination of environmental classes (square F, SoR of bar or special buildings FB and FD respectively) and attack types, with the specific details on those discussed (T2 and T3). The quantification assigns a score (4 or 5) based on the consequence levels for the selected combination in [18].

Crowd Index [E_I.2]

As far as the possible effects are concerned (E_I.2), the Exposure class is also determined by the potential number of people that could be involved in the attack. The crowding index KCRW describes the possible impact related to the density of people in the open area or outside the public activities facing the open area, and it is properly assessed according to the technicians’ experience, in line with the qualitative ranges (see Table 2).

Index of the Attack Reaction [E_I.3]

Finally, “hide” and “run” represent two of the most recommended actions, consistent with several guidelines and norms regarding preventive actions at the national level [13,75]. The detail is on the effect of “obstacles” or “objects” that can participate in violent actions generating protective areas (positive effect) [76] or obstructing the possible evacuation (negative effect) [77]. In the first case, as reported in major national experiences, the physical object with high resistance and mass can be considered a “protective zone” for both T2 and T3 attacks. On the other hand, it was demonstrated that a system of urban furniture or objects can alter the flux, generating real obstacles during evacuation. It includes elements such as poles with chains, railings, benches, and planters, which are predominantly characterized by horizontal development. Single elements, such as trees, monuments, and bollards, may alter the flux [78]. Thus, the attack reaction [E_I.3] is focused on the potential impact on users’ reaction of the physical elements included in the uOAs from a static point of view. Instead, the impact of violent acts should consider the presence of countermeasures specifically fitted for the attack types in terms of users’ involvement, according to the results presented by Quagliarini et al. [12]. Here, the presence of coordination and evacuation plans, alarm systems, and suitable physical elements in supporting evacuation (evacuation paths that are narrow, with lighting to ensure a secure emergency exit) influence the emergency phase, limiting the final number of people involved. Thus, two main descriptors are introduced for the assessment of the related index (iREA):
  • KOBST(E), which describes the influence of «obstacles» and «objects» on the identified aims. Specifically, KOBST(E) has to consider their total extent in relation to that of the uOA (d), their shape or the final shape resulting from the replicability of individual elements in the spaces (vertical, horizontal, compact development) (fSHPob) and, finally, their influence on protection or evacuation (finf). Thus, KOST(E) should consider all the obstacles in the uOAs and determine a mean value for all the observed objects. Specifically, Table 3 shows the selected influence of obstacles’ shape in the process, consistent with the state of the art [12].
  • KCM describes the positive effect on the number of people involved due to the presence of countermeasures. In this case, the factor considers strategies that may influence the preparedness for emergency activities in terms of alarms and evacuation countermeasures (both for T2 and T3). Due to that, KCM has to consider the number of classes of countermeasures in the emergency phase present in the uOA (Wi) and the effective ones discussed in Quagliarini et al. (WEFF).

3.2.4. Final Remark for Assessing K-Factors and Indexes

Due to the complexity of qualifying all the elements, properties, and characteristics of places, some specifications were required, and they are discussed below.
The formulations concern both uOA and SoR for all the public and symbolic or strategic buildings facing the actual open areas. However, some K-factors require to be linked to one of them in accordance with some main principles:
  • Due to the inherent concept assumed in the study of uOA as a system of buildings, infrastructures, and open areas, KTUR, KCON, KSHP, KPER, KACC, KCM are calculated considering the overall uOA, even when describing a SoR. This is due to the overlapping classes of qualities described by the K-factors, which are usually pre-determined by the historical evolution (e.g., the morphology of the city and district) or external strengths (e.g., tourism, local norms).
  • The assessment of the SoR explicates its physical qualities when the K-factors describe properties related to their use or function (Kenv, Ksymb, KUSE, KATT, KCRW) or link properties and qualities to their position within the overall uOA. This is the case of obstacles that are discussed in terms of efficacy, shape, or influence when they are included in the perimeter of the SoR. Thus, all the SoR graphical details, starting from their perimeter, are necessary to support the formulation.

3.3. The Mathematical Structure of the Risk Determinants

After selecting and identifying factors that influence terrorist threats in uOAs, the nature of the indexes and descriptors varies in terms of the qualitative and quantitative discussions due to the complexity of the matter. However, some common points can be recognized in order to solve the qualitative–quantitative assessment. In detail, the following points should be considered:
  • Considering the relevance of the matter, some parameters cannot be related to specific ranges of values (KSHP, KPER). Others are related to classes of features that qualitatively describe their relevance (e.g., low, high) (KENV, KSYM KTUR, KUSE, KACC, KATT, KCRW, KOBST(E)). Due to that, all the descriptors are categorized into five classes of possible quantitative values, considering a range between 1 and 5, each associated with five possible qualitative classes.
  • When the descriptors are related to factors that constitute corrective properties, ranges of factors are introduced in three classes in order to address the absence of influential and non-influential factors, as well as the influence of corrective factors (KSHP, KOBST(E)).
  • All the descriptors related to the same index are considered independent and are combined for the index calculation as a product.
  • Due to the large variability of the results (in terms of maximum and minimum values), all the indexes are normalized in five ranges, considering the associated final values in terms of class, from 1 to 5. This structure supports the limitation of results and their control in the overall process.
  • All the values are conceived in order to exclude the zero value. This is fundamental to solving the undetermined ratios and excluding the zero value for the final risk triad (the minimum value of risk is 1).
As far as the final formulation is concerned, and consistent with the general rules, the terrorist risk for uOAs is structured as the product of three determinants. Each is calculated as the sum of all the indexes properly weighted (w), and it is evaluated for each attack type (T2 and T3), following Equation (3) and the detailed equations (Equations (4)–(6)).
R(T-type(F.Fb,Fd)) = H(T-type(F.Fb,Fd)) × V(T-type(F.Fb,Fd)) × E(T-type(F.Fb,Fd))
HT-type(F.Fb,Fd) = ((iTRG × wTRG) + (iUse × wUse) + (iPREV × wPREV))/wTot
VT-type(F.Fb,Fd) = ((iSHP × wSHP) + (iACC × wACC) + (iOBST × wOBST))/wTot
ET-type(F.Fb,Fd) = ((iATT × wATT) + (iCRW × wCRW) + (iREA × wREA))/wTot
Moreover, all of them are calculated for actual open areas (square or street F) and each SoR (public or special buildings, Fb and Fd, respectively). This is due to the conceptualization of uOAs as a system of buildings, infrastructures, and unbuilt areas, where the interactions among the building/infrastructure uses and the uses of squares/streets are part of the SoRs (see Section 3.1) within the same uOAs distribution. In that sense, the conceptual extension of uOAs (Atot) has to consider the extent of all the SoRs, as well as that of the square/street (Equation (8)). Thus, the values of the determinants are calculated for both the square and each SoR (RF = HF × VF × EF; RFdi = HFdi × VFdi × EFdi; RFbi = HFbi × VFbi × EFbi), considering the ratio between single SoRs and Atot. Moreover, for each attack type, a final triplet and risk value (RuOAT-type) are introduced as the values of three determinants that need to be appropriately weighted to the area extension of F, SoRFB, and SoRFD. More specifically,
R u O A ( T 2 T 3 ) = H u O A × V u O A × E u O A = [ ( H F A F A t o t ) + i = 1 n H F b i A F b i A t o t + i = 1 m H F b i A F b i A t o t ] × [ ( V F A F A t o t ) + i = 1 n V F b i A F b i A t o t + i = 1 m V F b i A F b i A t o t ] × [ ( E F A F A t o t ) + i = 1 n E F b i A F b i A t o t + i = 1 m E F b i A F b i A t o t ]
where   A t o t = A F + i = 1 n A F b i + i = 1 m A F d i
Table 2 summarizes the K-parameters, formulations, and details used for setting up the formulation, applicable to the AHP and Delhi participatory methods. Specifically, detailed references to the literature and normative are reported when the classes or values are already present; in all the other cases, the formulations are derived; in this latest case, they are reorganized for work purposes, reporting them in the participatory validation process (Section 4).

4. Influence Factors and Weighting with Participatory Methods

The indexes and descriptors are submitted to a pool of participants which includes the following:
  • Eight master’s degree students involved in studying the terroristic phenomenon in Europe.
  • Seven European academics with experience in resilient and secure cities.
  • Two experts in participatory methods applied to architectural built environment issues (static failure, preventive maintenance).
  • Four public policymakers involved in the management of security for big events.
The participants were engaged online to explain the main goal of the questionnaire. However, they were equipped with a set of general information related to the goal of setting up the algorithm before answering the questionnaire.

