Planning and Threat Assessment Case Study by Vulcan

Planning and Threat Assessment
This paper explores threat assessment in general and in a specific case.
# 103508 | 1,499 words | 3 sources | APA | 2008 | US
Published on May 16, 2008 in Criminology (General)

$19.95 Buy and instantly download this paper now


The paper defines threat assessment and explains that the main goal of the agency charged with protection responsibilities is to prevent an attack on a prospective target. The paper lists the main functions of threat assessment and then provides a threat assessment of a specific case. The paper also shows how comprehensive and sensitively performed threat assessment investigations can discourage probable attackers, safeguard potential targets and serve the public.

Threat Assessment Definition and Purpose
Planning and Assessment

From the Paper:

"Threat assessment has made immense advances in the past 20 years; assessments of targeted violence resume posing a sizeable challenge to law enforcement, mental health, and other professionals. This explicit and critical assessment calls for an innovative approach. The effective assessment and management of people acknowledged as being at risk for violence continues to be a significant worry in the criminal justice and mental health communities. In the case of Principal Dauber who is an outspoken supremacist, he is in danger of his life due to his lifestyle and beliefs."

Sample of Sources Used:

  • Behavioral Sciences & the Law. (1999). Threat Assessment. John Wiley & Sons Ltd. Vol. 17. ISSN: 0735-3936
  • Fein, R. A., and Vossekuil, B. (1998). Protective Intelligence Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials. Retrieved March 29, 2008, from
  • Fein, R. A., Vossekuil, B., and Holden, G. A. (1995). Threat Assessment: An Approach to Prevent Targeted Violence. Retrieved March 29, 2008, from

Cite this Case Study:

APA Format

Planning and Threat Assessment (2008, May 16) Retrieved April 21, 2024, from

MLA Format

"Planning and Threat Assessment" 16 May 2008. Web. 21 April. 2024. <>