Previous Chapter: 2 Literature Review and Synthesis
Suggested Citation: "3 Threat Assessment Response Protocol." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 1: Research Overview. Washington, DC: The National Academies Press. doi: 10.17226/25115.
Page 8
Suggested Citation: "3 Threat Assessment Response Protocol." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 1: Research Overview. Washington, DC: The National Academies Press. doi: 10.17226/25115.
Page 9
Suggested Citation: "3 Threat Assessment Response Protocol." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 1: Research Overview. Washington, DC: The National Academies Press. doi: 10.17226/25115.
Page 10
Suggested Citation: "3 Threat Assessment Response Protocol." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 1: Research Overview. Washington, DC: The National Academies Press. doi: 10.17226/25115.
Page 11
Suggested Citation: "3 Threat Assessment Response Protocol." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 1: Research Overview. Washington, DC: The National Academies Press. doi: 10.17226/25115.
Page 12
Next Chapter: 4 Risk Methodology
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.