Abstract
The Risk Assessment Method Threatening Letters (RAT in brief) provides assessors such as forensic psychologists working for law enforcement and justice departments with a structured assessment method for threatening letters. On the basis of an assessment framework and guidelines, threatening letters will be analysed according to eighteen characteristics. The purpose is to arrive at a risk definition regarding the chances that a person will resort to violence, and to apply risk management to individuals who make threats. With the development of the RAT, efforts have been made regarding the identification of threat level of persons whose identity has not yet been established or who have not been detained, due to the absence of a criminal file. With an assessment form, the presence and relevance of eighteen characteristics divided into: content words (9), emotion words (5), linguistic features (3) and details (1), are examined in disturbing and threatening letters. The content analysis allows assessors to encode a text in binary units of measurement (present or not present) and is based on a combination of empirical knowledge and professional judgement. The objective concerns individuals who are posting (repeated) threatening or disturbing letters on social media and whose authorship must be reviewed to reveal background characteristics for the writer, in the case: 1. they are written anonymously; 2. they are intimidating in nature; 3. they undermine faith in social institutions. Its scope includes public figures such as representatives of the government who frequently are subject to threat or violence. However, the RAT is equally useful for the interpretation of threats aimed at other persons in whose cases the nature and seriousness of the type of threat is also of importance.
Highlights
Risk Assessment Method Threatening Letters: A Structured Approach for Disturbing and Threatening LettersMargaret Diekhuis-KuiperMinistry of the Interior and Kingdom Relations, The Hague, The NetherlandsEmail address: To cite this article: Margaret Diekhuis-Kuiper
The RAT was developed for assessors such as forensic psychologists working for law enforcement and justice departments
The study by Smith [26] served as a precursor; this study showed that certain words could be correlated with future violent actions
Summary
The assessment of digital and handwritten threatening letters whose authorship must be reviewed to reveal background characteristics, requires an investment of the National Police or for example the Public Prosecution Service. Different from the CTAP-25 and the VRAW, the RAT is aimed at the question whether the writer, in case of repeated letters is the same author, or whether a digital or handwritten threat might resort to action, and which specific linguistics could be clues for this. The focus, are besides content words, especially emotion words, function words and details like micro markers as interpunctions and capital letters These risk factors are combined together in eighteen linguistic characteristics that are assessed in terms of relevance, which results in a risk assessment for the writer of the threat. The RAT was developed for assessors such as forensic psychologists working for law enforcement and justice departments These are digital or handwritten threatening letters whose contents could cause social unrest or be considered undermining to rule of law. The RAT procedure is presented (4), followed by conclusions and discussion (5) and recommendations (6)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Information and Communication Sciences
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.