tag:blogger.com,1999:blog-37697990178831158382024-03-12T22:19:02.147-04:00Current Issues in Threat Assessment & Threat ManagementMarisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.comBlogger23125tag:blogger.com,1999:blog-3769799017883115838.post-14439338317621317872013-12-08T15:52:00.000-05:002013-12-19T19:41:55.554-05:00A Critical Look at Mass Shootings in the United States <div style="background-color: white; font-family: arial, verdana, helvetica, sans-serif; font-size: 12px;">
<span style="font-family: Cambria;">By Jeffrey W. Pollard, Phd, ABPP</span><br />
<span style="font-family: Cambria;"><br /></span>
<span style="font-family: Cambria;"><br /></span>
<span style="font-family: Cambria;">You may have seen the USA Today article released on December 3, 2013. It is an informative piece addressing mass shooting in the United States and includes helpful criticism of the methodology the FBI and local law enforcement has employed collecting these data and how it can be improved. If you are going to dive in, be sure to click through the interactive links – they contain some of the most revealing information. The article can be found here:</span></div>
<div style="background-color: white; font-family: arial, verdana, helvetica, sans-serif; font-size: 12px;">
<span style="font-family: Cambria;"><br /></span></div>
<div style="background-color: white; font-family: arial, verdana, helvetica, sans-serif; font-size: 12px;">
<a href="http://www.usatoday.com/story/news/nation/2013/12/03/fbi-mass-killing-data-inaccurate/3666953/" target="_blank">http://www.usatoday.com/story/news/nation/2013/12/03/fbi-mass-killing-data-inaccurate/3666953/</a></div>
<div style="background-color: white; font-family: arial, verdana, helvetica, sans-serif; font-size: 12px;">
<br /></div>
<div style="background-color: white; font-family: arial, verdana, helvetica, sans-serif; font-size: 12px;">
<br />
<div class="MsoNormal" style="margin-bottom: 16pt; position: relative;">
<span style="font-family: Cambria;">Dr. Gene Deisinger, our colleague at SIGMA, characterized the article as one of the most complete public media analyses of mass violence he has seen, and I agree. </span><span style="font-family: Cambria;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 16pt; position: relative;">
<span style="font-family: Cambria;">Looking at the issue longitudinally, per capita rates of mass killings really have not changed. What has changed is a shift from private/family killings to public/stranger killings which doesn’t quite come out in the article but is outlined in </span><span style="font-family: Cambria;">Grant Duwe’s work as well as that of </span><span style="font-family: Cambria;">others. Overall there is a slight uptrend in the number of victims per incident though it doesn’t appear statistically significant with the mode remaining very close to 4 - the definition of a mass incident. However the majority of catastrophic mass killings, e.g., 10 or more, have occurred in the last 30 years. It is interesting that the authors do not focus solely on gun violence as I anticipate there is more information forthcoming on non-gun mass killing.</span><span style="font-family: Cambria;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 16pt; position: relative;">
<span style="font-family: Cambria;">Two important areas remain to be addressed (there are likely others):</span><span style="font-family: Cambria;"><o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 16pt; position: relative;">
<span style="font-family: Cambria;">1) Disrupted or prevented attacks</span><o:p></o:p></div>
<div class="MsoNormal" style="margin-bottom: 16pt; position: relative;">
<span style="font-family: Cambria;">2) Attacks in which the perpetrator intended to kill multiple victims but fewer than 4 died (these incidents are not counted). This is harder to get a handle on but has likely skewed the analysis by excluding cases when, for example, the reason fewer than 4 died was not a function of perpetrator intent but of rapid delivery of trauma services or some other intervention.</span></div>
</div>
Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-61411524287205027962013-11-07T18:11:00.000-05:002013-11-07T21:21:09.928-05:00Threat Assessment Q&A: "What is the Role of a Forensic Psychologist or Psychiatrist in the Threat Assessment Process?"<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><i><span style="color: #0c343d;">by Gene Deisinger, Ph.D.</span> </i></span></span><br />
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><i><b>Q: What is the role of a forensic psychologist/psychiatrist -- as an independent examiner -- in supplementing an effective threat assessment / management process?</b></i></span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><b>A:</b> There is some confusion about the role and purpose (and limitations) of a forensic psychologist/psychiatrist as an independent examiner in conducting "Direct Threat" and/or Fitness for Duty evaluations. These evaluations are often useful in supplementing an effective threat assessment and management process. We have found independent forensic examinations both to be over-used (e.g., being mandated when it would not be lawful to do so) -- and also under-used (e.g. when such expertise could inform a threat assessment team’s perspective on managing a case).</span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">A psychological evaluation of this sort is appropriate under the following conditions:</span></span></div>
<ul style="background-color: white; text-align: justify;">
<li><span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">when there is a reasonable belief that a person of concern (i.e., a student or employee) may pose a direct threat (as defined by law) to the campus/workplace/others</span></span></li>
</ul>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><b> AND</b></span></span></div>
<ul style="background-color: white; text-align: justify;">
<li><span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">that such potential threat may (reasonably) be due to a psychological/psychiatric/medical condition or disability. </span></span></li>
</ul>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">The fundamental question for an examination of this sort is whether the subject of the evaluation poses a direct threat <u>due to a</u> mental disorder or disability; and/or whether, due to a medical condition or disability, there is evidence that the subject cannot safely and effectively perform the essential functions of their position.</span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">If the examination finds that psychological conditions are causing/contributing to the threat posed by the subject, then consideration is given to mental health interventions to ameliorate symptoms and mitigate risk, and (to where appropriate), what accommodations the workplace may consider for the person to continue enrollment/employment. Note that these issues and outcomes of a forensic psychological or psychiatric examination are not to be equated with the threat management process, which is an operational, problem-solving approach to preventing and mitigating risk (rather than predicting risk). An effective threat management strategy is multi-dimensional in nature, and is not solely focused on mental health issues or interventions.