4.1. Validation of Influencing Factors and Formulation

In accordance with the described method, three levels of detail are required to the participants (Table 4).
  • The first and second levels ensure that the indexes and K-types comply with the selected risk determinant and the associated index, respectively. In these phases, the Delphi method follows the “Consensus” goal.
  • The third level aims at the acceptability of formulation and ranges for each K-type. Acceptability is measured by “Yes” or “Not” answers, and a field for comments is included.
The results of the first and second rounds of consensus met a higher level of acceptability in the first round of the Delphi surveys, both in assigning indexes to the risk determinants and in the association of K-descriptors to indexes.
The third level was addressed in two rounds due to recurrent notes about the ranges. Specifically, KCRD, despite reaching an acceptability rate in the round (CRV > 0.5), saw more than half of the participants propose the use and association of standard ranges of values with the qualitative classification, highlighting the opportunity to resolve the issue using normative details. A new classification was determined for the selected K-type, including the opportunity to use national ranges to manage crowding events for KCRD.

4.2. Quantification of Factor Relations in the Determinant Calculation

In accordance with the AHP procedures, the participants were invited to determine the final weight of indexes. The choice of the weight of indexes instead of K-parameters results from the necessity to provide an easier way to solve the algorithm and, above all, to understand the major results of the participatory approach. Moreover, in accordance with Equations (2)–(4), the weights are assessed considering single determinants, thus comparing three indexes for time. This is due to the necessity to consider independent Hazard, Vulnerability, and Exposure determinants in alignment with the goals of the work. The final weights for each index and the associated CR values are summarized in Table 5.
Regarding the comparison of participatory methods, consistent opinions can be highlighted at the end of the procedure, supporting the coherence and the structure of the applied method:
  • The concurrence between the higher values of CRV parameters for K-types and the weight of the associated index. This is the case of the target and accessibility indexes, where both the CRV values associated with K-parameters showed higher values.
  • The relevance of major details about the crowding index in determining the most coherent formulation and the associated final weight of the index.
In both cases, the participants demonstrated a clear and coherent perception of key elements and features to be considered. Similarly, a good alignment with the review research conducted as the foundation of the work can be highlighted.

5. Numerical and Theoretical Test and Validation of the Algorithm

The last phase of the work involves algorithm testing to validate the participatory results and the suitability of the elements parametrized, thus testing them.
In order to exploit the calculation tool in accordance with national details, the algorithm was processed for 22 Italian cases, providing different levels of peculiarities, both in symbolicity and time of use. Table 6 summarizes the case studies in accordance with the main conditions and the elements for discussion. More details about FB and FD and SoRs extensions are detailed in Appendix A.
Data gathering involved using Google Maps details (through Google Earth Pro v.7.3.6.9796 using images ©2023Google, Airbus Maxer Technologies) in order to provide compatible and homogeneous data. Daily uses and opening times were also gathered using Google Maps details. The use of these details helps in overcoming the regional variability of the data available in vectorial maps (such as GIS data), which may determine local variability when considering the physical objects in the case studies. Finally, due to the variety of physical elements within the analyzed OAs, two main conditions were considered for the algorithm testing: with (S) and without mitigative (NS) strategies. The higher political and religious relevance of some case studies (Milano, Roma, Venezia) has already moved policymakers to introduce physical solutions aiming at increasing the local security of the places. As part of this study, the algorithm was also tested for the assessment of strategies by means of the global risk calculation, in accordance with Equation (7).
Table 7 summarizes the results of all the cases, highlighting the distribution of risk determinants for the environmental classes involved (F, Fb, and Fd), in accordance with their extensions, for both attack types (T2—armed assault, T3—car bombing attack). The mathematical application across several case studies has not established limitations, it solves all the queries, and shows the expected results for most representative and symbolic Italian case studies. This is due to the relevance of both Hazard and Exposure in relation to the places, resulting from the weighted average of SoRs and square extensions. However, additional observations can be noted:
  • Considering the variation in risk values for the S and NS cases, the algorithm provided sufficient variations for assessing the presence of physical mitigative or protective strategies. However, in compliance with the gathered data, all the elements aim to reduce the Vulnerability of a place to external attacks (car bombing in movement). In that sense, the reduction affects the Vulnerability values (see the case of Milano and Roma) as a consequence of the physical reduction in the accessibility of openings.
  • When provincial case studies are assessed (Trani, Ostuni, Narni), the algorithm returns medium values for the actual state of the places. This is due to the inherent critical features (morphology, accessibility, lower level of protection) rather than the symbology or attractiveness of the places.
  • Minor case studies, such as Corato, San Gemini, and Caldarola, reflect minor risk values, as a consequence of the combination of lower levels of attractiveness and symbology of places, combined with variable values of Vulnerability and Exposure.
In addition to the mathematical significance reached, these results also align with the main principle of the terrorism phenomenon in classifying hard and soft targets, as introduced by Gordon Woo [4]:
  • Protective strategies are independent of the Hazard of places when describing hard targets. Considering the most relevant case studies (Milano, Roma, Napoli, Venezia), the algorithm describes them as hard targets where the violent acts require operative resourcefulness both in planning and executing; in fact, despite the higher symbolicity of places and the high level of protection achieved in the squares, Hazard still maintains superior values, in the range [4 or 5]. This is in accordance with the weights assigned to the target and the protection indexes (0.60 and 0.31, respectively) in the Hazard assessment. On the other hand, the strategies reflect positive effects on reducing the overall risk values, having effects on Vulnerability as the main descriptor of the inherent physical criticalities of places.
  • Protective strategies affect the Hazard value of places when the soft targets are assessed. Consistent with the definition of “soft target”, the occurrence of events may increase due to the lower level of protection of places, allowing for their replicability. In that sense, the weights assigned to the target and protection indexes are well calibrated, particularly in describing soft targets. This allows for the description of the strategies’ effect on reducing both the Hazard and inherent Vulnerability of places.

6. Discussion of Results from the Risk Assessment to Its Control and Management

In accordance with the results discussed in the previous section, the 5-point scales of the Hazard, Vulnerability, and Exposure determinants are translated into qualitative meaning in order to support coherent and intelligible discussions of numerical results. Table 8 summarizes the classes and the qualitative meaning assigned.
These classes of significance are thus merged with previous results in reading soft and hard targets, as well as with the terroristic principles in terms of result maximization, and three main recurrences can be enunciated:
  • Hard targets belong to the higher class of Hazard (likely), exploiting the higher value of damage (E critical).
  • Soft targets fit within all the other classes of Hazard (unlikely and probably), varying for all the other determinant classes.
  • Due to the lower significance of places (H unlikely) and the lower potential effects (E minor), soft targets do not require any specific measures regarding terroristic attack risks. They are assumed to be negligible due to the lower attractiveness and efficacy of violent events, assuming that Vulnerability is an independent factor.
Due to these results, the risk management of the terrorist phenomenon can be solved by introducing and discussing three classes of risk typologies of real places as the combination of Hazard and Exposure. Moreover, considering Hazard as the determinant to describe a place’s proneness to violent acts, Vulnerability and Exposure are discussed in terms of the degree of danger, combining the potency of damage and the intrinsic vulnerabilities of places. These are thus combined to determine equivalent classes of actions to support risk reduction in real places. Table 9 sums up the results in degrees of danger and classes of risk, combining the typologies of soft/hard targets. Figure 3 shows the expanded matrices for four combinations of the same classes of targets.
In more detail, besides the operative benefit of understanding the proneness to a single risk of uOAs, some possible goals can be reached:
  • The comprehension of the possible critical points of the place can support the analysis of behavior during the emergency, matching the geometric and physical properties of the place to the users’ movements, while also assessing mitigative strategies introduced for the reduction of pre-emergency phase, toward a more comprehensive behavioral–physical-based approach for emergencies [79,80].
  • Considering an asynchronous multi-risk perspective, recognizing critical points vulnerable to harm in uOAs, and designing and assessing physical transformations of the place to reduce susceptibility to terrorism offer the opportunity to evaluate the resilience of such strategies in other risk occurrences. The inherent double relationship between the protective and obstructing features of the physical objects in the area may affect emergency conditions for other sudden threats (e.g., earthquakes). In that sense, the design of mitigative and protective solutions may consider all the possible hazards in uOAs, taking advantage of behavior analysis for emergency planning [64,81].
  • Considering a synchronous multi-risk perspective, the identification of critical points vulnerable to harm can be correlated with the local distribution of people when external pressures occur, such as heatwaves. Here, the slow nature of natural events may affect the local re-distribution of users within the uOAs, altering the local crowd density and shifting potential point of attacks, as well as affecting user behavior [82].
All these advantages are strictly related to the qualitative approach at the basis of the formulation, which became fundamental in describing a human-based phenomenon. At the same time, some limitations can be expressed.
First of all, it is necessary to test the results related to previous events in order to calibrate the quality of the data. This includes discussing the effects of an event before and after the application of mitigative strategies. However, this can be achieved by including a more comprehensive structure of results that includes the users’ movements. On the other hand, this requires that the location has experienced the same type of attack in the same place, which constitutes a significant limitation.
Another limitation of the analysis is related to the independence of the human dimension of the perpetrators. The proposed analysis is centered on the built environment aligning with the aim of the work and addressing the perpetrator’s actions during a violent act may change the final riskiness of the place.
The setup of the discussed algorithm for squares concerns a specific matter, compared to the general phenomenon. This is in line with most of the previous studies found in the literature that tried to solve specific problems in cities exposed to these violent acts. In accordance with European regulations [36,37,38], all these fields of application require direction toward a common method to first measure the risk and then assess the overall resilience level of cities. The application of a standardized method to assess terrorist risk and the use of a set of parameters to describe and evaluate elements in the scenarios may allow for the complexity of resolving the overall general threat, combining new parameters and re-weighting them within a broader collaborative effort.

