Risk assessment

TSAS WP17-01: A Concurrent Evaluation of Threat Assessment Tools for the Individual Assessment of Terrorism

Publisher: TSAS
Year: 2017
Description:

This research examines what is the content overlap among three tools that may be relevant for assessing an individual’s risk for terrorist violence: Version 3 of the Historical-Clinical-Risk Management—20 (HCR-20 – …

L’analyse du risque géopolitique: du plausible au probable

Author(s): Bencherif-- Adib
Year: 2015
Description:

Abstract: This paper is going to explore the logical process behind risk analysis, particularly in geopolitics. The main goal is to demonstrate the ambiguities behind risk calculation and to highlight – …

Security Games: Surveillance and Control at Mega-Events

Year: 2011
Description:

Security Games: Surveillance and Control at Mega-Events addresses the impact of mega-events – such as the Olympic Games and the World Cup – on wider practices of security and surveillance. – …

Using structured professional judgment guidelines in threat assessment and management: Presentation, analysis, and formulation of a case of serial intimate partner violence.

Year: 2014

Violent Extremist Risk Assessment: Development of the VERA 2 and Applications in the High Security Correctional Setting

Publisher: Routledge
Year: 2014

TSAS WP14-09: A Systematic Approach to Develop a Computational Framework for Counter-terrorism and Public Safety

Year: 2014
Description:

Can agent-based modelling and virtual environment technologies be used to create a decision support, response planning and risk assessment system for emergence preparedness?

Risk assessment and management of group-based violence

Author(s): Cook--Alana
Year: 2014
Description:

Group-based violence (GBV) may be defined as actual, attempted, or threatened physical injury that is deliberate and nonconsensual, perpetrated by one or more individuals whose decisions and behaviour are influenced – …

The Proliferation of Cyber Security Strategies and Their Implications for Privacy

Author(s): Dupont-- Benoit
Year: 2013
Description:

The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …

Intelligence and Counter-Terrorism in a Multi-Centric World: Challenges and Opportunities

Year: 1999