</span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><u>Finding a Qualified Examiner</u></span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">Independent evaluations (for Direct Threat, Fitness for Duty, or forensic purposes) are highly specialized areas of practice and go well beyond administration of a standardized psychological test and a brief interview. Board certification (e.g., ABPP) in forensic psychology would be good evidence of expertise, but it is not the only consideration. As with all determinations of expertise, one must consider the <u>relevant</u> education, training, and experience of the professional in conducting these evaluations. The American Pychology-Law Society and the American Psychological Association Council of Representatives have developed and approved recognized specialty guidelines for forensic psychologists (see: <a href="http://www.apa.org/practice/guidelines/forensic-psychology.pdf" target="_blank">www.apa.org/practice/guidelines/forensic-psychology.pdf</a>).</span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">Professionals with experience in conducting pre-employment and/or fitness for duty evaluations MAY have relevant experience but those evaluations are not fully the same as a forensic/direct threat evaluation. There are differing aspects of law and research that inform the different (but related) fields. A former law enforcement officer, or physician or generalist psychologist is <u>NOT</u> competent to perform such evaluations. However, each of those persons may have skills that may supplement a threat assessment/management process.</span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">For educational institutions and for employers, we recommend that, before the need arises in a particular case, it is helpful to have already identified professionals with demonstrated expertise in this area and to have established referral arrangements with professionals. In some areas of the country, these professionals may be few and far between so it will be important to seek out such resources before a critical need arises. Where possible, it is helpful to have a couple of qualified experts available to the institution, so that if one is not available in a timely manner, or has a conflict of interest, the other is available to provide the evaluation.</span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">It is preferable to have these evaluations conducted by persons external to your organization, both to minimize perceptions of bias, and because few campuses have clinical services that are staffed with persons that are qualified to conduct the evaluations. Even where an institutions may have qualified experts on staff (e.g., with a university hospital/clinic, medical school or graduate program) there is significant value in utilizing an external evaluator to provide an objective and independent assessment of the case. This greatly minimizes the potential for a conflict of interest, or any dual relationships that may have otherwise arisen. </span></span></div>
<div class="MsoNormal" style="background-color: white; position: relative; text-align: justify;">
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;"><br /></span></span>
<span style="font-size: small;"><span style="font-family: "Trebuchet MS",sans-serif;">Finally, the issues involved with forensic/direct threat evaluations are many and varied, and there are significant aspects of law and professional standards that impact on ethical and lawful practice with such evaluations. We recommend consulting with legal counsel (who has knowledge and experience of those issues) when considering such evaluations, to ensure compliance with relevant employment and educational laws and policies.</span></span></div>
Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com2tag:blogger.com,1999:blog-3769799017883115838.post-33430728616385042972013-03-17T20:28:00.001-04:002013-03-17T20:31:50.397-04:00School Threat Assessment: A Great Example in Los Angeles Schools<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:DontVertAlignCellWithSp/>
<w:DontBreakConstrainedForcedTables/>
<w:DontVertAlignInTxbx/>
<w:Word11KerningPairs/>
<w:CachedColBalance/>
</w:Compatibility>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
<br />
<h1 style="background: none repeat scroll 0% 0% white; line-height: 13pt; margin-bottom: 6pt; text-align: justify;">
<span style="font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;"><span style="color: #20124d;"><i>by Jeffrey W. Pollard, PhD, ABPP and Marisa R. Randazzo, PhD </i></span></span></h1>
<h1 style="background: none repeat scroll 0% 0% white; line-height: 13pt; margin-bottom: 6pt; text-align: justify;">
<span style="font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;">Since the school shooting at Sandy Hook Elementary School, many schools, school districts, and legislators across the country are looking at whether school threat assessment programs could help enhance school safety. <span style="background: white;">As schools, communities, and legislators consider the merits of school threat assessment, we encourage them to take a look at the School Threat Assessment Response Team program that serves schools throughout Los Angeles county. </span>An <a href="http://www.nytimes.com/2013/03/15/us/in-los-angeles-focusing-on-violence-before-it-occurs.html?hpw&_r=0" target="_blank">article in the The New York Times</a> describes the inner workings of this program, which was originally developed by the Los Angeles Police Department and is financed under California's Mental Health Services Act<span style="background: white;">. Reporter Erica Goode describes the program as “one of the most intensive efforts in the nation to identify the potential
for school violence and take steps to prevent it.”</span></span><span style="background: white; font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;"> </span></h1>
<h1 style="background: none repeat scroll 0% 0% white; line-height: 13pt; margin-bottom: 6pt; text-align: justify;">
<span style="background: white; font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;">“Threat assessment” </span><span style="font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;">–
whether in a school, college, workplace, or the community – is essentially a
systematic fact-finding process. A threat assessment team addresses
threats and other alarming behavior by gathering objective
information, analyzing the information to determine if someone is planning to
engage in violence, and if so, implementing a strategy to help solve the problems that are driving the person to consider violence in the
first place.</span><span style="background: white; font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;"> The concept of using threat assessment to prevent school
violence was developed by the U.S. Secret Service and U.S. Department of
Education, following their landmark study of school shootings <a href="http://www.huffingtonpost.com/marisa-randazzo/is-there-anything-we-can-_b_2331319.html?utm_hp_ref=crime" target="_blank">that showed that prevention is possible</a>.</span></h1>
<h1 style="background: none repeat scroll 0% 0% white; line-height: 13pt; margin-bottom: 6pt; text-align: justify;">
<span style="background: white; font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;"> </span><span style="font-family: "Calibri","sans-serif"; font-size: 11.0pt; font-weight: normal;">The School Threat Assessment Response Team program in Los Angeles is an excellent example of school threat assessment programs
currently in operation at numerous schools and colleges across the country. <span style="background: white;">The Los Angeles program is noteworthy for how
information is shared lawfully among agencies, for making assessments that are
