The Use of Simulation Models in Security Studies: An Example of Basketball Games as Mass Sports Events
DOI:
https://doi.org/10.18485/fb_ijcss.2025.1.2.18Keywords:
simulation model, XVR software, security risks, public gatherings, sports event, basketball gameAbstract
Within the framework of security studies, the use of software in education about dealing with and solving crises has become an increasingly relevant methodological approach. The use of the software should enable a better understanding of decision-making mechanisms and evaluate security measures in conditions that replicate real operational environments. The aim of this paper is to demonstrate how simulation models contribute to improving the design of a security subsystem by enabling the testing and optimization of procedures. A basketball game was selected as a representative mass sports event due to the predictable presence of large crowds and the potential for security-related incidents. Through scenario manipulation, trainees can modify variables such as the number of security personnel, the placement of barriers, or the number of evacuation routes, and immediately observe how these changes affect the defined performance indicators. XVR simulation software was used to design and evaluate the security subsystem for the event. The results confirm that the software enables the controlled testing of security procedures without risk to people or property, with the possibility of providing quantifiable feedback that improves training efficiency and decision-making accuracy.
Downloads
References
1. Barta, J., Michaela, V., & Jiri, J. U. (2016). Evaluation of Simulation Programs Applicable to the Support of Decision-Making Processes in Crisis Management of Critical Infrastructure. International Journal of Education and Learning Systems, 1, 74–80.
2. BBC. (2022, January 25). Hillsborough disaster: 97th victim to be added to memorial. BBC. Retrieved from https://www.bbc.com/news/uk-england-merseyside-60127696.
3. Boyle, M., & Jean-Claude, V. (2021). A brief introduction to policing public gatherings: A guide for practitioners. Council of Europe.
4. Carrozzino, M., Franco, T., Sandro, B., Carlo, C., & Massimo, B. (2005). Lowering the development time of multimodal interactive applications: the real-life experience of the XVR project. In Proceedings of the 2005 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology (pp. 270–273). New York: Association for Computing Machinery.
5. Ceccato, V., & Andrew, N. (Eds.). (2015). Safety and security in transit environments: An interdisciplinary approach. Springer.
6. Cvetković, V. (2015). Integrisano upravljanje u prirodnim katastrofama. U S. Mijalković (Ur.), Suprotstavljanje savremenom organizovanom kriminalu i terorizmu (str. 291-322). Beograd: Kriminalističko-policijska akademija.
7. Dada, K. S. J., Mohammed, H. A., & Quadir, R. O. (2025). Disaster Risk Management in Academic Institutions: An Assessment of Preparedness and Recovery at Kashim Ibrahim Library, Nigeria. International Journal of Contemporary Security Studies, 1(1), 1–16.
8. Event Insurance Services. (n.d.). Your Guide to Ensuring Crowd Safety. Event Insurance Services. Retrieved from https://www.events-insurance.co.uk/event-insurance-policies/sporting-insurance/sporting-insights/your-guide-to-ensuring-crowd-safety.
9. Lamb, K., Martijn, B., & Jim, D. (2015). Introspect Model: Competency Assessment in the Virtual World. In L. Palen, M. Büscher, T. Comes, and A. Hughes (Eds.), 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, Krystiansand, Norway, May 24-27, 2015 – ISCRAM2015 Conference Proceedings (pp. 235-243). ISCRAM Association.
10. Leveson, N. G. (2012). Engineering a Safer World. MIT Press.
11. Mandić, G. J., & Stanojević, P. (2020). Korporativna bezbednost. Fakultet bezbednosti, Univerzitet u Beogradu.
12. Marković, J. (2021). Video-nadzor u funkciji prevencije kriminala u otvorenim javnim gradskim prostorima. Godišnjak Fakulteta bezbednosti, 1, 31–49.