7. Conclusions

In this work, European theories on the terrorism phenomenon, normative experiences, and phenomenological results about violent acts in urban open and public places (uOAs) are combined to determine a simplified risk matrix for qualifying this urban built environment prone to terrorism. The matrix of risk, properly defined to describe uAOs as either soft or hard targets, resulted from the assessment of the elements (objects and obstacles, buildings, accesses) and properties (functions, geometry, symbolism) that usually feature the real urban built environment, in accordance with city development and urban relevance (political, religious, …). Such properties, qualities, and deficiencies, both quantitative and qualitative, are translated into descriptors (K-descriptors) by merging scientific and normative experiences to provide a limited number of factors for the study of the real uOAs. The nine K-descriptors, properly identified in formulation and meaning, were discussed for compliance with the three determinants of risk (Hazard, Vulnerability, and Exposure) and shared with the external judges through a participatory method. All the experts involved in the AHP process were coached in the thematic study, presenting previous findings, i.e., the relevance of uOA within the European phenomenon, and the classes of mitigative and preventive strategies. Specifically, the coherence with the determinants and formulations is first assessed using the Delphi method. Then, the K-determinants were evaluated using an AHP process to determine the main relevant ones. The main result of the participatory process is the higher relevance of three main properties: the symbolism of place and its level of protection (target index), which affect the Hazard dimension of the risk, the level of accessibility (accessibility index) for the Vulnerability of the place, and the crowding level for the standard use of the space for the Exposure dimension (crowding index).
The testing phase of the mathematical algorithm on a wider set of case studies in Italy supported the validation of the tool, as well as its potentialities, both in testing possible mitigation strategies and in classifying real case studies as soft and hard targets. In fact, the determination of a formulation as a triad of determinant values allows us to control their variation as single factors and thus to understand the possible effectiveness of space transformation in terms of reduction in inherent vulnerabilities, increasing protection to reduce the likelihood of events, or increasing the users’ protection when exposed to the threat.
Finally, the use of SoRs to translate the interferences and inter-relationships between square/street—as physical open areas—and the function of buildings facing these open and public places offer the opportunity to study the actual urban open area as a system of infrastructures, buildings, and uses. This is compliant with the recent studies on the phenomenon in Europe, where the proneness of public places and public buildings to violent actions influences perpetrator choice. In that sense, the physical delimitation of SoR/s within the uOA and their qualification in terms of risk can support the identification of major critical parts of uOAs where violent actions can be perpetrated. This provides the setup for coherent and efficient evacuation plans, going beyond the assessment of the pre-emergency phase toward the resolution of the emergency one, in accordance with the BE S2ECURe project of which this study is part.

Author Contributions

Conceptualization, F.F. and E.C.; methodology, F.F. and E.C.; validation, E.Q. and F.F.; investigation, E.C.; resources, E.C.; data curation, E.C.; writing—original draft preparation, E.C.; writing—review and editing, F.F. and E.Q.; visualization, E.C.; supervision, E.Q. and F.F.; project administration, E.Q.; funding acquisition, E.Q. and F.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the MIUR (the Italian Ministry of Education, University, and Research) Project BE S2ECURe—(make) Built Environment Safer in Slow and Emergency Conditions through behavioral assessed/designed Resilient solutions (Grant number: 2017LR75XK).

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to thank all the people involved in the gathering of data for the assessment of Italian case studies, Federica Cassano, Salvatore Anastasia, Marco Martucci, Sonia Debenedittis, Elisabetta Pietricola during their research for the master’s thesis at the Politecnico di Bari.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Table A1. Details of the analyzed squares, considering the position and extension of the SoRs for Fb, Fd, and all physical elements within the place.
Table A1. Details of the analyzed squares, considering the position and extension of the SoRs for Fb, Fd, and all physical elements within the place.
Case StudyCoordinates
Milano—Piazza del Duomo45°27′51.34″ N, 9°11′22.41″ E
Heritage 07 00251 i006
Napoli—Piazza del Plebiscito40°50′8.97″ N, 14°14′54.90″ E
Heritage 07 00251 i007
Roma—Piazza San Pietro41°54′8.01″ N, 12°27′25.78″ E
Heritage 07 00251 i008
Venezia—Piazza San Marco45°26′2.59″ N, 12°20′17.88″ E
Heritage 07 00251 i009
Corato (BA)—Piazza Sedile41° 9′7.94″ N, 16°24′44.00″ E
Heritage 07 00251 i010
Matera—Piazza Vittorio Veneto40°40′1.19″ N, 16°36′22.86″ E
Heritage 07 00251 i011
Ostuni (BR)—Piazza della Libertà40°43′55.55″ N,17°34′41.72″ E
Heritage 07 00251 i012
Trani (BAT)—Piazza Duomo, Piazza Re Manfredi41°16′55.31″ N, 16°25′2.67″ E
Heritage 07 00251 i013
Narni (TR)—Piazza dei Priori42°31′10.31″ N, 12°30′55.51″ E
Heritage 07 00251 i014
Caldarola (MC)—Piazza Vittorio Emanuele II43° 8′17.22″ N, 13°13′34.04″ E
Heritage 07 00251 i015
Catania—Piazza Università37°30′13.08″ N, 15° 5′13.74″ E
Heritage 07 00251 i016
Genova—Piazza delle Vigne44°24′34.46″ N, 8°55′52.36″ E
Heritage 07 00251 i017
Parma—Piazza del Duomo44°48′12.69″ N, 10°19′49.65″ E
Heritage 07 00251 i018
Monza—Piazza Trento e Trieste45°35′1.32″ N, 9°16′24.57″ E
Heritage 07 00251 i019
Perugia—Piazza IV Novembre43° 6′43.88″ N, 12°23′20.17″ E
Heritage 07 00251 i020
Pavia—Piazza del Duomo45°11′5.57″ N, 9°9′10.10″ E
Heritage 07 00251 i021
Padova—Piazza delle Erbe45°24′24.99″ N, 11°52′30.73″ E
Heritage 07 00251 i022
Reggio Calabria—Piazza Duomo38° 6′21.10″ N, 15°38′29.40″ E
Heritage 07 00251 i023
Cagliari—Piazza Palazzo39°13′9.91″ N, 9° 6′59.87″ E
Heritage 07 00251 i024
L’Aquila—Piazza Duomo42°20′56.38″ N, 13°23′53.27″ E
Heritage 07 00251 i025
Ancona—Piazza del Plebiscito43°37′10.62″ N, 13°30′41.70″ E
Heritage 07 00251 i026
San Gemini (TR)—Piazza San Francesco42°36′47.88″ N, 12°32′46.47″ E
Heritage 07 00251 i027
Table A2. Examples of obstacles in case studies classified according to classes introduced in Table 2. All images are extracted from Google maps spherical images.
Table A2. Examples of obstacles in case studies classified according to classes introduced in Table 2. All images are extracted from Google maps spherical images.
IconExamples and Locations
Heritage 07 00251 i028Heritage 07 00251 i029Heritage 07 00251 i030Heritage 07 00251 i031
Lampposts, trees, and bollards in Piazza Duomo—Reggio CalabriaLampposts in Piazza Duomo—L’AquilaLampposts in Piazza Trento e Trieste—Monza
Heritage 07 00251 i032Heritage 07 00251 i033Heritage 07 00251 i034Heritage 07 00251 i035
Loggia in Piazza del Duomo—PaviaFlowerpots in Piazza
Sedile—Corato (BA)
Loggia around Piazza San Marco—Venezia
Heritage 07 00251 i036Heritage 07 00251 i037Heritage 07 00251 i038Heritage 07 00251 i039
Equestrian Statue of Vittorio Emanuele II in Piazza Duomo- MilanoCovered bar terrace in Piazza dei Priori—
Narni (TR)
Fountain in the center of
Piazza IV Novembre—
Perugia
Heritage 07 00251 i040Heritage 07 00251 i041Heritage 07 00251 i042Heritage 07 00251 i043
Perimetral bollards in Piazza San Pietro—RomaPark Areas in Piazza Duomo, Piazza Re
Manfredi—Trani (BAT)
Dense bollards line in Piazza delle Vigne—
Genova
Heritage 07 00251 i044Heritage 07 00251 i045Heritage 07 00251 i046Heritage 07 00251 i047
Stairs within Piazza della Libertà—Ostuni (BR)Stairs in front of the
cathedral in Piazza del Plebiscito—Ancona
Stairs in front of
Prefettura in Piazza
Palazzo—Cagliari

