International Handbook of TA Flashcards

1
Q

Two elements to a threat:

A

1) Perceived possibility of harm (potential danger)
2) A statement conveying an intention to cause harm (menacing utterance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three general elements to the management process:

A

1) Logistical - resources
2) Strategic - goals/priorities
3) Tactical - what ops are needed to carry out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three principles of threat assessment and management

A

1) Usually the result of a discernable process
2) Usually an interaction among the attacker, past events, current situation, and target
3) Key is identifying attack-related behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Systems theory

A

1) Equifinality - multiple factors leading to same outcome
2) Multifinality - One factor having multiple outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kinney’s model of workplace violence (Think Kinney needs TP for his PEA)

A

1) Traumatic experience
2) Perceptions that problems are unsolvable
3) Projection of all responsibility onto the situation
4) Egocentric frame of reference
5) Assumption that violence is the only way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

White and Meloy’s five critical items to workplace violence

A

1) Motives for violence
2) HI/fantasies/fixation
3) Violent intentions/expressed threats
3) Weapons skill and access
4) Preattack planning and preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

McKenzie’s Five risk factors of stalking

A

1) SI
2) HI
3) Psychosis
4) last resort
5) Psychopathy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hoffman and Roshdi’s four-stage pathway to school shooting

A

1) Ongoing crisis
2) Emerging pattern of warning behavior
3) Inner world of the actors
4) Outside perspective showing how the perpetrator acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

O’Toole had how many levels of risk for school shootings based on which four elements?

A

Three levels of risk base on:
Specific, direct, detailed, plausibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cornell added to O’Toole’s levels of risk by adding which two elements?

A

1) Transient
2) Substantive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Motivational typologies of threats:

A

1) Schemer
2) Shocker
3) Signaler
4) Shielder
5) Screamer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This threatener’s intent is instrumental and to get others to comply to further own interest

A

Schemer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of threatener’s intent is to bring attention to himself via fear/anxiety by producing reactions in the target

A

Shocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This type of threatener’s intent is promise future harm to target for perceived/actual harm caused and are committed to act violently

A

Signaler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of threatener’s intent is to ward off potential attacks by others by engaging in self-protection

A

Shielder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of threatener’s intent is catharsis of emotion than intent to act - they’re rarely committed but may be based on general anger

A

Screamer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Stalking victims who have been threatened have been found ____ times more likely to be assaulted

A

Three times more likely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The vast majority of threats in stalking situations are made by two types of stalkers:

A

1) Disgruntled former sexual partners
2) Vengeful stalkers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When interviewing a source it’s best to have a:

A

topic based convo rather than question-answer approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In memory research .. Emotional experiences lead to:

A

better memory of central details but not necessarily more accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When something isn’t true but presented as truth vs when someone resists or withholds informaiton

A

active vs passive deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Strategic Use of Evidence technique of source interviewing

A

1) Gain cooperation
2) Allow them to provide info without knowing what info the interviewer holds
3) Slowly, relevant info is released in an unassuming way
4) When interviewer notices subject is lying, not immediately confronted
5) Disclosure strategies are used to challenge the narrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Sharff Technique of source interviewing

A
  • Collecting info while interviewee is unaware of their contributions to the investigator
  • Subtly inviting subject to confirm/disconfirm assertions
  • Pretend to have lots of info and what’s being discussed isn’t anything new
  • Premise is on misperception by subject of what info the interviewer holds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PEACE model of source interviewing

A

P - Plan and prepare
E - Engage and explain
A - Personal Account
C - Closure
E - Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Personal injury law is aka

A

Tort Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Tort feasor is aka

A

The defendant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Core elements of tort law

A

1) There was an existence of duty of care
2) Negligence in the performance of that duty or failure to act when required
3) Causal relationship between negligence and injury
- need proximate causation and damages
- damages must be proved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is foreseeability in tort law?

A

When an ordinary person would or should know that harm could result from their negligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Why has legal action against TA consultants failed when violence does end up occuring?

A

Absence of duty to the injured third party by the consultants. Protection is lost when there’s an advisory role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Under the ADA, are substance use or personality disorders considered disabilities?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Under the ADA what is a FFDE and what is it considered?

