Threat Assessment Glossary Flashcards
Americans with Disabilities Act (ADA)
The Americans with Disabilities Act of 1990 established comprehensive legislation covering civil rights for people with disabilities. It is published in the United States Code and is often referred to by the titles and chapters of the code that contain the law. More information about the ADA is available at http://www.ada.gov
Administrative Action
A threat management intervention involving the use of disciplinary action within an organization or structure to manage problem individuals (e.g., firing, withholding services, suspension, barring from a particular location or activity; Calhoun & Weston, 2009).
Affective Violence
Affective violence, sometimes called impulsive, emotional or reactive violence, is an unplanned act of violence that occurs in response to a perceived threat in the immediate environment (Meloy, 2006).
Anchors
Anchors are factors that provide stability – in threat assessment, anchors could be used to provide support or stability to a subject who is struggling or represent reasons that an individual would not engage in targeted violence (de Becker, 1997).
Approach Behavior
This refers to the type, frequency and intensity of the subject’s attempts to be physically proximal (close) to the target. Approach behavior includes successful and unsuccessful attempts to approach the target.
Arrest
An arrest can be a threat management intervention. It is the act of detaining someone in legal custody, usually be a law enforcement officer. The actual deprivation of a person’s liberty can be physical detention for a short or prolonged period of time in response to a criminal charge. (Bureau of Justice Statistics, 2011)
Attack
Carrying out (or attempting to carry out) the intended violence against the target (Calhoun & Weston, 2003).
Attack Related Behaviors
Specific behaviors that are needed in order to launch a physical assault on a target – These behaviors are displayed as steps on the pathway to violence (Calhoun & Weston, 2009).
Behavioral Indicator
An observable action that provides evidence of an underlying element that may be relevant to a threat assessment and management case – for example, a subject’s actions (e.g., talking to him/herself) might lead the threat assessor to believe the person has a mental health disorder that influences the level of threat posed by that individual (Bulling et al., 2008).
Behavioral Threat Assessment
Threat assessment orientation based on the idea that the subject will exhibit identifiable behaviors indicating the intent to commit an act of targeted of violence.
Behaviors of Concern
Behaviors of concern are the observable, identifiable behaviors that an individual exhibits while they are progressing on the pathway of violence.
Black Swan Event
An event that is rare, predictable only in retrospect, with extreme impacts (Meloy, 2011; Talib, 2007).
Breach
The word breach is commonly used when referring to a gap or break. In threat assessment contexts, this usually refers to a situation where usual security measures have been circumvented (Calhoun & Weston, 2003).
Bunkers
The use of the term “bunker” is linked to the common use of the phrase “bunker mentality” in which an individual or group becomes defensive and surrounded by fortifications (real and virtual) to keep information in or detractors out. Adopting a bunker mentality in threat assessment can lead to under or over estimation of risk (Calhoun & Weston, 2012).
Case Dynamics
The continuous interaction between what is known and unknown in a particular case, and the evolving assessments used to determine the appropriate protective response at any given point in time (Calhoun & Weston, 2012).
Code of Ethics
Refers to the ethical code developed by the Association of Threat Assessment Professionals outlining appropriate behavior and decision making in threat assessment and management (Association of Threat Assessment Professionals, 2010).
Chain of Custody
This is a process used to document the chronological history of evidence to maintain the security, integrity and accountability of its handling.
CirCon Factors
“CirCon” is an acronym for “circumstances, content and contextual factors” related to a subject’s inappropriate communication or contact (Calhoun & Weston, 2003).
Civil Action
Civil actions are orders issued by a court to convince the subject to stop threatening behaviors or stay away from the target, periodically employed as a threat management intervention (e.g., restraining, stay away, protective orders) (Calhoun & Weston, 2009).
Cognition
The simplest definition of cognition is thinking; in more complex terms it is the processes in the human mind involved in acquisition, storage, retrieval and processing of information. Individuals with poor cognition may have difficulty visualizing alternatives to violence and receiving assistance for grievances.
Cognitive Complexity
This is a psychological construct that refers to a person’s ability to perceive nuances or subtle differences. A person who has high cognitive complexity is sensitive to small changes in a task, activity, behavior or the environment while someone with low cognitive complexity is less likely to detect these differences. Sometimes this is referred to as intuition or street smarts. A person may have high cognitive complexity but little formal education (Scott, 1962).
Communication Channels
The mediums used to transmit messages are referred to as “communication channels.” Threat assessment uses this phrase when referring to the ways that information about threatening individuals can be gained by threat assessment teams (Calhoun & Weston, 2012).
Confidentiality
Confidentiality refers to the process of safeguarding sensitive information, usually involving case intelligence or personal information. Confidentiality is sometimes framed as an individual’s right to have their personal information kept private.
Content Factors
The information contained and conveyed in the words, style and method of a threat.