fact-based rather than based on stereotypes or profiling, and for the degree of
follow-up they conduct to keep track of worrisome students and
help connect them with resources to address their underlying
needs. For any school or school district looking to develop a school
threat assessment program, the Los Angeles program offers a helpful model
for guidance. More details on setting up and operating a school threat assessment program can be found in "<span style="color: black;"><a href="http://www.secretservice.gov/ntac/ssi_guide.pdf" target="_blank">Threat Assessment in Schools: A Guide to Managing Threatening Situations and Creating Safe School Climates</a>," published by U.S. Secret Service and U.S. Department of Education.</span></span></span></h1>
<br />Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com1tag:blogger.com,1999:blog-3769799017883115838.post-11216131078943438242012-12-21T14:05:00.001-05:002012-12-21T15:14:15.135-05:00Preventing Mass ViolenceIs there anything we can do to prevent school shootings and mass violence? Please <span style="color: black;"><a href="http://www.huffingtonpost.com/marisa-randazzo/is-there-anything-we-can-_b_2331319.html?utm_hp_ref=crime" target="_blank">click here for our article</a> on what we can do to prevent these attacks. </span>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-34256864499686355062011-12-12T01:45:00.001-05:002011-12-13T12:39:06.362-05:00Helping the Family of Fallen Virginia Tech Police Officer Deriek Crouse<h6 class="uiStreamMessage" data-ft="{"type":1}" style="font-family: Arial,Helvetica,sans-serif; font-weight: normal;">
<span style="font-size: small;"><span class="messageBody" data-ft="{"type":3}">On behalf of Major Gene Deisinger and our colleagues and friends at the Virginia Tech Police Department, we wanted to provide the latest information on funeral services and the
memorial fund to help support the family of fallen Virginia Tech Police
Department Officer Deriek Crouse:<br /> <br /> Expressions of condolences
to the Crouse family or to members of the Virginia Tech Police
Department may be sent to <a href="mailto:VTpolice@vt.edu">VTpolice@vt.edu</a>.</span></span></h6>
<h6 class="uiStreamMessage" data-ft="{"type":1}" style="font-family: Arial,Helvetica,sans-serif; font-weight: normal;">
<span style="font-size: small;"><span class="messageBody" data-ft="{"type":3}">The funeral service will be
held at 2 p.m. on Monday, Dec. 12, at <a href="http://www.blogger.com/goog_1341219348">Cassell Colise</a><span class="text_exposed_show"><a href="http://www.vt.edu/about/buildings/cassell-coliseum.html" target="_blank">um</a>
on the Virginia Tech campus.</span></span></span></h6>
<h6 class="uiStreamMessage" data-ft="{"type":1}" style="font-family: Arial,Helvetica,sans-serif; font-weight: normal;">
<span style="font-size: small;"><span class="messageBody" data-ft="{"type":3}"><span class="text_exposed_show">A memorial fund has been established to
support the needs of the family of Officer Crouse. Those wishing to
contribute can mail checks, payable to “Deriek Crouse Memorial Fund,” to
the address below:<br /> <br /> National Bank of Blacksburg<br /> Attn: Dana Sutphin<br /> P.O. Box 90002<br /> Blacksburg, VA 24062-9002<br /> <br /> Those seeking more information about the fund should call 540-552-2011 and ask to speak with Dana Sutphin, branch manager.<br /> <br /> Thank you to all who have expressed their support and concern.</span></span></span></h6>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-72321387830892374942011-12-08T01:15:00.001-05:002011-12-08T01:34:35.428-05:00Upcoming Training in Campus Threat Assessment Best Practices<div style="font-family: Arial,Helvetica,sans-serif;">
<span style="font-size: small;">Following the very popular <a href="http://www.campusthreatassessment.org/" target="_blank">COPS Office</a> campus threat assessment training sessions run by <a href="http://www.margolis-healy.com/" target="_blank">Margolis, Healy & Associates</a> -- we are once again offering a day-long training session on <a href="http://events.r20.constantcontact.com/register/event?oeidk=a07e5fc5bsufcbc902f&llr=mzvcrgcab" target="_blank">Best Practices in Campus Threat Assessment & Threat Management.</a> This session will be held on Thursday, January 12, 2012 and will be hosted by <a href="http://www.goucher.edu/" target="_blank">Goucher College</a> in Baltimore, MD. For more information - or to register - please <a href="http://events.r20.constantcontact.com/register/event?oeidk=a07e5fc5bsufcbc902f&llr=mzvcrgcab" target="_blank">CLICK HERE</a>.</span></div>
<div style="font-family: Arial,Helvetica,sans-serif;">
<span style="font-size: small;"><br /></span></div>
<div style="font-family: Arial,Helvetica,sans-serif;">
<span style="font-size: small;">This session is open to all higher education personnel and local law enforcement officials. Topics will include:</span></div>
<ul style="font-family: Arial,Helvetica,sans-serif;">
<li><span style="font-size: small;"><span title="">Current best practices in campus threat assessment and threat management and the new national standards.</span><span title=""> </span></span></li>
<li><span style="font-size: small;"><span title="">Case studies of targeted attacks. </span><span title=""> </span></span></li>
<li><span style="font-size: small;"><span title="">How to operate an effective campus threat assessment team.</span><span title=""> </span><span title=""> </span></span></li>
<li><span style="font-size: small;"><span title="">Steps to take in identifying, investigating, and evaluating threats and other disturbing behavior on campus.</span><span title=""> </span><span title=""> </span></span></li>
<li><span style="font-size: small;"><span title="">Developing and implementing case management plans to reduce risk.</span><span title=""> </span><span title=""> </span></span></li>
<li><span style="font-size: small;"><span title="">Case studies of prevented incidents.</span></span></li>
<li><span style="font-size: small;"><span title="">Understanding legal issues in campus threat assessment and new legal developments.</span><span title=""> </span><span title=""> </span></span></li>
<li><span style="font-size: small;"><span title="">Finding solutions to common problems facing campus threat assessment teams.</span></span></li>
</ul>
<span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;" title=""></span></span><span style="font-size: 12pt;" title=""><span style="font-size: small;"><span style="font-family: Arial,Helvetica,sans-serif;">Early Registration is $295 for registrations by December 31, 2011. Registration after December 31, 2011 is $350. </span><a href="http://events.r20.constantcontact.com/register/event?oeidk=a07e5fc5bsufcbc902f&llr=mzvcrgcab" style="font-family: Arial,Helvetica,sans-serif;" target="_blank">Click here</a><span style="font-family: Arial,Helvetica,sans-serif;"> for more information or to register.</span></span></span>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-59643101449927906962011-09-15T02:11:00.001-04:002011-09-20T01:48:12.631-04:00JOB OPENINGS: Positions with NC State and Tidewater Community College<div style="color: black; text-align: justify;">
Two new job openings in higher ed threat assessment have just been posted: </div>
<div style="color: black; text-align: justify;">
<br /></div>
<div style="color: black; text-align: justify;">
