Area Study in Security Operations: A Spatial-Behavioral Framework for Integrating Collection and Building a Common Operational Picture

  • Obaid Juma Al Kaabi PhD Researcher in Ijtihad in Contemporary Issues, Mohamed bin Zayed University for Humanities, UAE
Keywords: Area Study, Security Operations, Operational Picture, Intelligence Work

Abstract

This study aims to develop a theoretical framework for the skill of area study in security operations through several steps, including identifying its relationship to the components of the intelligence cycle; analyzing the geographical, demographic, economic, cultural, and informational dimensions of the operational environment; examining the practical tools used in area study; and highlighting the potential of employing modern technologies in this field.

To achieve its objectives, the research adopts a composite methodology comprising the descriptive-analytical, comparative, and inferential-synthetic approaches.

The study arrives at several findings, most notably that area study is not merely a descriptive procedure conducted on the margins of security work; rather, it constitutes an operational framework for generating the understanding upon which prevention, response, and resource allocation are based. When the components of the operational environment are analyzed through spatial–behavioral approaches, and when field, human, open-source, and technological collection and analysis tools—along with mapping—are integrated into a Common Operational Picture (COP) that is continuously updated and shared among relevant entities, decision-making becomes more evidence-based, discrepancies in assessment are reduced, and coordination effectiveness is enhanced.

However, this integration remains contingent upon normative and legal controls. The expansion of monitoring and analytical tools—particularly in the digital space—poses risks of privacy violations or of security functions drifting toward excessive surveillance, which may undermine public trust. Therefore, the principles of necessity and proportionality, data governance, and procedural transparency are not merely ethical add-ons, but essential professional conditions for maintaining security legitimacy and ensuring the sustainability of outcomes.

