CHapter 10: Crime Prevention Through Environmental Design Flashcards

1
Q

What does CPTED stand for?

A

Crime Prevention Through Environmental Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What program was the precursor to CPTED?

A

US. HUD’s Defensible Space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who created the HUD program Defensible Space?

A

Oscar Newman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What did the HUD program Defensible Space explore?

A

how opportunities for criminal behavior were being engineered into our built environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who was the first person to use the term CPTED?

A

Ray Jeffrey in his book Crime Prevention Through Enviornmental Design (1971)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What items does CPTED target?

A
  1. Places
  2. Behavior
  3. Design and use of space.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three underlying elements of CPTED?

A
  1. Territoriality
  2. Surveillance
  3. Access Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of measures can CPTED be?

A
  1. Mechanical
  2. Organizational
  3. natural
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the mechanical measures of CPTED include?

A

physical security hardware or electronic systems such as locks, fencing, or CCTV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the organizational measures of CPTED include?

A

people or activities rather than equipment, such as security guards, police patrols, or neighborhood watch patrols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do the natural measures of CPTED include?

A

Natural Features such as terrain, layout, landscaping, gates, walls, and other nonmechanical objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of CPTED tools?

A
  1. Natural territorial reinforcement
  2. Natural Surveillance
  3. Natural Access Control
  4. Management and Maintenance
  5. Legitimate Activity Support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Natural Territorial Reinforcement mean?

A

The process of establishing a sense of ownership, responsibility, and accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Natural Surveillance?

A

Increasing visibility by occupants and casual observers for the detection of trespassers or misconduct at a facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Natural Access Control?

A

The use of real and symbolic barriers-including doors, fences, and shrubbery- to define and limit access to a building or other space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is management and maintenance in regard to CPTED?

A

For spaces to look well cared for and crime-free, they must be well maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the broken window theory suggest?

A

Leaving broken windows or other decay markers unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian is observed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is legitimate activity support?

A

when a space is used by the authorities or management for legitimate activity. ie, placing a police substation is an empty building or moving maintenance staff into an unused area. Drug and other criminal activity thrive in spaces where legitimate activity support is not maintained.

19
Q

What is a key element of CPTED during the design or redesign of a venue.

A

That you can reduce crime opportunity and fear of crime through natural, mechanical, and organizational or procedural means.

20
Q

Name two crime prevention operating assumptions when applying CPTED?

A
  1. crime prevention knowledge is continually developing and is interdisciplinary in nature.
  2. Crime prevention strategies must remain flexible and creative.
21
Q

What increases the likelihood of crime?

A

When a potential criminal feels the chances of detection and identification are low and the chances of escape are high.

22
Q

What are some CPTED steps that can assist in preventing repeat victimization?

A
  1. Quickly remove signs of victimization.
  2. Improve physical security.
  3. Block Easy Access to Targets.
  4. Protect especially vulnerable targets.
  5. Regulate access to high-risk assets or areas.
23
Q

What is the Capable Guardian Concept?

A

Criminals generally avoid targets or victims who are perceived to be armed, capable of resistance, or potentially dangerous.

24
Q

Second generation CPTED employs what four main strategies?

A
  1. Cohesion
  2. Capacity Threshold
  3. Community Culture
  4. Connectivity
25
Q

How is Cohesion implemented in second generation CPTED?

A

through community groups, neighborhood associations, and personal development programs (such as training on leadership, financial, and organizational skills, and conflict resolution.)

26
Q

What is Capacity Threshold also known as?

A

Tipping Point Theory.

27
Q

What is Capacity Threshold?

A

a strategy that attempts to balance land uses and urban features.

28
Q

What does community culture aim to do?

A

bring neighborhood people together for a common purpose through cultural, artistic, sporting, and other recreational activities.

29
Q

What does connectivity aim to do?

A

link the neighborhood to surrounding neighborhoods and to funding and political support from corporations and upper levels of government.

30
Q

Give a quick breakdown on the focus of the various generations of CPTED.

A

1st generation manifested a fortified city mentality, the 2nd generation focused on socio-economically balanced community. The 3rd generation of CPTED is more focused on reprogramming the urban space through digital means on one hand, and green technologies on the other.

31
Q

What are the steps to a traditional building planning process?

A
  1. Programming-
  2. Schematic Design
  3. Design Development
  4. Construction Documents or Working Drawings
  5. Bids for construction and selection of contractor
32
Q

What is programming in the traditional building planning process?

A

where the owner informs the architect about the building’s purpose and occupants.

33
Q

What is schematic design in the traditional building planning process?

A

Where the architect develops bubble diagrams reflecting circulation patterns and proximity relationships based on the programming information. The diagrams evolve into drawings of the floor plan, site plan, and elevations as the beginning of engineering considerations.

34
Q

What is design development in the traditional building planning process?

A

The architect presents ideas to the client and makes design corrections.

35
Q

What are construction documents in the traditional building planning process?

A

These are the final drawings prepared for construction purposes.

36
Q

What happens during the bids for construction and selection of contractor phase in the traditional building planning process?

A

The architectural drawings and specifications are put out to bid.

37
Q

What three challenges does security design pose for architects?

A
  1. Determining requirements.
  2. Knowling the technology.
  3. Understanding architectural implications.
38
Q

What does the architect need to consider when determining requirements for security design?

A

the designated purpose of the space or building and examine the cultural, legal, and physical definitions of the prescribed, desired, and acceptable behaviors.

39
Q

How does knowing the technology pose a challenge for the architect?

A

Rapid advances in security technology make it challenging to keep up to date.

40
Q

Where should access control be considered?

A
  1. all entrances and exits to the site and building
  2. internal access points to restricted or controlled areas.
  3. environmental and building features used to gain access.
  4. security screening devices.
41
Q

What are some examples of the types of security zones?

A
  1. Unrestricted Zones.
    2, Controlled Zones.
    3, Restricted Zones.
42
Q

What is an unrestricted zone?

A

encourages persons to conduct their business and leave the facility without entering controlled or restricted zones.

43
Q

What are controlled zones?

A

zones where personnel may enter only if they have a valid purpose for entry.

44
Q

What are restricted zones?

A

These are sensitive areas limited only to staff assigned to those areas.