Threat Assessment: A Risk Management Approach / Edition 1

Paperback (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $23.35
Usually ships in 1-2 business days
(Save 41%)
Other sellers (Paperback)
  • All (5) from $23.35   
  • New (2) from $37.84   
  • Used (3) from $23.35   


Detailed "how to's" of threat assessment-from the initial contact to the sharing of results! Risk management can be an organizational nightmare, but it is an essential part of your operations. Recent events have shown us that organizations need to know how to respond swiftly and effectively in emergencies and that companies need to protect their employees from internal and external threats. This book, which has been used as a training manual by the United States Secret Service, provides you with the tools you need to protect both your employees and yourself from a variety of threats. Threat Assessment: A Risk Management Approach examines the factors that human resource, security, legal, and behavioral professionals need to understand in work violence and threat situations that disrupt the working environment, revealing the best ways to reduce risk and manage emergencies. It includes case studies and hypothetical examples that show recommended practices in action and provides detailed interviewing methods that can increase the efficiency of current strategies. Helpful appendices provide sample forms for identification cards, stay-away letters, workplace behavior improvement plans for problem employees, questions for health care providers, and announcements for employees regarding security changes. An extensive bibliography points the way to other useful material on this subject. Threat Assessment: A Risk Management Approach explores: the role of the multidisciplinary threat management team corporate liaisons with law enforcement agencies cyberthreats and stalking insider threats category classification of offending behaviors Risk management is a constantly evolving field, and Threat Assessment provides you with access to the latest updates. Staying up-to-date on risk management innovations will help you increase corporate sensitivity to possible threats and provide the safest possible working environment to your employees. The au

Read More Show Less

Product Details

  • ISBN-13: 9780789016287
  • Publisher: Taylor & Francis
  • Publication date: 6/28/2003
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 206
  • Product dimensions: 6.00 (w) x 8.30 (h) x 0.70 (d)

Table of Contents

  • Foreword
  • Preface
  • Acknowledgments
  • Chapter 1. Threat Management: Organizational Challenge
  • A Threat Review Team
  • Chapter 2. Work Place Violence: An Overview
  • Defining Workplace Violence
  • Recognizing the Types of Workplace Violence
  • Statistics on Workplace Violence
  • Myths Regarding Workplace Violence
  • Conditions That May Lead to Workplace Violence
  • Warning Signs
  • Chapter 3. Organizational Response Options
  • Threat Response Process
  • Incident Response Checklist
  • Chapter 4. Intake Process
  • Initial Stage of Contact
  • Second Stage of Contact
  • Chapter 5. Category Classification
  • Category 1
  • Category 2
  • Category 3
  • Category 4
  • Category 5
  • Case Examples
  • Chapter 6. Threat Management: Interviewing Strategies
  • Introduction
  • Interview and Investigation
  • Chronological Documentation
  • Establishing the Pattern
  • Collateral Interviews
  • Assessment of Case Material
  • The Interview Environment
  • Interview Phases
  • Chapter 7. Liaison with Law Enforcement
  • Chapter 8. Analysis of Threats
  • Principles of Threat Communication Analysis
  • Communicated Threat Rating
  • Case Example
  • Chapter 9. Threat Assessment Feedback for Management
  • Feedback Elements
  • Case Example
  • Chapter 10. Stalking As a Contemporary Crime in the Workplace
  • Background
  • Stalking Defined
  • Stalking As a Mental Disorder in the Workplace
  • Threat Assessment and Response
  • Chapter 11. Cyberthreats
  • Defining Cyberthreats
  • Risk Control
  • Case Examples
  • Chapter 12. Insider Threat: Risk Management Consideration
  • Behavior, Personality, and Motivation of the Employee at Risk
  • The Development of a Problem
  • Behavioral Indicators of Insider Risk
  • Applications
  • Chapter 13. Executive Vulnerability
  • Appendix A: Threat Information Card for Potential Victims
  • Appendix B: Stay Away Letter
  • Appendix C: Behavior Improvement Plan
  • Appendix D: Health Provider Questions
  • Appendix E: Announcement of Employees Regarding Security Changes
  • Bibliography
  • Index
  • Reference Notes Included
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)