Specialized Training

Shop

This is where you can browse products in this store.

  • The Power of Prevention (On Demand Video Training)

    $729.95$754.95

    Threat Assessment Training

    This premium, on-demand, 18-module course offers world-class foundational education on pre-violence warning signs and risk factors; related stressors and triggers; mental disturbance and its relationship to targeted violence; personal grievance and ideological motivations; signs of potential imminent violence; gathering information, understanding social media impact, and avoiding various critical biases. This course will also teach practical threat assessment and management, offering instruction on the full life cycle of a case including intake, triage, critical threat assessment stages, changing levels of concern, full-spectrum threat management strategies, and responsible follow-up including case closure.

    *****EMAIL US AT INFO@SPECIALIZEDTRAINING.COM TO INQUIRE ABOUT OUR GROUP DISCOUNT*****

    Presenters: Reid Meloy, PhD, ABPP      and     Molly Amman, JD

    Bundle 1 (1 hour CE) contains:

    • Module 1 – Introduction: The course introduction outlines the course content, provides some fundamental concepts, and discusses recent case law in threat assessment and management.
    • Module 2 – Understanding Planned Violence: This module explains different modes of violence and how they intersect with biology and behavior, offers explanatory case examples, and addresses threats versus violence.

    Bundle 2 (1 hour CE) contains:

    • Module 3 – Risk Factors for Violence: Gain an in-depth understanding of how risk factors can create a future vulnerability to considering planned violence, with research findings and case examples.

    Bundle 3 (1.5 hours CE) contains:

    • Module 4 – Proximal Warning Behaviors and the Pathway to Violence: Learn, in compelling detail, about the patterns of behavior that suggest accelerating risk toward planned violence. Filled with real world case examples, current research, and in-depth analysis.

    Bundle 4 (1 hour CE) contains:

    • Module 5 – Signs of Imminence: This succinct module describes those behaviors which appear to be associated with a short period before violence could unfold.
    • Module 6 – Stressors and Triggers: Events or circumstances with the potential to degrade a person of concern’s coping abilities are described, along with a framework for analysis and case example
    • Module 7 – Threat Reducing Factors: Facts, circumstances, or even personal attributes of the person of concern that may operate to reduce violence potential are described and explained.
    • Module 8 – Violence Risk and Threat Assessment Instruments: These important tools are categorized and explained, along with examples in each category and a source for additional information.
    • Module 9 – Deciding on a Level of Concern: This module offers a framework by which the threat assessor may consistently assess and label cases, which is a key to effective communication and appropriate action.

    Bundle 5 (.75 hour CE) contains:

    • Module 10 – Stalking and Intimate Partner Violence: Unparalleled analysis and explanation of stalkers, stalking behaviors and violence, and key aspects of intimate partner violence for threat assessors.

    Bundle 6 (.5 hour CE) contains:

    • Module 11 – Avoiding Cognitive Biases That Derail Assessment and Management: Different forms of bias are revealed and explained, to enable threat assessors to avoid them in case work.

    Bundle 7 (1.5 hours CE) contains:

    • Module 12 – Information Gathering and Interviewing: An important discussion of data in threat assessment investigations and how this concept differs from other types of investigations. Special tips for interviewing the subject of inquiry.
    • Module 13 – Social Media’s Place in Threat Assessment: Describes the ways in which social media relates to on-the-ground behavior, plus key psychological and behavioral concepts.

    Bundle 8 (1 hour CE) contains:

    • Module 14 – Threat Management: Informed by the assessment, threat management is the key to altering the course of events. This module describes the threat management spectrum of options, illustrated by numerous case examples. Particular attention is paid to safe  and future-oriented terminations, expulsions, and long suspensions..

    Bundle 9 (.5 hour CE) contains:

    • Module 15 – Special Considerations in the K-12 Environment: Special characteristics of the K-12 environment are discussed, along with zero tolerance policies, K-12 threat assessment structured professional judgment tools, and attachment and its relationship to targeted violence by juveniles. Particular attention is paid to safe  and future-oriented terminations, expulsions, and long suspensions.

    Bundle 10 (1.25 hours CE) contains:

    • Module 16 – Threat Assessment Mechanics: This crucial module describes each step—and the reasons for them—in the lifecycle of a threat assessment and management case, from intake to case closure.
    • Module 17 – Setting Up your Program and Threat Assessment Team: This module is for anyone responsible for writing or evaluating workplace violence prevention policy, establishing a program, or setting up a threat assessment team. It also addresses maximizing bystander reporting of concerning behavior
    • Module 18 – Overview of the Threat Assessment and Management Arc: Review of the threat assessment and management process, discussion of resources for networking, knowledge and training, and final thoughts of the presenters.

    CLICK HERE to purchase individual bundles – with APA Continuing Education credits

    CLICK HERE to purchase individual bundles – without CEs

  • Preventing and Managing Violence in Organizations – Workplace Violence, Targeted Violence, and Active Shooters

    $69.99

    Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue.  As such, the book’s objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach.

    The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager.

    While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization’s system of management and all its activities and functions.  The “Introduction” section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization’s overall business management strategy. The “Framework” section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The “Tactics and Control Measures” section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events.  For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach.

    Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization’s day-to-day activities—as an integral part of these activities—rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

    Dr. Marc H. Siegel

  • Preventing Domestic Homicides

    $84.99

    Preventing Domestic Homicides: Lessons Learned from Tragedies focuses on the diverse nature of domestic homicides and what has been learned about the most effective prevention strategies from emerging research and the work of domestic violence death review committees in Canada, the US, the UK, NZ and AU. Each chapter focuses on different populations—specifically older women, youth dating relationships, indigenous women, immigrant and refugee populations, rural/remote communities, same-sex relationships, homicides with police & military, domestic homicide in the workplace, and children killed in the context of domestic violence. Topics cover current research, risk factors, and include case studies from domestic homicide review committees.

    Cases are summarized regarding major themes and recommendations, such as public awareness, professional training, risk assessment, intervention and collaboration amongst service systems. Written for academic and domestic violence researchers in sociology, criminology, psychology and psychiatry by global contributors with on-the-ground domestic homicide experience.

    1st Edition – March 24, 2020

  • The Psychology of Insider Risk – Detection, Investigation and Case Management

    $54.99

    Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. After a career in counterterrorism, Dr. Shaw spent the last 20 years concentrating on insiders—employees who commit espionage, sabotage, intellectual property theft, present risks of harm to self and others, and other workplace risks, especially those influenced by mental health conditions.

    Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personal characteristics, resources and support that can mitigate these risks. Dr. Shaw also examines specific risk accelerators like subject disgruntlement, personality disorders and problematic organizational responses that can escalate the speed and intensity of insider risks. The investigative applications, strengths and weaknesses of the CPIR are also considered.

    This work also describes the behavioral science tools deployed in insider investigations, especially those designed to locate and understand persons at-risk and help organizations intervene to avoid escalation or manage potential damage. Case examples are drawn from intelligence community, corporate and law enforcement investigations. Specific insider cases where the use of behavioral science tools is described in detail include leaks, anonymous threats, erotomania, hacking, violence risk, mass destruction threats and espionage.

    The work closes with consideration of the many current and future challenges insider risk professionals face. These include the challenge of recognizing suicidal ideation as a gateway to other forms of insider risk, understanding when subject therapy will, and will not reduce risk, deciphering belief in conspiracy theory from significant extremist risk, appreciating insider threats to our elections and the unique challenges posed when the insider is a leader.

    Eric Shaw, PhD

  • The Psychology of Stalking

    $20.00$69.99

    8 CE hours available

    Specialized Training Services is approved by the
    American Psychological Association to sponsor
    continuing education for psychologists.
    Specialized Training Services retains
    responsibility for this program.

  • The Psychology of Stalking: Clinical and Forensic Perspectives

    $49.99

    327 pages, published in 1998.
    J. Reid Meloy

    “The Psychology of Stalking is the first Scholarly book on stalking ever published. Virtually every serious writer and researcher in this area of criminal psychopathology has contributed to this comprehensive resource. These chapters explore stalking from social, psychiatric, psychological, legal and behavioral perspectives. New thinking and data are presented on threats, pursuit characteristics, psychiatric diagnosis, offender-victim typologies, cyberstalking, false victimization syndrome, erotmania, stalking and domestic violence, stalking of public figures, and many other aspects of stalking. This landmark text is of interest to both professionals and other thoughtful individuals who recognize the serious nature of this ominous social behavior at the end of the millennium.” Excerpt taken from bookcover

    “The Psychology of Stalking is a comprehensive, up to date, scholarly review that includes everything from Shakespeare’s stalking sonnets to cyberstalking. It provides a wealth of useful information. The book is must reading for law enforcement and mental health professionals that deal with stalkers.” Phillip J. Resnick, M.D. Director of Forensic Psychiatry, Case Western Reserve University

    “J. Reid Meloy and his colleagues have blended clinical insight, scientific rigor, and legal precision to produce the one indispensable book on stalking. Encyclopedic in coverage and gracefully written, this work will have enormous influence on practice, policy, and research. With the publication of The Psychology of Stalking: Clinical and Forensic Perspectives, the study of stalking has come of age.” John Monahan, Ph.D. University of Virginia School of Law

  • Reading Red Flags, Separating Danger from Drama and Desire, Wendy Patrick, JD, MDiv, PhD

    $49.99$69.99

    Reading Red Flags is now available. This is an on-demand video that is sold with or without CE units.

    • Career prosecutor (over 110 jury trials)
    • Association of Threat Assessment Professionals Certified Threat Manager
    • Author of Red Flags: How to Spot Frenemies, Underminers, and Ruthless People
    • Co-author of New York Times bestseller Reading People (revision)
    • Author of Why Bad Looks Good: Biblical Wisdom to Make Smart Choices
    • Psychology Today columnist: Why Bad Looks Good
    • Host, Today with Dr. Wendy KCBQ radio
  • Red Flags: Frenemies, Underminers, and Ruthless People

    $15.99

    We all wear emotional blinders: keeping society moving smoothly depends on it. But when you absolutely must rely on another person, you have to be able to assess them objectively. Red Flags will train you to spot deceptive or dangerous people.

    Learn how to:
    – Avoid selective attention
    – Observe people over time (bad guys rely on first impressions)
    – Ask questions: most people’s favorite topic is themselves
    – Cybersleuth to verify information and track down inconsistencies

    If you want to know whether a potential boyfriend is trustworthy, are hiring employees, selecting a child care worker, or have partners in business, you need RED FLAGS.

    Wendy L. Patrick, Ph.D.

    Paperback
    Published: 05-17-16
    Pages: 320

  • The Risks Within: Preventing & Managing Workplace Violence

    $34.99

    156 pages, published in 2022.
    Marc Mcelhaney, Ph.D.

    The term, “workplace violence” has become a frightful one, suggesting the seemingly sudden emergence of a crazed “active shooter”, resulting in multiple casualties. Dr. McElhaney, a psychological specialist in the prevention and management of high-risk behavior, urges us to reconsider our preconceptions and stereotypes if we are ever going to be able to successfully prevent these often-fatal events. Relying on real examples from his files, he demonstrates that these at-risk individuals always exist among us, often unrecognized, but for a variety of reasons and circumstances, have come to pose a danger to those around them. He introduces us specifically to the events surrounding Maria, Patrick, and Neil, otherwise “normal” individuals in most circumstances, but who had encountered a perfect storm of events in their lives that, without early recognition and intervention, could have resulted in violent consequences. In the second half of this book, the author provides us with a step-by-step guide to establishing a process that enables us to identify and safely manage these behaviors before they result in dangerous and fatal consequences. This is a critical read for any manager – or for any of us for that matter.

