Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Law Enforcement Use of Threat Assess...
~
Wood, Tracey Michelle.
Linked to FindBook
Google Book
Amazon
博客來
Law Enforcement Use of Threat Assessments to Predict Violence.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Law Enforcement Use of Threat Assessments to Predict Violence./
Author:
Wood, Tracey Michelle.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2016,
Description:
323 p.
Notes:
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: A.
Contained By:
Dissertation Abstracts International77-11A(E).
Subject:
Social research. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10133871
ISBN:
9781339924274
Law Enforcement Use of Threat Assessments to Predict Violence.
Wood, Tracey Michelle.
Law Enforcement Use of Threat Assessments to Predict Violence.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 323 p.
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: A.
Thesis (Ph.D.)--Grand Canyon University, 2016.
The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass homicide or harm. Research had been done exploring threat assessments and the evaluation of violence potential through such foundational theories as the pathway to violence, the concept of leakage, and typologies of warning behavior indicators of violence; however, there was a gap as to what process specifically law enforcement officers used to evaluate violence potential via threat assessments. Three research questions for this study were: (a) what processes were law enforcement officers in a selected county in the southwest region of the United States using when threat assessments were performed to determine violence potential of subjects threatening to commit mass homicide or harm; (b) what policies and procedures guided the threat assessment processes; (c) were the processes aligned with an empirically approved threat assessment process. A total of 10 cases were evaluated via observation and interview. Major process themes were covered in pattern matching logic, replication design, as well as cross-case synthesis evaluation to determine that law enforcement officers were utilizing a clear process for the threat assessments, and the processes aligned with an empirically approved guideline. There were no existing policies and procedures, but this research showed that the same process was ultimately being utilized across multiple jurisdictions in the area researched.
ISBN: 9781339924274Subjects--Topical Terms:
2122687
Social research.
Law Enforcement Use of Threat Assessments to Predict Violence.
LDR
:02675nmm a2200313 4500
001
2117780
005
20170602084406.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781339924274
035
$a
(MiAaPQ)AAI10133871
035
$a
AAI10133871
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Wood, Tracey Michelle.
$3
3279576
245
1 0
$a
Law Enforcement Use of Threat Assessments to Predict Violence.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
323 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: A.
500
$a
Adviser: Kathryn Westbeld.
502
$a
Thesis (Ph.D.)--Grand Canyon University, 2016.
520
$a
The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass homicide or harm. Research had been done exploring threat assessments and the evaluation of violence potential through such foundational theories as the pathway to violence, the concept of leakage, and typologies of warning behavior indicators of violence; however, there was a gap as to what process specifically law enforcement officers used to evaluate violence potential via threat assessments. Three research questions for this study were: (a) what processes were law enforcement officers in a selected county in the southwest region of the United States using when threat assessments were performed to determine violence potential of subjects threatening to commit mass homicide or harm; (b) what policies and procedures guided the threat assessment processes; (c) were the processes aligned with an empirically approved threat assessment process. A total of 10 cases were evaluated via observation and interview. Major process themes were covered in pattern matching logic, replication design, as well as cross-case synthesis evaluation to determine that law enforcement officers were utilizing a clear process for the threat assessments, and the processes aligned with an empirically approved guideline. There were no existing policies and procedures, but this research showed that the same process was ultimately being utilized across multiple jurisdictions in the area researched.
590
$a
School code: 1582.
650
4
$a
Social research.
$3
2122687
650
4
$a
Law.
$3
600858
650
4
$a
Criminology.
$3
533274
650
4
$a
Social sciences education.
$3
2144735
690
$a
0344
690
$a
0398
690
$a
0627
690
$a
0534
710
2
$a
Grand Canyon University.
$b
College of Doctoral Studies.
$3
2097618
773
0
$t
Dissertation Abstracts International
$g
77-11A(E).
790
$a
1582
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10133871
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9328398
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login