References

1. حكومة دولة الإمارات العربية المتحدة. الإطار الوطني لضمان أمن المعلومات (NIAF) (وثيقة PDF). متاح (تاريخ الاطلاع: 2 فبراير 2026) على: https://beta.government.ae/-/media/Documents-2023/National-Information-Assurance-Framework-NIAF.pdf
2. الهيئة الوطنية لإدارة الطوارئ والأزمات والكوارث (NCEMA). «مرسوم بقانون اتحادي رقم (2) لسنة 2011م في شأن إنشاء الهيئة…» (وثيقة PDF/نسخة مُعدَّلة). متاح (تاريخ الاطلاع: 2 فبراير 2026) على: https://www.ncema.gov.ae/vassets/5cc7e243/%D9%82%D8%A7%D9%86%D9%88%D9%86%20%D8%A7%D9%86%D8%B4%D8%A7%D8%A1%20%D8%A7%D9%84%D9%87%D9%8A%D9%8A%D9%94%D8%A9-%D8%A7%D9%84%D9%85%D8%B9%D8%AF%D9%84%20%D8%A8%D8%AA%D8%A7%D8%B1%D9%8A%D8%AE%20%D8%B3%D9%86%D8%A9%202021.pdf.aspx
3. المنصة الرسمية لحكومة الإمارات العربية المتحدة. «سياسة حماية البنية التحتية للمعلومات الحيوية». متاح (تاريخ الاطلاع: 2 فبراير 2026) على: https://u.ae/ar/about-the-uae/strategies-initiatives-and-awards/policies/transport-and-infrastructure/critical-information-infrastructure-protection-policy
4. Abalkhail, Abdullah A. “Saudi Arabia’s Management of the Hajj Season through Artificial Intelligence.” Sustainability 14, no. 21 (2022). available (accessed on 27 Jan 2026) at: https://www.mdpi.com/2071-1050/14/21/14142
5. Brantingham, Paul J. “The Geometry of Crime and Crime Pattern Theory.” (2017). available (accessed on 27 Jan 2026) at: https://www.crimrxiv.com/pub/b3vnxots/download/pdf
6. Brantingham, Patricia L., and Paul J. Brantingham. “Nodes, Paths and Edges: Considerations on the Complexity of Crime and the Physical Environment.” Journal of Environmental Psychology 13 (1993): 3–28. available (accessed on 20 Jan 2026) at: https://www.sciencedirect.com/science/article/abs/pii/S0272494405802129
7. Butorac, Ksenija, and Jelena Marinović. “Geography of Crime and Geographic Information Systems.” Journal of Forensic Sciences & Criminal Investigation 2, no. 4 (2017): 1–2.
8. Caplan, Joel M., and Leslie W. Kennedy. Risk Terrain Modeling Compendium. Rutgers Center on Public Security, 2011. available (accessed on 28 Jan 2026) at: https://www.rutgerscps.org/uploads/2/7/3/7/27370595/riskterrainmodelingcompendium_caplankennedy2011.pdf
9. College of Policing. What Works Briefing: The Effects of CCTV on Crime. London: College of Policing, 2013. available (accessed on 21 Jan 2026) at: https://library.college.police.uk/docs/what-works/What-works-briefing-effects-of-CCTV-2013.pdf
10. Cohen, Lawrence E., and Marcus Felson. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44, no. 4 (1979): 588–608. available (accessed on 20 Jan 2026) at: https://faculty.washington.edu/matsueda/courses/587/readings/Cohen%20and%20Felson%201979%20Routine%20Activities.pdf
11. Department of the Air Force. Cyberspace Operations, AFDP 3-12. Washington, DC: Department of the Air Force, 1 February 2023. available (accessed on 20 Jan 2026) at: https://www.doctrine.af.mil/Portals/61/documents/AFDP_3-12/3-12-AFDP-CYBERSPACE-OPS.pdf
12. Eck, John E., Spencer Chainey, James G. Cameron, Michael Leitner, and Roberta E. Wilson. Mapping Crime: Understanding Hot Spots. Washington, DC: National Institute of Justice, 2005. accessed January 20, 2026. https://www.ojp.gov/pdffiles1/nij/209393.pdf
13. Europol. Criminal Networks in EU Ports: Risks and Challenges for Law Enforcement. The Hague: Europol, 30 March 2023. available (accessed on 27 Jan 2026) at: https://www.europol.europa.eu/cms/sites/default/files/documents/Europol_Joint-report_Criminal%20networks%20in%20EU%20ports_Public_version.pdf
14. Europol. Diversification in Maritime Cocaine Trafficking: Modi Operandi. The Hague: Europol, 2026. available (accessed on 27 Jan 2026) at: https://www.europol.europa.eu/cms/sites/default/files/documents/Diversification_in_maritime_cocaine_trafficking_modi_operandi.pdf
15. FEMA. National Incident Management System (NIMS) Appendix B: Command and Management. Washington, DC: FEMA, n.d. available (accessed on 27 Jan 2026) at: https://www.fema.gov/pdf/emergency/nims/nims_appendix.pdf
16. Frontex. “Risk analysis.” available (accessed on 27 Jan 2026) at: https://www.frontex.europa.eu/what-we-do/monitoring-and-risk-analysis/risk-analysis/risk-analysis/
17. Hudson, U.S. Department of Housing and Urban Development (HUD). Creating Defensible Space. Washington, DC: HUD, 1996. available (accessed on 27 Jan 2026) at: https://www.huduser.gov/publications/pdf/def.pdf
18. ICAO. Interactive Advance Passenger Information (iAPI) Best Practice. Montreal: International Civil Aviation Organization, October 2024. available (accessed on 27 Jan 2026) at: https://www.icao.int/sites/default/files/FAL/iAPI-Best-Practice_Oct-2024_CC-Meeting-Endorsement_withDisclaimer.pdf
19. INTRAC. “Triangulation.” M&E Universe (paper), 2017. accessed January 20, 2026. https://www.intrac.org/app/uploads/2017/01/Triangulation.pdf
20. Joint Chiefs of Staff. Joint Intelligence Preparation of the Operational Environment (JIPOE), Joint Publication 2-01.3. Washington, DC: U.S. Department of Defense, 16 June 2009. available (accessed on 20 Jan 2026) at: https://www.bits.de/NRANEU/others/jp-doctrine/jp2_01_3%2809%29.pdf
