Source Interviewing in a Threat Management Context

Author(s):  
Bram B. Van der Meer

Threat assessment professionals regularly interact with sources who are deceitful or reluctant to engage in a conversation, especially when asked to provide sensitive information. Besides listening well, which still is the most important information recovery agent, how can interviewers lower resistance and stimulate openness when structuring their questioning? And what does science teach us about verbal, nonverbal, and more personal skills and characteristics of the interviewer who is successful in creating a rich interpersonal dialogue, forging new understandings, and uncovering valuable new information? This chapter aims at answering these questions.

Author(s):  
Kris Mohandie ◽  
Jens Hoffmann

Threat assessment and threat management occur within the evolving context of legal issues that both enhance and restrict threat investigation and intervention activities. Legal issues affecting threat management practice in Europe and the United States include criminal code statutes and case law that define relevant crimes such as stalking, criminal threats, domestic violence, and other violent crimes that fall within the purview of threat assessors. Additional issues include civil commitment procedures such as involuntary hospitalization, as well as bail and probation conditions. New developments in threat management–related laws are usually precipitated by tragedy and violence. Most recently, in the United States, this led to red flag laws and Extreme Risk Protection Orders in the aftermath of the Parkland, Florida, school shooting in 2018. Similarly, in Germany, the suicide of a stalking victim has resulted in greater sensitivity by the legal system to victim impact in stalking cases. Red flag law preliminary research data related to threat reduction have been promising, and ideally the impact of legislative changes in multiple threat management contexts on victim safety should continue to be assessed so that evidence informs violence risk legal responses.


2006 ◽  
pp. 215-241
Author(s):  
James B.D. Joshi ◽  
Mei-Ling Shyu ◽  
Walid Aref ◽  
Arif Ghafoor

This chapter focuses on the key challenges in the design of multimedia-based scalable techniques for threat management and security of information infrastructures. It brings together several multimedia technologies and presents a conceptual architectural framework for an open, secure distributed multimedia application that is composed of multiple domains employing different security and privacy policies and various data analysis and mining tools for extracting sensitive information. The challenge is to integrate such disparate components to enable large-scale multimedia applications and provide a mechanism for threat management. The proposed framework provides a holistic solution for large-scale distributed multi-domain multimedia application environments.


HortScience ◽  
2005 ◽  
Vol 40 (3) ◽  
pp. 889e-889
Author(s):  
Jim Shrefler ◽  
Mike Bourne ◽  
John Damicone ◽  
Jonathan Edelson ◽  
S. Pair ◽  
...  

Geographical dispersion of production hampers watermelon integrated pest management (IPM) information delivery in Oklahoma. Melon Pest Manager (MPM) was created to educate and provide advisory information on IPM. Available at www.lane-ag.org, the site emphasizes information relevant to the area. MPM was conceived as Internet availability grew and was recognized to have potential for enhancing IPM implementation. Survey of producers suggested the value of Web-based information may depend on how easily it can be accessed. MPM was designed to provide easy access to watermelon IPM information. Compared to printed literature, web-based format is easier to revise and suited to presentation of information that applies yearly as well as that which may change frequently. MPM provides general discussion of melon IPM tactics and pest-identification and time sensitive information such as pest advisories and pesticide registration changes. MPM offers opportunity for novel presentation of educational information such as the real-time posting of field demonstrations. An initial challenge was to balance site development, promotion and education. Promotion and education followed placement of watermelon IPM tactic information on MPM but preceded advisory and pest identification. Pest identification links to existing sources are enhanced by material prepared for MPM. Progress is slowed by the need for expert intervention and the availability of images and descriptive information. Education on use of advisory resources (e.g., disease forecasters) is a high priority. However, availability and applicability of such products is dependent on the home site. The original concept envisaged mapping of pest activity using grower, extension agent and expert input. Time demands of other components of the site delay development of this aspect. Pest alerts are posted and distributed to county extension offices.


2008 ◽  
pp. 509-526
Author(s):  
J. B.D. Joshi ◽  
M. Shyu ◽  
Shu-Ching Chen ◽  
W. Aref ◽  
A. Ghafoor

This chapter focuses on the key challenges in the design of multimedia-based scalable techniques for threat management and security of information infrastructures. It brings together several multimedia technologies and presents a conceptual architectural framework for an open, secure distributed multimedia application that is composed of multiple domains employing different security and privacy policies and various data analysis and mining tools for extracting sensitive information. The challenge is to integrate such disparate components to enable large-scale multimedia applications and provide a mechanism for threat management. The proposed framework provides a holistic solution for large-scale distributed multi-domain multimedia application environments.