  • Schizoid, Schizotypal, and Paranoid Personality Disorders (3.5 Hours)

    $29.99$49.99

    The DSM-IV-TR personality disorders (PDs) classified in Cluster A are referred to as the “odd/eccentric” group of PDs. These Axis II disorders are considered to be on the “schizophrenia spectrum” along with the different categories of schizophrenia on Axis I. Patients with schizoid PD resemble those in the early stages of schizophrenia but, unlike those in such an early, prodromal phase of the Axis I condition, do not go on to develop schizophrenia. Schizotypal PD most closely fits the “odd/eccentric” label. Patients with schizotypal PD and Paranoid PD are thought to be genetically predisposed to develop these conditions, yet less vulnerable than those predisposed to develop schizophrenia itself. Good data about the prevalence of these disorders are not available as patients with these disorders are not generally treatment seeking. As is characteristic of all PDs, the diagnostic features of the Cluster A disorders are relatively stable over time, although under stress, peaks of more disabling pathology may occur. Comorbidity with other disorders (Axis I and II) is common. State-of-the-art assessment and treatment of the Cluster A PDs will be presented in this half day program.

    Workshop Content

    • DSM-IV-TR diagnosis of the Cluster A PDs
    • How to differentiate Cluster A PDs from Axis I psychotic disorders
    • Common patterns of comorbidity
    • A vulnerability/stress model for the development of these personality disorders
    • Treatment strategies to deal with the high levels of mistrust typical of these patients
    • Countertransference difficulties in working with Cluster A patients
    • Symptom-targeted psychopharmacological strategies
    • An integrated psychotherapy/psychopharmacology approach

    On Demand Video

    Continuing Education (CE credit): 3.5 hours– watch the video, take notes, pass the test, print your certificate!

    Presenter: Philip Erdberg, Ph.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

  • School Resource Bundle

    $76.99
    This special, discounted price is for the following four exceptional school-based resources:
    • Assessing Student Threats, Van Dreal
    • Youth Violence Prevention, Van Dreal
    • School Violence Threat Management, Mohandie
    • Threats in Schools, A Practical Guide for Managing Violence, McCann
  • School Violence Threat Management

    $4.99

    230 pages, published 11/00. Updated 02/02 for second printing.

    Section One: Overview 1. Introduction to School Violence

    Section Two: School Violence Threat Assessment 2. Threat Assessment: Warning Signs 3. Threat Assessment: Risk and Stability Factors 4. Threat Assessment: Applying the Concepts

    Section Three: School Violence Intervention 5. General Intervention Strategies 6. High Risk Case Intervention Consideration 7. Moderate/Lower Risk Case Intervention Considerations

    Section Four: School Violence Aftermath 8. Aftermath Crisis Management References Recommended Resources

     

  • School Violence Threat Management

    $20.00$25.99

    8 CE hours available

    Specialized Training Services is approved by the
    American Psychological Association to sponsor
    continuing education for psychologists.
    Specialized Training Services retains
    responsibility for this program.

  • School Violence Threat Management (3.5 Hours)

    $29.99$49.99

    Program description :

    The 21st Century has arrived with a new sense of urgency to keep our children and schools safe. The Virginia Tech tragedy reminds us that these issues can occur in universities as they have in middle and high schools. The recent deaths of students in Colorado and Pennsylvania at the hands of outside offenders highlights that students are not the only threat sources and the need exists to protect our schools from outsiders with unique and dangerous agendas. The tragic deaths of hundreds of people, many of whom were children, in a school based terrorism incident in Russia further underscores this issue. There are new dimensions of threat for school personnel, mental health, legal, and school police and security professionals to consider. This presentation will provide attendees with an overview of cutting edge information about school based threat assessment, violence prevention and intervention strategies. It will assist in understanding the unique assessment, management, criminal, and civil legal issues associated with these cases and how to reduce one’s liability in the process. The material presented will be based on over 17 years of topic-specific experience, pre/post conviction interviews and reviews of school violence perpetrators, victims, and incidents. Participants will gain practical ideas that may be applied to their own educational setting.