A

Fitness for duty evaluation and is considered a medical evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Four variations of the insanity defense:

A

1) M’Nuaghten test - as a result of SMI not capable of knowing nature and quality of actions were legally or morally wrong
2) Durham Rule - only used in new Hampshire
3) ALI Model Penal Code standard - defendant who lacks substantial capacity to appreciate the criminality of conduct or conform the conduct to the requirements of law
4) 18 USC Section 17 - standard in federal cases - unable to appreciate the nature and quality or wrongfulness of the actions bc of mental disease or defect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which case set the precedent that a defendant is held in treatment until no longer mentally ill or dangerous

A

Jones v US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In stalking, a term to describe when one individual handles the case from beginning through post-sentencing

A

vertical prosecution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Precedent is established by

A

Appellate courts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An open source and ongoing tally that includes 115 mass shootings from 1982-2019

A

Mother Jones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Four types of workplace violence recognized by the National Institute of Occupational Safety and Health

A

1) Criminal intent - aka Type 1
2) Customer/client - aka Type 2
3) Worker on worker - aka Type 3
4) Personal relationship - aka Type 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Assuming negative consequences for misconduct are effective risk mgmt strategies

A

Disciplinary drift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Shea described interview techniques in assessing suicide risk that if modified can be adapted to assess violence risk

A

1) Shame attenuation - do you find your boss is unfairly getting on your case?
2) Normalization - Many people tell me how angry they are with the unfairness. What’s it like for you?
3) Denial of the specific - Asking questions in a series about a topic vs general question
4) Symptom amplification - Counteracts tendencies to downplay the frequency or degree of concerning behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Increasing the number of people an individual of concern is fixated on or threatening

A

Target dispersion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A study by Cornell and colleagues (2018) found what about threats made by students among elementary, middle, and high school?

A

Those in 4th and 5th grade were less likely to be considered serious compared to middle and high school. Threats by older students more likely to be classified as serious and more likely to be attempted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The Salem-Keizer Student Threat Assessment System (STAS) is a process that beings with _____ and is followed by _______. This uses how many teams and for what?

A

Begins with identifying students where there is a risk for aggression, followed by an assessment of the seriousness of the risk. Two teams: one for less serious threats and one in the community for more serious threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A Canadian school threat assessment model…the VTRA

A

Violence Threat Risk Assessment: involve a stage 1 intervention for immediate implementation and a stage 2 for long-term services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The German Networks Against School Shootings program focuses school threat assessment on:

A

psychosocial crises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What’s the CSTAG school threat assessment model? Who comprises the team and how what are the steps?

A

Comprehensive School Threat Assessment Guidelines. Relies on school-based multidisciplinary teams to distinguish transient from substantive threats.
Step 1 - Gather info and determine if it is a threat
Step 2 - Consider credibility/seriousness
Step 3 - Teams respond to substantive threats which require protective action. If threat exceeds a fight, and includes a threat to kill, use a weapon, steps 4 and 5 are activated.
Step 4 - Three additional actions
(a) screened for MH services (b) law enf invest (c) integrate findings from a & b
Step 5 - Implement and monitor safety plan from step 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The CSTAG has been recognized as

A

evidence based practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Research shows that the optimal size of multidisciplinary teams in the range of ___ to ___ members. Fewer than ___ and more than ___ limit knowledge and compromise productivity, respectively.

A

5 to 9
Fewer than 5…more than 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The STEP model to identifying potential indicators of concern

A

S - Subject’s behaviors, traits, and characteristics
T - Target’s vulnerabilities
E - Environment that facilitates, permits, or doesn’t discourage violence
P - Precipitating events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

If the STEP process highlights potential for team involvement, utilize:

A

1) Subject based strategies
2) Target based strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Third Restatement of Torts, Sections 40-41

A

40 - Duties based on a special relationship with the injured person
41 - Duties based on a special relationship with the subject posing the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Third Restatement of Torts, Sections 42-43

A

42 & 43 - Duties based on undertakings - a person who assumes responsibility to provide services to another (such as to implement a case mgmt strategy) has a duty to provide reasonable care if (a) the failure to exercise such care increases the risk of physical harm beyond that which existed prior OR (b) the person to whom the services are rendered relies on the team member exercising reasonable care in the undertaking…these duties are aka “gratuitous undertakings”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

