Targeted Violence in Schools

Author(s):  
Randy Borum

Though targeted attacks at schools are rare events, educators and behavioral health professionals working in those settings must evaluate threats and threatening situations when they occur. Schools across the world have experimented with different methods over time, but the threat assessment approach—particularly executed by an interdisciplinary team—has emerged as abest practice. This chapter describes the results of the Safe School Initiative, an in-depth case analysis of 37 targeted school attacks involving 41 attackers over a 25-year period, and their implications for understanding the attackers, the situations, the settings, and the targets. It addresses the continuum of threats that schools may encounter and offers some heuristics for decision making, including recent research on key indicators of intent. It concludes by emphasizing the need for schools to have incident and post-incident response plans to mitigate harm if an attack does occur.

Water Policy ◽  
2012 ◽  
Vol 15 (2) ◽  
pp. 325-333 ◽  
Author(s):  
Sanford V. Berg

Six recent publications by the International Water Association underscore the growing importance of quantitative studies of water utilities for identifying (1) performance patterns, (2) trends in key indicators and (3) best practice. Since each author takes a different approach to the problem of performance measurement and incentives for improvement, the books provide different perspectives on the decision-relevance of empirical analysis and cases for managers and policymakers. Key lessons from the volumes include the use of benchmarking as a tool for establishing better internal incentives, the importance of data collection and auditing and the role of transparency in helping stakeholders become more informed about utility operations. Analysts need to help stakeholders understand sector complexities, where hydrology, topology, historical developments outside current management's control, population income levels and the amount of skilled labor differ widely across and even within nations. The six books taken together underscore the value of quantifying relative performance and improving our awareness of production processes and the institutional arrangements that support strong water sector performance.


Author(s):  
Randy Borum ◽  
Mary Rowe

Bystanders—those who observe or come to know about potential wrongdoing—are often the best source of preattack intelligence, including indicators of intent and “warning” behaviors. They are the reason that some planned attacks are foiled before they occur. Numerous studies of targeted violence (e.g., mass shootings and school shootings) have demonstrated that peers and bystanders often have knowledge of an attacker’s intentions, concerning communication, and troubling behavior before the attack occurs. This chapter describes—with empirical support—why threat assessment professionals should consider bystanders; outlines a model for understanding bystander decision-making; reviews common barriers to bystander reporting; and suggests ways to mitigate those barriers, to engage bystanders at an individual level, and to improve reporting. The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. When tragic incidents of planned violence occur, however, it is almost always uncovered “that someone knew something” about the attack before it happened. This happens because, as attack plans unfold, people in several different roles may know, or come to know, something about what is happening before harm occurs. The perpetrators know, and so might others, including targets, family members, friends, coworkers, or even casual observers.


Author(s):  
Chad Bunch ◽  
Glenn Cameron ◽  
Rafael G. Mora

This paper provides guidelines to identify all threats and assess a pipeline’s susceptibility to those threats in order to select appropriate and effective mitigation, monitoring, and prevention measures prior to reactivating pipelines. The intent of this paper is to provide pipeline operators, consultants and regulatory agencies with a generic threat assessment approach that has to be customized to the pipeline-specific characteristics and conditions, and the regulatory requirements of its own jurisdiction. A literature review and authors’ experiences across the pipeline industry have identified the need for a generic, yet complete approach that guides pipeline integrity engineers in the methodologies that adequately and effectively assess threats prior to reactivation and that can be validated in a timely manner during the operations. Pipeline operators may be called on to reactivate pipelines that are facing challenges such as aging, changes in operational conditions, lack of maintenance and inconsistent integrity practices while facing constraints from increasing population density, higher pressure and flow throughput requirements of a competitive marketplace, and regulatory requirements insisting on higher levels of safety and protection of the environment. This paper was structured with the following components to assist the reader in conducting threat assessments: • Current regulations and recognized industry standards with respect to reactivating pipelines; • Definition of and differentiation between hazard and threat; • Hazard identification analysis for the known and potential situations, events and conditions; and • Threat susceptibility and identification analysis process for the known categories derived from the hazard identification process. A case study is described as an example of applying the guidelines to conduct threat susceptibility and identification assessments of a pipeline prior to its reactivation. The results from the threat susceptibility and identification assessment process can help operators, consultants and regulators in determining effective inspection, mitigation, prevention and monitoring measures.


Author(s):  
Robert A. Fein ◽  
◽  
Bryan Vossekuil ◽  
William S. Pollack ◽  
Randy Borum ◽  
...  

2001 ◽  
Vol 24 (3) ◽  
pp. 100
Author(s):  
Margret Scheil

Individual Program Planning is an action research tool that facilitates consumer-oriented service provision. It is basedon four guiding principles to promote constructive interaction between consumers, significant others and services.Agreements for action are cooperatively developed in relation to the identification of issues. These are documented andmonitored in the form of ongoing meetings. The process supports coordination and accountability of activity betweenthose significant to treatment outcome across the continuum of care.


Author(s):  
Gunnar Weigold ◽  
Colin Argent ◽  
John Healy ◽  
Ian Diggory

ROSEN have developed together with MACAW Engineering Ltd. a Risk Assessment Tool that can be applied to both piggable and un-piggable pipelines. The Risk Model is structured to answer three basic questions relating to pipeline integrity: • What threats are active on the pipeline? • Will the active threats result in a leak or a rupture? • What is the company liability (cost) in the event of a failure? The risk assessment criteria on which the model is based are taken from codes and technical papers that have become accepted as industry norms. The Risk Model itself is semi-quantitative and is based on input data that operators should have for all pipelines. The results of the risk assessment provide an objective identification of active threats to pipeline integrity and a first level benchmarking of the operators procedures with regards to industry best practice. The paper will present the fast and robust Risk Assessment Approach and illustrate it’s application by different examples as it was used to identify and prioritize active threats mechanism to optimize maintenance expenditures for effective preservation of pipeline integrity.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Anna Feldmann ◽  
Frank Teuteberg

Purpose This paper aims to focus on the banking industry and its hackathon formats, which have been created by various banking groups. Other industries can learn from these findings and adopt best practice solutions. Design/methodology/approach A multi-case study was conducted with three hackathon formats (Collabothon, GENOhackathon and Symbioticon) from the banking sector in which qualitative interviews with members of the organization team were held and used to summarize the differences and similarities of hackathon formats in the banking industry. Findings A model was developed to demonstrate how the different hackathon formats in banking overlap and what differences exist. Originality/value This study used a cross-case analysis to summarize differences and similarities of hackathon formats in the banking industry in Germany.


Author(s):  
Gary Goertz ◽  
James Mahoney

This chapter examines how the qualitative and quantitative research traditions empirically assess theories about mechanisms when making causal inferences. In the qualitative paradigm, researchers carry out this assessment by attempting to observe causal mechanisms through process tracing and through the analysis of causal-process observations. In the qualitative paradigm, the within-case analysis of specific cases is combined with the effort to observe mechanisms. By contrast, statistical methods are not designed to observe mechanisms within particular cases. The chapter considers the importance of mechanisms in causal inference as well as the use of process tracing in multimethod vs. qualitative research. It shows that multimethod research, which integrates regression and case study analysis, is increasingly regarded as a best practice.


Global Crime ◽  
2014 ◽  
Vol 15 (3-4) ◽  
pp. 320-336 ◽  
Author(s):  
Viktoria Akchurina ◽  
Anita Lavorgna

Sign in / Sign up

Export Citation Format

Share Document