Threat Assessment : A Risk Management Approach book cover
1st Edition

Threat Assessment
A Risk Management Approach

ISBN 9780789016287
Published June 25, 2003 by Routledge
206 Pages

SAVE ~ $8.99
was $44.95
USD $35.96

Prices & shipping based on shipping country


Book Description

Detailed “how to's” of threat assessment—from the initial contact to the sharing of results!

Risk management can be an organizational nightmare, but it is an essential part of your operations. Recent events have shown us that organizations need to know how to respond swiftly and effectively in emergencies and that companies need to protect their employees from internal and external threats. This book provides you with the tools you need to protect both your employees and yourself from a variety of threats.

Threat Assessment: A Risk Management Approach examines the factors that human resource, security, legal, and behavioral professionals need to understand in work violence and threat situations that disrupt the working environment, revealing the best ways to reduce risk and manage emergencies. It includes case studies and hypothetical examples that show recommended practices in action and provides detailed interviewing methods that can increase the efficiency of current strategies. Helpful appendices provide sample forms for identification cards, stay-away letters, workplace behavior improvement plans for problem employees, questions for health care providers, and announcements for employees regarding security changes. An extensive bibliography points the way to other useful material on this subject.

Threat Assessment: A Risk Management Approach explores:

  • the role of the multidisciplinary threat management team
  • corporate liaisons with law enforcement agencies
  • cyberthreats and stalking
  • insider threats
  • category classification of offending behaviors
Risk management is a constantly evolving field, and Threat Assessment provides you with access to the latest updates. Staying up-to-date on risk management innovations will help you increase corporate sensitivity to possible threats and provide the safest possible working environment to your employees.

The authors of Threat Assessment are seasoned professionals with extensive experience in risk management. You can learn from their expertise and adapt it to your situation, improving workplace safety and contributing to security in your own community.

Table of Contents

  • Foreword
  • Preface
  • Acknowledgments
  • Chapter 1. Threat Management: Organizational Challenge
  • A Threat Review Team
  • Chapter 2. Work Place Violence: An Overview
  • Defining Workplace Violence
  • Recognizing the Types of Workplace Violence
  • Statistics on Workplace Violence
  • Myths Regarding Workplace Violence
  • Conditions That May Lead to Workplace Violence
  • Warning Signs
  • Chapter 3. Organizational Response Options
  • Threat Response Process
  • Incident Response Checklist
  • Chapter 4. Intake Process
  • Initial Stage of Contact
  • Second Stage of Contact
  • Chapter 5. Category Classification
  • Category 1
  • Category 2
  • Category 3
  • Category 4
  • Category 5
  • Case Examples
  • Chapter 6. Threat Management: Interviewing Strategies
  • Introduction
  • Interview and Investigation
  • Chronological Documentation
  • Establishing the Pattern
  • Collateral Interviews
  • Assessment of Case Material
  • The Interview Environment
  • Interview Phases
  • Chapter 7. Liaison with Law Enforcement
  • Chapter 8. Analysis of Threats
  • Principles of Threat Communication Analysis
  • Communicated Threat Rating
  • Case Example
  • Chapter 9. Threat Assessment Feedback for Management
  • Feedback Elements
  • Case Example
  • Chapter 10. Stalking As a Contemporary Crime in the Workplace
  • Background
  • Stalking Defined
  • Stalking As a Mental Disorder in the Workplace
  • Threat Assessment and Response
  • Chapter 11. Cyberthreats
  • Defining Cyberthreats
  • Risk Control
  • Case Examples
  • Chapter 12. Insider Threat: Risk Management Consideration
  • Behavior, Personality, and Motivation of the Employee at Risk
  • The Development of a Problem
  • Behavioral Indicators of Insider Risk
  • Applications
  • Chapter 13. Executive Vulnerability
  • Appendix A: Threat Information Card for Potential Victims
  • Appendix B: Stay Away Letter
  • Appendix C: Behavior Improvement Plan
  • Appendix D: Health Provider Questions
  • Appendix E: Announcement of Employees Regarding Security Changes
  • Bibliography
  • Index
  • Reference Notes Included

View More