Deck 12: Threat Assessment
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/15
العب
ملء الشاشة (f)
Deck 12: Threat Assessment
1
Threat assessment is:
A) a procedure wherein the amount of risk posed by actual or perceived threats is evaluated
B) a process during which indicators of violence, appropriate tactical responses, and psychological interventions are identified
C) based upon the idea that targeted violence is preventable
D) all of the above
A) a procedure wherein the amount of risk posed by actual or perceived threats is evaluated
B) a process during which indicators of violence, appropriate tactical responses, and psychological interventions are identified
C) based upon the idea that targeted violence is preventable
D) all of the above
D
2
Threat assessment differs from violence-risk assessment in that:
A) assessing violence risk places an individual's likelihood to engage in violence on a continuum, while threat assessment determines whether a threat is credible and focuses on intervening
B) assessing violence risk labels an offender as either violent or not violent, while threat assessment determines whether a threat is credible
C) assessing violence risk focuses on psychological intervention, while threat assessment deals only with whether a threat is likely to be carried out
D) both violence risk assessment and threat assessment predict dangerousness, but neither addresses intervention
A) assessing violence risk places an individual's likelihood to engage in violence on a continuum, while threat assessment determines whether a threat is credible and focuses on intervening
B) assessing violence risk labels an offender as either violent or not violent, while threat assessment determines whether a threat is credible
C) assessing violence risk focuses on psychological intervention, while threat assessment deals only with whether a threat is likely to be carried out
D) both violence risk assessment and threat assessment predict dangerousness, but neither addresses intervention
A
3
The range of concerning behaviors includes:
A) sudden changes in occupational functioning, dropping out of school, mood swings
B) experiencing deep depression and isolation following personal loss
C) making threatening communications, stalking, expressing grievances and/or delusional beliefs
D) all of the above
A) sudden changes in occupational functioning, dropping out of school, mood swings
B) experiencing deep depression and isolation following personal loss
C) making threatening communications, stalking, expressing grievances and/or delusional beliefs
D) all of the above
D
4
The majority of stalking offenses involves _____ stalking _____ who are __________.
A) men; men; not acquainted with them.
B) women; women; not acquainted with them.
C) men; women; current or former romantic partners
D) women; men; current or former romantic partners
A) men; men; not acquainted with them.
B) women; women; not acquainted with them.
C) men; women; current or former romantic partners
D) women; men; current or former romantic partners
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
5
When faced with a hostage taker who is delusion, police should:
A) lecture him or her about his or her unrealistic, wrong, or ridiculous ideas
B) build rapport and make the hostage taker feel heard
C) immediately challenge his or her delusions
D) wait for a psychiatrist to arrive on the scene and forcibly medicate the individual
A) lecture him or her about his or her unrealistic, wrong, or ridiculous ideas
B) build rapport and make the hostage taker feel heard
C) immediately challenge his or her delusions
D) wait for a psychiatrist to arrive on the scene and forcibly medicate the individual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
6
Cyber bullying involves:
A) sending mean or abusive text messages
B) posting rumors and embarrassing photos on social media
C) setting up fake profiles on social media
D) all of the above
A) sending mean or abusive text messages
B) posting rumors and embarrassing photos on social media
C) setting up fake profiles on social media
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
7
List and describe the three steps which comprise the threat assessment process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
8
Identify four categories of threat and provide examples of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
9
When assessing stalking threats, what three areas of concern must investigators consider?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
10
Identify four types of hostage takers and briefly describe their associated characteristics and motivations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
11
Discuss the impact of psychiatric symptoms on a suspect's potential to carry out a planned threat.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
12
Discuss the relationship between bullying and deadly school violence. Provide examples from Columbine, VA Tech, etc.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
13
Outline the FBI's four-prong approach to assessing threats of school violence.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
14
Define terrorism and outline its goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck
15
Explain the concept of a collectivist mentality as it relates to terrorist groups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 15 في هذه المجموعة.
فتح الحزمة
k this deck

