Risk assessment

TSAS WP17-01: A Concurrent Evaluation of Threat Assessment Tools for the Individual Assessment of Terrorism

Publisher: TSAS
Year: 2017

This research examines what is the content overlap among three tools that may be relevant for assessing an individual’s risk for terrorist violence: Version 3 of the Historical-Clinical-Risk Management—20 (HCR-20 – …

L’analyse du risque géopolitique: du plausible au probable

Author(s): Bencherif-- Adib
Year: 2015

Abstract: This paper is going to explore the logical process behind risk analysis, particularly in geopolitics. The main goal is to demonstrate the ambiguities behind risk calculation and to highlight – …

Security Games: Surveillance and Control at Mega-Events

Year: 2011

Security Games: Surveillance and Control at Mega-Events addresses the impact of mega-events – such as the Olympic Games and the World Cup – on wider practices of security and surveillance. – …

Using structured professional judgment guidelines in threat assessment and management: Presentation, analysis, and formulation of a case of serial intimate partner violence.

Year: 2014

Violent Extremist Risk Assessment: Development of the VERA 2 and Applications in the High Security Correctional Setting

Publisher: Routledge
Year: 2014

TSAS WP14-09: A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety

Year: 2014

Can agent-based modelling and virtual environment technologies be used to create a decision support, response planning and risk assessment system for emergence preparedness?

Risk assessment and management of group-based violence

Author(s): Cook--Alana
Year: 2014

Group-based violence (GBV) may be defined as actual, attempted, or threatened physical injury that is deliberate and nonconsensual, perpetrated by one or more individuals whose decisions and behaviour are influenced – …

The Proliferation of Cyber Security Strategies and Their Implications for Privacy

Author(s): Dupont-- Benoit
Year: 2013

The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …

Intelligence and Counter-Terrorism in a Multi-Centric World: Challenges and Opportunities

Year: 1999