Evaluating risk for targeted violence in schools: Comparing risk assessment, threat assessment, and other approaches

2001 ◽  
Vol 38 (2) ◽  
pp. 157-172 ◽  
Author(s):  
Marisa Reddy ◽  
Randy Borum ◽  
John Berglund ◽  
Bryan Vossekuil ◽  
Robert Fein ◽  
...  
Author(s):  
Randy Borum

Though targeted attacks at schools are rare events, educators and behavioral health professionals working in those settings must evaluate threats and threatening situations when they occur. Schools across the world have experimented with different methods over time, but the threat assessment approach—particularly executed by an interdisciplinary team—has emerged as abest practice. This chapter describes the results of the Safe School Initiative, an in-depth case analysis of 37 targeted school attacks involving 41 attackers over a 25-year period, and their implications for understanding the attackers, the situations, the settings, and the targets. It addresses the continuum of threats that schools may encounter and offers some heuristics for decision making, including recent research on key indicators of intent. It concludes by emphasizing the need for schools to have incident and post-incident response plans to mitigate harm if an attack does occur.


Author(s):  
Randy Borum ◽  
Mary Rowe

Bystanders—those who observe or come to know about potential wrongdoing—are often the best source of preattack intelligence, including indicators of intent and “warning” behaviors. They are the reason that some planned attacks are foiled before they occur. Numerous studies of targeted violence (e.g., mass shootings and school shootings) have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. This chapter describes—with empirical support—why threat assessment professionals should consider bystanders; outlines a model for understanding bystander decision-making; reviews common barriers to bystander reporting; and suggests ways to mitigate those barriers, to engage bystanders at an individual level, and to improve reporting. The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. When tragic incidents of planned violence occur, however, it is almost always uncovered “that someone knew something” about the attack before it happened. This happens because, as attack plans unfold, people in several different roles may know, or come to know, something about what is happening before harm occurs. The perpetrators know, and so might others, including targets, family members, friends, coworkers, or even casual observers.


Author(s):  
Kenneth J. Sousa ◽  
Laurie E. MacDonald ◽  
Kenneth T. Fougere

This study examines the possible disconnect between student concerns about privacy when using the Internet and their behavior. The literature indicates that Internet users are concerned about privacy but their web-browsing habits consistently put their privacy at risk. Browsing habits were examined using five factors: (1) privacy concerns, (2) self-efficacy, (3) risk assessment, (4) threat assessment, and (5) privacy involvement. These factors were analyzed for their relationship to privacy behavior. A survey questionnaire was developed and administered to a sample drawn from university students.


2011 ◽  
Vol 38 (6) ◽  
pp. 554-564 ◽  
Author(s):  
Jennifer E. Storey ◽  
Andrea L. Gibas ◽  
Kim A. Reeves ◽  
Stephen D. Hart

Although a great deal of research has focused on the development and validation of violence risk (threat) assessment instruments, few studies have examined whether professionals can be trained to use these instruments. The present study evaluated the impact of a violence risk assessment training program on the knowledge, skills, and attitudes of 73 criminal justice professionals, including police officers, civilian support staff, and prosecutors. The program covered principles of violence risk assessment, the nature of mental disorder and its association with violence risk, and the use of various structured professional judgment (SPJ) risk assessment instruments. Comparisons of pre- and post-training evaluations indicated significant improvements on measures of knowledge about risk assessment, skills in the analysis of risk in a case vignette, and perceived confidence in conducting violence risk assessments. Findings support the utility of risk assessment training for criminal justice professionals and the utility of SPJ violence risk assessment instruments generally.


2021 ◽  
pp. 106-112
Author(s):  
O. РАNСНENKO

The article considers topical issues of cyber threat risk assessment. It contains an analysis of the Law “On Basic Principles for providing of Cyber Security of Ukraine”, the Cyber Security Strategy of Ukraine and other legislative acts for providing on cyber security. The main approaches to determining the assessment of cyber threats are considered. The best examples of foreign practice of cyber threat risk assessment are analyzed, the most effective national systems of their assessment are revealed. It is concluded that multi-level risk and threat assessment systems are most effective when the relevant analysis is conducted at both the national and regional and/or local levels.


Author(s):  
Liam Ennis ◽  
N. Zoe Hilton

Many cases referred for threat assessment involve intimate partner violence (IPV). As a form of targeted violence, IPV fits the preventative focus of the threat assessment model. However, heterogeneity of IPV offender profiles, the personal nature of the relationship between aggressor and target, and concern for a diverse range of undesirable but relatively probable outcomes present distinct challenges to effective threat management. In this chapter, the authors offer a theoretically grounded and empirically informed framework for evaluating and managing threats to intimate partners. They describe empirically validated IPV risk assessment tools, and outline an approach to IPV threat assessment using the guiding principles of risk, need, and responsivity; such guidelines emphasize communication and collaboration with the threat management team and third parties, including the victim, and include perpetrator controls that attend to the perpetrator’s criminogenic needs. The authors also discuss victim safety issues and potential situational risk factors applying to IPV cases.


This chapter turns its focus to ways to assess the risk of mass shootings. Risk assessment is used for the prevention and initial identification of violence. The usefulness of risk assessment instruments in this process is debated. Also discussed is the viability of criminal profiling, looking at characteristics associated with a particular type of offender. To add to the discussion, the motives of previous mass shooters selected as case studies are detailed. This goes some way to showing that the varied motivations of perpetrators make it difficult to adequately assess the risk posed. The next chapter will illustrate that threat assessment is a more useful approach to determine whether an individual intends to perpetrate a mass shooting.


2002 ◽  
Vol 29 (5) ◽  
pp. 590-616 ◽  
Author(s):  
P. Randall Kropp ◽  
Stephen D. Hart ◽  
David R. Lyon

Risk assessment of stalkers is difficult due to the diversity of stalking-related behaviors and the lack of research. The authors discuss three problems. First, stalking is a form of targeted violence, that is, violence directed at specific people known to the perpetrator. Second, stalking may include acts that are implicitly or indirectly threatening. Third, stalking can persist for many years, even decades. In contrast, most research on violence risk assessment ignores the relationship between victim and perpetrator, defines violence solely in terms of physical harm, and tracks perpetrators for limited time periods. The authors conclude that these problems make it impossible to rely on actuarial approaches when assessing risk for stalking at the present time, although it is possible to use structured professional judgment. They discuss some basic principles that can be used to guide stalking risk assessment within the framework of structured professional judgment.


Author(s):  
Robert A. Fein ◽  
Bryan Vossekuil ◽  
Gwen A. Holden

Sign in / Sign up

Export Citation Format

Share Document