U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Threat Assessment: A Risk Management Approach

NCJ Number
201825
Author(s)
James T. Turner Ph.D.; Michael G. Gelles PsyD
Date Published
2003
Length
201 pages
Annotation
This book provides tools for the human resource professional in assessing risk for employees from a variety of threats.
Abstract
Chapter 1 discusses the objective of a risk management approach, which is to develop a plan that contains two core elements: ongoing threat assessment; and threat control action, threat management, and risk control. A threat review team, consisting of personnel from management, human resources, security, and experts in labor law and threat assessment, is one way to respond to violence in the workplace. Chapter 2 defines workplace violence and discusses the types, statistics, myths, and warning signs of workplace violence. Chapter 3 focuses on the threat response process and provides an incident response checklist. In chapter 4, the intake process is detailed, with a discussion of the initial stage of contact and the second stage of contact. The intake procedure assists management in relating the necessary information regarding a problem to the assessor. Chapter 5 describes the five categories of the Threat Assessment Model (TAM), ranging from high violence potential (Category 1) to insufficient data for violence potential (Category 5). Case examples are provided. Chapter 6 provides interviewing strategies for threat management, including assessment of case material and interview phases. Liaison with law enforcement is discussed in Chapter 7. Chapter 8 provides an analysis of threats, using the principles of threat communication analysis and communicated threat rating. In Chapter 9, threat assessment feedback for management is discussed. Chapter 10 focuses on stalking as a contemporary crime in the workplace. Chapter 11 describes cyberthreats and risk control for this type of crime. Chapter 12 describes the behavior, personality, and motivation of the employee at risk, as well as behavioral indicators of insider risk. Chapter 13 discusses executive vulnerability. 5 appendices, bibliography, index

Downloads

No download available

Availability