Islamist movements in the Fergana Valley: a new threat assessment approach

Global Crime ◽  
2014 ◽  
Vol 15 (3-4) ◽  
pp. 320-336 ◽  
Author(s):  
Viktoria Akchurina ◽  
Anita Lavorgna
Author(s):  
Randy Borum

Though targeted attacks at schools are rare events, educators and behavioral health professionals working in those settings must evaluate threats and threatening situations when they occur. Schools across the world have experimented with different methods over time, but the threat assessment approach—particularly executed by an interdisciplinary team—has emerged as abest practice. This chapter describes the results of the Safe School Initiative, an in-depth case analysis of 37 targeted school attacks involving 41 attackers over a 25-year period, and their implications for understanding the attackers, the situations, the settings, and the targets. It addresses the continuum of threats that schools may encounter and offers some heuristics for decision making, including recent research on key indicators of intent. It concludes by emphasizing the need for schools to have incident and post-incident response plans to mitigate harm if an attack does occur.


Author(s):  
Chad Bunch ◽  
Glenn Cameron ◽  
Rafael G. Mora

This paper provides guidelines to identify all threats and assess a pipeline’s susceptibility to those threats in order to select appropriate and effective mitigation, monitoring, and prevention measures prior to reactivating pipelines. The intent of this paper is to provide pipeline operators, consultants and regulatory agencies with a generic threat assessment approach that has to be customized to the pipeline-specific characteristics and conditions, and the regulatory requirements of its own jurisdiction. A literature review and authors’ experiences across the pipeline industry have identified the need for a generic, yet complete approach that guides pipeline integrity engineers in the methodologies that adequately and effectively assess threats prior to reactivation and that can be validated in a timely manner during the operations. Pipeline operators may be called on to reactivate pipelines that are facing challenges such as aging, changes in operational conditions, lack of maintenance and inconsistent integrity practices while facing constraints from increasing population density, higher pressure and flow throughput requirements of a competitive marketplace, and regulatory requirements insisting on higher levels of safety and protection of the environment. This paper was structured with the following components to assist the reader in conducting threat assessments: • Current regulations and recognized industry standards with respect to reactivating pipelines; • Definition of and differentiation between hazard and threat; • Hazard identification analysis for the known and potential situations, events and conditions; and • Threat susceptibility and identification analysis process for the known categories derived from the hazard identification process. A case study is described as an example of applying the guidelines to conduct threat susceptibility and identification assessments of a pipeline prior to its reactivation. The results from the threat susceptibility and identification assessment process can help operators, consultants and regulators in determining effective inspection, mitigation, prevention and monitoring measures.


Author(s):  
Anna Sorrentino ◽  
Anna Baldry ◽  
David Farrington

Background. This article presents results from the evaluation of the Tabby Improved Prevention and Intervention Program (TIPIP) for cyberbullying and cybervictimization. TIPIP is theoretically designed to address cyberbullying and cybervictimization. It is the first program in this field developed combining the Ecological System Theory and the Threat Assessment Approach. Method. The Tabby Improved program was evaluated using an experimental design with 759 Italian students (aged 10–17 years) randomly allocated via their classes to either the Experimental or Control Group. Results. Repeated measures ANOVAs showed a significant decrease both in cyberbullying and cybervictimization among students who received the intervention with a follow-up period of six months. The program was more effective for boys than for girls. Conclusions. Because cyberbullying is a cruel problem negatively affecting those involved, validated interventions that prove their efficacy in reducing the problem using experimental designs should be widely tested and promoted, paying particular attention to implementing a program fully to increase and guarantee its effectiveness.


1995 ◽  
Vol 11 (3) ◽  
pp. 203-212 ◽  
Author(s):  
Frank C. Verhulst

In this article, recent developments in the assessment and diagnosis of child psychopathology are discussed with an emphasis on standardized methodologies that provide data that can be scored on empirically derived groupings of problems that tend to co-occur. Assessment methodologies are highlighted that especially take account of the following three basic characteristics of child psychopathology: (1) the quantitative nature of child psychopathology; (2) the role of developmental differences in the occurrence of problem behaviors, and (3) the need for multiple informants. Cross-cultural research is needed to test the applicability of assessment procedures across different settings as well as the generalizability of taxonomic constructs. Assessments of children in different cultures can be compared or pooled to arrive at a multicultural knowledge base which may be much stronger than knowledge based on only one culture. It is essential to avoid assuming that data from any single source reveal the significance of particular problems. Instead, comprehensive assessment of psychopathology requires coordination of multisource data using a multiaxial assessment approach.


Sign in / Sign up

Export Citation Format

Share Document