In which court case did the court hold that postsecondary schools have a duty to keep students safe from foreseeable criminal assaults while they’re engaged as part of the school’s curriculum/services

A

Rosen v Regents of the Univ of California

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

In which court case did the supreme court hold that a univ has a special relationship with a student and corresponding duty to take reasonable measures to prevent his or her suicide

A

Dzung Duy Nguyen v Massachusetts’s Institute of Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Public figure stalkers are more likely to target ____ over ____

A

politicians over corporate figures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The attacks by public figure stalkers are more often ___ & ___ than ___ & ___

A

direct and interpersonal than indirect and from a distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Letter writers who threatened politicians are _____ likely to approach the politican

A

less likely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

In a study by Meloy and Amman, politicians were more likely attacked during ____ hours, usually at the ____, rather than at _____and in ____ areas

A

Daytime hours, at the workplace rather than at public events and in open areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

In a study by Meloy and Amman, politicians were more likely attacked during ____ hours, usually at the ____, rather than at _____and in ____ areas

A

Daytime hours, at the workplace rather than at public events and in open areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Compared to other groups of public figures, politicians have an ____ risk of being attacked.

A

Increased risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Leets, de Becker, and Giles studied letters from stalkers to celebrities and found that the _____ of expectations was most significant in discerning those who:

A

reasonableness….those who didn’t pursue from those who did

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Coined by Meloy, this means when the stalker believes a debt is owed to them by the celebrity equal to the amount and time the stalker has invested

A

entitled reciprocity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The average stalking period of celebrities is around ______ months,

A

25-26 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Two significant predictors of a physical approach by a stalker towards a celebrity

A

1) escalation - nine fold increase in likelihood to approach
2) police intervention - approaches decreased by half

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Three red flags that are useful indictors of dangerous celebrity stalkers:

A

1) obsession with celebrity - others noticed
2) entitled reciprocity
3) Anger about some personal behavior of the celebrity that served as a trigger

65
Q

Regarding stalking of royalty figures, James studied the British royal family and found that over ___ % suffered from a serious mental illness. Different forms of behavior were associated with different symptom patterns and separated into ___ motivational groups.

A

over 80% (84 to be exact)….8 different motivational groups

66
Q

Delusions of ________ are a common motive for contact and approach behavior of stalkers of royalty.

A

delusions of royal identity

67
Q

In royalty stalking, fixation on a _____ is more concerning than fixation on a ____

A

fixation on a cause than fixation on a person

68
Q

Stalkers of corporate figures can be divided into 4 subgroups, as stated by Hoffmann and Sheridan. Those 4 groups are: think..stalking the corporate figure so I can get My EPR

A

1) Motivation
2) Endurance
3) Psychopathology
4) Relationship

69
Q

Rate of violence towards corporate figures is lower than for ___ or ____ but because of _____ corporate figures may be viewed as celebrities, as they try to be recognized as leaders.

A

politicians and celebrities. because of social media

70
Q

Fairly rapid movement from one individual target to another with threats/communications of concern..no studies yet to indicate this suggests accelerated risk for violence

A

Sequential dispersion

71
Q

A fixation on one individual target but then bringing in others as an audience…this does suggest accelerated risk for targeted violence

A

Audience dispersion

72
Q

Generalizing from the individual to a group within which the target belongs

A

Target dispersion

73
Q

Coined by Pies, this is a chronically emotional state that does not rise to the threshold of a diagnosable mental disorder but may motivate targeted violence

A

Persistent emotional disturbance

74
Q

Evaluators should consider four basic kinds of risk management strategies in IPV cases:

A

1) Monitoring
2) Treatment
3) Supervision
4) Victim safety planning

75
Q

Evaluators should consider three domains in IPV cases:

A

1) Acute conflict
2) Capacity for serious violence
3) Severe disinhibition

76
Q

About ___ % of stalkers have previously had an intimate relationship with the victim

A

50%

77
Q

Recent comparative analysis of stalker typologies suggest that those based on ____ and ____ are likely to be most helpful when considering relevance of behavioral and situational risk factors

A

Stalker’s prior relationship to the victim and stalker’s apparent motivation

78
Q

Mullen and colleagues proposed three different domains in stalking-related risk that should be considered:

A

1) The risk of continued stalking (persistence)
2) The risk of physical or sexual violence
3) The risk of future stalking (recurrence)

79
Q

Stalkers who engage in brief pursuits tend to be ____ and ____ and make _____ communications

A

single and young…fewer communications

80
Q

Stalkers who are highly persistent are more likely to be what type of stalker?

A

Intimacy seeking

81
Q

Stalkers who engage in moderately long pursuits (12+ weeks) tend to be ____ and _____ and seek _____

A

single and older…seek intimacy

82
Q

Making false reports of critical incidents to police with intention of target being harassed by attending personnel

A

swatting

83
Q

Publication and circulation of private or personal info considered compromising or embarrasing

A

doxing

84
Q

When assessing anonymous threatening communications, _____ staging is similar to crime scene staging. The POC is manipulating to direct the investigation away from its logical direction

A

linguistic staging

85
Q

When assessing anonymous threatening communications, how combined levels of ______ and ______ should draw the attention

A

energy and risk-taking

86
Q

Focusing on the structure and careful examination of an author’s word choices to discern motivations and sources behind the disclosure

A

statement analysis

87
Q

JACA, as it relates to linguistic analysis of anonymous threatening communication, can be remembered as LACE JIC, which detects the threatener’s resolution to violence.

A

L - Lack of resiliency
A - Ability
C- Contempt
E - Energy and Effort
J - Justification
I - Inevitability
C - Consequences

88
Q

Three psychiatric disorders show a higher prevalence among lone actors”

A

1) Schizophrenia
2) Delusional disorder
3) Autism Spectrum

89
Q

In lone actors, leakage of which three elements is common:

A

1) beliefs
2) attitudes
3) intent

90
Q

Radicalization of lone actors occurs both:

A

online and offline

91
Q

Lone actors engage in a process that allows them to choose the target with relatively fewest risks, which weapon they’d use in which location, or which targets have least level of security.

A

cost benefit analysis

92
Q

The timeframe between deciding to conduct an attack and actually doing it varies between

A

3 months to more than 2 years

93
Q

Behaving in an intentionally disruptive, destructive, or deceptive manner on the internet for no apparent reason

A

trolling

94
Q

Of the 8 warning behaviors, which three have been observed the most in social media?

A

1) Fixation
2) Identification
3) Leakage

95
Q

Social network analysis is relevant to threat assessment in the virtual space, as it looks into which four elements?…think: they spread the message as if they’re on NBC(C)

A

1) Network density - the proportion of relationships that actually exists in the network

2) Betweenness centrality - more influence if the person is an intermediary between people and messages

3) Clustering and community detection algorithms - collection of nodes strongly connected to each other

4) Closeness centrality - the more links people have, the more the message spreads

96
Q

New Jersey vs TLO

A

Need to maintain order outweighs the privacy of students

97
Q

Two methods for analzying social network communications

A

1) word frequency analysis
2) named entity recognition

98
Q

After filtering and analyzing data regarding networks, there are additional ways to inspect text at the content level.

A

1) sentiment - words within a text are assigned to a positive or negative attitude.
2) emotions - ancodi

99
Q

Two methods for analzying social network lexicon quantitatively

A

1) linguistic inquiry
2) word count

100
Q

When assessing adolescents, special attention should be paid to their _______ or their perception of their ______

A

social standing…..social standing

101
Q

O’Toole highlighted six general areas to consider in a threat assessment

A

1) Social life
2) Work
3) Family life
4) personal life
5) private life
6) secret life

102
Q

O’Toole highlighted 4 general reasons problematic behaviors are missed

A

1) Normalizing - finding a “normal” explanation for observation
2) Rationalizing - excusing it, explaining it away
3) Ignoring
4) Icon intimidation/influence

103
Q

case law: Right to remain silent

A

Miranda v Arizona

104
Q

Case law: expands the right of the govt to search and surveil without court order, and now applies to certain domestic terrorism situations

A

US Patriot Act

105
Q

Case law: established the test about what is free speech on school campuses

A

Tinker v Des Moines Independent Community School District

106
Q

Case Law: what did Bethel School District v Fraser and Hazlewood School District v Kuhlmeier oppose?

