Risk

TSAS WP17-01: A Concurrent Evaluation of Threat Assessment Tools for the Individual Assessment of Terrorism

Publisher: TSAS
Year: 2017
Description:

This research examines what is the content overlap among three tools that may be relevant for assessing an individual’s risk for terrorist violence: Version 3 of the Historical-Clinical-Risk Management—20 (HCR-20 – …

TSAS WP16-13: Trying to Talk to Terrorists: Ethical and Methodological Challenges in Canada

Publisher: TSAS
Geography: Canada
Year: 2016
Description:

Scholars have long shied away from talking to terrorists. This is because there are significant methodological and ethical problems posed by such research. How can we manage those challenges and – …

L’analyse du risque géopolitique: du plausible au probable

Author(s): Bencherif-- Adib
Year: 2015
Description:

Abstract: This paper is going to explore the logical process behind risk analysis, particularly in geopolitics. The main goal is to demonstrate the ambiguities behind risk calculation and to highlight – …

Security Games: Surveillance and Control at Mega-Events

Year: 2011
Description:

Security Games: Surveillance and Control at Mega-Events addresses the impact of mega-events – such as the Olympic Games and the World Cup – on wider practices of security and surveillance. – …

L’Analyse du Risque Géopolitique: du Plausible au Probable

Author(s): Bencherif-- Adib
Year: 2015
Description:

This paper is going to explore the logical process behind risk analysis, particularly in geopolitics. The main goal is to demonstrate the ambiguities behind risk calculation and to highlight the – …

Using structured professional judgment guidelines in threat assessment and management: Presentation, analysis, and formulation of a case of serial intimate partner violence.

Year: 2014

Violent Extremist Risk Assessment: Development of the VERA 2 and Applications in the High Security Correctional Setting

Publisher: Routledge
Year: 2014

TSAS WP14-09: A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety

Year: 2014
Description:

Can agent-based modelling and virtual environment technologies be used to create a decision support, response planning and risk assessment system for emergence preparedness?

Risk assessment and management of group-based violence

Author(s): Cook--Alana
Year: 2014
Description:

Group-based violence (GBV) may be defined as actual, attempted, or threatened physical injury that is deliberate and nonconsensual, perpetrated by one or more individuals whose decisions and behaviour are influenced – …

Woolwich Attack: Managing Fear

Author(s): Gomis– Benoît
Publisher: Chatham House
Year: 2013

The Proliferation of Cyber Security Strategies and Their Implications for Privacy

Author(s): Dupont-- Benoit
Year: 2013
Description:

The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …

Invisible Victims: Homelessness and the Growing Security Gap

Author(s): Huey– Laura
Year: 2012

Terrorism and Human Rights: A Decade of Canadian Practices

Geography: Canada, North America
Year: 2011
Description:

The aim of this chapter is to give an overview of some of the challenges that Canada has faced in tackling terrorist threats since the events of the 11th September – …

Notes on the Canadian Exception: Security Certificates in Critical Context

Author(s): Aitken-- Rob
Geography: Canada, North America
Year: 2007
Description:

This paper attempts to place the Canadian security certificate program in critical context. The program is a mechanism of arbitrary detention targeted to non-citizens the state has certified as ‘threats’ – …

Intelligence and Counter-Terrorism in a Multi-Centric World: Challenges and Opportunities

Year: 1999

War on Terrorism

Publisher: Ashgate
Year: 2004

The Security Mirage

Publisher: TED Talk
Year: 2011

2013 Public Report on the Terrorist Threat to Canada

Geography: Canada, North America
Year: 2013
Description:

The 2013 Public Report on the Terrorist Threat to Canada updates Canadians on how the terrorist threat has changed in the last year. (Source: Publication).

Assessing Cyber Threats to Canadian Infrastructure

Publisher: CSIS
Geography: Canada, North America
Year: 2012
Description:

The purpose of this study is threefold: (1) to examine the cyber threat environment confronting Canada’s Critical National Infrastructure (CNI), with a particular focus on four key sectors and their – …

TSAS WP13-01: C, B, R, or N: The Influence of Related Industry on Terrorists’ Choice in Unconventional Weapons

Author(s): Tishler-- Nicole
Publisher: TSAS
Year: 2013
Description:

The assumption of technological determinism for CBRN underlies Canadian policy, but it has not been empirically tested.