Record ID | ia:usingbehaviorali0000davi |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/usingbehaviorali0000davi/usingbehaviorali0000davi_marc.xml |
Download MARC binary | https://www.archive.org/download/usingbehaviorali0000davi/usingbehaviorali0000davi_meta.mrc |
LEADER: 01786cam 2200361 i 4500
001 9924130760001661
005 20150423150725.0
008 131127s2013 caua b 000 0 eng
010 $a2013024014
020 $a9780833080929 (pbk. : alk. paper)
020 $a083308092X (pbk. : alk. paper)
035 $a(OCoLC)848393355
035 $a(OCoLC)ocn848393355
040 $aDLC$beng$erda$cDLC$dOCLCO$dYDXCP$dOUN$dTXA
042 $apcc
049 $aCNUM
050 00 $aHV6431$b.D3268 2013
082 00 $a363.325/12$223
100 1 $aDavis, Paul K.,$d1952-
245 10 $aUsing behavioral indicators to help detect potential violent acts :$ba review of the science base /$cPaul K. Davis, Walter L. Perry, Ryan Andrew Brown, Douglas Yeung, Parisa Roshan, Phoenix Voorhies.
264 1 $aSanta Monica :$bRAND,$c[2013]
300 $axliii, 258 pages :$billustrations (some color) ;$c25 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
504 $aIncludes bibliographical references (pages 225-258).
505 0 $aPreface -- Figures -- Tables -- Summary -- Acknowledgements -- Abbreviations -- Introduction -- Developing intent -- Planning & laying groundwork -- Immediate pre-execution -- Execution and aftermath -- Technologies and methods -- Cross-cutting issues -- Conclusions -- Appendix A. Methodological notes -- Appendix B. References and cases to support historic examples -- Appendix C. References and cases to support indicator tables -- Appendix D. Information fusion methods -- Bibliography.
650 0 $aTerrorism$xPrevention.
650 0 $aBehavioral assessment.
650 0 $aPsychology$xMethodology.
947 $fSOC-SCI$hBOOK$p$31.30$q1
949 $aHV6431 .D3268 2013$i31786102957229
994 $a92$bCNU