North Carolina State University (Raleigh NC) has posted a job opening for a counselor with an emphasis in threat assessment and threat management. <a href="http://www.higheredcenter.org/jobs/counselor-university-counseling-center-emphasis-threat-assessment-and-threat-management">Click here</a> for more information on the NC State position. </div>
<div style="color: black; text-align: justify;">
<br /></div>
<div style="color: black; text-align: justify;">
Tidewater Community College (Virginia) has posted an opening for the Director of Threat Assessment and Staff Psychologist. <a href="http://support.tcc.edu/hr/d_administrators.asp?primary=2138">Click here</a> for information on the Tidewater CC vacancy announcement.</div>
Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-68948068143136107002011-08-26T14:24:00.001-04:002011-08-26T14:26:18.970-04:00Two New Threat Assessment Resources<div style="text-align: justify;">
Here are two new resources that we felt are worth highlighting, for those in the threat assessment field or who work with anyone in threat assessment: </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The first is an article in the 2011 issue of the <a href="http://www.urmia.org/">URMIA</a> Journal: "<a href="http://www.sigmatma.com/images/NolanRandazzoDeisinger_CampusThreatAssessmentTeams_FINAL_20110802.pdf">Campus Threat Assessment and Management Teams: What Risk Managers Need to Know Now</a>." <a href="http://www.sigmatma.com/images/NolanRandazzoDeisinger_CampusThreatAssessmentTeams_FINAL_20110802.pdf">The article</a> covers the emerging standard of care in campus threat assessment, and identifies steps that risk managers can take to make their threat assessment process consistent with the standard of care. While written for campus risk managers, <a href="http://www.sigmatma.com/images/NolanRandazzoDeisinger_CampusThreatAssessmentTeams_FINAL_20110802.pdf">the article</a> is useful for a broader audience. This article was co-authored by Jeff Nolan, Esq., Marisa Randazzo, PhD, and Gene Deisinger, Ph.D.</div>
<div style="text-align: justify;">
<br /></div>
The second is an <a href="http://policechiefmagazine.org/magazine/index.cfm?fuseaction=display&article_id=2447&issue_id=82011">article from Police Chief magazine</a> on the role of police psychologists as consultants to law enforcement agencies, including in threat assessment. Gene Deisinger co-wrote this article's section on threat assessment and management. It offers a great perspective on the various roles that psychologists can play in support of federal, state, and local law enforcement. Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-61820891882700902682011-08-22T16:00:00.002-04:002011-08-22T16:01:23.062-04:005 Pitfalls to Avoid in Threat Assessment<div style="text-align: justify;">
As a follow up to the first article in <i>Higher Ed Impact</i> on tips to make your threat assessment team more effective, Dr. Gene Deisinger discusses five common pitfalls that can plague higher ed threat assessment teams - and ways to avoid them. <a href="http://www.academicimpressions.com/news.php?i=224&q=9225a345448nL">According to this second article in <i>Higher Ed Impact</i></a>, 5 common pitfalls to avoid are:</div>
<div style="text-align: justify;">
</div>
<ol style="text-align: justify;">
<li>"Focusing solely on increased reporting</li>
<li>Focusing only on students</li>
<li>Reinventing the wheel</li>
<li>Lack of due diligence in vetting possible vendors</li>
<li>Failing to follow up, monitor, and assess whether the initial intervention was sufficient."</li>
</ol>
<div style="text-align: justify;">
For the full article - including ways to avoid these pitfalls, <a href="http://www.academicimpressions.com/news.php?i=224&q=9225a345448nL">please click here</a>.</div>
<br />Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-77288841571227982882011-08-20T01:07:00.000-04:002011-08-20T01:07:11.899-04:003 Tips for Making Your Threat Assessment Team More Effective<div style="text-align: justify;">
In the August 4, 2011 edition of <a href="http://www.academicimpressions.com/">Academic Impressions</a>' <i>Higher Ed Impact</i>, Dr. Gene Deisinger outlines three tips for making higher education threat assessment teams more effective, even in the face of budget cuts. <a href="http://www.academicimpressions.com/news.php?i=220">According to the article</a>, the three strategies he recommends are: </div>
<ol style="text-align: justify;">
<li>"Define your team's mission and purpose clearly.</li>
<li>Do more with what you already have by finding opportunities for greater collaboration between departments that provide resources and services to students. </li>
<li>Cultivate a sense of shared purpose."</li>
</ol>
<div style="text-align: justify;">
For more on these tips, <a href="http://www.academicimpressions.com/news.php?i=220">read the full article here</a>.</div>
Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-73894288334334495142011-07-19T04:02:00.008-04:002011-07-19T04:14:01.230-04:00Everybody Needs a Vacation - Even in Threat Assessment<div style="text-align: justify;">
It's "summertime, and the livin' is easy"*....or at least it should be. But if you serve on a threat assessment team, summertime may not mean the vacations and downtime it means for many people. Threats and disturbing behavior can occur anytime, and they often require a quick evaluation and rapid intervention. Being on a threat assessment team can mean working on weekends, over vacations, and late into the night. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
But this does not mean that team members or individual threat managers cannot take a break. Quite the contrary: threat assessment team members NEED to take a break every so often. Threat assessment work is important work. It is often urgent or time sensitive. And threat assessment work can be a matter of life and death -- literally. It is this "life and death" aspect of threat assessment and protective intelligence that can make it hard to justify taking a vacation. But it is precisely what makes taking a break so critical.</div>
<br />
<div style="text-align: justify;">
My colleagues and I have worked with several threat assessment teams that - to put it bluntly - were burnt out. In some cases the team members were managing sizable caseloads. In other cases, the team members were juggling their threat assessment responsibilities with the demands of their busy day jobs. Regardless of the reason for burn out, some ways to help guard against it can include:</div>
<ul>
<li>adding "term limits" into a team's policies or procedures, so that individual team members have to rotate off the team every so often; </li>
<li>identifying and training alternates for each team member - individuals who are ready to step in and serve on the team for a week - or two - or three -- when needed; and, </li>
<li>encouraging team members to look after each other with care - and to say something if they think a fellow team member might need a break. </li>
</ul>
<div style="text-align: justify;">
</div>
<br />
<div style="text-align: justify;">
In <a href="https://www.stephencovey.com/7habits/7habits.php">The 7 Habits of Highly Effective People</a>, Stephen Covey discusses the parable of the goose and the golden egg, to illustrate that you can fail in your work if you fail to take good care of yourself at the same time. I think it's a lesson that's particularly appropriate for threat assessment team members to heed. Enjoy your summer.</div>
<br />
- <i>Marisa R. Randazzo, Ph.D.</i><br />
