Search results

1 – 10 of over 42000
Book part
Publication date: 4 December 2023

Dewey Cornell

Behavioral threat assessment and intervention is a violence prevention strategy that has become widely used in US schools. Instead of relying on a zero tolerance disciplinary…

Abstract

Behavioral threat assessment and intervention is a violence prevention strategy that has become widely used in US schools. Instead of relying on a zero tolerance disciplinary approach that often leads to school exclusion of students with disabilities, schools can use a multidisciplinary threat assessment team to assess the seriousness and context of a student's behavior and identify appropriate interventions and supports. This process is especially valuable for students with disabilities who are identified as threatening violence. This chapter describes an evidence-based model of threat assessment, the Comprehensive School Threat Assessment Guidelines (CSTAG), 1 reviews some common misunderstandings of threat assessment, and presents a case example illustrating the value of threat assessment in preventing school exclusion, and provides services for a student with a disability.

Article
Publication date: 6 June 2016

Zhengbiao Han, Shuiqing Huang, Huan Li and Ni Ren

This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought of ISO…

3828

Abstract

Purpose

This paper uses the GB/T20984-2007 multiplicative method to assess the information security risk of a typical digital library in compliance with the principle and thought of ISO 27000. The purpose of this paper is to testify the feasibility of this method and provide suggestions for improving information security of the digital library.

Design/methodology/approach

This paper adopts convenience sampling to select respondents. The assessment of assets is through analyzing digital library-related business and function through a questionnaire which collects data to determine asset types and the importance of asset attributes. The five-point Likert scale questionnaire method is used to identify the threat possibility and its influence on the assets. The 12 respondents include directors and senior network technicians from the editorial department, comic library, children’s library, counseling department and the learning promotion centre. Three different Guttman scale questionnaires, tool testing and on-site inspection are combined to identify and assess vulnerabilities. There were different Guttman scale questionnaires for management personnel, technical personnel and general librarian. In all, 15 management librarians, 7 technical librarians and 72 ordinary librarians answered the vulnerability questionnaire. On-site inspection was conducted on the basis of 11 control domains of ISO 27002. Vulnerabilities were scanned using remote security evaluation system NSFOCUS. The scanning covered ten IP sections and a total of 81 hosts.

Findings

Overall, 2,792 risk scores were obtained. Among them, 282 items (accounting for 10.1 per cent of the total) reached the high risk level; 2 (0.1 per cent) reached the very high risk level. High-risk items involved 26 threat types (accounting for 44.1 per cent of all threat types) and 13 vulnerability types (accounting for 22.1 per cent of all vulnerability types). The evaluation revealed that this digital library faces seven major hidden dangers in information security. The assessment results were well accepted by staff members of this digital library, which testified to the applicability of this method to a Chinese digital library.

Research limitations/implications

This paper is only a case study of a typical Chinese digital library using a digital library information security assessment method. More case-based explorations are necessary to prove the feasibility of the assessing strategy proposed in this study.

Originality/value

Based on the findings of recent literature, the authors found that very few researchers have made efforts to develop methods for calculating the indicators for digital library information security risk assessment. On the basis of ISO 27000 and other related information security standards, this case study proposed an operable method of digital library information security risk assessment and used it to assess a the information security of a typical Chinese digital library. This study can offer insights for formulating a digital library information security risk assessment scale.

Details

The Electronic Library, vol. 34 no. 3
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 12 September 2018

Joel A. Capellan and Carla Lewandowski

The purpose of this paper is to examine whether threat assessment, an intelligence-led policing (ILP) tool, can prevent mass public shootings.

1325

Abstract

Purpose

The purpose of this paper is to examine whether threat assessment, an intelligence-led policing (ILP) tool, can prevent mass public shootings.

Design/methodology/approach

In order to gauge the potential effectiveness of this ILP tool, the authors conduct a retrospective analysis of 278 mass public shootings that occurred in the USA between 1966 and 2016. This retrospective analysis allows us to determine how successful threat assessment protocols could be in preventing mass public shootings by examining how successful this tool would have been in identifying the offenders in our data.

Findings

The results show that threat assessment has the potential to be an effective tool in the ILP arsenal to identify and prevent impending mass public shootings. However, our results also point to several obstacles for the effective implementation of this ILP tool. The underreporting of threats and using the content of threats and characteristics of threateners are problematic in correctly assigning risk. The authors make suggestions for how to overcome these obstacles.