References

  1. Bonti, A.; Lijtenstein, C. Reflections on the destruction of memory. Operations towards the recovery of the voluntarily destroyed architecture between the XX and XXI centuries. An. Investig. En Arquit. 2020, 10, 95–117. [Google Scholar] [CrossRef]
  2. Al-Azm, A. The Threat to Cultural Heritage in Times of Conflict and Its Dynamic Relationship with Gulf Society. In Social Change in the Gulf Region: Multidisciplinary Perspectives; Gulf Studies; Springer: Singapore, 2023; Volume 8, pp. 271–286. [Google Scholar] [CrossRef]
  3. Nanninga, P. “Cleansing the Earth of the Stench of Shirk”: The Islamic State’s Violence as Acts of Purification. J. Relig. Violence 2019, 7, 128–157. [Google Scholar] [CrossRef]
  4. Woo, G. Understanding the Principles of Terrorism Risk Modeling from Charlie Hebdo Attack in Paris. Def. Against Terror. Rev. 2015, 7, 33–46. [Google Scholar]
  5. von Schorlemer, S. Fighting Terrorist Attacks against World Heritage–An Integrated Approach. In 50 Years World Heritage Convention: Shared Responsibility–Conflict & Reconciliation; Springer International Publishing: Cham, Switzerland, 2022; pp. 201–213. [Google Scholar] [CrossRef]
  6. Green Martínez, S. UNESCO Declaration Concerning the Intentional Destruction of Cultural Heritage (2003). In Encyclopedia of Global Archaeology; Springer International Publishing: Cham, Switzerland, 2018; pp. 1–6. [Google Scholar] [CrossRef]
  7. UNESCO Declaration Concerning the Intentional Destruction of Cultural Heritage (Doc. 32 C/Res. 33); 2003. Available online: https://unesdoc.unesco.org/ark:/48223/pf0000133874#:~:text=For%20the%20purposes%20of%20this,humanity%20and%20dictates%20of%20public (accessed on 1 July 2024).
  8. Council of Europe. Council of Europe Convention on the Prevention of Terrorism; Council of Europe Pub.: Strasbourg, France, 2005; ISBN 9287157626. [Google Scholar]
  9. Kedziorek, A.; Jakubowski, A. The Role of the European Union in Combatting the Illicit Trafficking of Cultural Objects-Towards a New Action Plan. Santander Art Cult. Law Rev. 2021, 7, 13–20. [Google Scholar] [CrossRef]
  10. Rosén, F. The Dark Side of Cultural Heritage Protection. Int. J. Cult. Prop. 2020, 27, 495–510. [Google Scholar] [CrossRef]
  11. European Commission. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. Action Plan to Support the Protection of Public Spaces; European Commission: Brussels, Belgium, 2017. [Google Scholar]
  12. Quagliarini, E.; Fatiguso, F.; Lucesoli, M.; Bernardini, G.; Cantatore, E. Risk Reduction Strategies against Terrorist Acts in Urban Built Environments: Towards Sustainable and Human-Centred Challenges. Sustainability 2021, 13, 901. [Google Scholar] [CrossRef]
  13. Ministère de l’Intérieur, Ministère de la Culture et de la Communication; Secrétariat Général de la Défense et de la Sécurité Nationale. Gérer La Sureté et La Sécurité Des Événements et Sites Culturels; 2017. Available online: https://www.culture.gouv.fr/Media/Actualites/Autres-dossiers/Plan-vigipirate/Gerer-la-surete-et-la-securite-des-evenements-et-sites-culturels (accessed on 1 July 2024).
  14. Counter Terrorim Policing (UK) Action Counter Terrorism (ACT). Available online: https://act.campaign.gov.uk/ (accessed on 18 April 2020).
  15. Coaffee, J.; O’Hare, P.; Hawkesworth, M. The Visibility of (in) Security: The Aesthetics of Planning Urban Defences against Terrorism. Secur. Dialogue 2009, 40, 489–511. [Google Scholar] [CrossRef]
  16. Coaffee, J. Beyond Concrete Barriers Innovation in Urban Furniture and Security in Public Space; GCDN Commissioned Research, Ed.; Global Cultural Districts Network: London, UK, 2018. [Google Scholar]
  17. Coaffee, J.; Bosher, L. Integrating Counter-Terrorist Resilience into Sustainability. Proc. Inst. Civ. Eng. Des. Plan. 2008, 161, 75–83. [Google Scholar] [CrossRef]
  18. Cantatore, E.; Quagliarini, E.; Fatiguso, F. European Cities Prone to Terrorist Threats: Phenomenological Analysis of Historical Events towards Risk Matrices and an Early Parameterization of Urban Built Environment Outdoor Areas. Sustainability 2022, 14, 12301. [Google Scholar] [CrossRef]
  19. Hunt, K.; Agarwal, P.; Zhuang, J. On the Adoption of New Technology to Enhance Counterterrorism Measures: An Attacker–Defender Game with Risk Preferences. Reliab. Eng. Syst. Saf. 2022, 218, 108151. [Google Scholar] [CrossRef]
  20. Pressman, D.E.; Davis, N. Violent Extremism Risk Assessment and Screening Analysis: Applicability, Challenges, and New Developments. J. Polic. Intell. Count. Terror. 2022, 17, 301–313. [Google Scholar] [CrossRef]
  21. Bridgelall, R. Using Artificial Intelligence to Derive a Public Transit Risk Index. J. Public Transp. 2022, 24, 100009. [Google Scholar] [CrossRef]
  22. Hussin, S.; Alkaff, S.H.B.O. The Los Angeles Model in Deradicalisation. In Terrorist Deradicalisation in Global Contexts: Success, Failure and Continuity; Routledge: Abingdon, UK, 2019; pp. 197–208. [Google Scholar]
  23. Höffler, K.; Meyer, M.; Möller, V. Risk Assessment—The Key to More Security? Factors, Tools, and Practices in Dealing with Extremist Individuals. Eur. J. Crim. Policy Res. 2022, 28, 269–295. [Google Scholar] [CrossRef]
  24. Huang, J.; Zhang, X. Risk Assessment of Regional Violent Terrorist Attacks in Southern Xinjiang. China Saf. Sci. J. 2022, 32, 192–199. [Google Scholar]
  25. Zhu, R.; Hu, X.; Li, X.; Ye, H. A Personalized and Practical Method for Analyzing the Risk of Chemical Terrorist Attacks. IEEE Access 2020, 8, 81711–81723. [Google Scholar] [CrossRef]
  26. Mullerova, J.; Nemec, V. Risk Analysis of Chemical Hazard Affecting the Air Quality in Pezinok District. In Proceedings of the International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM, Albena, Bulgaria, 28 June–7 July 2019; Volume 19, pp. 273–278. [Google Scholar]
  27. Liu, J.; Piegorsch, W.W.; Grant Schissler, A.; Cutter, S.L. Autologistic Models for Benchmark Risk or Vulnerability Assessment of Urban Terrorism Outcomes. J. R. Stat. Soc. Ser. A Stat. Soc. 2018, 181, 803–823. [Google Scholar] [CrossRef] [PubMed]
  28. Fischer, K.; Hiermaier, S.; Riedel, W.; Häring, I. Morphology Dependent Assessment of Resilience for Urban Areas. Sustainability 2018, 10, 1800. [Google Scholar] [CrossRef]
  29. Sitnikova, O.; Melnyk, A. Development of the Algorithm to Assess Vulnerability of Radiation Sources. Nucl. Radiat. Saf. 2022, 1, 71–76. [Google Scholar] [CrossRef]
  30. Westbrook, T.; Schive, T. Urban Security and Counterterrorism: An Approach to Proportionality. J. Strateg. Secur. 2021, 14, 70–85. [Google Scholar] [CrossRef]
