AETAP Conference 2018
These documents are for your personal use only!
24th April
| Dr Paul Gill |
Sequencing lone actor terrorist behaviors | Presentation | |
|
|
|
|
|
| Dr Laura Guy |
State of the art and science in youth violence risk assessment | ||
|
|
|
|
|
| Dr. Renate Geurts |
Strengthening threat assessment interviewing: Insights drawn from negotiations and interrogation | ||
|
|
|
|
|
| Dr Caroline Logan |
Forensic clinical interviewing: practical skills for threat assessment professionals | ||
|
|
|
|
|
| Dr Annabel Chan & Luke Bartlett |
QuAIC relief: qualifiying the “gut feeling” in case triage | ||
|
|
|
|
|
25th April – Track I
| Jason Forgash |
The threat inside the walls: discerning between delusions, hallucinations and actual threats faced by mentally ill individuals and methods of successful assessment and case management | ||
|
|
|
|
|
| Dr. Cornelis van Putten |
Integrity testing and threat assessment | ||
|
|
|
|
|
| Dr. Susanne Strand |
Policing stalking | ||
|
|
|
|
|
| Dr. Ryan Burnette |
Novel threats at the convergence of biosecurity and cybersecurity | ||
|
|
|
|
|
| Christopher Dean |
Identifying radicalization to violent extremism in prison: the Prison Radicalization Awareness Guide (PRAG) | ||
|
|
|
|
|
Dr Camie Condon & Jeff Weyers |
Using open source intelligence in assessing potential for violence by foreign fighters | |
|
|
|
|
|
|
Dr Stephen Hart & Dr Randy Kropp |
What every threat assessment professional needs to know about sexual violence | |
|
|
|
|
|
|
25th April – Track II
| Mikko Savela & Markus Haaranen |
Case study of threat case against Helsinki University | ||
|
|
|
|
|
| Kristina Anderson |
Safety is personal: lessons learned as survivor of the Virgina Tech tragedy | ||
|
|
|
|
|
| Dr Gene Deisinger |
Campus behavioural threat assessment and management in the US 2007 to present | ||
|
|
|
|
|
| Katherine Timmel & Adrian Meier |
Threat managment at ETH Zurich – “from cradle to grave” | ||
|
|
|
|
|
| Atte Oksanen |
Cyberhate and young offenders: emerging forms of violent ideation | ||
|
|
|
|
|
26th April
| Dr. Lina Alathari |
Case studies to illustrate the importance of gatheringand corroborating information from multiple systems on concerning behaviours communications | ||
|
|
|
|
|
| Dr. Gerard Labuschange & Bronwynn Stollarz |
Anonymous threats involving bomb threats towards a South African company | ||
|
|
|
|
|
| Dr. Russ Palarea & Chuck Tobin |
A shot in the dark: when a persistent threatener finally commits a violent act | ||
|
|
|
|
|
| Elsine van Os |
Anonymous threatening communications | ||
|
|
|
|
|
| Jascha van Hoorn | Setting up a threat management facility | |
|
|
|
|
|
|