Een informatiestrategie voor de bestrijding van voetbalvandalisme

J.J. Dijkman, J.H.A.M. Grijpink, M.G.A. Plomp, P. Seignette, T. Visser

Research output: Contribution to JournalArticleProfessional

435 Downloads (Pure)

Abstract

This article presents the results of the chain analysis of the hooliganism control chain according to the standard method of Chain-computerisation. The goal of the hooliganism control chain is to prevent football-related violence. The current infrastructure of this chain consists of a person-focused and an event-focused approach to prevent football-related violence. Research has shown that the violence more often takes place outside the football stadiums and before or after football games. A chain information system could possibly be a solution to ensure that correct decisions can also be made in the future with respect to the prevention and control of football-related violence.

A chain analysis assesses (beforehand) the chance of success of a chain information system. A theoretical and practical introduction to this chain analysis methodology can be found in the founding article in this journal (Grijpink, 2010). This chain analysis of the hooliganism control chain is part of the Chain Landscape Research Programme at the Department of Information and Computer Sciences of Utrecht University.

According to this chain analysis, a chain information system for the hooliganism control chain is necessary and, in the short term, feasible. There is extensive co-operation in this chain, and the Football Follow System [Voetbal Volgsysteem (VVS)] can grow to be a full chain information system. Therefore, the information strategy advice is to work, step by step, towards a chain information system containing identifying data on persons and a risk code and current measures affecting a specified person. We also advise to keep the person-related part of the Football Follow System strictly separated from the KNVB part of the system to prevent the emerging chain position of the person-related part to be compromised.
Original languageDutch
Pages (from-to)1-16
JournalJournal of Chain-Computerisation
Volume3
Issue number1
Publication statusPublished - 2012

Cite this