Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition

Frederick S. Calhoun, Stephen W. Weston J.D.

  • 出版商: CRC
  • 出版日期: 2016-02-25
  • 售價: $3,710
  • 貴賓價: 9.5$3,525
  • 語言: 英文
  • 頁數: 279
  • 裝訂: Paperback
  • ISBN: 1498721842
  • ISBN-13: 9781498721844
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100 new pages of material, including several new chapters, charts, and illustrations, as well as updated cases.

The book has been reorganized into two parts. The first part offers the authors’ current thinking on how to conduct practical and effective threat management processes. The second provides an in-depth analysis of how howlers and hunters behave and how understanding those behaviors can be used to manage each type of problem individual.

This new edition draws on the latest research, as well as ideas and concepts from the authors’ previous books. It integrates the sum of their careers in threat management―both their individual experiences managing problem situations and their research and writing on the topic―into a single volume. As in each of their previous books, it focuses on operationally effective and practical methods for managing problem situations.

This book also covers special issues in threat management, exploring the relationship between the law and the intimacy effect as well as different ways to identify, assess, and manage howlers and hunters. Each chapter concludes with a real-life situation analysis relevant to the subject under focus.

Drawing upon the latest research and on the previous work of its authors, Threat Assessment and Management Strategies, Second Edition provides a complete guide to setting up successful threat management processes. It approaches the presented strategies as guidelines rather than prescriptions, emphasizing that threat managers must use their intelligence and originality to modify strategies as necessary to suit each situation.