    Workshop Content

    Extent of the school violence problem
    Three types of potential offenders
    Warning signs and risk factors associated with school violence
    Improving early warning detection systems
    Applied threat assessment principles
    Interview strategies for potential offenders
    Systemic and multidisciplinary aspects of school based threat management-integrating mental health, law enforcement, and school resources
    Perpetrator’s stories from videotaped interviews and other sources

    This video is from a live conference presentation and is largely unedited. In some cases you may not hear a question asked by a participant however, in most cases the presenter will repeat the question.  Video resolution is very good but not as high as possible to decrease downloading time. Best viewing is done with a mid-sized screen as a full screen will lose some of its resolution. We recommend you take notes just as you would if you were in a live conference as those notes will be helpful to learning and will come in handy for the test.

    On Demand Video

    Continuing Education (CE credit): 3.5 hours– watch the video, pass the test, print your certificate!

    Presenter: Kris Mohandie, Ph.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

     

  • Schools at Risk: Managing Bullying, Gangs and Violent Females (3.5 Hours)

    $29.99$49.99

    Maintaining a safe school environment means managing bullying, gangs, violent males and increasing female violence. Problems associated with bullying, gangs, and violence are well documented in their adverse affects on a positive learning environment. Nevertheless, many successful programs have been implemented nationwide to address these issues. Participants will be presented with overview of how these behaviors impact the social environment of the school, attendance and academic performance of students. State of the art, research-based prevention and intervention approaches will be presented in a “nuts and bolts” format. Attendees will be able to follow and implement five planning steps to improve school climate, attendance and academic achievement. Many of these interventions are valid for those working with youth in a non-school environment as well. School site teams will be able to personalize the information directly to their school site.

    The Impact of Bullying, Gangs and Female Aggression in Schools
    Early Warning Signs
    Gang Behaviors and Intervention Strategies
    How to “Bully Proof” the School Environment
    Recognize and Intervene with Aggressive and Potentially Violent Females

    On Demand Video

    Continuing Education (CE credit): 3.5 hours)– watch the video, pass the test, print your certificate!

    Presenter: Wayne Sakamoto

    Venue: Live Conference Presentation

    Location: San Diego, CA

    This video is designed to play on a normal cable or DSL broadband internet connection. Dial up connections will probably not load this video quickly enough for proper viewing. Video resolution is very good but not as high as possible to decrease downloading time. Best viewing is done with a mid-sized screen as a full screen will lose some of its resolution.

    This video is from a live conference presentation and is largely unedited. In some cases you may not hear a question asked by a participant however, in most cases the presenter will repeat the question.

    We recommend you take notes just as you would if you were in a live conference as those notes will be helpful to learning and will come in handy for the test which follows.

  • The Scientific Pursuit of Stalking

    $25.00$29.99

    10 CE hours available

    Specialized Training Services is approved by the
    American Psychological Association to sponsor
    continuing education for psychologists.
    Specialized Training Services retains
    responsibility for this program.

  • The Scientific Pursuit of Stalking

    $4.99

    August, 2006, 374 pages.

    Dr. Reid Meloy’s ninth book provides his vast research on stalking and obsessional following and summarizes the implications of that research. Framed with a beautifully haunting cover painting by Konstantin Dikovsky titled, “The Hidden,” Dr. Meloy has produced the most comprehensive chronology of what we know about stalking yet published. It is a must for every forensic library and any professional working in this area.

    From the Foreword
    “Stalking is neither new nor rare. Examples of intrusive behaviors that would now be identified as stalking have been described for centuries, but in the late 1980s these behaviors finally found a name. Initially, the American media applied the evocative term “stalkers” to those who pursued the famous. This label gripped the public’s imagination and rapidly propelled stalking into the public’s consciousness. It exposed a once obscure form of social deviance and provided the impetus for its criminalization.”

