Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide (2018)

Chapter: 5 Threat Assessment Response Protocol and Evaluation Methodology

Previous Chapter: 4 Threat Assessment Response Protocol and Evaluation Methodology
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 46
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 47
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 48
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 49
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 50
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 51
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 52
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 53
Suggested Citation: "5 Threat Assessment Response Protocol and Evaluation Methodology." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
Page 54
Next Chapter: Appendix A: Vulnerability Self-Assessment Tool
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.