  31. Moghaddam, A.; Afsharnia, M.; Peirovi Minaee, R. Preparing the Optimal Emergency Response Protocols by MOPSO for a Real-World Water Distribution Network. Environ. Sci. Pollut. Res. 2020, 27, 30625–30637. [Google Scholar] [CrossRef]
  32. Garzia, F. New Security Risk Assessment and Genetic Algorithms Based Methods to Optimize Risk Reduction Countermeasures for Cultural Heritage Sites. Int. J. Comput. Methods Exp. Meas. 2023, 11, 45–54. [Google Scholar] [CrossRef]
  33. Garzia, F. Novel risk assessment methodology for cultural heritage sites. In Proceedings of the WIT Transactions on the Built Environment; Hernández, S., Marseglia, G., Eds.; WIT Press: Southampton, UK, 2021; Volume 203, pp. PI149–PI160. [Google Scholar]
  34. D’Amico, A.; Russo, M.; Bernabei, L.; Angelosanti, M.; Cantatore, E.; Bernardini, G.; Fatiguso, F.; Salvalai, G.; Mochi, G.; Quagliarini, E.; et al. A Survey Form for the Characterization of the Historical Built Environment Prone to Multi-Risks. Riv. TEMA 2022, 8, 77–88. [Google Scholar] [CrossRef]
  35. Rosso, F.; Bernabei, L.; Bernardini, G.; Russo, M.; Angelosanti, M.; Currà, E.; Quagliarini, E.; Mochi, G. Urban Morphology Parameters towards Multi-Risk Scenarios for Squares in the Historical Centers: Analyses and Definition of Square Typologies and Application to the Italian Context. J. Cult. Herit. 2022, 56, 167–182. [Google Scholar] [CrossRef]
  36. Poljanšek, K.; Casajus Valles, A.; Marin Ferrer, M.; De Jager, A.; Dottori, F.; Galbusera, L.; Garcia Puerta, B.; Giannopoulos, G.; Girgin, S.; Hernandez Ceballos, M. Recommendations for National Risk Assessment for Disaster Risk Management in EU; Publications Office of the European Union: Luxembourg, 2019. [Google Scholar]
  37. The United Nations Office for Disaster Risk Reduction (UNISDR). National Disaster Risk Assessment; UNDRR: Geneva, Switzerland, 2017. [Google Scholar]
  38. European Commission. Risk Assessment and Mapping Guidelines for Disaster Management; European Commission: Brussels, Belgium, 2010. [Google Scholar]
  39. Monahan, J. The Individual Risk Assessment of Terrorism. Psychol. Public Policy Law 2012, 18, 167–205. [Google Scholar] [CrossRef]
  40. Ruiz Estrada, M.A.; Koutronas, E. Terrorist Attack Assessment: Paris November 2015 and Brussels March 2016. J. Policy Model. 2016, 38, 553–571. [Google Scholar] [CrossRef]
  41. Paton, D.; Violanti, J.M. Terrorism Stress Risk Assessment and Management. In Psychology of Terrorism; Bongar, B., Brown, L.M., Beutler, L.E., Breckenridge, J.N., Zimbardo, P.G., Eds.; Oxford University Press: New York, NY, USA, 2007; pp. 225–246. [Google Scholar]
  42. Stewart, M.G. Terrorism Risks and Economic Assessment of Infrastructure Protection against Progressive Collapse. J. Struct. Eng. 2021, 147, 4021165. [Google Scholar] [CrossRef]
  43. Crichton, D. The Risk Triangle. Nat. Disaster Manag. 1999, 102, 102–103. [Google Scholar]
  44. Hagenlocher, M.; Thieken, A.; Schneiderbauer, S.; Ayerbe, I.A.; Dobes, P.; Donovan, A.; Morsut, C.; Paris, N.; Pedoth, L.; Tonmoy, F. Risk Assessment. In Science for Disaster Risk Management 2020: Acting Today, Protecting Tomorrow; Publications Office of the European Union: Luxembourg, 2020; pp. 54–65. [Google Scholar]
  45. Saulnier, D.; Dixit, A.; Nunes, A.; Murray, V. Disaster Risk Factors–Hazards, Exposure and Vulnerability. In WHO Guidance on Research Methods for Health Emergency and Disaster Risk Management; World Health Organization: Geneva, Switzerland, 2021; pp. 151–163. [Google Scholar]
  46. Arrighi, C.; Tanganelli, M.; Cristofaro, M.T.; Cardinali, V.; Marra, A.; Castelli, F.; De Stefano, M. Multi-Risk Assessment in a Historical City. Nat. Hazards 2023, 119, 1041–1072. [Google Scholar] [CrossRef]
  47. Xofi, M.; Domingues, J.C.; Santos, P.P.; Pereira, S.; Oliveira, S.C.; Reis, E.; Zêzere, J.L.; Garcia, R.A.C.; Lourenço, P.B.; Ferreira, T.M. Exposure and Physical Vulnerability Indicators to Assess Seismic Risk in Urban Areas: A Step towards a Multi-Hazard Risk Analysis. Geomat. Nat. Hazards Risk 2022, 13, 1154–1177. [Google Scholar] [CrossRef]
  48. Yang, Z.; Zhao, T.; Tian, Y.; Zhang, Y.; Chen, X. An Integrated Assessment of Tropical Cyclone Risks in Mainland China by Considering Hazard, Exposure, Vulnerability and Mitigation. Hydrol. Res. 2022, 53, 1090–1106. [Google Scholar] [CrossRef]
  49. Yaofang, Z.; Jian, C.; Zhixuan, Q. Nonlinear Impact Analysis of Built Environment on Urban Road Traffic Safety Risk. Syst. Sci. Control Eng. 2023, 11, 2268121. [Google Scholar] [CrossRef]
  50. Sakti, A.D.; Anggraini, T.S.; Ihsan, K.T.N.; Misra, P.; Trang, N.T.Q.; Pradhan, B.; Wenten, I.G.; Hadi, P.O.; Wikantika, K. Multi-Air Pollution Risk Assessment in Southeast Asia Region Using Integrated Remote Sensing and Socio-Economic Data Products. Sci. Total Environ. 2023, 854, 158825. [Google Scholar] [CrossRef] [PubMed]
  51. Bernardini, G.; Quagliarini, E. Terrorist Acts and Pedestrians’ Behaviours: First Insights on European Contexts for Evacuation Modelling. Saf. Sci. 2021, 143, 105405. [Google Scholar] [CrossRef]
  52. Urlainis, A.; Ornai, D.; Levy, R.; Vilnay, O.; Shohet, I.M. Loss and Damage Assessment in Critical Infrastructures Due to Extreme Events. Saf. Sci. 2022, 147, 105587. [Google Scholar] [CrossRef]
  53. Ornai, D.; Elkabets, S.M.; Kivity, Y.; Ben-Dor, G.; Chadad, L.; Gal, E.; Tavron, B.; Gilad, E.; Levy, R.; Shohet, I.M. A Methodology of Risk Assessment, Management, and Coping Actions for Nuclear Power Plant (NPP) Hit by High-Explosive Warheads. Adv. Eng. Inform. 2020, 46, 101192. [Google Scholar] [CrossRef]
  54. Yao, X.; Wei, H.-H.; Shohet, I.M.; Skibniewski, M.J. Assessment of Terrorism Risk to Critical Infrastructures: The Case of a Power-Supply Substation. Appl. Sci. 2020, 10, 7162. [Google Scholar] [CrossRef]
  55. Wulf, W.A.; Haimes, Y.Y.; Longstaff, T.A. Strategic Alternative Responses to Risks of Terrorism. Risk Anal. 2003, 23, 429–444. [Google Scholar] [CrossRef]
  56. National Consortium for the Study of Terrorism and Responses to Terrorism (START) Global Terrorism Database (GTD). Available online: https://start.umd.edu/gtd/ (accessed on 1 July 2024).
  57. Gordon, T.J. The Delphi Method. Futur. Res. Methodol. 1994, 2, 1–30. [Google Scholar]
  58. Linstone, H.A.; Turoff, M. The Delphi Method; Addison-Wesley: Reading, MA, USA, 1975; ISBN 0201042940. [Google Scholar]
  59. Lawshe, C.H. A Quantitative Approach to Content Validity. Pers. Psychol. 1975, 28, 563–575. [Google Scholar] [CrossRef]
