Scope and method of the CPSI project

The CPSI (Changing Perceptions of Security and Interventions) project, funded by the European Commission under the 7th Framework Programme (Security Research) addresses security, its determinants, and measures designed to improve security. The goal of the present project is to provide end-users, in the form of for example, governments, law enforcement agencies and emergency services, with a methodology to increase insight into the determinants of actual and perceived security, and into which interventions are effective for increasing actual and perceived security. The results of this project represent practical and ready-to-use tools, which can be employed by policy makers, strategy developers and other end-users, to formulate policy regarding security.

 

 

CPSI project video

 

We will focus on security issues related to the commission of crimes such as breaking and entering, pickpocketing, assault, and vandalism. Security related to threats to public health or other types of security risks, such as large-scale terrorism, fall outside the scope of the present project. The methodologies developed in the present project, though, can also be implemented for security risks related to areas other than crime.

 

Security, as we address it in the present project, has two aspects:

But what determines how secure we objectively are and subjectively feel? In the CPSI project, we distinguish three determinants:

The project is divided into the following objectives:

 

CPSI project chart

 

 

 

The conceptual model will be designed using General Morphological Analysis, a method for structuring and analyzing the total set of relationships contained in multi-dimensional, non-quantifiable, problem complexes. This technique will be described in more detail later in this document, but in a nutshell, it is a method through which dimensions and characteristics can be identified in order to model problems and concepts that are otherwise too diffuse and unstructured to work with. The result of this technique is a limited set of models that represent logically and normatively acceptable combinations of key factors.

 

In the inventory, we will examine scientific literature and literature from the field in the area of security. Specifically, we will survey work on the dimensions identified in the morphological analysis workshops. The inventory will aid us in defining such controversial and context-bound concepts as actual and perceived security and it will provide us with an indication of the most robust determinants of security to develop our conceptual model. This workshop in combination with the results of the inventory will yield a conceptual model that will form the basis for the rest of the project. The combination of the inventory and the completion of the conceptual model are consistent with the first milestone of the project.

 

Central to this project is developing a methodology to collect, quantify, organize, analyse and interpret data on the factors described in the conceptual model. Our goal with the methodology is to identify methods to amass the different types of data related to security, and a procedure for integrating these data so that relevant questions can be answered. The methods used to amass data may be, for example, measurement methods, extracting data from existing sources, or scoring techniques. Subsequently, we will develop suitable methods for analyzing the data and provide guidelines for interpreting the results of the analyses.

 

The data warehouse is crucial to the methodology. The data warehouse is a central location in which data amassed using the methodology can be stored. From this location, it is possible to bring a degree of uniformity to data with different structures and content, thus allowing for a better comparison among the different types of information. In this way, data can be combined in complex queries in order to answer specific questions involving data from multiple sources. The input for how the form of the data warehouse (e.g. which variables will be included in the data base) will come from the methodology. For example, the variables that are available regarding information on the commission of crime will become the variables included in the data warehouse. Together, developing and defining the methodology – specifically which variables on which data will be amassed – and developing the data warehouse specifications are reflected in the second milestone.

 

For the validation study, one or two small but scientifically valid sample locations will be chosen from among the EU countries participating in the project. Using methods identified in the methodology we will amass data on actual security (including security interventions), perceived security, public opinion, and cultural characteristics. These data will be entered into the data warehouse from which it will be possible to extract sub-sets of data with which to conduct analyses.

 

We will use the data amassed in the study to validate the conceptual model, the methodology and the data warehouse. Specifically, we will test if it is possible to answer relevant security-related questions from the field using the methodology. The tools we will develop, in the form of the methodology and the data warehouse, will be able to be used by end-users to assess security at the international, national and local levels, in the same way they will be used in the validation study. These assessments will help end-users draw conclusions regarding such issues as: What are the levels of actual and perceived security in specific locations?, Which interventions work where?, and Which interventions should be implemented in which locations? One of the strong points of this project is that with our methodology it will be possible to answer these questions at the neighbourhood level, not just in abstract terms for a country as a whole.

 

The completion of the validation study will yield the data to fill the data warehouse. This is reflected in the third milestone.

 

The most important deliverables of this project are:

Abstracts of the deliverables are available in the papers section.