21. Joint Chiefs of Staff. Information Operations, Joint Publication 3-13. Washington, DC: U.S. Department of Defense, 27 November 2012. available (accessed on 20 Jan 2026) at: https://informationsecurity.info/wp-content/uploads/2021/04/jp3_13.pdf
22. Joint Emergency Services Interoperability Principles (JESIP). “Common Operating Picture.” available (accessed on 02 Feb 2026) at: https://www.jesip.org.uk/joint-doctrine/common-operating-picture/
23. Kennedy, Leslie W., Joel M. Caplan, and Eric L. Piza. “Risk Clusters, Hotspots, and Spatial Intelligence: Risk Terrain Modeling as an Algorithm for Police Resource Allocation Strategies.” Journal of Quantitative Criminology 27 (2011): 342–346.
24. Moteff, John, Claudia Copeland, and John Fischer. Critical Infrastructures: What Makes an Infrastructure Critical? Washington, DC: Congressional Research Service, January 29, 2003.
25. National Academies of Sciences, Engineering, and Medicine. Developing Policing Practices that Build Legitimacy. Washington, DC: The National Academies Press, 2022. available (accessed on 21 Jan 2026) at: https://www.nationalacademies.org/read/26678/chapter/3
26. National Academies of Sciences, Engineering, and Medicine. Proactive Policing: Effects on Crime and Communities. Washington, DC: The National Academies Press, 2017. available (accessed on 21 Jan 2026) at: https://nap.nationalacademies.org/resource/24928/Proactive%20Policing.pdf
27. National Institute of Justice. “Research in Brief: Predictive Policing: Understanding and Applying Analytical Methods.” available (accessed on 28 Jan 2026) at: https://nij.ojp.gov/library/publications/research-brief-predictive-policing-understanding-and-applying-analytical
28. Organization for Security and Co-operation in Europe (OSCE). Border Security and Management. Vienna: OSCE, 2023. available (accessed on 27 Jan 2026) at: https://www.osce.org/sites/default/files/f/documents/8/a/551846.pdf
29. Organization for Security and Co-operation in Europe (OSCE). Guidebook on Intelligence-Led Policing (ILP). Vienna: OSCE, 2017. available (accessed on 20 Jan 2026) at: https://www.osce.org/sites/default/files/f/documents/d/3/327476.pdf
30. Rhodes, Andrew. “Thinking in Space: The Role of Geography in National Security Decision Making.” Directed Research Paper, United States Naval War College, February 2019.
31. Rinaldi, Steven M., James P. Peerenboom, and Terrence K. Kelly. “Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies.” IEEE Control Systems Magazine 21, no. 6 (December 2001): 11–17.
32. Sampson, Robert J., and W. Byron Groves. “Community Structure and Crime: Testing Social-Disorganization Theory.” American Journal of Sociology 94, no. 4 (1989): 774–802. available (accessed on 21 Jan 2026) at: https://www.antoniocasella.eu/nume/sampson_communitystructurecrime_1989.pdf
33. Tyler, Tom R. “Procedural Justice, Legitimacy, and Effective Rule of Law.” Crime and Justice (2015): 4–8. available (accessed on 21 Jan 2026) at: https://law.yale.edu/sites/default/files/area/center/justice/document/5697d9ee08aea2d74375cb87.pdf
34. UNODC. Drug Trafficking in the Sahel. Vienna: United Nations Office on Drugs and Crime, 2022. available (accessed on 27 Jan 2026) at: https://www.unodc.org/documents/data-and-analysis/tocta_sahel/TOCTA_Sahel_drugs.pdf
35. UNODC. “The UNODC-WCO Container Control Programme (CCP).” available (accessed on 27 Jan 2026) at: https://www.unodc.org/unodc/en/drug-trafficking/container-control-programme.html
36. Wilson, James Q., and George L. Kelling. “Broken Windows: The Police and Neighborhood Safety.” The Atlantic (March 1982). available (accessed on 02 Feb 2026) at: https://www.theatlantic.com/magazine/archive/1982/03/broken-windows/304465/
37. Wortley, Richard, and Michael Townsley. “Environmental Criminology and Crime Analysis: Situating the Theory, Analytic Approach and Application.” (chapter PDF). available (accessed on 27 Jan 2026) at: https://api.pageplace.de/preview/DT0400.9781317487104_A28523482/preview-9781317487104_A28523482.pdf
38. World Health Organization (WHO). Mass Gatherings: Risk Management. December 2017. available (accessed on 27 Jan 2026) at: https://cdn.who.int/media/docs/default-source/disaster-mngmt/risk-management-mass-gatherings-december2017.pdf
39. Esri. “What is GIS?” available (accessed on 21 Jan 2026) at: https://www.esri.com/en-us/what-is-gis/overview
40. Esri. “Geospatial Platform | ArcGIS.” available (accessed on 02 Feb 2026) at: https://www.esri.com/en-us/arcgis/geospatial-platform/overview
Published
2026-05-16
How to Cite
Obaid Juma Al Kaabi. (2026). Area Study in Security Operations: A Spatial-Behavioral Framework for Integrating Collection and Building a Common Operational Picture . Journal of Educational and Human Sciences, (51), 274-296. https://doi.org/10.33193/JEAHS.51.2026.766
Section
المقالات