Startseite A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders

  • Allan Turner EMAIL logo , Kenneth Glantz und Julie Gall
Veröffentlicht/Copyright: 13. Juli 2013

Abstract

The Department of Homeland Security has funded an array of threat, risk and vulnerability assessment methodologies for use by law enforcement jurisdictions throughout the US. Yet, in spite of this effort, many law enforcement agencies either do not conduct assessments or do not understand and use operationally, the information gathered in assessments. This article discusses a practitioner/researcher partnership model which successfully developed and delivered a training course to assist homeland security professionals in understanding and using operationally, information gathered by various threat, risk, and vulnerability methodologies. The model takes into consideration not only what participants needed to learn but also how they were going to learn it. This article discusses initial background research, course development, implementation, delivery, and lessons learned. The results demonstrate the effectiveness of a model which incorporates the strength of both practitioners and researchers and can be replicated to provide effective training throughout homeland security.


Corresponding author: Allan Turner, DPA, CHPP, Professor Emeritus, George Mason University, Fairfax, VA, USA, e-mail:

  1. 1

    HLS-CAM™ is a comprehensive assessment that defines a community, evaluates its strengths and weaknesses, identifies its critical infrastructure and key resources (CI/KR), identifies the threats to the community, prioritizes its CI/KR, and provides a comprehensive vulnerability assessment.

  2. 2

    SPSS is popular statistical analysis software used by social scientists.

References

Anti-Defamation League. (2011) Criminal Proceedings: A Timeline of U.S. Terror Cases. Available at:www.adl.org/terrorism/Criminal_Proceedings.pdf.Suche in Google Scholar

Bersin, Josh (2004) The Blended Learning Book: Best Practices, Proven Methodologies, and Lessons Learned. San Francisco, CA: Pfeiffer.Suche in Google Scholar

Birzer, Michael L. (2003) “The Theory of Andragogy Applied to Police Training,” Policing: An International Journal of Police Strategies and Management, 26(1):29–42.10.1108/13639510310460288Suche in Google Scholar

Birzer, Michael L. (2004) “Andragogy: Student Centered Classrooms in Criminal Justice Programs,” Journal of Criminal Justice Education, 15(2):393–411.10.1080/10511250400086041Suche in Google Scholar

Birzer, Michael L. and Ronald Tannehill (2001) “A More Effective Training Approach for Contemporary Policing,” Police Quarterly, 4(2):233–252.10.1177/109861101129197815Suche in Google Scholar

Burruss, George W., Matthew J. Giblin and Joseph A. Schafer (2010) “Threatened Globally, Acting Locally: Modeling Law Enforcement Homeland Security Practices,” Justice Quarterly, 27(1):77–101. Available at: www.tandfonline.com/doi/pdf/10.1080/07418820902763053.Suche in Google Scholar

Charles, Michael T. (2000) Police Training Breaking All the Rules: Implementing the Adult Education Model into Police Training. Springfield, Ill. Thomas Publishing.Suche in Google Scholar

Holton, Elwood F., III, Richard A. Swanson and Sharon S. Naquin (2008) “Andragogy in Practice: Clarifying the Andragogical Model of Adult Learning,” Performance Improvement Quarterly, 14(1):118–143.10.1111/j.1937-8327.2001.tb00204.xSuche in Google Scholar

Kennedy, Ralph C. (2003) “Applying Principles of Adult Learning: The Key to More Effective Training Programs,” FBI Law Enforcement Bulletin, 72(4):Law Module 1.10.1037/e312582004-001Suche in Google Scholar

Kerka, Sandra (2002) “Teaching Adults: Is It Different? Myths and Realities No. 21.” Educational Resources Information Center, Clearinghouse on Adult, Career, and Vocational Education. Available at:www.eric.ed.gov/PDFS/ED468614.pdf.Suche in Google Scholar

Knowles, Malcolm S. (1990) The Adult Learner: A Neglected Species. 4th ed. Houston, TX: Gulf Publishing Company.Suche in Google Scholar

Leson, Joel (2005) Assessing and Managing the Terrorism Threat: Law Enforcement in the Post 9/11 Era. NCJ 210680. Washington, DC: Bureau Justice Assistance.Suche in Google Scholar

McCoy, Mark R. (2006) “Teaching Style and the Application of Adult Learning Principles by Police Instructors,” Policing: An International Journal of Police Strategies and Management, 29(1):77–91. doi:10.1108/13639510610648494.10.1108/13639510610648494Suche in Google Scholar

Merriam, Sharan B. and Rosemary S. Caffarella (1999) Learning in Adulthood: A Comprehensive Guide. San Francisco, CA: Jossey-Bass.Suche in Google Scholar

Morreale, Stephen A. and David E. Lambert (2009) “Homeland Security and the Police Mission,” Journal of Homeland Security and Emergency Management, 6(1). works.bepress.com/david_lambert/1/.10.2202/1547-7355.1618Suche in Google Scholar

Mueller, John (2010) “Assessing Measures Designed to Protect the Homeland,” Policy Studies Journal, 38(1):1–21. doi:10.1111/j.1541-0072.2009.00341.x.10.1111/j.1541-0072.2009.00341.xSuche in Google Scholar

Rosenzweig, Paul and Alane Kochems (2005) “Risk Assessment and Risk Management: Necessary Tools for Homeland Security,” October 25. The Heritage Foundation. Available at: www.heritage.org/research/reports/2005/10/risk-assessment-and-risk-management-necessary-tools-for-homeland-security.Suche in Google Scholar

Published Online: 2013-07-13
Published in Print: 2013-01-01

©2013 by Walter de Gruyter Berlin Boston

Artikel in diesem Heft

  1. Masthead
  2. Masthead
  3. Research Articles
  4. Integrating Federal Approaches to Post-Cyber Incident Mitigation
  5. Cybersecurity and US Legislative Efforts to address Cybercrime
  6. The Military’s Response to Domestic CBRNE Incidents
  7. Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
  8. Situated Response and Learning of Distributed Bushfire Coordinating Teams
  9. A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
  10. “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
  11. Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
  12. Understanding Incident Response to Unplanned Releases at Chemical Facilities
  13. A Study on the Responsiveness of Local Health Departments that Use Facebook
  14. Texas takes on the TSA: The Constitutional Fight over Airport Security
  15. The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
  16. The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
  17. Diffusion of Emergency Information during a Crisis within a University
  18. Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
  19. Communication and News
  20. A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
  21. Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
  22. It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
  23. Finding the New High Ground in Cyber War: Malware as an Instrument of War
  24. Opinions
  25. Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
  26. Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
  27. Book Review
  28. Emergency Management: The American Experience 1900–2010 (2nd Edition)
Heruntergeladen am 23.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2012-0056/html
Button zum nach oben scrollen