Printer Friendly

Threat Assessment: A Risk Management Approach.

Threat Assessment: A Risk Management Approach. By James T. Turner, Ph.D., and Michael G. Gelles, Psy.D.; published by the Haworth Press. 800/429-6784 (phone), www.haworthpress.com (Web); 182 pages; $24.95.

One of the most notorious terms in the security industry is "risk management." Various experts put their unique spin on the term, making consistent application of the principle difficult. This book adopts a levelheaded, systematic approach to risk management, yielding an excellent tool for security professionals, law enforcement, and human resource managers.

At the heart of the book is the threat of workplace violence and how to prepare, intervene, and respond to it. For example, authors James Turner and Michael Gelles simply and plainly explain such topics as forming cross-functional crisis-management teams and updating workplace violence response plans.

[ILLUSTRATION OMITTED]

One of the most valuable aspects of the assessment process discussed in the book is conducting investigations. The authors provide excellent guidance in developing clues, conducting data analysis, targeting appropriate interviewees, retaining key records, and sequencing witness interviews. And this discussion is free of jargon.

This book posits a well-rounded risk-management approach that focuses on workplace violence, covering such topics as disgruntled employees, cyberstalking, and executives' vulnerabilities. As a well-thought-out, lean explication of these issues, this book is a fine choice.

Reviewer: Steven Adler, who holds an M.S. in Business Management from Rensselaer's Lally School of Management, is audit manager for Health Net, Inc. He serves on the Business Practices Council of A SIS International. He is also a member of the Institute of Internal Auditors and of the Information Systems Audit and Control Association.
COPYRIGHT 2004 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2004 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Adler, Steven
Publication:Security Management
Article Type:Book Review
Geographic Code:1USA
Date:Feb 1, 2004
Words:270
Previous Article:Front Desk Security and Safety: An On-the-Job Guide to Handling Emergencies, Threats, and Unexpected Situations.
Next Article:PDA Security: Incorporating Handhelds Into the Enterprise.
Topics:


Related Articles
Business Confronts Terrorism: Risks and Response.
New in plaintext.
Stalking Crimes and Victim Protection: Prevention, Intervention, Threat Assessment, and Case Management.
Risk Management for Security Professionals.
Violence Assessment and Intervention: The Practitioner's Handbook.
Recent advances in quantitative methods in cancer and human health risk assessment.
Risk Management for Computer Security: Protecting Your Network and Information Assets.
Risk Analysis and Society: An Interdisciplinary Characterization of the Field.
Where are the WMDs?: The Reality of Chem-Bio Threats on the Home Front and the Battlefront.

Terms of use | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters