<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Workplace Archives - Behavioral Threat Assessment Software by USA Software</title>
	<atom:link href="https://threatassessmenttracking.com/category/workplace/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatassessmenttracking.com/category/workplace/</link>
	<description>Track, Monitor, Manage, Data Share</description>
	<lastBuildDate>Mon, 24 Jun 2024 16:17:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Empowering communities to prevent mass shootings</title>
		<link>https://threatassessmenttracking.com/2022/02/12/empowering-communities-to-prevent-mass-shootings/</link>
					<comments>https://threatassessmenttracking.com/2022/02/12/empowering-communities-to-prevent-mass-shootings/#respond</comments>
		
		<dc:creator><![CDATA[cnAgro]]></dc:creator>
		<pubDate>Sat, 12 Feb 2022 14:27:09 +0000</pubDate>
				<category><![CDATA[Behavioral Threat Assessments]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[Workplace]]></category>
		<category><![CDATA[Behavioral Threat Assessment]]></category>
		<category><![CDATA[communities]]></category>
		<category><![CDATA[community]]></category>
		<category><![CDATA[Dewey Cornell]]></category>
		<category><![CDATA[J. Reid Meloy]]></category>
		<category><![CDATA[Jillian Peterson]]></category>
		<category><![CDATA[Karie Gibson]]></category>
		<category><![CDATA[PhD]]></category>
		<category><![CDATA[PsyD]]></category>
		<category><![CDATA[Stephen White]]></category>
		<category><![CDATA[warning signs]]></category>
		<category><![CDATA[worrisome messages on a social media]]></category>
		<guid isPermaLink="false">https://threatassessmenttracking.com/?p=1892</guid>

					<description><![CDATA[<p>"This demonstrates the power of paying attention to warning signs" –J. Reid Meloy, PhD, a threat assessment researcher In the fall of 2020, a prominent technology company in California contacted forensic psychologist J. Reid Meloy, PhD, a threat assessment researcher, because one of their software engineers had posted worrisome messages on a social media  [...]</p>
<p>The post <a href="https://threatassessmenttracking.com/2022/02/12/empowering-communities-to-prevent-mass-shootings/">Empowering communities to prevent mass shootings</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last" style="--awb-bg-size:cover;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy"><div class="fusion-text fusion-text-1" style="--awb-text-transform:none;"><h2>&#8220;This demonstrates the power of paying attention to warning signs&#8221;</h2>
<p>–J. Reid Meloy, PhD, a threat assessment researcher</p>
<p>In the fall of 2020, a prominent technology company in California contacted forensic psychologist J. Reid Meloy, PhD, a threat assessment researcher, because one of their software engineers had posted worrisome messages on a social media platform. The messages alluded to plans of a violent attack. The platform flagged the posts and alerted the FBI.</p>
<p><a href="https://www.apa.org/monitor/2022/01/feature-empowering-communities" target="_blank" rel="noopener">Ironically, the case never received any news coverage because nobody was murdered.</a></p>
</div><div class="fusion-clearfix"></div></div></div></div></div>
<p>The post <a href="https://threatassessmenttracking.com/2022/02/12/empowering-communities-to-prevent-mass-shootings/">Empowering communities to prevent mass shootings</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://threatassessmenttracking.com/2022/02/12/empowering-communities-to-prevent-mass-shootings/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Value of School Threat Assessment Software by Dewey Cornell, Ph.D.</title>
		<link>https://threatassessmenttracking.com/2020/04/09/the-value-of-school-threat-assessment-software/</link>
					<comments>https://threatassessmenttracking.com/2020/04/09/the-value-of-school-threat-assessment-software/#respond</comments>
		
		<dc:creator><![CDATA[cnAgro]]></dc:creator>
		<pubDate>Thu, 09 Apr 2020 16:34:54 +0000</pubDate>
				<category><![CDATA[Campus]]></category>
		<category><![CDATA[K-12]]></category>
		<category><![CDATA[Workplace]]></category>
		<guid isPermaLink="false">https://threatassessmenttracking.com/?p=1361</guid>

					<description><![CDATA[<p>Dewey Cornell, Ph.D. CSTAG Developer Threat assessment software is a valuable tool that can yield multiple benefits for schools. First, a well-designed program can help assure high-quality practice. Threat assessment is a complex process, and good software with definitions and prompts at each step can help team members stay on track as they gather  [...]</p>
<p>The post <a href="https://threatassessmenttracking.com/2020/04/09/the-value-of-school-threat-assessment-software/">The Value of School Threat Assessment Software by Dewey Cornell, Ph.D.</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling" style="--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;" ><div class="fusion-builder-row fusion-row"><div class="fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last" style="--awb-bg-size:cover;"><div class="fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy"><div class="fusion-text fusion-text-2"><p><em>Dewey Cornell, Ph.D.</em><br />
<em>CSTAG Developer</em></p>
<p>Threat assessment software is a valuable tool that can yield multiple benefits for schools.</p>
<p>First, a well-designed program can help assure high-quality practice. Threat assessment is a complex process, and good software with definitions and prompts at each step can help team members stay on track as they gather information and move through the decision tree.<br />
Each member of the team can see what information is needed and what factors should be considered at each decision point.</p>
<p>Simple cases can be resolved quickly and, when a case is more serious, the team can readily divide up the necessary safety measures and further assessment steps. Pulling everything together in the case record makes it easy to identify targets for intervention and build a comprehensive management plan. Teamwork is enhanced because everyone has the same information readily available and tasks can be clearly assigned and monitored.</p>
<p>Second, after the threat assessment process is concluded, the clear and complete records generated by the program will make it easy to check on student well-being down the road and to share information when appropriate for follow-up services. Furthermore, these records will stand up to external scrutiny and help protect against liability claims. The Comprehensive School Threat Assessment Guidelines is the only threat assessment model tested in controlled studies.</p>
<p>Finally, your records database will allow you to evaluate trends across cases and demonstrate equity and fairness in student outcomes across demographic groups. Annual reports can show stakeholders the extent to which you have averted violence and helped troubled students.</p>
<p>Document your success with <a href="https://threatassessmenttracking.com">software that follows the <span style="color: #000000;">Comprehensive School Threat Assessment Guidelines.</span></a></p>
</div><div class="fusion-clearfix"></div></div></div></div></div>
<p>The post <a href="https://threatassessmenttracking.com/2020/04/09/the-value-of-school-threat-assessment-software/">The Value of School Threat Assessment Software by Dewey Cornell, Ph.D.</a> appeared first on <a href="https://threatassessmenttracking.com">Behavioral Threat Assessment Software by USA Software</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://threatassessmenttracking.com/2020/04/09/the-value-of-school-threat-assessment-software/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
