
Event Security: A grounded model of risk communication and resource negotiation between security and safety actors
- Tin Nguyen , Erin Kearns , Callie Vitro , Sarah Schappert , Cynthia Kennedy , Allison Munderloh
- Event security
- August 2025
Table of Contents
Research on risk communication and resource negotiation in event security.
Project Overview
Event security at mass gatherings must manage both safety (accidents) and security (human-caused harm) risks across many disciplines (law enforcement, private security, emergency management, medical, venue staff). NCITE researchers have developed a grounded, data-driven model to explain how risk is communicated and how resources are negotiated among those actors. Using field observations, interviews, and document review from two large Midwestern events—a statewide cycling event (~18,000 registrants) and a three‑day music festival (~20,000 attendees)—the authors applied constant comparison methods to elucidate cross-cutting themes. The model shows that practitioners hold different “risk frames” (how they view threats and vulnerabilities), and gaps between frames (“representational gaps”) drive friction. Requests for assistance are made via distinct means‑ends propositions and supported by prescriptive (authority, data) or relational (appeals, social capital) influence tactics. Receivers judge issue credibility (likelihood/impact) and mitigation feasibility (urgency vs. resources) to approve, deny, negotiate, or refer. The impact is a practical blueprint for faster, more constructive cross‑agency decisions at events.
NCITE researchers have developed a grounded, data-driven model to explain how risk is communicated and how resources are negotiated among those actors. Using field observations, interviews, and document review from two large Midwestern events—a statewide cycling event (~18,000 registrants) and a three‑day music festival (~20,000 attendees)—the authors applied constant comparison methods to elucidate cross-cutting themes.
Full Report
Follow link below for the report. Questions? Contact the authors.
Full ReportRelated Posts

Event-related threats in the United States: Analysis of plots and incidents from 1970–2024
- Tin Nguyen , Erin Kearns , Callie Vitro , Sarah Schappert , Cynthia Kennedy , Allison Munderloh ,
- Event security
Research on event-related threats in the United States
Read More
Defining the logic and risk of terrorist UAS attacks in the United States
- Austin Doctor , Suat Cubukcu , George Grispos , Joel Elson , Tyler McCoid ,
- Ux s, Emerging technology
A report on the logic and emerging trends in terrorist use of UAS.
Read More
Event security: Vision-setting, planning, and implementation considerations
Considerations for event security vision-setting, planning, and implementation.
Read More