Journal of Threat Assessment and Management最新文献

筛选
英文 中文
Negotiation in mass casualty attacks. 大规模伤亡袭击中的谈判。
Journal of Threat Assessment and Management Pub Date : 2019-09-01 DOI: 10.1037/tam0000129
Anna Theophilus, Thomas R. Thornton, J. Trigg, Michael Yansick
{"title":"Negotiation in mass casualty attacks.","authors":"Anna Theophilus, Thomas R. Thornton, J. Trigg, Michael Yansick","doi":"10.1037/tam0000129","DOIUrl":"https://doi.org/10.1037/tam0000129","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131260052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity, computational modeling, and forecasting the future of threat management. 复杂性、计算建模和预测威胁管理的未来。
Journal of Threat Assessment and Management Pub Date : 2019-09-01 DOI: 10.1037/tam0000131
John S Rozel
{"title":"Complexity, computational modeling, and forecasting the future of threat management.","authors":"John S Rozel","doi":"10.1037/tam0000131","DOIUrl":"https://doi.org/10.1037/tam0000131","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131111896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning from the parallel field of terrorism studies. 从恐怖主义研究的平行领域学习。
Journal of Threat Assessment and Management Pub Date : 2019-09-01 DOI: 10.1037/tam0000133
Isabelle van der Vegt, Zoe Marchment, C. Clemmow, P. Gill
{"title":"Learning from the parallel field of terrorism studies.","authors":"Isabelle van der Vegt, Zoe Marchment, C. Clemmow, P. Gill","doi":"10.1037/tam0000133","DOIUrl":"https://doi.org/10.1037/tam0000133","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129934204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond first-person shooter video games: Using computational modeling and simulation of mass violence for threat assessment and management. 超越第一人称射击视频游戏:使用计算建模和模拟大规模暴力来进行威胁评估和管理。
Journal of Threat Assessment and Management Pub Date : 2019-09-01 DOI: 10.1037/tam0000128
T. Briggs, J. Pollard
{"title":"Beyond first-person shooter video games: Using computational modeling and simulation of mass violence for threat assessment and management.","authors":"T. Briggs, J. Pollard","doi":"10.1037/tam0000128","DOIUrl":"https://doi.org/10.1037/tam0000128","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Problematic behaviors experienced by electorate and ministerial office staff: Results of and responses to a Western Australian survey. 选民和部长办公室工作人员所经历的问题行为:对西澳大利亚调查的结果和回应。
Journal of Threat Assessment and Management Pub Date : 2019-09-01 DOI: 10.1037/tam0000130
L. Sheridan, N. Pyszora, B. Cooper, Martyna Bendlin
{"title":"Problematic behaviors experienced by electorate and ministerial office staff: Results of and responses to a Western Australian survey.","authors":"L. Sheridan, N. Pyszora, B. Cooper, Martyna Bendlin","doi":"10.1037/tam0000130","DOIUrl":"https://doi.org/10.1037/tam0000130","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132723635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep interest in school shootings and online radicalization. 对校园枪击案和网络激进化非常感兴趣。
Journal of Threat Assessment and Management Pub Date : 2019-09-01 DOI: 10.1037/tam0000127
Jenni Raitanen, Atte Oksanen
{"title":"Deep interest in school shootings and online radicalization.","authors":"Jenni Raitanen, Atte Oksanen","doi":"10.1037/tam0000127","DOIUrl":"https://doi.org/10.1037/tam0000127","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124853644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
“The road not taken”: Understanding and mapping complexity in threat assessment. “未走的路”:理解和绘制威胁评估中的复杂性。
Journal of Threat Assessment and Management Pub Date : 2019-09-01 DOI: 10.1037/tam0000132
D. Keatley, L. Sheridan, M. Whitty
{"title":"“The road not taken”: Understanding and mapping complexity in threat assessment.","authors":"D. Keatley, L. Sheridan, M. Whitty","doi":"10.1037/tam0000132","DOIUrl":"https://doi.org/10.1037/tam0000132","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129164819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Some TRAP-18 indicators discriminate between terrorist attackers and other subjects of national security concern. 一些TRAP-18指标区分了恐怖分子攻击者和其他国家安全关注对象。
Journal of Threat Assessment and Management Pub Date : 2019-06-01 DOI: 10.1037/TAM0000119
J. Reid Meloy, Alasdair M. Goodwill, M. J. Meloy, Gwyn Amat, M. Martínez, Melinda Morgan
{"title":"Some TRAP-18 indicators discriminate between terrorist attackers and other subjects of national security concern.","authors":"J. Reid Meloy, Alasdair M. Goodwill, M. J. Meloy, Gwyn Amat, M. Martínez, Melinda Morgan","doi":"10.1037/TAM0000119","DOIUrl":"https://doi.org/10.1037/TAM0000119","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125646548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Stalking in the workplace. 在工作场所跟踪。
Journal of Threat Assessment and Management Pub Date : 2019-06-01 DOI: 10.1037/TAM0000124
L. Sheridan, Adrian C. North, A. Scott
{"title":"Stalking in the workplace.","authors":"L. Sheridan, Adrian C. North, A. Scott","doi":"10.1037/TAM0000124","DOIUrl":"https://doi.org/10.1037/TAM0000124","url":null,"abstract":"Stalking is a prevalent phenomenon that has major negative psychological, physical, social and financial sequelae. Although workplaces are creating and extending policies to respond to domestic abuse, little attention has been paid to workplace-based stalking. The present study took a mixed methods approach to examining and comparing 49 cases of stalking that began in the workplace and 92 cases of ex-partner stalking that began elsewhere and extended to the workplace. Workplace stalkers were reported to manipulate workplace practices to harass and gain proximity to their targets. Significant consequences for both complainants and workplaces were recorded, ranging from discomfort through to sexual and physical assault and career disruption and loss. A minority of complainants in both subsets reported the stalking to their managers, and only half of these were satisfied with the responses they received. Recommendations concerning the recognition and management of stalking in work environments are provided.","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
“Gender in the jihad: Characteristics and outcomes among women and men involved in jihadism-inspired terrorism”: Correction to Brugh et al. (2019). “圣战中的性别:参与圣战恐怖主义的男女的特征和结果”:对Brugh等人的更正(2019)。
Journal of Threat Assessment and Management Pub Date : 2019-06-01 DOI: 10.1037/tam0000125
{"title":"“Gender in the jihad: Characteristics and outcomes among women and men involved in jihadism-inspired terrorism”: Correction to Brugh et al. (2019).","authors":"","doi":"10.1037/tam0000125","DOIUrl":"https://doi.org/10.1037/tam0000125","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信