SmartSellTM - The New Way to Sell Online

We won't be beaten by anyone. Guaranteed

Threat Assessment


Product Description
Product Details

Table of Contents

  • Foreword
  • Preface
  • Acknowledgments
  • Chapter 1. Threat Management: Organizational Challenge
  • A Threat Review Team
  • Chapter 2. Work Place Violence: An Overview
  • Defining Workplace Violence
  • Recognizing the Types of Workplace Violence
  • Statistics on Workplace Violence
  • Myths Regarding Workplace Violence
  • Conditions That May Lead to Workplace Violence
  • Warning Signs
  • Chapter 3. Organizational Response Options
  • Threat Response Process
  • Incident Response Checklist
  • Chapter 4. Intake Process
  • Initial Stage of Contact
  • Second Stage of Contact
  • Chapter 5. Category Classification
  • Category 1
  • Category 2
  • Category 3
  • Category 4
  • Category 5
  • Case Examples
  • Chapter 6. Threat Management: Interviewing Strategies
  • Introduction
  • Interview and Investigation
  • Chronological Documentation
  • Establishing the Pattern
  • Collateral Interviews
  • Assessment of Case Material
  • The Interview Environment
  • Interview Phases
  • Chapter 7. Liaison with Law Enforcement
  • Chapter 8. Analysis of Threats
  • Principles of Threat Communication Analysis
  • Communicated Threat Rating
  • Case Example
  • Chapter 9. Threat Assessment Feedback for Management
  • Feedback Elements
  • Case Example
  • Chapter 10. Stalking As a Contemporary Crime in the Workplace
  • Background
  • Stalking Defined
  • Stalking As a Mental Disorder in the Workplace
  • Threat Assessment and Response
  • Chapter 11. Cyberthreats
  • Defining Cyberthreats
  • Risk Control
  • Case Examples
  • Chapter 12. Insider Threat: Risk Management Consideration
  • Behavior, Personality, and Motivation of the Employee at Risk
  • The Development of a Problem
  • Behavioral Indicators of Insider Risk
  • Applications
  • Chapter 13. Executive Vulnerability
  • Appendix A: Threat Information Card for Potential Victims
  • Appendix B: Stay Away Letter
  • Appendix C: Behavior Improvement Plan
  • Appendix D: Health Provider Questions
  • Appendix E: Announcement of Employees Regarding Security Changes
  • Bibliography
  • Index
  • Reference Notes Included

Ask a Question About this Product More...
Write your question below:
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Threat Assessment: A Risk Management Approach on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond Retail Limited.
Back to top