    Though not a new behavior, stalking may well be more prevalent in a new millennium characterized by…”

    Table of Contents

    Foreword
    1. Unrequited Love and the Wish to Kill
    2. Nondelusional or Borderline Erotomania: A Disagreement
    3. A Case Study: Revisiting the Rorschach of Sirhan Sirhan
    4. Demographic and Clinical Comparison of Obsessional Followers and Offenders with Mental Disorders
    5. A Case Study: Erotomania in a Shi’ite Islamic Male
    6. Stalking (Obsessional Following): A Review of Some Preliminary Studies
    7. A Case Study: “All I wanted was to love you…”
    8. The Clinical Risk Management of Stalking: “Someone is watching over me…”
    9. A Comparative Study of Psychotic and Nonpsychotic Stalking
    10. Domestic Protection Orders and the Prediction of Subsequent Criminality and Violence Toward Protectees
    11. Stalking: An Old Behavior, A New Crime
    12. A Case Study: Erotomania, Triangulation, and Homicide
    13. A Replication Study of Obsessional Followers and Offenders with Mental Disorders
    14. Risk Factors for Violence Among Stalkers
    15. Stalking and Violence
    16. Communicated Threats and Violence Toward Public and Private Targets: Discerning Differences Among Those Who Stalk and Attack
    17. Pathologies of Attachment, Violence, and Criminality
    18. Stalking, Threatening, and Harassing Behavior by Patients – The Risk Management Response
    19. When Stalkers Become Violent: The Threat to Public Figures and Private Lives
    20. Female Stalkers and Their Victims
    21. A Research Review of Public Figure Threats, Approaches, Attacks, and Assassinations in the United States
    22. Some Thoughts on the Neurobiology of Stalking
    Acknowledgements

  • Snakes in Suits: Understanding and Surviving the Psychopaths in Your Office

    $29.99

    Revised and updated with the latest scientific research and case studies, the business classic that offers a revealing looks at psychopaths in the workplace – how to spot their destructive behavior and stop them from creating chaos in the modern corporate organization. Snakes in Suits: When Psychopaths go to Work Paul Babiak, Ph.D & Robert…

  • Stalking, Threatening, and Attacking Public Figures [backordered]

    $74.99

    Published 2008. 474 pages.

    Public figures require attention, whether from a constituency who votes them in or out of office, shareholders who decide their economic benefit to the corporation, or fans who judge their performances. However, on the periphery of this normal attention resides a very real risk; that of a much smaller group of individuals who lack the ability to discriminate between their own private fantasies and the figure’s public behavior. They may be personally insulted by perceived betrayal, fanatically in love due to a perceived affectionate or sexual invitation, or simply preoccupied with the daily life of the public figure. Such individuals may fixate and do nothing more. Others communicate or approach in a disturbing way. A few will threaten. And on rare occasions, one will breach the public figure’s security perimeter and attack.

    Stalking, Threatening, and Attacking Public Figures is a comprehensive survey of the current knowledge about stalking, violence risk, and threat management towards public figures. With contributions from forensic psychologists and psychiatrists, clinicians, researchers, attorneys, profilers, and current and former law enforcement enforcement professionals, this book is the first of its kind, international in scope, and rich in both depth and complexity.

    The book is divided into three sections which, in turn, focus upon defining, explaining, and risk managing this increasingly complex global reality. Chapters include detailed case studies, analyses of quantitative data, reflections from attachment theory and psychoanalytic thought, descriptions of law enforcement and protective organization activities, mental health and psychiatric categorizations and understandings, consideration of risk assessment models and variables, victim perspectives, and others.

