School Threat Assessments: Psychological and Behavioral Considerations

2017 ◽  
Vol 43 (1) ◽  
pp. 32-40
Author(s):  
Peter Langman
Keyword(s):  
2021 ◽  
Vol 95 ◽  
pp. 103451
Author(s):  
Adam T. Biggs ◽  
Dominick Pistone ◽  
Mackenzie Riggenbach ◽  
Joseph A. Hamilton ◽  
Kara J. Blacker
Keyword(s):  

2017 ◽  
Vol 48 (1) ◽  
pp. e12378 ◽  
Author(s):  
J. E. Stewart ◽  
A. L. Ross-Davis ◽  
R. N. Graҫa ◽  
A. C. Alfenas ◽  
T. L. Peever ◽  
...  

2020 ◽  
Vol 2 (2) ◽  
Author(s):  

This article has been produced by the Combined Threat Assessment Group (CTAG). It provides in detail, and publicly for the first time, a genuinely informed explanation for the origins and function of CTAG. It covers the nature and challenge of threat assessment, the methodology applied as well various iterations of the threat assessments that are undertaken. This leads on to an explanation of how New Zealand’s National Terrorism Threat Level is set. Overall, this article provides an informative and well-rounded explanation of the components that comprise the National Terrorism Threat Level and makes for essential reading for wider public service, academic, and security conscious public and private institutions across the country.


2019 ◽  
pp. 43-61
Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


Sign in / Sign up

Export Citation Format

Share Document