Originality/value

This study makes several contributions to the intelligence-led policing and mass murder field. This is the first study to test the potential effectiveness of an intelligence-led policing tool to prevent mass public shootings. Additionally, this is one of the first studies to examine the leaks, types, context and follow-though of threats made by mass public shooters in the United States. Consequently, it provides unique information on the foreshowing behaviors of mass public shooters.

Details

Policing: An International Journal, vol. 42 no. 1
Type: Research Article
ISSN: 1363-951X

Keywords

Article
Publication date: 1 February 2011

Eileen Weisenbach Keller, Stephanie Hughes and Giles Hertz

An increase in the number of disruptive and violent events on college and university campuses instigated this review of the methods used to interrupt the trend, with the goal of…

2367

Abstract

Purpose

An increase in the number of disruptive and violent events on college and university campuses instigated this review of the methods used to interrupt the trend, with the goal of identifying a preliminary model for systematic management of such threats. The intent is to instigate research, review and discussion in order to decrease the number and severity of threatening incidents on college campuses.

Design/methodology/approach

Thorough review of plans from primary and secondary education, plans in use in higher education, literature on risk and threat assessment, literature on “whistle blowers”, and of violent events on college campuses was used to construct a model.

Findings

It was found that, in terms of managing and reducing threats to people who study, live and work in post‐secondary educational institutions, insufficient attention has been given to the unique needs of this setting and therefore efforts to mitigate threats have been insufficient. The investigation resulted in the development of a model of assessment and management of threats on university and college campuses.

Research limitations/implications

College campus threat assessment research is very much in its infancy and will certainly develop over time. This paper is the first step in an effort to develop and ultimately test the plausibility of a model. Future research should be pursued to determinewhether the model holds up under a majority of situations on college campuses. Those involved in threat mitigation in university settings should be queried to determine their agreement with the proposed framework and for assistance in refining it.

Originality/value

This paper presents suggestions for the systematic management of threats and mitigation in university settings.

Details

Journal of Educational Administration, vol. 49 no. 1
Type: Research Article
ISSN: 0957-8234

Keywords

Article
Publication date: 1 December 2003

Dewey G. Cornell

A series of highly publicized school shootings in the USA generated the misperception of an epidemic of school violence. Fears of school violence stimulated an ill‐advised…

2353

Abstract

A series of highly publicized school shootings in the USA generated the misperception of an epidemic of school violence. Fears of school violence stimulated an ill‐advised expansion of zero tolerance school discipline policies and the widespread dissemination of profiles or warning signs of potentially dangerous students for use by school administrators. This article presents the rationale for student threat assessment as an administrative alternative to zero tolerance or profiling. It describes the development and field‐testing of guidelines for school administrators to follow in investigating and resolving student threats of violence. Student threat assessment permits administrators to make reasonable judgments about the seriousness of a threat, to resolve most threats quickly and efficiently, and to reserve more labor‐intensive procedures for the most serious threats.

Details

Journal of Educational Administration, vol. 41 no. 6
Type: Research Article
ISSN: 0957-8234

Keywords

Content available

Abstract

Details

Journal of Criminal Psychology, vol. 12 no. 1/2
Type: Research Article
ISSN: 2009-3829

Article
Publication date: 1 May 1996

Alice Sturgeon

Provides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have…

3193

Abstract

Provides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have encouraged its growth. Examines the security threats and vulnerabilities which are inherent in teleworking and assesses the risks associated with employees working on sensitive material from a remote site. Postulates a framework for threat and risk assessment with a generic model, and a specific example using a hypothetical telework situation.

Details

Information Management & Computer Security, vol. 4 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 12 February 2021

Dan Bouhnik, Nurit Reich and Noa Aharony

The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness…

Abstract

Purpose

The study focuses on adolescents and the influence the big five great personality traits – extroversion, agreeableness, neuroticism, openness to experiences and conscientiousness – on self-disclosure. These personality traits, combined with the ability to cope with stress, determine the degree of threat felt by an individual towards their information, their evaluation of their personal ability to keep their information secure, and their willingness to secure information.

Design/methodology/approach

Five questionnaires relating to the big five personality traits, self-disclosure, cognitive assessment, self-efficacy and IS awareness were distributed among 157 adolescents.

