Hostile Design

Week 8

Petty, James. 2016. “The London Spikes Controversy: Homelessness, Urban Securitisation and the Question of ‘Hostile Architecture.’International Journal for Crime, Justice and Social Democracy 5 (March): 67.

Shows the hostile element in T4
Limited access in T4

Limited access in T4

In the article "The London Spikes Controversy: Homelessness, Urban Securitisation and the Question of 'Hostile Architecture'," the author, James Petty discussed the issue of hostile architecture. He studied it in the context of homelessness and urban...

The inside of a building shared by multiple businesses showing a bathroom door protected by a keypad lock.
Public Space and Social Codes

Public Space and Social Codes

In James Petty’s research, he examines "hostile architecture" and its implications in urban spaces. It begins with a case study of metal spikes installed in an alcove of a high-end apartment building in South London, which started an outrage on social media. This...

Hostile Architecture On Campus

Hostile Architecture On Campus

This is the secondary security to get into the library. In the image you can see the metal detectors set up as well as the front desk in the background. Once through the initial security room, the metal detectors and past the front desk, anyone is free to use the...

A Seemingly Safe Public Oasis

A Seemingly Safe Public Oasis

Summary In this article John Petty explored the idea of “hostile architecture,” and its continuous implementation specifically in London. Hostile Architecture is described as architecture and design that is installed in urban settings that is aimed to directly...

Dark, thick marble columns frame a golden art deco glass door. In the background, the main library stairs twist to the right.
Not so Public

Not so Public

Architectural details that selectively exclude specific groups or behaviors, such as anti-street sleeping spikes, are an example of visibly violent forms of social control. James Petty argues that the less obvious ways that buildings can detour “undesirable” users...