Anna Theophilus, Thomas R. Thornton, J. Trigg, Michael Yansick
{"title":"Negotiation in mass casualty attacks.","authors":"Anna Theophilus, Thomas R. Thornton, J. Trigg, Michael Yansick","doi":"10.1037/tam0000129","DOIUrl":"https://doi.org/10.1037/tam0000129","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131260052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complexity, computational modeling, and forecasting the future of threat management.","authors":"John S Rozel","doi":"10.1037/tam0000131","DOIUrl":"https://doi.org/10.1037/tam0000131","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131111896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Isabelle van der Vegt, Zoe Marchment, C. Clemmow, P. Gill
{"title":"Learning from the parallel field of terrorism studies.","authors":"Isabelle van der Vegt, Zoe Marchment, C. Clemmow, P. Gill","doi":"10.1037/tam0000133","DOIUrl":"https://doi.org/10.1037/tam0000133","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129934204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beyond first-person shooter video games: Using computational modeling and simulation of mass violence for threat assessment and management.","authors":"T. Briggs, J. Pollard","doi":"10.1037/tam0000128","DOIUrl":"https://doi.org/10.1037/tam0000128","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Sheridan, N. Pyszora, B. Cooper, Martyna Bendlin
{"title":"Problematic behaviors experienced by electorate and ministerial office staff: Results of and responses to a Western Australian survey.","authors":"L. Sheridan, N. Pyszora, B. Cooper, Martyna Bendlin","doi":"10.1037/tam0000130","DOIUrl":"https://doi.org/10.1037/tam0000130","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132723635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep interest in school shootings and online radicalization.","authors":"Jenni Raitanen, Atte Oksanen","doi":"10.1037/tam0000127","DOIUrl":"https://doi.org/10.1037/tam0000127","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124853644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“The road not taken”: Understanding and mapping complexity in threat assessment.","authors":"D. Keatley, L. Sheridan, M. Whitty","doi":"10.1037/tam0000132","DOIUrl":"https://doi.org/10.1037/tam0000132","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129164819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Reid Meloy, Alasdair M. Goodwill, M. J. Meloy, Gwyn Amat, M. Martínez, Melinda Morgan
{"title":"Some TRAP-18 indicators discriminate between terrorist attackers and other subjects of national security concern.","authors":"J. Reid Meloy, Alasdair M. Goodwill, M. J. Meloy, Gwyn Amat, M. Martínez, Melinda Morgan","doi":"10.1037/TAM0000119","DOIUrl":"https://doi.org/10.1037/TAM0000119","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125646548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stalking in the workplace.","authors":"L. Sheridan, Adrian C. North, A. Scott","doi":"10.1037/TAM0000124","DOIUrl":"https://doi.org/10.1037/TAM0000124","url":null,"abstract":"Stalking is a prevalent phenomenon that has major negative psychological, physical, social and financial sequelae. Although workplaces are creating and extending policies to respond to domestic abuse, little attention has been paid to workplace-based stalking. The present study took a mixed methods approach to examining and comparing 49 cases of stalking that began in the workplace and 92 cases of ex-partner stalking that began elsewhere and extended to the workplace. Workplace stalkers were reported to manipulate workplace practices to harass and gain proximity to their targets. Significant consequences for both complainants and workplaces were recorded, ranging from discomfort through to sexual and physical assault and career disruption and loss. A minority of complainants in both subsets reported the stalking to their managers, and only half of these were satisfied with the responses they received. Recommendations concerning the recognition and management of stalking in work environments are provided.","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123561859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Gender in the jihad: Characteristics and outcomes among women and men involved in jihadism-inspired terrorism”: Correction to Brugh et al. (2019).","authors":"","doi":"10.1037/tam0000125","DOIUrl":"https://doi.org/10.1037/tam0000125","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}