Findings

Readiness for IS. Furthermore, the study showed that the more ostentatiousness, agreeable, goal oriented and open the subjects are, the lower they will evaluate the threat to their information. A relationship was also revealed between the subjects' agreeableness, goal orientation and their information threat assessment. It was also found that the more extroverted, agreeable, conscientious and the more inclined to self-disclosure, the higher they evaluate their self-ability to handle threats to their information.

Originality/value

For IS behavior to become second nature to adolescents they must first be educated and trained to do so. Knowing what motivates them and, on the other hand, what hinders them, to practice IS can help build training models for teachers which may be adapted according to their personal traits, thus getting the most out of such programs.

Details

Online Information Review, vol. 45 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 8 February 2021

Tamsin Priscott and Robert Anthony Allen

The purpose of the study was to test the assumption of similarities between neurodivergents and other minority groups regarding their reaction to stereotype threat. In addition…

1997

Abstract

Purpose

The purpose of the study was to test the assumption of similarities between neurodivergents and other minority groups regarding their reaction to stereotype threat. In addition, it aimed to identify the source of stereotype threat and the neurodivergent's response to it.

Design/methodology/approach

Two studies were conducted. Study 1 employed three exercises consisting of brochures, learning sets and posters to test organisational cues, notions of intelligence and situational cues. It collected data from 53 participants to establish whether stereotype threat observed in visible difference such as race, gender and intelligence is equally relevant to neurodiversity. Study 2 consisted of interviews with 44 participants to establish stereotype threat source, reaction and effect on declaration of invisible difference.

Findings

Neurodivergents, defined by their invisible difference, react similarly to those with a visible difference with respect to organisational cues and stereotype threat. They will cognisantly define their behaviours depending upon those cues and stereotype threat. In doing so, they draw upon previous personal and work experiences. After the event, they will make a comparison to their assessment. If it is similar to their assessment, it reinforces it; however, if it is dissimilar, the neurodivergent will make an adjustment to the assessment. In both cases, the experience will form part of a future threat assessment.

Research limitations/implications

The research is limited by its interpretivist nature and sample comprising personnel within a UK government organisation.

Practical implications

The research has practical implications for employers, providing managers with a model to understand the impact a neurodivergents' previous experiences can have on their ability to interact within the workplace. Such understanding can provide insight into how best to utilise human capital.

Originality/value

This study makes a contribution to theory by expanding knowledge of neurodiversity in the workplace and by identifying the neurodivergents' reaction to the anticipation of a stereotype threat. In addition, it offers the stereotype threat anticipation conceptual model as a representation of the cognitive decisions made by neurodivergents to conceal or reveal their invisible difference.

Details

Employee Relations: The International Journal, vol. 43 no. 5
Type: Research Article
ISSN: 0142-5455

Keywords

Article
Publication date: 14 November 2016

Mohamad K. Naja and Hoda Baytiyeh

Terrorist attacks on schools and colleges have disrupted educational processes and caused fear, deaths and tragedies. Considering the recent increase in terrorist attacks on…

Abstract

Purpose

Terrorist attacks on schools and colleges have disrupted educational processes and caused fear, deaths and tragedies. Considering the recent increase in terrorist attacks on educational facilities in different parts of the world, vulnerability and risk assessments have assumed crucial importance in the design and evaluation of mitigation plans to reduce the traumatic impacts of such events. This paper aims to assess the vulnerability and risk of Lebanese high school assets to terrorism.

Design/methodology/approach

Through site visits to various high schools in Lebanon, the authors evaluated specific features common in the majority of Lebanese high schools and identified six categories of schools. Using Federal Emergency Management Agency (FEMA 428) guidelines, one high school from each category was surveyed and analysed.

Findings

The results reveal a relatively high vulnerability to and risk of the threat of terrorism and a lack of protective plans and mitigation measures to minimise this risk among the majority of the investigated high school facilities.

Originality/value

This paper should alert school administrators, public leaders and government officials regarding the terrorist threats and their subsequent effects on the structural safety of school buildings in Lebanon. The risk assessment of schools to terrorism has rarely been performed or even discussed in the Lebanese-related literature.

Details

International Journal of Disaster Resilience in the Built Environment, vol. 7 no. 5
Type: Research Article
ISSN: 1759-5908

Keywords

1 – 10 of over 42000