International handbook of threat assessment /

"This introductory chapter sets forth three foundations for threat assessment and management: the first foundation is the defining of basic concepts, such as threat assessment and threat management; the second foundation outlines the similarities and differences between threat assessment and vi...

Full description

Saved in:
Bibliographic Details
Group Author: Meloy, J. Reid.; Hoffmann, Jens, 1968-
Published: Oxford University Press,
Publisher Address: New York, NY :
Publication Dates: [2021]
Literature type: Book
Language: English
Edition: Second edition.
Subjects:
Summary: "This introductory chapter sets forth three foundations for threat assessment and management: the first foundation is the defining of basic concepts, such as threat assessment and threat management; the second foundation outlines the similarities and differences between threat assessment and violence risk assessment; the third foundation is a detailed overview of the research findings, theoretical avenues, measurement instruments, and developments in practice over the past quarter century. The goal of our chapter is to introduce the professional reader to the young scientific field of threat assessment and management, and to clarify and guide the seasoned professional toward greater excellence in his or her work"--
Item Description: Revised edition of International handbook of threat assessment, [2014].
Carrier Form: xvii, 736 pages : illustrations ; 26 cm
Bibliography: Includes bibliographical references and index.
ISBN: 9780190940164
Index Number: RC569
CLC: R749.91-62
Call Number: R749.91-62/I615/2nd ed.
Contents: Cover -- International Handbook of Threat Assessment -- Copyright -- Dedication -- Contents -- Foreword -- About the Editors -- Contributors -- Part I: Foundations -- 1. Threat Assessment and Threat Management -- 2. Explicit Threats of Violence -- 3. Warning Behaviors -- 4. Source Interviewing in a Threat Management Context -- 5. Legal Issues in Threat Assessment and Management -- Part II: Fields of Practice -- 6. Workplace Targeted Violence: Assessment and Management in Dynamic Contexts -- 7. Threat Assessment and Management in K-?12 Schools
8. Threat Assessment and Management in Higher Education: Enhancing the Standard of Practice -- 9. Public Figure Stalking and Attacks -- 10. Intimate Partner Violence, Stalking, and Femicide -- 11. Stalking Threat and Risk Assessment -- 12. The Assessment of Anonymous Threatening Communications -- 13. Lone Actor Terrorism -- 14. Electronic Threats and Harassment: A Dominant Role in Threat Assessment -- 15. Crawling in the Dark-?Perspectives on Threat Assessment in the Virtual Sphere -- 16. Insider Threats: Leveraging the Benefits of Behavioral Science Research
17. Threat Assessment of Targeted Honor-?Based Violence -- 18. Fundamentals of Threat Assessment for Beginners -- 19. International Legal Perspectives on Threat Assessment -- 20. Protective Intelligence: Threat Assessment and Management Considerations -- 21. Critical Concepts for Threat Assessment and Management With Adolescents -- 22. Rethinking the Path to Intended Violence -- 23. False Allegations in Rape, Stalking, and Gang-?Stalking -- 24. The Importance of Bystanders in Threat Assessment and Management -- Part III: Operations
25. Enhancing School Safety Using a Threat Assessment Model: An Operational Chapter for Preventing Targeted School Violence -- 26. Operations of the Los Angeles Police Department Threat Management Unit and Crisis Support Response Section -- 27. The Fixated Threat Assessment Centers: The Joint Policing and Psychiatric Approach to Risk Assessment and Management in Cases of Public Figure Threat and Lone Actor Grievance-?Fueled Violence -- 28. Domestic Violence Risk Assessment: Tools and Procedures for Threat Assessment and Management
29. Threat Triage: Recognizing the Needle in the Haystack -- 30. Workplace Violence Risk Instrumentation: Use of the WAVR-?21 V3 and the CAG -- 31. The Problem Behaviour Program: Threat Assessment and Management in a Community Forensic Mental Health Context -- 32. Digital Behavioral Criminalistics to Elucidate the Cyber Pathway to Intended Violence -- 33. Mitigating Harm in the Military: A Military Service Approach to Threat Assessment and Management -- 34. Making Sense of Terrorist Violence and Building Psychological Expertise