<span style="font-size: xx-small;">* Lyrics from "Summertime" by George Gershwin, DuBose Heyward, Dorothy Heyward, and Ira Gershwin</span><i><span style="font-size: xx-small;"> </span></i>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com1tag:blogger.com,1999:blog-3769799017883115838.post-54207818673003765732011-05-06T10:47:00.006-04:002011-05-06T14:32:41.803-04:00Meeting Murder or Overreacting?Peter Romary, Senior Consultant with Sigma Threat Management, writes about the need for effective, proven threat management techniques, threat managers, and processes to avoid serious mistakes! Read <a href="http://truthinthelaw.blogspot.com/2011/05/meeting-murder-or-overreacting.html">More </a>
"I met Murder on the way
He had a face like Castleraegh"Peter Romaryhttp://www.blogger.com/profile/11972355057923761303noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-26719340591064657132011-03-13T03:34:00.000-04:002011-03-13T03:34:39.164-04:00Threat Assessment Q & A<i>By Marisa R. Randazzo, PhD and Gene Deisinger, PhD </i><br />
<br />
In the course of our seminars and consulting
work, we often get questions that we think could be helpful for others
to hear. So we have started a new series of blog posts – each labeled
“Threat Assessment Q&A” -- to answer these questions and to correct
common misunderstandings about threat assessment that appear in the
media and elsewhere. We posted our first Threat Assessment Q & A on March 6, 2011 (<a href="http://threatmanagement.blogspot.com/2011/03/threat-assessment-q-should-counseling.html">click here</a> to read it).<br />
<br />
If you have a question about behavioral threat
assessment and threat management -- on campus, in the workplace, for public officials and
public figures, or in any other domain – please email it to us at <a href="mailto:Info@SigmaTMA.com">Info@SigmaTMA.com</a> and include "Threat Assessment Q&A" in the subject line. We'll answer some questions and open others up for discussion and debate. As a reminder, we have<a href="http://threatmanagement.blogspot.com/2011/01/before-you-post-comment-on-this-blog.html"> guidelines for posting comments</a> on this blog. Out of respect for all who read and comment here, please make sure you adhere to these<a href="http://threatmanagement.blogspot.com/2011/01/before-you-post-comment-on-this-blog.html"> guidelines</a> before posting a comment or submitting a question. Look for more Threat Assessment Q&A posts in the coming weeks.Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-36456304201229439002011-03-06T20:56:00.026-05:002011-03-13T03:26:14.345-04:00Threat Assessment Q&A: “Should Counseling Center Staff Conduct ‘Direct Threat’ or ‘Fitness for Duty’ Evaluations?”<div style="text-align: justify;">
<i>By Gene Deisinger, PhD; Jeff Pollard, PhD & Marisa Randazzo, PhD </i></div>
<div style="text-align: justify;">
<br />
The question we received this week came from a training session on college/university threat assessment that we conducted in San Diego at the beginning of February 2011. A staff psychologist at a college counseling center asked us:
<b> </b><br />
<br />
<b>Q:</b> “Is it advisable for a college or university to have its counseling center psychologists or psychiatrists conduct "Fitness to Stay" or “Fitness for Re-entry” evaluations on students (both types are evaluations are similar to Fitness for Duty evaluations conducted on employees), and “Direct Threat” evaluations on students or employees”?
<b> </b><br />
<br />
<b>A:</b> While psychologists and psychiatrists on staff at college/university counseling centers may be qualified to conduct such assessments, we recommend that institutions think through several issues before asking this of their mental health professionals.<br />
<br />
The first issue is that psychologists’ and psychiatrists’ training do not typically include the skills required for conducting such evaluations -- so colleges and universities should insure that the professional in question has demonstrated post-graduate training, supervised practice, and experience in conducting the evaluations. The professional standards for forensic evaluators or forensic psychologists/psychiatrists are good baselines for measuring the competence and/or setting out training/experience guidelines for someone whose position requires they conduct such evaluations. To be competent, examiners do not have to be certified at the forensic level; however they must possess the necessary training and hands-on experience.<br />
<br />
The second issue is the impact that using counseling center staff as evaluators could have on the counseling center’s reputation on campus. Most counseling centers build their reputation and relationship with students as being a service for the students and may actively or implicitly have some advocacy role on behalf of student needs. Conducting evaluations that can negatively impact upon a student's status – that is, on a student’s ability to stay or enter the institution -- often raise concerns (on behalf of students and some faculty/staff) as to whether the center is a true support/advocate for students. While this can be addressed in terms of HOW the services are provided and how they are discussed in the community, it still raises concerns in which many centers choose not to involve themselves. Also, as most of these evaluations are mandated by the college or university as a contingency of enrollment, some centers are reluctant to involve themselves in mandated services. It would be fair to say that there is a good deal of controversy on this question as some professionals/centers do not view mandated services as consistent with counseling center philosophy and a few would go so far as to suggest it is unethical (a view we understand but do not necessarily hold).<br />
<br />
Finally, when such evaluations are done internal to the institution - i.e., by a component of the university -- it raises a reasonable question as to the independence, autonomy, and objectivity of the evaluator. It may be reasonable for the person being evaluated to question findings presented by an internal evaluator because the evaluator is an employee or agent of the university and could be assumed (rightly or wrongly) to provide only conclusions that are in line with the university’s stance. Evaluations that are conducted by an external psychologist or psychiatrist make that argument of bias a bit harder to make, presuming the independent evaluator conducts a fair, thorough and objective evaluation.<br />
<br />
The last issue we want to raise is that, with respect to high risk evaluations or ones in which there is a fair amount of ambiguity, we find it very helpful to have an objective, independent view from outside the university that either validates our views (from internal evaluations or the threat assessment process) or challenges misperceptions that we may have formed or provides information we could have overlooked. In essence, it can create a check and balance on the institution’s internal decision-making.<br />
<br />
While none of these issues would legally prohibit a college or university from using someone on staff to conduct these evaluations, these concerns make it less ideal for an institution to do so internally. We want to be clear that our comments are only in regard to true assessment of dangerousness and fitness for duty evaluations (including fitness to stay and fitness for re-entry evaluations) and are not related to the types of evaluations that college health/counseling services provide routinely -- including intake/diagnostic screening and screening whether someone may benefit from involvement in mental health services -- for which counseling center staff members are highly competent and appropriate.
