The dynamics of threat management.

Author(s):  
Joseph A. Kinney
Keyword(s):  
2018 ◽  
Vol 56 (2) ◽  
pp. 481-490 ◽  
Author(s):  
Josie Carwardine ◽  
Tara G. Martin ◽  
Jennifer Firn ◽  
Rocio Ponce Reyes ◽  
Sam Nicol ◽  
...  

Author(s):  
Kris Mohandie ◽  
Jens Hoffmann

Threat assessment and threat management occur within the evolving context of legal issues that both enhance and restrict threat investigation and intervention activities. Legal issues affecting threat management practice in Europe and the United States include criminal code statutes and case law that define relevant crimes such as stalking, criminal threats, domestic violence, and other violent crimes that fall within the purview of threat assessors. Additional issues include civil commitment procedures such as involuntary hospitalization, as well as bail and probation conditions. New developments in threat management–related laws are usually precipitated by tragedy and violence. Most recently, in the United States, this led to red flag laws and Extreme Risk Protection Orders in the aftermath of the Parkland, Florida, school shooting in 2018. Similarly, in Germany, the suicide of a stalking victim has resulted in greater sensitivity by the legal system to victim impact in stalking cases. Red flag law preliminary research data related to threat reduction have been promising, and ideally the impact of legislative changes in multiple threat management contexts on victim safety should continue to be assessed so that evidence informs violence risk legal responses.


1998 ◽  
pp. 295-315 ◽  
Author(s):  
Stephen G. White ◽  
James S. Cawood
Keyword(s):  

2019 ◽  
Vol 19 (3) ◽  
pp. 1-19 ◽  
Author(s):  
Muhamad Felemban ◽  
Emad Felemban ◽  
Jason Kobes ◽  
Arif Ghafoor

2006 ◽  
pp. 215-241
Author(s):  
James B.D. Joshi ◽  
Mei-Ling Shyu ◽  
Walid Aref ◽  
Arif Ghafoor

This chapter focuses on the key challenges in the design of multimedia-based scalable techniques for threat management and security of information infrastructures. It brings together several multimedia technologies and presents a conceptual architectural framework for an open, secure distributed multimedia application that is composed of multiple domains employing different security and privacy policies and various data analysis and mining tools for extracting sensitive information. The challenge is to integrate such disparate components to enable large-scale multimedia applications and provide a mechanism for threat management. The proposed framework provides a holistic solution for large-scale distributed multi-domain multimedia application environments.


Sign in / Sign up

Export Citation Format

Share Document