  60. Sadi, S.; Gholami, J.; Fereydooni, M.; Moshari, S. Development of Water Conservation Indicators for Office Buildings Using Delphi Method. Jordan J. Mech. Ind. Eng. 2022, 16, 247–259. [Google Scholar]
  61. Kang-Hyun, P.; Dae-Sung, H.; PARK, H.A.E.Y.; Sung-Min, H.; Park, J.-H. Pilot Research for Development of Multi-Faceted Lifestyle Profile Components Affecting Health and Quality of Life: Delphi Survey. Korean J. Occup. Ther. 2019, 27, 105–120. [Google Scholar] [CrossRef]
  62. Almathami, H.K.Y.; Win, K.T.; Vlahu-Gjorgievska, E. Development and Validation of a New Tool to Identify Factors That Influence Users’ Motivation toward the Use of Teleconsultation Systems: A Modified Delphi Study. Int. J. Med. Inform. 2022, 157, 104618. [Google Scholar] [CrossRef] [PubMed]
  63. Saaty, T.L. The Analytic Hierarchy Process: A New Approach to Deal with Fuzziness in Architecture. Archit. Sci. Rev. 1982, 25, 64–69. [Google Scholar] [CrossRef]
  64. Cantatore, E.; Esposito, D.; Sonnessa, A. Mapping the Multi-Vulnerabilities of Outdoor Places to Enhance the Resilience of Historic Urban Districts: The Case of the Apulian Region Exposed to Slow and Rapid-Onset Disasters. Sustainability 2023, 15, 14248. [Google Scholar] [CrossRef]
  65. li Piani, T. Progettazione Strutturale e Funzione Sociale Dello Spazio (Quale) Vulnerabilita e Soluzione Al Terrorismo Urbano. Secur. Terror. Soc. (Sicurezza Terror. Soc.) 2018, 8, 7–15. [Google Scholar]
  66. Crenshaw, M. Terrorism in Context; Penn State Press: University Park, PA, USA, 2010; ISBN 027104442X. [Google Scholar]
  67. Piazza, J.A. Rooted in Poverty?: Terrorism, Poor Economic Development, and Social Cleavages. Terror. Polit. Violence 2006, 18, 159–177. [Google Scholar] [CrossRef]
  68. Crenshaw, M.; Pimlott, J. Encyclopedia of World Terrorism; Routledge: Abingdon, UK, 2019; ISBN 1315480352. [Google Scholar]
  69. Albu, C.E. Tourism and Terrorism: A Worldwide Perspective. CES Work. Pap. 2016, 8, 1. [Google Scholar]
  70. Drakos, K.; Kutan, A.M. Regional Effects of Terrorism on Tourism in Three Mediterranean Countries. J. Confl. Resolut. 2003, 47, 621–641. [Google Scholar] [CrossRef]
  71. Enders, W.; Sandler, T. Causality between Transnational Terrorism and Tourism: The Case of Spain. Stud. Confl. Terror. 1991, 14, 49–58. [Google Scholar] [CrossRef]
  72. Divizinyuk, M.; Kasatkina, N.; Melnyk, B. The Use of Electrical Monitoring and Surveillance Systems to Prevent Emergencies of a Terrorist Nature (on the Example of Motor Vehicles). In Proceedings of the 2019 IEEE 20th International Conference on Computational Problems of Electrical Engineering (CPEE), Lviv-Slavske, Ukraine, 15–18 September 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–4. [Google Scholar]
  73. Federal Emergency Management Agency. FEMA 430: Site and Urban Design for Security: Guidance Against Potential Terrorist Attacks; FEMA: Washington, DC, USA, 2007. Available online: https://www.fema.gov/sites/default/files/2020-08/fema430.pdf (accessed on 1 July 2024).
  74. Federal Emergency Management Agency. Reference Manual to Mitigate Potential Terrorist Attacks against Buildings (FEMA-426/BIPS-06), 2nd ed.; Buildings and Infrastructure Protection Series; FEMA: Washington, DC, USA, 2011.
  75. National Countr Terrorism Security Office (NaCTSO); United Kingdom Home Office; Centre for the Protection of National Infrastructure. Protecting Crowded Places: Design and Technical Issues; Great Britain Home Office: London, UK, 2012. Available online: https://assets.publishing.service.gov.uk/media/5a78c6a740f0b62b22cbcb49/design-tech-issues.pdf (accessed on 1 July 2024).
  76. Garcia, M.L. Design and Evaluation of Physical Protection Systems; Elsevier: Amsterdam, The Netherlands, 2007; ISBN 0080554288. [Google Scholar]
  77. Álvarez, G.; Quiroz, M.; León, J.; Cienfuegos, R. Identification and Classification of Urban Micro-Vulnerabilities in Tsunami Evacuation Routes for the City of Iquique, Chile. Nat. Hazards Earth Syst. Sci. 2018, 18, 2027–2039. [Google Scholar] [CrossRef]
  78. Federal Emergency Management Agency. Evacuee Support Planning Guide; FEMA P-760; FEMA: Washington, DC, USA, 2009.
  79. Keykhaei, M.; Samany, N.N.; Jelokhani-Niaraki, M.; Zlatanova, S. A Situation-Aware Emergency Evacuation (SAEE) Model Using Multi-Agent-Based Simulation for Crisis Management after Earthquake Warning. Geo-Spat. Inf. Sci. 2023, 1–24. [Google Scholar] [CrossRef]
  80. Yang, Y.; Yin, J.; Wang, D.; Liu, Y.; Lu, Y.; Zhang, W.; Xu, S. ABM-Based Emergency Evacuation Modelling during Urban Pluvial Floods: A “7.20” Pluvial Flood Event Study in Zhengzhou, Henan Province. Sci. China Earth Sci. 2023, 66, 282–291. [Google Scholar] [CrossRef]
  81. Cavalieri, F.; Franchin, P.; Giovinazzi, S. Multi-Hazard Assessment of Increased Flooding Hazard Due to Earthquake-Induced Damage to the Natural Drainage System. Reliab. Eng. Syst. Saf. 2023, 237, 109348. [Google Scholar] [CrossRef]
  82. Quagliarini, E.; Bernardini, G.; D’Orazio, M. How Could Increasing Temperature Scenarios Alter the Risk of Terrorist Acts in Different Historical Squares? A Simulation-Based Approach in Typological Italian Squares. Heritage 2023, 6, 5151–5186. [Google Scholar] [CrossRef]
Figure 1. Steps and details of the method applied for the test formulation.
Figure 1. Steps and details of the method applied for the test formulation.
Heritage 07 00251 g001
Figure 2. Diagram of the system of indexes and K-descriptors organized around single risk determinants.
Figure 2. Diagram of the system of indexes and K-descriptors organized around single risk determinants.
Heritage 07 00251 g002
Figure 3. Expanded two-dimensional matrices of terrorism risk uOAs for soft (left) and hard (right) targets, coherently with the classes of risks in Table 9 (red, orange, green, and grey colors represent high, medium, low, and negligible classes of risk).
Figure 3. Expanded two-dimensional matrices of terrorism risk uOAs for soft (left) and hard (right) targets, coherently with the classes of risks in Table 9 (red, orange, green, and grey colors represent high, medium, low, and negligible classes of risk).
Heritage 07 00251 g003
Table 1. Summary of indexes related to Hazard, Vulnerability, and Exposure determinants, as in [18].
Table 1. Summary of indexes related to Hazard, Vulnerability, and Exposure determinants, as in [18].
DeterminantCodeIndexDescription of Index
Hazard H_I.1TargetInherent and environmental relevance of uOAs to be attacked
H_I.2UsesTypologies of uses influence the choice of a perpetrator aiming at maximizing the effect of the violent act
