{"title":"The timelessness of propaganda of the deed.","authors":"J. Meloy","doi":"10.1037/tam0000113","DOIUrl":"https://doi.org/10.1037/tam0000113","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interviewing to Manage Threats: Exploring the Effects of Interview Style on Information Gain and Threateners’ Counter-Interview Strategies","authors":"R. Geurts, K. Ask, P. Granhag, A. Vrij","doi":"10.1037/tam0000107","DOIUrl":"https://doi.org/10.1037/tam0000107","url":null,"abstract":"There is consensus about the importance to engage with, and if possible interview, individuals who threaten to cause harm. However, there exists little research on how to conduct such interviews. This article contributes with an experimental approach on threat management interviewing. We explored what types of counter-interview strategies threateners employ, and we tested the efficacy of two common interview styles (direct interviewing vs. rapport-based interviewing). Participants (N = 120) were interviewed about a nonviolent threat they had made (to press charges against their former employer) and reported what strategies they had used during the interview. No differences were found between the interview protocols for threat management outcomes (i.e., information gain, use of counter-interview strategies, and willingness to discuss or enact the threat). However, the study showed how threateners struck a deliberate balance between proving their stand and disguising implementation details. Critically, individuals with more serious intentions to enact the threat were more inclined to hide information from the interviewer. We argue that it is vital for threat management interviewers to (a) understand what behaviors can be expected from the interviewee, and (b) learn about interview methods that can steer these behaviors toward information gain (which is beneficial to threat assessment) and toward de-escalation (which is the purpose of threat management).","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127452648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Terrorism, 1888–2018: Some change, but mostly the same.","authors":"Shandon Harris-Hogan","doi":"10.1037/TAM0000109","DOIUrl":"https://doi.org/10.1037/TAM0000109","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131533779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dispensation of dynamite (1883, March 16) New York Times.","authors":"","doi":"10.1037/tam0000117","DOIUrl":"https://doi.org/10.1037/tam0000117","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132930492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reviewing a dispensation for dynamite.","authors":"L. Warren","doi":"10.1037/TAM0000108","DOIUrl":"https://doi.org/10.1037/TAM0000108","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134113745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Caroline Mok, Christopher M Weaver, J. Rosenthal, Trent Pettis, R. Wickham
{"title":"Augmenting Veterans Affairs Police Mental Health Response: Piloting Diversion to Health Care as Risk Reduction","authors":"Caroline Mok, Christopher M Weaver, J. Rosenthal, Trent Pettis, R. Wickham","doi":"10.1037/tam0000112","DOIUrl":"https://doi.org/10.1037/tam0000112","url":null,"abstract":"The sequential intercept model (SIM) of mental health decriminalization describes five stages in the legal system at which people with mental illness can be diverted out of that system and into treatment. Law enforcement represents the first stage and that with the highest potential for diversion. A novel interpretation of the SIM is as a model of threat management and violence risk mitigation since crisis de-escalation can constitute primary prevention of violent behavior. Health care settings that treat substance abuse and mental illness represent excellent settings in which to optimize such prevention. The U.S. Department of Veteran Affairs is a nationwide system of such settings and also maintains its own internal federal police force. This study examined the pilot implementation of a 14-hr national “train-the-trainer” curriculum, focusing on mental health diagnoses, stressors, de-escalation techniques, and referral options. The goals of this study were to evaluate feasibility-of-implementation issues, recommend any changes for the full-scale project, and provide preliminary analysis of outcomes. Trainers (n = 35) exhibited significant pre- to posttest increases in the domains of (a) knowledge and (b) skill, but not in (c) attitudes or (d) perceived efficacy as a trainer. Police officers (n = 140) demonstrated significant gains in all three assessed domains of (a) knowledge, (b) attitudes, and (c) skill in identifying diversion resources. The results supported changes to the curriculum and procedure as well as progression to the full-scale implementation. The curriculum has the potential to systematically enhance officer management of violent behavior while simultaneously decriminalizing mental illness.","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116616628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent Selection and Threat Actualization in Contamination Cases: Predicting Action From Perpetrator