A

The decision in Tinker v Des Moines, stating that lewd speech at a school assembly is not constitutionally protectied

107
Q

Case law: how are Arnett v kennedy and Garcetti v Ceballos related to free speech ?

A

1) Arnett = authorized removal/suspension of employee if the reason is based on employee’s speech which affects the employing agency
2) Garcetti = If employee did not speak as a citizen on a matter of public concern, then no first amendment protection

108
Q

Case Law: Duty to warn

A

Tarasoff v regents of the Univ of California

109
Q

Under the Individuals with Disabilities Education Act (IDEA), students with disabilities may be removed from schools who carry a weapon, to an interim placement for …..

A

up to 45 days

110
Q

IDEA does not permit changes in student’s ______, if the behavior was a _______

A

placement….manifestation of a disability

111
Q

Through FERPA, can schools share student’s information if student is a dependent for tax purposes?

A

Yes

112
Q

Through FERPA, can schools share student’s information if the student has violated policy regarding alcohol or controlled substance?

A

Yes

113
Q

Case Law: Offers an objective standard for evaluating if a statement is a true threat, thus making it unprotected by the first amendment

A

US v Orozco-Santillan

114
Q

Credible threats from patients or ________ are covered under duty to warn, but not beyond…

A

family members…….family members

115
Q

Communicated threats can be classified into three categories:

A

1) Direct
2) Veiled
3) Conditional

116
Q

Jeff Cooper’s structure for situational awareness, originally for marines, and comprised of four conditions:

A

1) White - unprepared
2) Yellow - prepared and alert - good
3) Orange - Alert to probable danger - ready
4) Red - Acton mode - focused on emergency

117
Q

Another situational awareness model by Statfor, TEDD

A

T - Time
E - Environment
D - Distance
D - Demeanor

118
Q

The design of a comprehensive threat management plan is based on establishing controls in five domains:

A

1) Organizational mgmt
2) Psychological mgmt
3) Social mgmt
4) Physical mgmt
5) Legal mgmt

119
Q

Protective investigations emerged to prevent assassinations in the ____

A

Warren Commission Report

120
Q

By applying a _______ model, threat assessors can develop, evaluate, and implement primary, secondary, and tertiary activities to prevent violence acts among adolescents

A

disease prevention model

121
Q

Unhurried decision-making and opportunity for consultation is known as _____ and likely matures by age 16

A

Cold cognition

122
Q

Pressured emotional arousal, possible social coercion likely matures in early 20s, is known as

A

Hot cognition

123
Q

Leakage appears prevalent in which two settings?

A

School and workplace

124
Q

What is DRA? Describe

A

Detect, Report, Act
1) D - processes to identify people on pathway to violence
2) R - processes to help those who detect to communicate what’s been observed
3) A - once reported, trained personnel to fully assess appropriately

124
Q

What is DRA? Describe

A

Detect, Report, Act
1) D - processes to identify people on pathway to violence
2) R - processes to help those who detect to communicate what’s been observed
3) A - once reported, trained personnel to fully assess appropriately

125
Q

Kanin looked at 45 cases of false rape allegations and found that they tend to serve three functions for the complainant:

Later two more motivations were added

A

1) to create an alibi
2) seek revenge
3) obtain sympathy and attention
4) Mental health issues didn’t allow them to discern reality
5) engage in consensual sex but out of guilt/remorse, claimed sexual assault

126
Q

The alibi function in false rape allegations is subdivided into two groups:

A

1) young girls who want to avoid consequences of disobeying rules
2) older teens/adult women who want to cover up consensual activity

127
Q

Philpot and colleagues examined CCTV footage in three countries and found that the number of bystanders present in the conflict situation…

A

increased the likelihood of intervention, with an incremental bump for each bystander on scene

128
Q

_____ loners are the main threat to public figures in western countries

A

fixated loners

129
Q

Typology researchers have identified three or four subtypes of male intimate partner perpetrators, two of which pose an elevated risk for severe violence

A

1) Dysphoric/borderline
2) Violent/antisocial

130
Q

the recognition that both the actions and inactions of the threat assessor can result in increase risk…this process is known as and the effects are known as