H_I.3PreventionQualification of uOAs and their components regarding the presence of countermeasures or mitigative solutions
VulnerabilityV_I.1Shape of BEThe shape of open spaces influences the attack-type effects
V_I.2Accessibility Geometric dimension of uOAs and their components and permeability to perpetrators and their weapons
V_I.3Obstacles Presence and level of social “attractive” urban furniture in the uOAs and their components
ExposureE_I.1Attack typeEffect of violent event related to the weapon type
E_I.2Crowd levelCharacter that reflects the potential numerousness of involved people
E_I.3Attack reactionPotential level of users’ protection or obstruction within the uOA and its components thanks to the presence of protective or blocking elements
Table 2. System of K-descriptors and details for their calculation and value ranges.
Table 2. System of K-descriptors and details for their calculation and value ranges.
Index NameK TypeRef. for ValuesNormativeGeneral
Classif.
EquationDetails of
Classification
Value
Hazard
Target
index
KENV[18] KENV = [1, … 5]Likelihood levelsRemoteUnlikelyPossibleLikelyVery Likely
12345
KSYMB xKSYMB = [1, … 5]Symbolicity classesnegligiblelowmediumhighVery high
12345
Index of useKTUR xKTUR = Tour.Int
= (n.arrivals)/(n.inhab)
Classes of
intensity
very lowlowmediumhighVery high
12345
KUSE xKUSE = [1, … 5]Classes of userarelylownormalhighVery high
12345
Prevention
index
KCON[12]x K CON   = i = 1 n ( Z i / Z e f f ) N . A C C E S S Eff (T2)Remote controlDirect/local controlVideo SurveillanceInnovative systems
Eff (T3)Innovative systemsReinforced urban furnitureBarriersBollards
Vulnerability
Shape
index
KSHP[35] xKSHP = fEXT × fSHP
fEXT = [1, 5], fSHP = f(2P/A)
fSHP = [1, 1.5]
fSHP = f(w/l)
Classes of fEXT0 < 2P/A < 0.020.02 ≤ 2P/A < 0.030.03 ≤ 2P/A < 0.060.06 ≤ 2P/A < 0.032P/A ≥ 0.09
12345
Classes of fSHPCompact w/l ≥ 0.71.5 (T2)1.0 (T3)
elongated or very
elongated fSHP < 0.7
1.0 (T2)1.5 (T3)
Accessibility IndexKPER[35] x K PER = [ 1 , 5 ] i = 1 n A v i 2 P Classes for r 0 < r < 0.050.05 < r < 0.10.1 < r < 0.20.2 < r < 0.3r > 0.3
12345
KACC xx K ACC = i = 1 n ( A v i f a c c   i ) i = 1 n A v i fACC = [1, …, 5]Not accessibleLimitedlyModeratelyAlternativelyAccessible
12345
Obstacle
index
KOBST(V) x K OBST = i = 1 n d   i f i n f   i
di =Ai/Avi
fINF = [1, 1.25, 1.5]No
influence
average
increase
increasing
11.251.5
Exposure
Index of
attack type
KATT[18] KATT = [4,5]Consequence levels for KattMinormoderateMediumMajorExtreme
12345
Crowding indexKCRW xKCRW = [1, …5]Occupancy classes for KCRWnegligiblelowmediumhighVery high
12345
Index of ReactionKOBST(E) x K OBST ( E )   = i = 1 n d   i f i n f i f s h p o b   i fINFDecreasingaverage
decreasing
not influentialaverage
incremental
incremental
0.50.7511.251.5
fSHPobnegligiblelowmediumhighVery high
12345
KCM[12] xKCM = WEFF/WiWEFF = 3Alarm
countermeasures
Evacuation countermeasuresSystems of physical interventions
Table 3. Summary of the influence determined by obstacle typology on classes of shape and prevalent development.
Table 3. Summary of the influence determined by obstacle typology on classes of shape and prevalent development.
IconExamples of Shape and Prevalent Development of ObstaclesInfluence of Obstacle’s Shape
Heritage 07 00251 i001Poles and trees—
vertical development
Negligible
Heritage 07 00251 i002Monuments—
vertical development
Low
Heritage 07 00251 i003Bar covered terraces—
Compact development
Average
Heritage 07 00251 i004Benches, planters, new jersey—
horizontal development
High
Heritage 07 00251 i005Railings, steps—
horizontal development
Very high
Table 4. Results of the Delphi method (✓ yes, x not).
Table 4. Results of the Delphi method (✓ yes, x not).
First Round First RoundFirst Round CRVNOTESecond Round CRV
Consensus:
the Index is Compliant with the Risk Determinant
K-TypeConsensus:
the Index is Compliant with the Associated Index
Formulation and Ranges Are Acceptable?Formulation and Ranges Are Acceptable
Target indexKENV0.7143
KSYMB1.0000
Index of useKTUR0.5714
KUSE0.8571
Prev. indexKCON1.0000
Shape indexKSHP0.85710.8571
Accessibility indexKPER1.0000
KACC0.7143
Obstacle indexKOBST(V)0.7143
Index of attack typeKATT1.0000
Crowding indexKCRD1.00001.0000
Index of reactionKOBST(E)0.7143
KCM1.0000
Table 5. Results of the AHP method applied to the K-descriptors.
Table 5. Results of the AHP method applied to the K-descriptors.
Index NameWeightCR (%)
Hazard
Target index0.60.6%
Index of use0.09
Prev. index0.31
Vulnerability
Shape index0.246.9%
Accessibility index0.65
Obstacle index0.12
Exposure
Index of attack type0.23.2%
Crowding index0.65
Index of reaction0.17
Table 6. Major details about tested case studies in Italy.
Table 6. Major details about tested case studies in Italy.
Italian CaseTouristic RelevanceSymbolicityPresence of Strategic BuildingsPrincipal Symbolic
Buildings
Presence of Mitigative Strategy
Milano—
Piazza Duomo
High, independent of season and time of dayHigh—
Political and economic
Duomo, Galleriayes
Napoli—
Piazza del Plebiscito
High, independent of season and time of dayHigh—
Cultural
Basilica Pontificia, Palazzo Realeyes
Roma—
Piazza San Pietro
High, independent of season and time of dayHigh—
Religious and political
Basilica di San Pietroyes
Venezia—
Piazza San Marco
High, independent of season and time of dayHigh—
Cultural and economic
Basilica di San Marco, Palazzo Ducaleyes
Corato (BA)—
Piazza Sedile
Low, citizen usesLow minor churchesno
Matera—
Piazza Vittorio Veneto
High, “Matera Capitale della Cultura” and “Sassi” UNESCO SiteMedium—touristic Balcony on the “Sassi”no
Ostuni (BR)—
Piazza della Libertà
Seasonal and mainly nocturnalMedium—touristic no
Trani (BAT)—Piazza Duomo, Piazza Re ManfrediMedium, presence of cultural attractionHigh—
Touristic and strategic
Courthouse of the provinceCastello Svevo, Representative church of the Romanic styleyes
Narni (TR)—Piazza dei PrioriMedium high, independent of seasonMedium—culturalCity hallPalace “dei Priori”no
Caldarola (MC)—
Piazza Vittorio Emanuele II
Very low usage by citizensLowCity hallTwo churchesno
Catania—
Piazza Università
Medium, presence of cultural attraction and university attractivenessMedium—touristicUniversity of Catania “Machiavelli” Theatreno
Genova—
Piazza delle Vigne
Medium, presence of cultural attraction and university attractivenessMedium—touristic Basilica di Santa Maria delle Vigneno
Parma—
Piazza del Duomo
Medium, presence of cultural attractionsMedium—touristic Basilica Cathedral, Baptistery, Bishop’s palaceno
Monza—
