Home A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
Article
Licensed
Unlicensed Requires Authentication

A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders

  • Allan Turner EMAIL logo , Kenneth Glantz and Julie Gall
Published/Copyright: July 13, 2013

Abstract

The Department of Homeland Security has funded an array of threat, risk and vulnerability assessment methodologies for use by law enforcement jurisdictions throughout the US. Yet, in spite of this effort, many law enforcement agencies either do not conduct assessments or do not understand and use operationally, the information gathered in assessments. This article discusses a practitioner/researcher partnership model which successfully developed and delivered a training course to assist homeland security professionals in understanding and using operationally, information gathered by various threat, risk, and vulnerability methodologies. The model takes into consideration not only what participants needed to learn but also how they were going to learn it. This article discusses initial background research, course development, implementation, delivery, and lessons learned. The results demonstrate the effectiveness of a model which incorporates the strength of both practitioners and researchers and can be replicated to provide effective training throughout homeland security.


Corresponding author: Allan Turner, DPA, CHPP, Professor Emeritus, George Mason University, Fairfax, VA, USA, e-mail:

  1. 1

    HLS-CAM™ is a comprehensive assessment that defines a community, evaluates its strengths and weaknesses, identifies its critical infrastructure and key resources (CI/KR), identifies the threats to the community, prioritizes its CI/KR, and provides a comprehensive vulnerability assessment.

  2. 2

    SPSS is popular statistical analysis software used by social scientists.

References

Anti-Defamation League. (2011) Criminal Proceedings: A Timeline of U.S. Terror Cases. Available at:www.adl.org/terrorism/Criminal_Proceedings.pdf.Search in Google Scholar

Bersin, Josh (2004) The Blended Learning Book: Best Practices, Proven Methodologies, and Lessons Learned. San Francisco, CA: Pfeiffer.Search in Google Scholar

Birzer, Michael L. (2003) “The Theory of Andragogy Applied to Police Training,” Policing: An International Journal of Police Strategies and Management, 26(1):29–42.10.1108/13639510310460288Search in Google Scholar

Birzer, Michael L. (2004) “Andragogy: Student Centered Classrooms in Criminal Justice Programs,” Journal of Criminal Justice Education, 15(2):393–411.10.1080/10511250400086041Search in Google Scholar

Birzer, Michael L. and Ronald Tannehill (2001) “A More Effective Training Approach for Contemporary Policing,” Police Quarterly, 4(2):233–252.10.1177/109861101129197815Search in Google Scholar

Burruss, George W., Matthew J. Giblin and Joseph A. Schafer (2010) “Threatened Globally, Acting Locally: Modeling Law Enforcement Homeland Security Practices,” Justice Quarterly, 27(1):77–101. Available at: www.tandfonline.com/doi/pdf/10.1080/07418820902763053.Search in Google Scholar

Charles, Michael T. (2000) Police Training Breaking All the Rules: Implementing the Adult Education Model into Police Training. Springfield, Ill. Thomas Publishing.Search in Google Scholar

Holton, Elwood F., III, Richard A. Swanson and Sharon S. Naquin (2008) “Andragogy in Practice: Clarifying the Andragogical Model of Adult Learning,” Performance Improvement Quarterly, 14(1):118–143.10.1111/j.1937-8327.2001.tb00204.xSearch in Google Scholar

Kennedy, Ralph C. (2003) “Applying Principles of Adult Learning: The Key to More Effective Training Programs,” FBI Law Enforcement Bulletin, 72(4):Law Module 1.10.1037/e312582004-001Search in Google Scholar

Kerka, Sandra (2002) “Teaching Adults: Is It Different? Myths and Realities No. 21.” Educational Resources Information Center, Clearinghouse on Adult, Career, and Vocational Education. Available at:www.eric.ed.gov/PDFS/ED468614.pdf.Search in Google Scholar

Knowles, Malcolm S. (1990) The Adult Learner: A Neglected Species. 4th ed. Houston, TX: Gulf Publishing Company.Search in Google Scholar

Leson, Joel (2005) Assessing and Managing the Terrorism Threat: Law Enforcement in the Post 9/11 Era. NCJ 210680. Washington, DC: Bureau Justice Assistance.Search in Google Scholar

McCoy, Mark R. (2006) “Teaching Style and the Application of Adult Learning Principles by Police Instructors,” Policing: An International Journal of Police Strategies and Management, 29(1):77–91. doi:10.1108/13639510610648494.10.1108/13639510610648494Search in Google Scholar

Merriam, Sharan B. and Rosemary S. Caffarella (1999) Learning in Adulthood: A Comprehensive Guide. San Francisco, CA: Jossey-Bass.Search in Google Scholar

Morreale, Stephen A. and David E. Lambert (2009) “Homeland Security and the Police Mission,” Journal of Homeland Security and Emergency Management, 6(1). works.bepress.com/david_lambert/1/.10.2202/1547-7355.1618Search in Google Scholar

Mueller, John (2010) “Assessing Measures Designed to Protect the Homeland,” Policy Studies Journal, 38(1):1–21. doi:10.1111/j.1541-0072.2009.00341.x.10.1111/j.1541-0072.2009.00341.xSearch in Google Scholar

Rosenzweig, Paul and Alane Kochems (2005) “Risk Assessment and Risk Management: Necessary Tools for Homeland Security,” October 25. The Heritage Foundation. Available at: www.heritage.org/research/reports/2005/10/risk-assessment-and-risk-management-necessary-tools-for-homeland-security.Search in Google Scholar

Published Online: 2013-07-13
Published in Print: 2013-01-01

©2013 by Walter de Gruyter Berlin Boston

Articles in the same Issue

  1. Masthead
  2. Masthead
  3. Research Articles
  4. Integrating Federal Approaches to Post-Cyber Incident Mitigation
  5. Cybersecurity and US Legislative Efforts to address Cybercrime
  6. The Military’s Response to Domestic CBRNE Incidents
  7. Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
  8. Situated Response and Learning of Distributed Bushfire Coordinating Teams
  9. A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
  10. “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
  11. Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
  12. Understanding Incident Response to Unplanned Releases at Chemical Facilities
  13. A Study on the Responsiveness of Local Health Departments that Use Facebook
  14. Texas takes on the TSA: The Constitutional Fight over Airport Security
  15. The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
  16. The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
  17. Diffusion of Emergency Information during a Crisis within a University
  18. Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
  19. Communication and News
  20. A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
  21. Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
  22. It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
  23. Finding the New High Ground in Cyber War: Malware as an Instrument of War
  24. Opinions
  25. Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
  26. Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
  27. Book Review
  28. Emergency Management: The American Experience 1900–2010 (2nd Edition)
Downloaded on 25.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2012-0056/html
Scroll to top button