Behavior","authors":"Sarah C. Kilbane","doi":"10.1037/tam0000103","DOIUrl":"https://doi.org/10.1037/tam0000103","url":null,"abstract":"Although existing research on the topic is sparse, previous works have shown that there is believed to be a substantial threat of intentional, malicious contamination of the supply chain by criminals and terrorists (Center for Food Safety and Applied Nutrition, 2001; World Health Organization, 2008). Genuine contamination incidents have the potential to result in mass casualties, although empty threats are often enough to generate public fear and lead to considerable economic damage. Although empty threats often appear indistinguishable from those which will result in contamination, it is thought that certain variables identified in perpetrator communications may be able to help separate empty threats from those that will be actualized. This research thus attempts to determine whether a perpetrator’s reported choice of agent could offer functional predictions for the likelihood of actual contamination in future incidents. Findings indicate that chemical agents alone are more likely to be associated with genuine contamination, whereas the claimed use of biological agents alone as well as chemical, biological, and radionuclear agents combined are more often associated with empty threats. The utility of these findings will be discussed, as well as suggestions for future research.","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121424101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differentiating delusional disorder from the radicalization of extreme beliefs: A 17-factor model.","authors":"M. Cunningham","doi":"10.1037/TAM0000106","DOIUrl":"https://doi.org/10.1037/TAM0000106","url":null,"abstract":"","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarah Goodrum, Andrew J. Thompson, K. Ward, William Woodward
{"title":"A Case Study on Threat Assessment: Learning Critical Lessons to Prevent School Violence","authors":"Sarah Goodrum, Andrew J. Thompson, K. Ward, William Woodward","doi":"10.1037/tam0000104","DOIUrl":"https://doi.org/10.1037/tam0000104","url":null,"abstract":"This qualitative case study examines the way school officials implemented the U.S. Secret Service and Department of Education’s principles for threat assessment with a specific student of concern, who underwent a threat assessment and later shot and killed a classmate and himself on school grounds. The data came from deposition testimony from 12 school and district staff familiar with the student and the case and more than 8,000 pages of school, district, and law enforcement records. The findings suggest that district and school officials need to monitor the implementation of the threat assessment process with students of concern. Specifically, the threat assessment team should include 4 to 5 members from multidisciplinary perspectives; team members should complete a comprehensive threat assessment training program; threat assessed students should receive regular check-ins and support; and districts and schools should use an empirically validated threat assessment tool. Finally, educators should consider relying on a continuous improvement model to monitor implementation of threat assessment principles and procedures.","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126829766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Violence Risk Identification, Assessment, and Management Practices in Inpatient Psychiatry","authors":"K. Watt, Jennifer E. Storey, S. Hart","doi":"10.1037/tam0000099","DOIUrl":"https://doi.org/10.1037/tam0000099","url":null,"abstract":"Serious mental illness is a major risk factor for violence. Research suggests that many committed psychiatric inpatients have perpetrated violence before, during, and after hospitalization. Despite the prevalence and implications of violence among committed psychiatric patients, the responsibility of health care professionals to identify, assess and manage violence risk, and the development of identification and assessment tools to assist health care professionals in discharging their responsibility, little is actually known about what practices are being used to identify, assess, and manage violence in inpatient psychiatry units. The purpose of this study is to obtain a better understanding of violence risk identification, assessment, and management practices used by inpatient psychiatric units. Specifically, this study involved semistructured interviews with key informants from 13 inpatient psychiatry units in the largest health region in Western Canada. Every inpatient psychiatry unit that was invited to take part in this study agreed to participate. Data were analyzed using frequency and content analysis. The analysis revealed limited use of formal identification and assessment instruments for violence and diversity with respect to strategies used to manage violence. These findings have implications for highlighting promising practices that are currently being used, and identifying potential areas for future improvement.","PeriodicalId":217565,"journal":{"name":"Journal of Threat Assessment and Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}