EconPapers    
Economics at your fingertips  
 

From protective intelligence to threat assessment: Strategies critical to preventing targeted violence and the active shooter

Matthew Doherty

Journal of Business Continuity & Emergency Planning, 2016, vol. 10, issue 1, 9-17

Abstract: Acts of targeted violence — including active shooter incidents — are typically over within 15 minutes, often before the first law enforcement personnel can respond to the scene. More than a third of active shooter incidents in the USA, for example, last less than five minutes. While this stark fact is often used, with unimpeachable validity, as the cornerstone of employee security awareness training and the need for each employee to make a quick decision on whether to run, hide or fight, it also underscores the importance of another critical priority: prevention. This paper focuses on several of the most effective strategies and tactics — increasingly used across the USA, but applicable all over the world — in preventing an act of targeted violence or active shooter event. It starts with a brief discussion of the common roadblocks to prevention within enterprises today as well as the warning signs that can reveal an individual’s path toward an act of violence. Next, it defines targeted violence and summarises patterns that research has helped uncover with respect to attackers’ backgrounds, motives and target selection. This paper also outlines the crucial role played by protective intelligence and threat assessment protocols and provides several case studies to illustrate key concepts in real-world applications. Finally, this discussion points to several emerging trends in the USA and Europe, among other regions — such as radicalisation within the workforce — that are likely to continue to mature in 2016 and the years ahead.

Keywords: protective intelligence; threat assessment; workplace violence; targeted violence; active shooter; security (search for similar items in EconPapers)
JEL-codes: M1 M10 M12 (search for similar items in EconPapers)
Date: 2016
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/3450/download/ (application/pdf)
https://hstalks.com/article/3450/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:jbcep0:y:2016:v:10:i:1:p:9-17

Access Statistics for this article

More articles in Journal of Business Continuity & Emergency Planning from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:jbcep0:y:2016:v:10:i:1:p:9-17