<i> </i></div>Gene Deisinger, Ph.D.http://www.blogger.com/profile/11762791674255751898noreply@blogger.com1tag:blogger.com,1999:blog-3769799017883115838.post-20785518411895090952011-01-22T03:22:00.001-05:002011-01-22T03:26:39.659-05:00College & University Threat Assessment Training - February 1 and 8<div style="text-align: justify;">
In the past few weeks we've received many questions about threat assessment training for higher education institutions. There are two training sessions coming up in early February that are open to the public: </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>February 1 in San Diego CA</b> ($300 per person). This training is part of a multi-day conference on campus and workplace violence prevention, featuring some of the top experts in the field of threat assessment and threat management. Please <a href="http://www.specializedtraining.com/p-114-san-diego-ca-preventing-violence-in-the-workplace-threat-assessment-and-management-the-state-of-the-science.aspx">click here for more information and registration details</a>.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>February 8 in Tallahassee FL</b> (FREE). This training is the LAST of ten regional campus threat assessment seminars that have been sponsored by the <a href="http://www.cops.usdoj.gov/">US Department of Justice COPS Office</a>, and coordinated by <a href="http://www.margolis-healy.com/">Margolis Healy & Associates</a> throughout the US in 2009, 2010, and 2011. Please <a href="http://www.campusthreatassessment.org/">click here for more information or to register</a>. This seminar is open only to personnel at higher education institutions.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
If you can't make it to one of these workshops, more information on threat assessment training <a href="http://www.sigmatma.com/training.html">is available here</a>.</div>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-18292364485968837682011-01-15T04:00:00.001-05:002011-01-15T12:24:35.931-05:00Before You Post a Comment on this Blog....We encourage you to read the following guidelines before leaving a comment about any post, or about any other comment, on this blog:<br />
<br />
<b><u>Guidelines for Posting a Comment on <i>Current Issues in Threat Assessment & Threat Management</i></u></b> <br />
<br />
<div style="text-align: justify;">
We welcome all thoughts and
comments that are related to threat assessment, threat management, violence prevention, and personal safety - as well as debate sparked by incidents of
targeted violence or other current events, as long as the commentary
is related in some manner to threat assessment, violence prevention, or personal safety. If you have a comment or reaction to one of our posts, a question you'd like to pose, or a topic that you suggest we cover, we encourage you to post a comment.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
We
reserve the right to delete any comment that uses expletives or
obscene language, or that includes any personal attack or derogatory commentary directed at a particular individual or group.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
When you leave a comment, we strongly encourage you to identify yourself by name or at least by first name and last initial. If
you are a fellow professional in the field of threat assessment, threat
management, or behavioral intervention, we ask that -- as a
professional courtesy -- you identify yourself using your full name and preferably indicate your relationship to
the threat assessment community (e.g., your university affiliation; your firm's name; etc.) whenever you post a comment. If you have a sensitive or confidential comment or question - or anything else you would prefer not to post in the publicly-viewable comments - please feel free to email us directly at <a href="mailto:Info@SigmaTMA.com">Info@SigmaTMA.com</a>.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Any comment that, in our judgment, doesn't adhere to
these guidelines will be removed. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
In the spirit of <a href="http://threatmanagement.blogspot.com/2011/01/tucson-blame-game-time-to-dial-back.html">Peter Romary's post</a>, we encourage everyone who posts and comments here to be
civil and respectful of all the opinions voiced. This is an important
area of practice, and one that is under continual development and
improvement. I encourage all of us to strive to raise the bar in the
field of threat assessment and violence prevention, through our behavior as well as our work.</div>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-85163734829170208992011-01-13T13:48:00.007-05:002011-01-13T13:58:38.920-05:00The Tucson Blame Game: Time To Dial Back The Rhetoric<em>Published in <a href="http://truthinthelaw.blogspot.com/">"The True Verdict"</a> Blog, Peter Romary, a Senior Consultant for Sigma Threat Management, calls for more concern and support for victims and less speculative, inflammatory rhetoric in the wake of the recent shootings.</em> Visit the blog <a href="http://truthinthelaw.blogspot.com/2011/01/tucson-blame-game-time-to-dial-back.html">here</a>.Peter Romaryhttp://www.blogger.com/profile/11972355057923761303noreply@blogger.com28tag:blogger.com,1999:blog-3769799017883115838.post-14313839582215008272011-01-04T01:58:00.001-05:002011-01-04T01:58:51.055-05:00MORE Free Threat Assessment Training<div style="text-align: justify;">
In January and February we will be teaching two FREE, day-long campus threat assessment seminars. These seminars are the last two that will be provided free of charge to higher education personnel through a generous grant from the<a href="http://www.cops.usdoj.gov/"> U.S. Department of Justice COPS Office</a>. The last two seminars will be held in Phoenix, AZ
(on January 11) and in Tallahassee, FL (on February 8).</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
If you haven't had a chance to attend one of these sessions, and you work for a college or university, you can <a href="http://www.campusthreatassessment.org/">click here to register or for more information</a>. In the seminars, we:</div>
<ul style="text-align: justify;">
<li>Provide an overview of campus threat assessment & management</li>
<li>Compare threat assessment with profiling and other assessment approaches</li>
<li>Explain the steps in the threat assessment process, key investigative questions, and evaluation decisions</li>
<li>Provide coaching on developing case management strategies; and,</li>
<li>Discuss strategies for creating and operating an effective a campus threat assessment team.</li>
</ul>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Since 2009, the COPS Office has made this training available to higher education personnel at cities around the U.S., including Atlanta, Boston, Chicago, Houston, San Diego, Seattle, Sioux Falls, and Washington DC. We are honored to have been part of the team involved in creating the curriculum for this training and in providing the training to participants around the country. Come join us for one of these last seminars!</div>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com6tag:blogger.com,1999:blog-3769799017883115838.post-55123854684419953782010-12-02T02:05:00.013-05:002010-12-04T02:46:13.226-05:00How to Find a Good Threat Assessment Consultant: 5 Questions to Ask Before You Hire<br />
<div class="MsoNormal" style="text-align: justify;">
Let's face it, security can be big business -- and that
means it can attract some vendors who aren't all that they claim to be. After mass tragedies, we have seen unqualified
folks come out of the woodwork and announce that they are "experts"
in one security area or another. This is
certainly true in the area of behavioral threat assessment and threat management.</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div>
</div>
<div class="MsoNormal" style="text-align: justify;">
Businesses, educational institutions, government agencies,
and high-profile individuals may look to hire a behavioral threat assessment
consultant when they are faced with a death threat, a stalking situation,
or some other disturbing behavior. They
may seek out threat assessment training if they want to learn how to respond
appropriately to threats and troubling behavior – or if they are looking to start a threat assessment team.
