Knowledge

Talk:Threat assessment

Source đź“ť

225: 165: 138: 22: 382: 474: 74: 53: 263: 475:
https://www.edweek.org/leadership/a-state-mandated-school-threat-assessment-heres-what-it-meant-for-students/2023/07?s_kwcid=AL!6416!3!602270476281!!!g!!&utm_source=goog&utm_medium=cpc&utm_campaign=ew+dynamic+recent&ccid=dynamic+ads+recent+articles&ccag=recent+articles+dynamic&cckw=&cccv=dynamic+ad&gad_source=1
348:
Why did the information about Pinkerton National Security and their proteges suddenly disappear from this article? Why did the information on the morals of threat assessment disappear (proportionality theories about morals vs. established truths about morals)? Heck, everyone is looking to make a
470:
Hello, I am the IP that assembled the school section. I did paraphrase to make it copyright friendly. Then another user removed it for lack of sources. I provided on my user page a list of the sources that I said I would include here so we can discuss. I did try and make an account today but had
534: 535:
https://www.nasponline.org/resources-and-publications/resources-and-podcasts/school-safety-and-crisis/systems-level-prevention/threat-assessment-at-school/behavior-threat-assessment-and-management-(btam)-best-practice-considerations-for-k%e2%80%9312-schools
695: 332: 120: 606: 589: 575: 567: 680: 524: 620:
I highly advise you completely rephrase your words. The sources are alright, but every addition you made is a complete copyright violation of the indicated link at the top of the article.
361:. It seems appropriate enough to combine the coverage of threat assessment in an enterprise/organizational risk management context with this more law enforcement/military-centric article. 85:, a collaborative effort to improve the coverage of Crime and Criminal Biography articles on Knowledge. If you would like to participate, please visit the project page, where you can join 294: 86: 529: 640:
Hi JalenBarks, OK I will work on rephrasing. I am a published writer though and do think this is within copyright law. Thanks for your input. I was able to make an account!
690: 215: 205: 81: 58: 544: 685: 610: 593: 579: 571: 675: 110: 415:
text or images borrowed from other web sites or published material; such additions will be deleted. Contributors may use copyrighted publications as a source of
181: 509: 670: 525:
https://www.cbs8.com/article/news/investigations/school-district-under-fire-for-failing-to-assess-alleged-threats/509-ebfcfe84-0ac8-4a02-8eab-f2461390ce32
705: 239: 484: 504: 489: 401: 715: 700: 252: 172: 143: 530:
https://www.cbs8.com/article/news/investigations/felony-charge-against-12-year-old-over-snapchat-message/509-d17e0d72-2d5c-4d6c-9436-22aa8f082de5
389: 331:
Just fix the article. It should be obvious to any of us where the errors are, but I'm in a hurry and need to leave so I can't do it on my own.
549: 479: 450:
from editing. While we appreciate contributions, we must require all contributors to understand and comply with these policies. Thank you. ⸺(
336: 494: 564: 545:
https://www.theguardian.com/us-news/2019/oct/14/when-kids-are-threats-the-assessments-unfairly-targeting-students-with-disabilities
345:
Rather than write about what threat assessment "seeks" to do, why not talk about its effectiveness or the positives and negatives.
554: 710: 234: 148: 559: 510:
https://www.psychologytoday.com/intl/blog/the-forensic-files/202210/threat-assessment-team-negligence-the-taft-union-case
33: 485:
https://www.edweek.org/leadership/a-state-mandated-school-threat-assessment-heres-what-it-meant-for-students/2023/07
519: 303:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
505:
https://www.newyorker.com/news/annals-of-inquiry/can-researchers-show-that-threat-assessment-stops-mass-shootings
490:
https://education.virginia.edu/sites/default/files/2023-06/yvp_fl-nij-case-technical-report-year-2_06-01-2023.pdf
447: 385:
Prior content in this article duplicated one or more previously published sources. The material was copied from:
451: 277: 21: 427:
properly. The material may also be rewritten, provided it does not infringe on the copyright of the original
390:
https://www.edsurge.com/news/2024-03-22-schools-are-desperate-to-stop-violence-will-these-new-guidelines-help
550:
https://www.endzerotolerance.org/single-post/2020/03/29/the-risks-of-threat-assessment-to-students-are-dire
539: 480:
https://ospi.k12.wa.us/sites/default/files/2023-08/washington-state-threat-assessment-fidelity-document.pdf
438:
for how to properly implement limited quotations of copyrighted text. Knowledge takes copyright violations
39: 645: 626: 431: 412: 408: 514: 457: 397: 180:
on Knowledge. If you would like to participate, please visit the project page, where you can join
495:
https://www.wvtf.org/news/2024-03-21/uva-experts-offer-free-threat-assessment-program-for-schools
434:
from that source. Therefore, such paraphrased portions must provide their source. Please see our
392:. Copied or closely paraphrased material has been rewritten or removed and must not be restored, 366: 565:
https://www.npr.org/2022/05/02/1095489487/trigger-points-mark-follman-how-to-stop-mass-shootings
555:
https://www.oregonlive.com/news/erry-2018/06/75f0f464cb3367/targeted_a_family_and_the_ques.html
358: 272: 177: 641: 621: 602: 560:
https://www.secretservice.gov/sites/default/files/2020-04/Protecting_Americas_Schools.pdf
306:
Find editors who have shown interest in this subject and ask them to take a look here.
664: 435: 362: 423:, may copy sentences and phrases, provided they are included in quotation marks and 224: 424: 386: 396:
it is duly released under a compatible license. (For more information, please see
381: 520:
https://clinicalsecurity.org/uncategorized/cognitive-bias-in-threat-assessment/
164: 137: 649: 631: 614: 597: 583: 499: 460: 370: 340: 420: 540:
https://kappanonline.org/kelleher-the-limits-of-threat-assessment-russo/
262: 73: 52: 515:
https://caselaw.findlaw.com/court/ca-court-of-appeal/2167340.html
15: 261: 223: 400:
if you are not the copyright holder of this material, or
696:
Start-Class Computer Security articles of Mid-importance
176:, a collaborative effort to improve the coverage of 284:Review importance and quality of existing articles 95:Knowledge:WikiProject Crime and Criminal Biography 681:WikiProject Crime and Criminal Biography articles 98:Template:WikiProject Crime and Criminal Biography 387:https://www.apa.org/monitor/2014/02/cover-threat 287:Identify categories related to Computer Security 8: 605:please review and let me know your thoughts. 19: 293:Identify articles for creation (see also: 247: 132: 47: 691:Mid-importance Computer Security articles 275:. Please allow some days for processing. 500:https://nces.ed.gov/pubs2022/2022029.pdf 82:WikiProject Crime and Criminal Biography 333:2600:1700:B250:DAF0:1D99:D236:5AC4:9F49 190:Knowledge:WikiProject Computer Security 134: 49: 686:Start-Class Computer Security articles 193:Template:WikiProject Computer Security 676:Low-importance Crime-related articles 607:2601:645:8A81:F8B0:430:50BB:E30E:13F4 590:2601:645:8A81:F8B0:D6A:78F6:89C6:6CB4 576:2601:645:8A81:F8B0:D6A:78F6:89C6:6CB4 568:2601:645:8A81:F8B0:D6A:78F6:89C6:6CB4 398:"using copyrighted works from others" 7: 588:Attempting to alert User:JalenBarks 170:This article is within the scope of 79:This article is within the scope of 38:It is of interest to the following 671:Start-Class Crime-related articles 14: 706:Mid-importance Computing articles 300:Identify articles for improvement 574:) 05:59, 4 September 2024 (UTC) 402:"donating copyrighted materials" 380: 163: 136: 72: 51: 20: 357:This is the target article for 210:This article has been rated as 115:This article has been rated as 716:All Computer Security articles 701:Start-Class Computing articles 1: 650:00:10, 5 September 2024 (UTC) 632:00:03, 5 September 2024 (UTC) 615:00:01, 5 September 2024 (UTC) 598:06:04, 4 September 2024 (UTC) 584:06:01, 4 September 2024 (UTC) 461:01:28, 4 September 2024 (UTC) 341:03:38, 31 December 2017 (UTC) 271:will be generated shortly by 253:WikiProject Computer Security 232:This article is supported by 184:and see a list of open tasks. 173:WikiProject Computer Security 89:and see a list of open tasks. 92:Crime and Criminal Biography 59:Crime and Criminal Biography 442:, and persistent violators 732: 436:guideline on non-free text 216:project's importance scale 196:Computer Security articles 121:project's importance scale 466:sources on school section 376:Copyright problem removed 371:01:57, 26 July 2024 (UTC) 246: 231: 209: 158: 114: 67: 46: 419:, and, if allowed under 349:few dollars these days. 711:All Computing articles 266: 228: 101:Crime-related articles 28:This article is rated 265: 235:WikiProject Computing 227: 290:Tag related articles 251:Things you can help 411:, we cannot accept 327:Spelling and commas 278:More information... 471:password trouble. 267: 229: 34:content assessment 359:Threat assessment 324: 323: 320: 319: 316: 315: 312: 311: 187:Computer Security 178:computer security 144:Computer Security 131: 130: 127: 126: 723: 629: 624: 384: 295:Article requests 280: 248: 198: 197: 194: 191: 188: 167: 160: 159: 154: 151: 140: 133: 103: 102: 99: 96: 93: 76: 69: 68: 63: 55: 48: 31: 25: 24: 16: 731: 730: 726: 725: 724: 722: 721: 720: 661: 660: 627: 622: 468: 378: 355: 353:Risk management 329: 281: 276: 195: 192: 189: 186: 185: 152: 146: 100: 97: 94: 91: 90: 61: 32:on Knowledge's 29: 12: 11: 5: 729: 727: 719: 718: 713: 708: 703: 698: 693: 688: 683: 678: 673: 663: 662: 659: 658: 657: 656: 655: 654: 653: 652: 467: 464: 440:very seriously 377: 374: 354: 351: 328: 325: 322: 321: 318: 317: 314: 313: 310: 309: 308: 307: 304: 301: 298: 291: 288: 285: 269:Article alerts 260: 257: 256: 244: 243: 240:Mid-importance 230: 220: 219: 212:Mid-importance 208: 202: 201: 199: 182:the discussion 168: 156: 155: 153:Mid‑importance 141: 129: 128: 125: 124: 117:Low-importance 113: 107: 106: 104: 87:the discussion 77: 65: 64: 62:Low‑importance 56: 44: 43: 37: 26: 13: 10: 9: 6: 4: 3: 2: 728: 717: 714: 712: 709: 707: 704: 702: 699: 697: 694: 692: 689: 687: 684: 682: 679: 677: 674: 672: 669: 668: 666: 651: 647: 643: 639: 638: 637: 636: 635: 634: 633: 630: 625: 619: 618: 617: 616: 612: 608: 604: 600: 599: 595: 591: 586: 585: 581: 577: 573: 569: 566: 562: 561: 557: 556: 552: 551: 547: 546: 542: 541: 537: 536: 532: 531: 527: 526: 522: 521: 517: 516: 512: 511: 507: 506: 502: 501: 497: 496: 492: 491: 487: 486: 482: 481: 477: 476: 472: 465: 463: 462: 459: 455: 454: 449: 445: 441: 437: 433: 430: 426: 422: 418: 414: 410: 409:legal reasons 405: 404:if you are.) 403: 399: 395: 391: 388: 383: 375: 373: 372: 368: 364: 360: 352: 350: 346: 343: 342: 338: 334: 326: 305: 302: 299: 296: 292: 289: 286: 283: 282: 279: 274: 270: 264: 259: 258: 254: 250: 249: 245: 241: 238:(assessed as 237: 236: 226: 222: 221: 217: 213: 207: 204: 203: 200: 183: 179: 175: 174: 169: 166: 162: 161: 157: 150: 145: 142: 139: 135: 122: 118: 112: 109: 108: 105: 88: 84: 83: 78: 75: 71: 70: 66: 60: 57: 54: 50: 45: 41: 35: 27: 23: 18: 17: 601: 587: 563: 558: 553: 548: 543: 538: 533: 528: 523: 518: 513: 508: 503: 498: 493: 488: 483: 478: 473: 469: 452: 443: 439: 428: 416: 406: 393: 379: 356: 347: 344: 330: 268: 233: 211: 171: 116: 80: 40:WikiProjects 623:Jalen Barks 417:information 413:copyrighted 30:Start-class 665:Categories 642:Angel94117 603:JalenBarks 432:plagiarize 425:referenced 273:AAlertBot 149:Computing 458:staplers 421:fair use 363:Tule-hog 448:blocked 214:on the 119:on the 628:(Woof) 453:Random 394:unless 36:scale. 255:with: 646:talk 611:talk 594:talk 580:talk 572:talk 444:will 407:For 367:talk 337:talk 446:be 206:Mid 111:Low 667:: 648:) 613:) 596:) 582:) 429:or 369:) 339:) 242:). 147:: 644:( 609:( 592:( 578:( 570:( 456:) 365:( 335:( 297:) 218:. 123:. 42::

Index


content assessment
WikiProjects
WikiProject icon
Crime and Criminal Biography
WikiProject icon
WikiProject Crime and Criminal Biography
the discussion
Low
project's importance scale
WikiProject icon
Computer Security
Computing
WikiProject icon
WikiProject Computer Security
computer security
the discussion
Mid
project's importance scale
Taskforce icon
WikiProject Computing
Mid-importance
WikiProject Computer Security

AAlertBot
More information...
Article requests
2600:1700:B250:DAF0:1D99:D236:5AC4:9F49
talk
03:38, 31 December 2017 (UTC)

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