Threat Assessment: A Risk Management Approach

Author:   James T Turner ,  Michael Gelles ,  Michael G. Gelles
Publisher:   Taylor & Francis Inc
ISBN:  

9780789016270


Pages:   206
Publication Date:   14 July 2003
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $80.00 Quantity:  
Add to Cart

Share |

Threat Assessment: A Risk Management Approach


Add your own review!

Overview

Detailed how to's of threat assessmentfrom the initial contact to the sharing of results! Risk management can be an organizational nightmare, but it is an essential part of your operations. Recent events have shown us that organizations need to know how to respond swiftly and effectively in emergencies and that companies need to protect their employees from internal and external threats. This book provides you with the tools you need to protect both your employees and yourself from a variety of threats. Threat Assessment: A Risk Management Approach examines the factors that human resource, security, legal, and behavioral professionals need to understand in work violence and threat situations that disrupt the working environment, revealing the best ways to reduce risk and manage emergencies. It includes case studies and hypothetical examples that show recommended practices in action and provides detailed interviewing methods that can increase the efficiency of current strategies. Helpful appendices provide sample forms for identification cards, stay-away letters, workplace behavior improvement plans for problem employees, questions for health care providers, and announcements for employees regarding security changes. An extensive bibliography points the way to other useful material on this subject. Threat Assessment: A Risk Management Approach explores: the role of the multidisciplinary threat management team corporate liaisons with law enforcement agencies cyberthreats and stalking insider threats category classification of offending behaviors Risk management is a constantly evolving field, and Threat Assessment provides you with access to the latest updates. Staying up-to-date on risk management innovations will help you increase corporate sensitivity to possible threats and provide the safest possible working environment to your employees. The authors of Threat Assessment are seasoned professionals with extensive experience in risk management. You can learn from their expertise and adapt it to your situation, improving workplace safety and contributing to security in your own community.

Full Product Details

Author:   James T Turner ,  Michael Gelles ,  Michael G. Gelles
Publisher:   Taylor & Francis Inc
Imprint:   Routledge
Dimensions:   Width: 14.80cm , Height: 1.90cm , Length: 21.00cm
Weight:   0.400kg
ISBN:  

9780789016270


ISBN 10:   0789016273
Pages:   206
Publication Date:   14 July 2003
Audience:   General/trade ,  General
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Foreword Preface Acknowledgments Chapter 1. Threat Management: Organizational Challenge A Threat Review Team Chapter 2. Work Place Violence: An Overview Defining Workplace Violence Recognizing the Types of Workplace Violence Statistics on Workplace Violence Myths Regarding Workplace Violence Conditions That May Lead to Workplace Violence Warning Signs Chapter 3. Organizational Response Options Threat Response Process Incident Response Checklist Chapter 4. Intake Process Initial Stage of Contact Second Stage of Contact Chapter 5. Category Classification Category 1 Category 2 Category 3 Category 4 Category 5 Case Examples Chapter 6. Threat Management: Interviewing Strategies Introduction Interview and Investigation Chronological Documentation Establishing the Pattern Collateral Interviews Assessment of Case Material The Interview Environment Interview Phases Chapter 7. Liaison with Law Enforcement Chapter 8. Analysis of Threats Principles of Threat Communication Analysis Communicated Threat Rating Case Example Chapter 9. Threat Assessment Feedback for Management Feedback Elements Case Example Chapter 10. Stalking As a Contemporary Crime in the Workplace Background Stalking Defined Stalking As a Mental Disorder in the Workplace Threat Assessment and Response Chapter 11. Cyberthreats Defining Cyberthreats Risk Control Case Examples Chapter 12. Insider Threat: Risk Management Consideration Behavior, Personality, and Motivation of the Employee at Risk The Development of a Problem Behavioral Indicators of Insider Risk Applications Chapter 13. Executive Vulnerability Appendix A: Threat Information Card for Potential Victims Appendix B: Stay Away Letter Appendix C: Behavior Improvement Plan Appendix D: Health Provider Questions Appendix E: Announcement of Employees Regarding Security Changes Bibliography Index Reference Notes Included

Reviews

Author Information

James T. Turner, Michael Gelles

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

ls

Shopping Cart
Your cart is empty
Shopping cart
Mailing List