The concept of leakage in threat assessment.

نویسندگان

  • J Reid Meloy
  • Mary Ellen O'Toole
چکیده

Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit

Designing an efficient protocol for avoiding the threat of recording based attack in presence of a powerful eavesdropper remains a challenge for more than two decades. During authentication, the absence of any secure link between the prover and verifier makes things even more vulnerable as, after observing a threshold challenge-response pair, users’ secret may easily get derived due to informat...

متن کامل

Mitigating the risk of insider threats when sharing credentials

This thesis extends DRM schemes which address the problem of unauthorized proprietary content sharing in home networks to address the problem of unauthorized confidential content sharing in organizations. In particular it focuses on how to achieve secure content sharing between employees in a group while limiting content leakage to unauthorized individuals outside the group. The thesis discusse...

متن کامل

The role of warning behaviors in threat assessment: an exploration and suggested typology.

The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been...

متن کامل

A novel ranking method for intuitionistic fuzzy set based on information fusion and application to threat assessment

A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...

متن کامل

Accident Scenarios Identification and Assessment in the Central Oxygen of Hospital through FTA and evaluation of the control Systems by LOPA

Introduction: Oxygen central is one of the vital parts of the hospital that is responsible for supplying oxygen. The occurrence of any defect can result in fatality and finansial damage. Therefore, effective risk analysis is very importance in preventing and mitigating such potential accidents.The purpose of this study was to analyze the scenarios of accidents in the oxygen central unit of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Behavioral sciences & the law

دوره 29 4  شماره 

صفحات  -

تاریخ انتشار 2011