The Role of Psychological Assessment in Countering Violent Extremism

Author(s):  
Garth Davies ◽  
Sara Doering ◽  
Christine Neudecker

The following chapter provides an overview of approaches and tactics commonly used in programs developed to counter radicalization and violent extremism, with a particular emphasis on the role of risk/threat assessments used within existing programs. The purpose of this chapter is to understand to what extent existing radicalization prevention, deradicalization, and disengagement programs are using some form of individual-level risk assessment for terrorism or other forms of violence, or if any psychological assessments or interventions are used. The results indicate that the overwhelming majority of current programs do not explicitly include individual risk assessments. This is a critical oversight, one which hampers the potential efficacy of disengagement efforts.

2019 ◽  
pp. 43-61
Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


2020 ◽  
Vol 27 (7) ◽  
Author(s):  
Wasin Matsee ◽  
Watcharapong Piyaphanee

We highlight lessons learned from the 2018–19 rubella outbreak in Japan on the use of Measles-Mumps-Rubella vaccine among travellers. We underline that individual risk assessment during pre-travel counselling is still essential in all situations especially among immunocompromised and pregnant travellers.


Science ◽  
1980 ◽  
Vol 208 (4448) ◽  
pp. 1114-1119 ◽  
Author(s):  
Chauncey Starr ◽  
Chris Whipple

The analytical approaches utilized for evaluating the acceptability of technological risk originate from analogies to financial cost-benefit risk analysis. These analogies appear generally valid for viewing risk from a societal basis, but are not applicable to individual risk assessments. Conflicts arising from these different views of risk assessment provide insights to the origins of individual, intuitive evaluations. Societal risk decisions made under conflict represent political compromises, and the resulting decision process creates substantial conflict costs. The pragmatic use of quantitative risk criteria (safety targets) may be useful in reducing these costs.


2004 ◽  
Vol 67 (9) ◽  
pp. 1972-1976 ◽  
Author(s):  
LEILA M. BARRAJ ◽  
BARBARA J. PETERSEN

The 1st International Conference on Microbiological Risk Assessment: Foodborne Hazards was held in July 2002. One of the goals of that conference was to evaluate the current status and future needs and directions of the science of microbial risk assessment. This article is based in part on a talk presented at that meeting. Here, we review the types of food consumption data available for use in microbial risk assessments and address their strengths and limitations. Consumption data available range from total population summary data derived from food production statistics to detailed information, derived from national food consumption surveys, about the types and amounts of food consumed at the individual level. Although population summary data are available for most countries, detailed data are available for a limited number of countries and may only be available in summary format. Despite the relatively large amount of detailed information collected by these national surveys, information crucial to microbial risk assessments, such as the specific types of foods, the eating patterns of susceptible populations, or an individual's propensity for consuming high-risk foods (e.g., eating undercooked hamburgers, raw shellfish, or temperature-abused foods), are not collected during these surveys.


2019 ◽  
pp. 231-249
Author(s):  
D. Elaine Pressman ◽  
Cristina Ivan

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.


2010 ◽  
Vol 143-144 ◽  
pp. 116-119
Author(s):  
Jia Jun Li ◽  
Li Ping Qin ◽  
Jia Zhao

To achieve low costs and better accuracy of individual risk assessments, we constructed a practical method based on multiple classifiers. The method includes many singal classifiers, such as decision trees and the cluster analysis. And we tested it empirically. The result shows that the application of the method can achieve better accuracy than any single classifier of it.


2007 ◽  
Vol 190 (S49) ◽  
pp. s60-s65 ◽  
Author(s):  
Stephen D. Hart ◽  
Christine Michie ◽  
David J. Cooke

BackgroundActuarial risk assessment instruments (ARAIs) estimate the probability that individuals will engage in future violence.AimsTo evaluate the ‘margins of error’ at the group and individual level for risk estimates made using ARAIs.MethodAn established statistical method was used to construct 95% CI for group and individual risk estimates made using two popular ARAIs.ResultsThe 95% CI were large for risk estimates at the group level; at the individual level, they were so high as to render risk estimates virtually meaningless.ConclusionsThe ARAIs cannot be used to estimate an individual's risk for future violence with any reasonable degree of certainty and should be used with great caution or not at all. In theory, reasonably precise group estimates could be made using ARAIs if developers used very large construction samples and if the tests included few score categories with extreme risk estimates.


Sign in / Sign up

Export Citation Format

Share Document