Premium
The Concept of Identification in Threat Assessment
Author(s) -
Meloy J. Reid,
Mohandie Kris,
Knoll James L.,
Hoffmann Jens
Publication year - 2015
Publication title -
behavioral sciences and the law
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.649
H-Index - 74
eISSN - 1099-0798
pISSN - 0735-3936
DOI - 10.1002/bsl.2166
Subject(s) - paraphernalia , superordinate goals , identification (biology) , relevance (law) , law enforcement , computer security , psychology , product (mathematics) , threat assessment , poison control , process (computing) , association (psychology) , social psychology , criminology , computer science , medicine , law , political science , medical emergency , psychotherapist , botany , geometry , mathematics , biology , operating system
Identification is one of eight warning behaviors—superordinate patterns of accelerating risk—that are theorized to correlate with targeted violence, and have some empirical validation. It is characterized by one or more of five characteristics: pseudo‐commando behavior, evidence of a warrior mentality, a close association with weapons or other military or law enforcement paraphernalia, wanting to imitate and often surmount previous attackers or assassins, or believing oneself to be an agent to advance a particular cause or belief system. The authors briefly explore the history of the psychology of identification, its current usage, and its application to threat assessment. Four cases are used to illustrate identification as both a process and a product, and a likely motive for targeted violence in some subjects. Its operational relevance for threat assessment is suggested. Copyright © 2015 John Wiley & Sons, Ltd.