Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityArenas / Stadiums / Leagues / EntertainmentEducation:University

When It Comes to Event Security, Colleges Can Look to the Pros

By Melissa Odegaard
stadium_enews
January 12, 2016

The security landscape at colleges and universities constantly changes in response to events in the outside world. Campuses cannot simply be considered leafy sanctuaries, immune from danger. Security is no longer a nice-to-have; the horrors of the Boston Marathon bombing, or just recently at the Stade de France in Paris, make it an essential consideration.

In the face of these threats many colleges and universities are beginning to consider what enhancements could and should be made to improve their security measures. Beyond the halls of academia universities host a variety of large scale events including sports, concerts and graduation ceremonies and must have a plan in place for keeping attendees safe.  

Major sporting events such as the Olympics, the Super Bowl, and the U.S. Open tennis tournament have implemented screening operations to keep athletes and spectators safe, while the NFL and Major League Baseball teams use security screening at all games.

Some institutions of higher education have mimicked the approaches of their commercial brethren. After Idaho law was changed to allow holders of enhanced concealed weapons permits to carry-concealed on some parts of Idaho campuses (though not at football stadiums or other large venues), in 2014 Boise State University installed metal detectors that football fans must pass through and added bag searches. Other universities, such as the University of Michigan, Rutgers, and the University of Pittsburgh, have stepped up security measures at their stadiums as well.

While changes to security on college campuses are taking place, approaches vary based on needs, venues, and more. Indeed, there are many factors university security personnel must consider, including mobility, reconfigurability, size and weight, not to forget the spectator experience.

First, think about the venue. If it is a single location then fixed metal detectors may be the best choice. If instead there are multiple locations, used at different times, then weight and portability of the metal detectors should be considered, to provide flexibility in configuration for different flows of foot traffic. Also an important consideration is whether the security screening is to be conducted outdoors or indoors. Security equipment specifically for outdoor applications are available.

Crowd size will also affect security considerations. At a sports event, for instance, there is a maximum number of people who can attend, based on the number of seats in the arena or stadium. Historical attendance records provide useful information on particular games (a nationally-ranked opponent is likely to bring bigger crowds, for instance). This will affect the number of screening stations required, to balance increased security against the length of time visitors will have to wait. Security equipment manufacturers can assist in throughput calculations estimating the needed amount of equipment and screening staff to efficiently screen the spectators.

Another consideration is the screening of bags and personal belongings. Walk-through metal detectors don’t take up much space; roller tables and screening devices for belongings take up more space, but allow for greater flexibility regarding changing (or creating) concepts of operations dictating what kinds of bags visitors can bring, or whether or not hand searches are necessary.

The spectator experience may be the least considered issue but is probably the most important one in the long run. You want everyone to enter the venue trusting that they are secure while enjoying the ball game or event. The other factor is the convenience the spectator experiences while being screened. This should be done effectively, equally and without any unnecessary hassles.

Cost, of course, is always important, but that should be the final factor to be weighed, not the first. Cost considerations should include whether training services for security personnel on the specific technologies are offered; power, repair and maintenance requirements, including availability of repair services on event days; durability of the screening equipment; and incidence of false positives, to name a few. It is imperative to weigh in the cost of security versus the cost of a breach of security and the damage that could accumulate. Also noteworthy to mention that in most cases the cost the equipment is minimal compared to the cost of the staff in the long run. The better the equipment and the smoother the concept of operations, the lesser the burden on human interference and thus, the lesser the cost.

Laying out all these considerations may seem daunting, nor is this an exhaustive list. Vendors offering solutions that fit specific needs can help guide security managers to answers that ensure that campus visitors have enjoyable – and safe – experiences.

KEYWORDS: crowd control event security sports security terrorist attack visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Melissa odegaard
Melissa Odegaard is Director, Global Marketing Communications at Rapiscan Systems. In this role she coordinates with regional sales and marketing teams to successfully execute on the company’s global brand strategy and bring new products to market worldwide.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • gaming

    The pressures the online gaming community faces when it comes to cybersecurity

    See More
  • It’s the Exemptions that Count When It Comes to Vehicle Theft

    See More
  • Blame It on the Media When It Comes to Pandemic Fears

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing