Threat Assessment : A Risk Management Approach

個数:
電子版価格
¥8,069
  • 電書あり

Threat Assessment : A Risk Management Approach

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 206 p.
  • 言語 ENG
  • 商品コード 9780789016287
  • DDC分類 658.38

Full Description

Detailed how to's of threat assessmentfrom the initial contact to the sharing of results!

Risk management can be an organizational nightmare, but it is an essential part of your operations. Recent events have shown us that organizations need to know how to respond swiftly and effectively in emergencies and that companies need to protect their employees from internal and external threats. This book provides you with the tools you need to protect both your employees and yourself from a variety of threats.

Threat Assessment: A Risk Management Approach examines the factors that human resource, security, legal, and behavioral professionals need to understand in work violence and threat situations that disrupt the working environment, revealing the best ways to reduce risk and manage emergencies. It includes case studies and hypothetical examples that show recommended practices in action and provides detailed interviewing methods that can increase the efficiency of current strategies. Helpful appendices provide sample forms for identification cards, stay-away letters, workplace behavior improvement plans for problem employees, questions for health care providers, and announcements for employees regarding security changes. An extensive bibliography points the way to other useful material on this subject.

Threat Assessment: A Risk Management Approach explores:

the role of the multidisciplinary threat management team
corporate liaisons with law enforcement agencies
cyberthreats and stalking
insider threats
category classification of offending behaviors

Risk management is a constantly evolving field, and Threat Assessment provides you with access to the latest updates. Staying up-to-date on risk management innovations will help you increase corporate sensitivity to possible threats and provide the safest possible working environment to your employees.

The authors of Threat Assessment are seasoned professionals with extensive experience in risk management. You can learn from their expertise and adapt it to your situation, improving workplace safety and contributing to security in your own community.

Contents

Foreword
Preface
Acknowledgments
Chapter 1. Threat Management: Organizational Challenge
A Threat Review Team
Chapter 2. Work Place Violence: An Overview
Defining Workplace Violence
Recognizing the Types of Workplace Violence
Statistics on Workplace Violence
Myths Regarding Workplace Violence
Conditions That May Lead to Workplace Violence
Warning Signs
Chapter 3. Organizational Response Options
Threat Response Process
Incident Response Checklist
Chapter 4. Intake Process
Initial Stage of Contact
Second Stage of Contact
Chapter 5. Category Classification
Category 1
Category 2
Category 3
Category 4
Category 5
Case Examples
Chapter 6. Threat Management: Interviewing Strategies
Introduction
Interview and Investigation
Chronological Documentation
Establishing the Pattern
Collateral Interviews
Assessment of Case Material
The Interview Environment
Interview Phases
Chapter 7. Liaison with Law Enforcement
Chapter 8. Analysis of Threats
Principles of Threat Communication Analysis
Communicated Threat Rating
Case Example
Chapter 9. Threat Assessment Feedback for Management
Feedback Elements
Case Example
Chapter 10. Stalking As a Contemporary Crime in the Workplace
Background
Stalking Defined
Stalking As a Mental Disorder in the Workplace
Threat Assessment and Response
Chapter 11. Cyberthreats
Defining Cyberthreats
Risk Control
Case Examples
Chapter 12. Insider Threat: Risk Management Consideration
Behavior, Personality, and Motivation of the Employee at Risk
The Development of a Problem
Behavioral Indicators of Insider Risk
Applications
Chapter 13. Executive Vulnerability
Appendix A: Threat Information Card for Potential Victims
Appendix B: Stay Away Letter
Appendix C: Behavior Improvement Plan
Appendix D: Health Provider Questions
Appendix E: Announcement of Employees Regarding Security Changes
Bibliography
Index
Reference Notes Included