Threat assessment consultants and instructors are hired for their ability to evaluate threats and craft strategies to
effectively reduce or minimize the risk…and in the case of training, their ability to
teach others to do the same.</div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
But how can you tell whether your threat assessment
consultant or instructor is truly qualified?
Here are 5 questions to ask -- ideally before you hire a consultant or
sign up for a course: </div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<b>1. “How much direct
experience do you have in investigating, evaluating, and/or managing individual
threat cases?” </b>While there is no
hard and fast rule, we think that it takes a good 7-10 years of experience
working on threat cases (depending on the level of direct involvement) before a
person has truly developed a level of expertise in threat assessment and
management. Preferably they should have
received all, or at least some, of their experience from a structured work
setting such as a law enforcement agency, security service, forensic mental
health program, or established campus or workplace threat assessment program
where they could learn from others with more experience in the field. Ideally, at least some of the consultant’s
/instructor’s experience should be directly relevant to your environment –
meaning that if you are concerned about workplace threats, your consultant’s
direct experience comes at least in part from workplace threat cases . As with any potential hire, check your
would-be consultant's or instructor’s claims about experience by calling
references and asking around about their reputation.</div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<b>2. “Give me examples of
the different types of cases you have handled, and what you found that worked
effectively to address some of those situations.”</b> What you are looking for is a broad range of
experience and the ability to offer details on some specific situations or
cases. A good threat assessment
consultant (or instructor) should be able to describe their involvement on a
wide array of cases, including threats of harm to others, harm to self,
stalking (cyber- or regular), harassment, and others. A good threat assessment consultant should
also be able to provide specific examples of interventions or case management
strategies they put into place that worked to reduce risk or improve the
overall safety of the situation. Beware
of a consultant or instructor who cannot provide some specific examples - or
who hides behind claims of privacy instead of answering this question. There is no need for them to name names --
but they should at least be able to share with you the sanitized facts of some
cases and how the situations were resolved.
Threat assessment consultants with sufficient case experience always have
a few good stories to tell - about cases that fascinated them or solutions that
worked particularly well.</div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<b>3. “Tell me about your
most challenging case, or about an intervention that did not work well and what
you did to resolve that situation?”</b>
Qualified threat assessment consultants and instructors often get to be
good because they have learned from their experiences -- good and bad --
throughout their career. Their answer
should tell you how the consultant has learned from his or her mistakes and
what they ultimately did to fix a particular problem. It will also tell you how creative or
resourceful they are when faced with a challenging problem. Beware of any threat assessment consultant or
instructor who claims never to have made a mistake. Either they don't have as much experience as
they are claiming - or they are not being truthful in their response.</div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<b>4. “What will your
references say is your greatest strength?