13. Marković, J. (2022). Javna okupljanja u urbanom prostoru – zaštita i bezbednost muzičkih manifestacija. U S. Stanarević i A. Đukić (Ur.), Urbana bezbednost i urbani razvoj: Zbornik radova (str. 33-41). Beograd: Fakultet bezbednosti, Univerzitet u Beogradu.
14. Metić, A. (2025). The Significance and Role of Police Officers in Building the School as a Safe Environment for All Students. International Journal of Contemporary Security Studies, 1(1), 17–24.
15. Milenković, D. (2025). Theoretical, Institutional and Organizational Aspects of the Integrated Disaster Risk Reduction System: Towards a Deeper Understanding of Disaster Resilience in Serbia. International Journal of Contemporary Security Studies, 1(1), 175–190.
16. Misić, Z. M. (2016). Bezbednosni menadžment javnih okupljanja. Doktorska disertacija. Beograd: Fakultet bezbednosti, Univerzitet u Beogradu.
17. News Desk. (2022, October 22). The Worst Tragedies in Sporting History. Editorji. Retrieved from https://www.editorji.com/sports-news/others-sports/the-worst-tragedies-in-sporting-history-1664728394760.
18. Omar. (2022, March 24). Football Vs. Basketball: Everything You Need To Know. Racket Rampage. Retrieved from https://racketrampage.com/football-vs-basketball/.
19. S.R. (2022, February 10). Dan kada je Jugoslavija plakala: Četrdeset godina od smrti Željke (14) na koncertu Riblje Čorbe ’Otišla je srećna...’. Blic. https://www.blic.rs/slobodno-vreme/dan-kada-je-jugoslavija-plakala-cetrdeset-godina-od-smrti-zeljke-14-na-koncertu/qnefy95.
20. UN General Assembly. (1966). International Covenant on Civil and Political Rights. United Nations.
21. UN-Habitat. (2018). SDG Indicator 11.7.1 Training Module: Public Space. Nairobi: United Nations Human Settlement Programme (UN-Habitat).
22. Young, W., & Leveson, G. N. (2013). Systems thinking for safety and security. In C. Schuba (Ed.), Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC'13) (pp. 1-8). New York: ACM, Inc.
23. Young, W., & Leveson, G. N. (2014). An integrated approach to safety and security based on systems theory. Communications of the ACM, 57(2), 31–35.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Jana Marković, Goran J. Mandić, Vladimir Bukvić (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
By submitting a manuscript to the International Journal of Contemporary Security Studies, authors acknowledge and agree to the following copyright terms and conditions:
-
Author Rights and Ownership
- Authors retain the copyright to their submitted work. However, by submitting their manuscript, authors grant the International Journal of Contemporary Security Studies a non-exclusive right to publish, distribute, and archive the work in any format (print, digital, or electronic).
- Authors are free to share, reproduce, and distribute their published work, provided proper credit is given to the original publication in this journal.
-
Licensing and Open Access Policy
- The journal publishes under the [insert applicable license, e.g., Creative Commons Attribution License (CC BY)], which allows others to share and adapt the work with appropriate attribution.
- Authors are responsible for ensuring that their submission complies with the journal's licensing terms and does not violate any third-party rights.
-
Originality and Permissions
- The submitted work must be original and not previously published or under consideration elsewhere.
- If the manuscript includes copyrighted materials (e.g., figures, tables, excerpts), authors must obtain the necessary permissions for reproduction and provide appropriate attribution.
-
Author Warranties
- By submitting, authors confirm that their work does not infringe on any intellectual property rights, is free from plagiarism, and adheres to ethical publishing standards.
- The journal is not responsible for any legal disputes arising from copyright infringement, misrepresentation, or unauthorized use of third-party materials.
-
Editorial and Publication Rights
- The International Journal of Contemporary Security Studies reserves the right to make editorial modifications to ensure clarity, consistency, and compliance with journal standards.
- If accepted, the manuscript will be published online and made publicly available according to the journal’s open-access policy.
By proceeding with submission, authors confirm that they have read and agreed to the terms outlined in this Copyright Notice.