A

intervention synergy….iatrogenic effects

131
Q

Risk for re-offense is highest _____ months or so following an arrest for IPV

A

6 months

132
Q

Threat mgmt in IPV cases is best informed by the…

A

risk, needs, responsivity model

133
Q

Smith’s research shows that initial communication, whether as a standalone or as the first in a succession of communications,, can be an accurate predictor of action/nonaction….even when…

A

there is no explicit threat or even angry language

134
Q

as actors become more committed to action, their conceptual complexity

A

drops

135
Q

WAVR-21

A

Indicators of targeted violence and general risk factors. First 5 items are red flag indicators. Remaining 16 are related to mental health, situational stressors, and history of violent behavior..then classify at low, moderate or high

136
Q

CAG

A

Cawood assessment and response intervention grid…to assess risk for physical violence in organizational settings and provides guidance for initial response and intervention …85 dichotomous items

137
Q

One differene bteween WAVR and CAG

A

WAVR allows assessing if behaviors have RECENTLY escalated and CAG assesses if behaviors have changed over time

138
Q

In workplace settings, these 2 factors are more relevant to violence risk than what other 2 factors

A

job-related/personally motivated grievances and behaviors of concern rather than personal dispositions or group membership

139
Q

The totality of digital artifacts that allows the assessor to piece together an offender’s behavioral picture, and which warrants its own pathway

A

Cyber pathway to intended violence (CPIV)

140
Q

Elements of the CPIV

A

1) Digital behaviors
2) Temporal contexts
3) Origin story
4) Exploratory thought
5) Noticeability versus surreptitiousness
6) Intra-attack behaviors
7) Post-attack behaviors

141
Q

The temporal contexts of the CPIV can be trifurcated, one of which can be further trifurcated.

A

1) Pre-offense - origination, development, refinement
2) Offense
3) Post-offense

142
Q

Preattack behaviors on the CPIV

A

1) Motivation
2) Ideation
3) Intention
4) Conceptualization
5) Research and planning
6) Preparation
7) Reconnaissance, probing, and breach

143
Q

A person’s behavior is determined by the person’s intention to perform the behavior and that this intention is a function of certain core beliefs

A

Ajzen’s theory of planned behavior

144
Q

A combined application of numerous forensic disciplines to uncover offender thoughts and actions in digital behavior artifacts

A

Digital Behavioral Criminalistics

145
Q

Digital evidence or “bread crumbs” or an offender’s behaviors left in publicly accessible locations

A

Digital behavioral artifacts

146
Q

In radicalization, push factors are within the _____ and pull factors within the ______

A

push are within the individual and pull are within the social and political context

147
Q

Those who have speculated about typologies of terrorism have identified three main types:

A

1) Noble cause
2) Criminality
3) Mental disorder

148
Q

The distal characteristics are used to assess the risk of extremists or another term used, the.. .

A

violent true believer

149
Q

In the international handbook, Caputo argues that the critical pathway to insider threat does not ____ insider threats

A

does not predict

150
Q

The critical pathway to insider risk fails to identify behaviors that span across known insiders, which would make such behaviors…

A

characteristics

151
Q

the critical pathway to insider risk does not offer ____, to distinguish good from bad insiders

A

indicators

152
Q

Caputo proposes a framework of 4 components to address insider threat:

A

1) Role
2) Character
3) Stressors
4) Concerning behaviors

153
Q

5 concerning behaviors that have been consistently shown across data sets of insider threat

A

1) Rule-breaking
2) Grievance collector
3) Rigid fairness
4) Conflict
5) Flight risk

154
Q

The 5 conditions necessary to making a malicious insider:

A

1) Opportunity
2) Idea of the behavior is conceivable
3) Motive
4) Ability to override any inhibitions of conscience
5) Lack of preventative mechanisms

155
Q

In insider threat, what is the MICE model of motivation

A

Motivation is a necessary condition to becoming an insider threat, and it includes money, ideology, coercion/compromise, and ego

156
Q

The 5 conditions necessary for insider risk include the Fraud Triangle, coined by Donald Cressey, which is made up of what three elements

A

1) Opportunity
2) Rationalization
3) Motivation

157
Q

Name the Act that mandates expulsion of students who bring a gun to school and report all violations to local law enforcement

A

Federal Gun Free Schools Act