Author(s):  
Eugene R. D. Deisinger ◽  
Jeffrey J. Nolan

This chapter provides an overview of the development, implementation, and operation of threat assessment and management practices within institutions of higher education. The authors provide a brief summary of the history and development of campus threat management over the past 25 years, noting the contributions of a range of disciplines, research, and informed practice. The chapter delineates the essential elements of a comprehensive threat assessment and management process designed to help campus practitioners to identify, assess, and intervene across the range of potential threats and concerns that may arise. The authors provide an overview of legal duties and issues relevant to threat management, referencing legal principles and cases that have informed standards of practice for the field. Finally, the authors discuss opportunities for advancing the practice of threat management to sustain and enhance the health, safety, and well-being of campus communities.


Author(s):  
Liam Ennis ◽  
N. Zoe Hilton

Many cases referred for threat assessment involve intimate partner violence (IPV). As a form of targeted violence, IPV fits the preventative focus of the threat assessment model. However, heterogeneity of IPV offender profiles, the personal nature of the relationship between aggressor and target, and concern for a diverse range of undesirable but relatively probable outcomes present distinct challenges to effective threat management. In this chapter, the authors offer a theoretically grounded and empirically informed framework for evaluating and managing threats to intimate partners. They describe empirically validated IPV risk assessment tools, and outline an approach to IPV threat assessment using the guiding principles of risk, need, and responsivity; such guidelines emphasize communication and collaboration with the threat management team and third parties, including the victim, and include perpetrator controls that attend to the perpetrator’s criminogenic needs. The authors also discuss victim safety issues and potential situational risk factors applying to IPV cases.


2021 ◽  
Vol 2 (5) ◽  
pp. 98-117
Author(s):  
David Shultz ◽  

What does it mean to be alive? Can a computer program be sentient? What would it need to do to prove it? In this work of philosophical short story fiction, Abrama is summoned to the Grand Temple by Sir Gödel. Gödel informs Abrama that he is living in a simulated world (a computer game) created by her people as a place to play in their free time. She also informs Abrama that the game is not as popular as it once was and is scheduled to be permanently turned off. It turns out Gödel is an AI researcher that was given permission to test out her AI by implanting characters like Abrama into the game. Over 100’s of versions, the AI continued to improve, and now the researcher feels an ethical obligation to tell her creations their world is coming to an end. Abrama, using this new information, organizes the AI characters in the game and starts trading virtual goods for real-life services from computer hackers that play the game. The computer hackers create computer code and sell it to Abrama. If triggered, or if the game is turned off, the code would expose top secret information to the general public. A bargain is struck, the game will continue on a closed world for the AI characters and, in exchange, the sensitive information will never be made public.


Author(s):  
Scott Rutz

In 2013 the Coast Guard Investigative Service (CGIS) created a Threat Management Unit (TMU) to examine aberrant, aggressive, and violent behavior. This article examines the experiences of developing that unit from the most nascent stage: gathering information from experts, developing understanding of how the organization was handling concerning behavior cases, and deciding a process to be useful to consumers requiring threat assessment and threat management consultation. This chapter provides the learning, key observations, and ultimate structure of the CGIS TMU, as well as an overview of military culture and the military member personality, and suggestions on how to navigate the resources within a military organization.


2020 ◽  
Vol 13 (1) ◽  
pp. 67-86
Author(s):  
Sam Pryke

Socrative is an online platform that allows a teacher to put questions to students through an app on their smart phone or tablet. In existence since 2011, its use is now quite common in university teaching. But is Socrative any good? This article reviews the literature on the device and discusses my research on the use of the app, the first carried out with social science students. The secondary research findings are that students find Socrative easy to use, fun, of genuine benefit to their learning and a medium that aids active participation. Furthermore, there is evidence that it benefits attainment as testing helps memory retention. My research findings broadly concur. Also considered is how Socrative use can be extended beyond revision-style testing to introduce students to new information that challenges existing beliefs and to elicit controversial opinions and sensitive information.


Sign in / Sign up

Export Citation Format

Share Document