Your biggest weakness?”</b> There
is no one "right" answer to these questions, but the consultant's
answers will give you some insight into how well-suited they may be for your
particular needs. For example, a
consultant who writes lengthy reports and takes months to do so may not be
well-suited for an operationally-focused organization that needs to make
decisions quickly. A consultant who uses
a lot of jargon may sound impressive but may not be able to translate their
expertise into information or recommendations you can actually use.</div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<b>5. “Who can verify your
credentials?” </b>Although it takes some
additional time, we strongly recommend asking for - and then checking with - at
least two references provided by the consultant or instructor. A reference who includes qualifiers in their
commentary (e.g. "<i>usually </i>good;
"<i>basically</i> offered helpful
advice;" "<i>generally</i>
responsive to our requests") should be questioned a bit further on
negatives or instances of problems with the consultant. We also recommend verifying claims about
education – what degrees the consultant or instructor says they have and from
where. We know of some consultants who
introduce themselves as “Dr.” but never earned a degree that would allow them
to use that title. A quick call to the
institution where the consultant claims to have gotten their degree will let
you know for sure.</div>
<div style="text-align: justify;">
</div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
Above all, keep in mind that a threat assessment consultant
is someone you may have to hire to help you handle a potentially dangerous or
even-life threatening situation. It is
important to take time to vet them as thoroughly as possible – ideally before a
crisis arises. Identifying and screening
potential consultants <u>before</u> you are faced with an imminent situation
will allow you sufficient time to verify claims and check with references. If a crisis eventually occurs, you'll be able
to secure the well-qualified help you need quickly and confidently.<br />
<br />
<i><a href="http://www.sigmatma.com/about.html">Marisa R. Randazzo, PhD</a> & <a href="http://www.sigmatma.com/about.html">Gene Deisinger, PhD</a> are lead authors of <a href="http://www.sigmatma.com/books.html"><u>The Handbook for Campus Threat Assessment & Management Teams.</u></a></i> </div>Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com10tag:blogger.com,1999:blog-3769799017883115838.post-69924812984316443582010-11-21T03:31:00.000-05:002010-11-21T03:31:38.956-05:00NEWS: Anti-Bullying Legislation Proposed in CongressThis week two federal legislators introduced a bill in Congress that would require colleges and universities that receive federal funding to implement anti-bullying/anti-harassment policies. <a href="http://www.nj.com/news/index.ssf/2010/11/higher_education_anti-bullying.html">According to an article in The Star-Ledger</a>, the legislation would also provide funding for colleges and universities in the U.S. to start anti-bullying programs on campus. The legislation, known as the Tyler Clementi Higher Education Anti-Harassment Act, was introduced in the U.S. House of Representatives by Rep. Rush Holt (D-12th Dist, NJ) and in the U.S. Senate by Sen. Frank Lautenberg (D-NJ).<br />
<br />
The legislation is named for <a href="http://articles.cnn.com/2010-09-30/opinion/spaulding.rutgers.suicide_1_transgender-students-experience-harassment-identity?_s=PM:OPINION">Tyler Clementi</a>, the Rutgers University student who committed suicide in September by jumping off the George Washington Bridge after his roommate and another classmate
allegedly used a webcam to film Clementi in a private encounter
with another man in his dorm room and publicize it to others via social media channels. Clementi's suicide sparked international commentary about bullying and harassment, including <a href="http://www.youtube.com/watch?v=ax96cghOnY4">an emotional speech by a Forth Worth city councilman Joel Burns</a> about his personal experiences being bullied that received widespread attention and prompted <a href="http://www.youtube.com/watch?v=ax96cghOnY4">similar commentary</a> from individuals around the world.Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-39939672977874522522010-11-16T00:45:00.002-05:002010-11-16T00:53:20.809-05:00FREE Campus Threat Assessment Training SessionsThe US Department of Justice, Office of Community Policing Services (<a href="http://www.cops.usdoj.gov/">COPS Office</a>) is sponsoring <a href="http://campusthreatassessment.org/index.php/">free one-day training seminars</a> on campus threat assessment and threat management. Course content includes: <br />
<ul>
<li>Guiding principles of campus threat assessment</li>
<li>Steps in the campus threat assessment and management process (including how to investigate, evaluate, prioritize, and manage cases)</li>
<li>Information-sharing and other legal concerns</li>
<li>Strategies for maximizing the effectiveness of a campus threat assessment team</li>
<li>Table-top exercise on a case situation, and other participant exercises</li>
</ul>
These seminars are appropriate for higher ed personnel in the areas of campus administration; campus security and law enforcement; counseling; judicial affairs; legal counsel; student
affairs; faculty; risk management; human resources; and students.<br />
<br />
Faculty for these sessions include <a href="http://campusthreatassessment.org/index.php/faculty/bios/gene_deisinger/">Dr. Gene Deisinger</a> and <a href="http://campusthreatassessment.org/index.php/faculty/bios/marisa_randazzo/">Dr. Marisa Randazzo</a> (co-authors of <a href="http://campusthreatassessment.org/index.php/cart/the_handbook_for_campus_threat_assessment_management_teams/">The Handbook for Campus Threat Assessment & Management Teams</a>), higher education attorney <a href="http://campusthreatassessment.org/index.php/faculty/bios/jeffrey_nolan/">Jeffrey Nolan</a>, and campus public safety experts <a href="http://campusthreatassessment.org/index.php/faculty/bios/gary_margolis/">Dr. Gary Margolis</a> and <a href="http://campusthreatassessment.org/index.php/faculty/bios/steven_healy/">Steven Healy</a>.<br />
<br />
The regional one-day training seminars will be offered on the following dates/cities:<br />
<ul>
<li>Atlanta, GA on December 2, 2010</li>
<li>Phoenix, AZ on January 11, 2011</li>
<li>Tallahassee, FL on February 8, 2011.</li>
</ul>
For information on <a href="http://campusthreatassessment.org/index.php/seminars/begin_registration/">how to register</a>, or for more details about the training sessions, please <a href="http://www.campusthreatassessment.org/">click here</a>. <br />Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-87339777077229664362010-10-28T02:24:00.001-04:002010-10-31T00:17:55.835-04:00Deisinger as Keynote Speaker at Two ConferencesDr. Gene Deisinger was recently featured as the keynote speaker at two conferences on violence prevention in Wisconsin. On Wednesday, October 27, Dr. Deisinger was featured as the keynote speaker on campus threat assessment and violence prevention at the University of Wisconsin System's Sexual Violence Prevention Workshop, "Leveraging Campus and Community Partnerships: Creating Communities Free of Sexual Violence." For more information on the workshop, <a href="http://www.uwsa.edu/acss/sexualviolence/">click here</a>. Then on Thursday, October 28, Dr. Deisinger was the keynote speaker at the University of Wisconsin-Madison's 2d Annual End Violence on Campus (EVOC) Initiative annual meeting. <a href="http://badgerherald.com/news/2010/10/28/virgina_tech_officer.php">Coverage of Dr. Deisinger's presentation</a> at the EVOC meeting appeared in <u>The Badger Herald</u> on Friday, October 29. Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0tag:blogger.com,1999:blog-3769799017883115838.post-84044888043964696512010-08-27T23:16:00.003-04:002010-12-04T02:43:15.512-05:00Welcome to Current Issues in Threat Assessment & Threat ManagementWelcome to our new blog on current issues in threat assessment and management. We will use this blog to highlight developments in the news, workplace, courts, academia, and other domains that are related to behavioral threat assessment, case management, and violence prevention. We will also include tips and strategies for personal safety. Our goal is to share what we know to help make threat assessment and violence prevention more feasible - for everyone. We welcome your thoughts on any of our posts. For more information about any of our contributors, please click on the links under List of Contributors on the left side of the page - or just <a href="http://www.sigmatma.com/">click here</a>.Marisa R. Randazzo, Ph.D.http://www.blogger.com/profile/06445584167875014537noreply@blogger.com0