Piazza Trento e Trieste
Medium, business activitiesHigh—political and economic no
Perugia—
Piazza IV Novembre
Medium, presence of cultural attractionsMedium—touristicCuria of Bishop no
Pavia—
Piazza del Duomo
Medium, presence of cultural and university attractivenessMedium—touristic Palazzo Vescovile; Cattedrale di Santo Stefanono
Padova—
Piazza delle Erbe
Medium, presence of cultural attractionsMedium—touristic Palazzo della Ragioneno
Reggio Calabria—
Piazza Duomo
Medium, presence of cultural attractionsMedium—touristic Duomono
Cagliari—
Piazza Palazzo
Medium, presence of cultural attractionsMedium—touristic and strategicPrefettura;
Ecclesiastic Courthouse
Palazzo Regio, Cathedral, Ancient City Hallyes, but related to strategic buildings
L’Aquila—
Piazza Duomo
Medium lowMedium—touristic Palazzo Poste e Telegrafi, Duomono
Ancona—
Piazza del Plebiscito
Medium, presence of cultural attractionsMedium—touristic and strategicPrefecture; Headquarter regional Finance policeSan Domenico Churchyes, and related to strategic buildings
San Gemini (TR)—
Piazza San Francesco
Very low, usage by citizensLow San Francesco Churchno
Table 7. Summary of results of applying the algorithm in all the analyzed Italian case studies, expressed in triads of values (H, V, E) for each environmental class (F, Fb, Fd).
Table 7. Summary of results of applying the algorithm in all the analyzed Italian case studies, expressed in triads of values (H, V, E) for each environmental class (F, Fb, Fd).
CityEnviron. ClassT2T3
Type%AreaHVERHVER
MilanoNoStr.F71%3.552.843.55 3.552.843.55
Fb13%0.520.530.52 0.520.530.52
Fd16%0.780.630.70 0.780.630.70
mean 545100545100
WithStr.F71%3.552.843.55 3.551.423.55
Fb13%0.400.530.52 0.380.270.52
Fd16%0.660.630.70 0.700.310.70
mean 54510052550
RomaNoStr.F71%3.552.843.55 3.552.843.55
Fb1%0.030.050.06 0.030.040.06
Fd28%1.391.111.39 1.390.841.39
mean 545100545100
WithStr.F71%2.842.133.55 3.551.423.55
Fb1%0.030.020.05 0.030.010.05
Fd28%1.110.841.39 1.390.561.39
mean 4356052550
NapoliF65%2.581.943.23 2.581.943.23
Fb4%0.100.140.16 0.110.090.15
Fd31%1.280.941.19 1.320.941.19
mean 4356043560
VeneziaNoStr.F71%3.542.833.54 ----
Fb17%0.490.440.46 ----
Fd12%0.780.570.74 ----
mean 545100----
WithStr.F71%3.542.833.54 ----
Fb17%0.370.440.46 ----
Fd12%0.610.570.74 ----
mean 545100----
MateraF70%2.782.783.48 2.782.782.78
Fb27%0.750.930.85 0.780.850.85
Fd4%0.110.150.08 0.110.110.08
total 4446444464
Ostuni (BR)SummerF77%2.313.083.85 2.313.083.85
Fb23%0.690.910.86 0.690.870.86
Fd0%0.000.000.00 0.000.000.00
mean 3456034560
WinterF77%2.312.313.08 2.312.313.08
Fb23%0.690.730.73 0.690.690.73
Fd0%0.000.000.00 0.000.000.00
mean 3343633436
TraniF73%2.192.192.92 2.192.192.92
Fb7%0.220.210.23 0.220.220.23
Fd20%0.700.510.59 0.700.590.59
mean 3343633436
Corato (BA)F85%1.703.401.70 1.702.551.70
Fb14%0.280.580.28 0.280.420.48
Fd1%0.020.040.02 0.020.030.02
mean 2.004.002.00162.003.002.0012
Narni (TR)F67%2.692.692.69 2.692.692.69
Fb33%1.231.231.23 1.231.231.23
Fd0%--- ---
mean 4.004.003.00484.003.003.0036
Caldarola (MC)F76%1.522.281.52 1.523.041.52
Fb5%0.150.200.10 0.150.210.10
Fd19%0.370.670.37 0.370.670.37
mean 2.003.002.00122.004.002.0016
CataniaF59%1.772.372.37 1.771.772.37
Fb41%1.201.241.53 1.201.221.53
Fd0%--- ---
mean 3.004.004.00483.003.004.0036
GenovaF36%1.081.081.08 0.720.721.08
Fb61%1.691.821.70 1.211.211.70
Fd3%0.070.100.07 0.070.070.07
mean 3.003.003.00272.002.003.0012
ParmaF59%1.782.961.78 1.781.181.78
Fb4%0.120.170.09 0.090.090.09
Fd36%1.091.791.01 1.091.061.01
mean 3.005.003.00453.002.003.0018
MonzaF64%1.932.581.93 1.932.581.93
Fb34%1.051.401.02 1.051.401.02
Fd2%0.010.020.01 0.010.020.01
mean 3.004.003.00363.004.003.0036
PerugiaF68%2.712.712.04 2.712.042.04
Fb13%0.460.460.29 0.460.390.29
Fd19%0.760.760.57 0.760.570.57
mean 4.004.003.00484.003.003.0036
PaviaF42%1.671.671.25 1.671.251.25
Fb7%0.240.260.18 0.240.210.18
Fd51%2.062.061.54 2.061.541.54
mean 4.004.003.00484.003.003.0036
PadovaF66%2.641.981.98 1.981.981.98
Fb34%1.121.021.00 0.901.021.00
Fd0%--- ---
mean 4.003.003.00363.003.003.0027
Reggio CalabriaF75%2.252.252.25 2.252.252.25
Fb13%0.390.360.36 0.390.320.39
Fd12%0.360.480.36 0.360.480.48
mean 3.003.003.00273.003.003.0027
CagliariF79%2.372.372.37 1.581.582.37
Fb17%0.510.470.47 0.370.340.47
Fd4%0.120.120.08 0.100.080.08
mean 3.003.003.00272.002.003.0012
L’AquilaF87%2.622.622.62 2.622.622.62
Fb5%0.160.110.16 0.160.150.13
Fd7%0.220.290.22 0.220.290.22
mean 3.003.003.00273.003.003.0027
AnconaF66%2.631.972.63 1.971.972.63
Fb9%0.210.280.28 0.850.610.78
Fd25%0.850.750.72 0.750.500.60
mean 4.003.004.00483.003.003.0027
San Gemini (TR)F50%1.001.501.00 1.002.001.00
Fb17%0.360.540.34 0.360.690.34
Fd33%0.651.250.65 0.651.250.65
mean 2.003.002.00122.004.002.0016
Table 8. Qualitative description of Hazard, Vulnerability, and Exposure determinants.
Table 8. Qualitative description of Hazard, Vulnerability, and Exposure determinants.
HazardVulnerabilityExposure
1–2 unlikely1–2 low1–2 minor
3 probably3 medium3 moderate
4–5 likely4–5 high4–5 critical
Table 9. Classes of risk associated with specific combinations of H and level of danger, discussed for hard and soft targets, associating red, orange, green, and grey colors to represent high, medium, low, and negligible classes of risk.
Table 9. Classes of risk associated with specific combinations of H and level of danger, discussed for hard and soft targets, associating red, orange, green, and grey colors to represent high, medium, low, and negligible classes of risk.
H ValuesDegree of DangerClass of Risk
Soft target
H [1, 2] ∧ E [1, 2]all the combinationsNegligible
V [1, 5]
H [4, 5]VxE = [1, 9]Medium
V [1, 5]; E [1, 3]VxE = [9, 15]High
H [1, 2] V [1, 5]; E [3, 5]VxE = [3, 6]Low
VxE = [6, 15]Medium
VxE = [15, 25]High
H [3] V [1, 5]; E [1, 5]VxE = [1, 4]
VxE = [4, 12]
VxE = [12, 25]
Low
Medium
High
Hard target
H [4, 5] ∧ E [4, 5]VxE = [4, 10] Medium
V [1, 5]VxE = [10, 25]High
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cantatore, E.; Quagliarini, E.; Fatiguso, F. Terrorism Risk Assessment for Historic Urban Open Areas. Heritage 2024, 7, 5319-5355. https://doi.org/10.3390/heritage7100251

AMA Style

Cantatore E, Quagliarini E, Fatiguso F. Terrorism Risk Assessment for Historic Urban Open Areas. Heritage. 2024; 7(10):5319-5355. https://doi.org/10.3390/heritage7100251

Chicago/Turabian Style

Cantatore, Elena, Enrico Quagliarini, and Fabio Fatiguso. 2024. "Terrorism Risk Assessment for Historic Urban Open Areas" Heritage 7, no. 10: 5319-5355. https://doi.org/10.3390/heritage7100251

Article Metrics

Back to TopTop