Cover for Active Shooter

Active Shooter

Preparing for and Responding to a Growing Threat

Book2015

Authors:

Kevin T. Doss and C. David Shepherd

Active Shooter

Preparing for and Responding to a Growing Threat

Book2015

 

Cover for Active Shooter

Authors:

Kevin T. Doss and C. David Shepherd

Browse this book

Book description

According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations tod ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    1 - Active Shooters and Workplace Violence

    Pages 1-19

  3. Book chapterAbstract only

    2 - Motivations and Triggers

    Pages 21-39

  4. Book chapterAbstract only

    3 - Effective Planning

    Pages 41-54

  5. Book chapterAbstract only

    4 - First Responders and the Private Sector

    Pages 55-75

  6. Book chapterAbstract only

    5 - Coordinated Response, Expectations, and Goals

    Pages 77-100

  7. Book chapterAbstract only

    6 - Internal and External Communications

    Pages 101-124

  8. Book chapterAbstract only

    7 - Human Resources

    Pages 125-141

  9. Book chapterAbstract only

    8 - Preparedness

    Pages 143-163

  10. Book chapterAbstract only

    9 - Training, Awareness, Education, and Exercise

    Pages 165-180

  11. Book chapterAbstract only

    10 - Recovery

    Pages 181-207

  12. Book chapterNo access

    Appendix A - Types and Classifications of Murderers

    Pages 209-214

  13. Book chapterNo access

    Appendix B - Psychological Characteristics of Murderers

    Pages 215-221

  14. Book chapterNo access

    Appendix C - Active Shooting Workplace Violence Recovery Questions

    Pages 223-259

  15. Book chapterNo access

    Appendix D - Active Shooter and Workplace Violence Training Exercise

    Pages 261-280

  16. Book chapterNo access

    Appendix E - Case Studies

    Pages 281-289

  17. Book chapterNo access

    Index

    Pages 291-304

About the book

Description

According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations today. Incidents involving active shooters in the workplace are on the rise and becoming more violent and deadly. Active Shooter provides the tools necessary to identify potential violent individuals, along with the options and responses needed to save lives, reduce corporate liability, and recover from an active shooter event should it happen.

Active Shooter begins with a brief history of active shooters and how they have changed over time. It shows why many perpetrators initiate attacks, what they often are thinking, and some of the indicators that could have been identified prior to the attack. The book shows how to develop an active shooter program in an organization, walking readers through the entire process including training exercises to test the efficiency of the program. With the uniquely private security perspective, Active Shooter illustrates how to communicate with law enforcement, government agencies, and the media in the event of active shooter incident. The book concludes with a discussion of how organizations can recover promptly after an incident, which is crucial for operational survival.

According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations today. Incidents involving active shooters in the workplace are on the rise and becoming more violent and deadly. Active Shooter provides the tools necessary to identify potential violent individuals, along with the options and responses needed to save lives, reduce corporate liability, and recover from an active shooter event should it happen.

Active Shooter begins with a brief history of active shooters and how they have changed over time. It shows why many perpetrators initiate attacks, what they often are thinking, and some of the indicators that could have been identified prior to the attack. The book shows how to develop an active shooter program in an organization, walking readers through the entire process including training exercises to test the efficiency of the program. With the uniquely private security perspective, Active Shooter illustrates how to communicate with law enforcement, government agencies, and the media in the event of active shooter incident. The book concludes with a discussion of how organizations can recover promptly after an incident, which is crucial for operational survival.

Key Features

  • Illustrates what businesses should consider prior to, during, and after an active shooting event, including developing business continuity plan
  • Demonstrates the importance of preparedness, an effective coordinated response, and planning all the way down to the frontline employee
  • Addresses the private sector and public sector coordination efforts needed for an effective active shooter program
  • Offers teaching and learning tools such as text boxes, end-of-chapter discussion questions, lists of key DHS, FBI and FEMA websites and resources, as well as training exercises and case studies
  • Illustrates what businesses should consider prior to, during, and after an active shooting event, including developing business continuity plan
  • Demonstrates the importance of preparedness, an effective coordinated response, and planning all the way down to the frontline employee
  • Addresses the private sector and public sector coordination efforts needed for an effective active shooter program
  • Offers teaching and learning tools such as text boxes, end-of-chapter discussion questions, lists of key DHS, FBI and FEMA websites and resources, as well as training exercises and case studies

Details

ISBN

978-0-12-802784-4

Language

English

Published

2015

Copyright

Copyright © 2015 Elsevier Inc. All rights reserved.

Imprint

Butterworth-Heinemann

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

Kevin T. Doss

C. David Shepherd