  • The Stop Child Molestation Book

    $4.99

    Published in 2001, 363 pages

    Contents
    1. The Stop Child Molestation Plan: Into a New Era
    2. Childhood Beginnings of the Desire to Molest
    3. Child Molesters by Accident
    4. Victims of Molestation Who Become Molesters
    5. A Child Molester in the Family: Father Molests Daughter
    6. The Magic of Early Diagnosis
    7. Treatment: The Medicines and the Therapies
    8. How Many Children can you Save?
    Appendices

  • Suicide by Cop

    $14.99

    Originally presented live in February, 2008, this brief training provides an overview of the phenomenon known as Suicide by Cop

    Running time: Approximately 35 minutes

  • Suicide Risk Assessment in Youth and Young Adults (3.5 Hours)

    $29.99$49.99

    Program description from brochure:

    It was well known that many examples of youth-perpetrated catastrophic violence were carried out by highly disturbed young men who were fundamentally suicidal. In many such cases, the suicidal risk of youth perpetrators is well known to parents, teachers, administrators, law enforcement personnel, and mental health professionals, yet tragic outcomes still occur. This presentation will offer practical information on the assessment of suicide risk, the interplay between suicidal and homicidal behaviors and a full range of intervention strategies suitable to a variety of settings. Using a lively case example approach, this presentation will provide critical information about how suicidal youth think, feel, and behave. Contemporary issues such as the influence of media, the role of internet, and peer influences will also be considered. Bottom-line, this training will enable participants to better recognize who is at risk for suicide and what can realistically be done to intervene and save lives.

    On Demand Video

    Continuing Education (CE credit): 3.5 hours, watch the video, pass the test, print your certificate!
    Presenter: David Jobes, Ph.D.
    Venue: Live Conference Presentation
    Location: San Diego, CA

    This video is designed to play on a normal cable or DSL broadband internet connection. Dial up connections will probably not load this video quickly enough for proper viewing. Video resolution is very good but not as high as possible to decrease downloading time. Best viewing is done with a mid-sized screen as a full screen will lose some of its resolution.

    This video is from a live conference presentation and is largely unedited. In some cases you may not hear a question asked by a participant however, in most cases the presenter will repeat the question.

    We recommend you take notes just as you would if you were in a live conference as those notes will be helpful to learning and will come in handy for the test which follows.

  • Testifying in Court

    $29.99

    Stanley Brodsky, Ph.D.
    208 pages, published in 1991

    Extremely well written, Testifying in Court provides the reader with a unique perspective on providing court testimony. It serves the reader by demonstrating an alternative approach to courtroom testimony in theory, as well as in application.

  • Testifying in Court (6.5 Hours)

    $59.99$79.99

    Original Program Description:

    Testifying in court is a time of anxiety for the first time witnesses and aggressive cross-examinations are particularly stressful, even for the experienced witness. This workshop begins by presenting ways of understanding the common problems faced on the witness stand. No techniques can take the place of good knowledge and careful preparation, and the foundations of such knowledge and preparation are described. The masterful expert witness knows what to expect in direct examinations and in cross-examinations. Drawing on the professional literature, on scientific findings, and on his own experience in court, Dr. Brodsky will present pathways towards reducing anxiety on the witness stand and specific methods for dealing with the most aggressive cross-examinations. This workshop will be didactic in part, but will use a highly interactive format. Participants will have the opportunity to try out the techniques presented for deflecting and mastering cross-examination challenges to their experience, to their thoroughness, to their competency, and to their impartiality. The workshop will include examples of worst scenario examinations and will draw on examples from Dr. Brodsky’s recent testimony.

    Topics may include:

    Preparation for testimony, Meeting with counsel
    The direct examination, Coping with examination in depositions
    Nonverbal behaviors and communication: Gestures, voice, and posture
    Handling anxiety about testimony, Specific techniques for mastery of the witness role
    Suspicion-evoking and trust-evoking testimony, Findings from the Witness Research Lab
    Coping with Cross-Examination: General considerations, The Push-Pull, The Admit-Deny, Answer yes or no, Eye Contact, Pace and Thought, Personal Space, Negative Assertions, Damage Control
    Examples of challenging and difficult questions and answers
    Gender and attempted invasions of personal privacy on the stand, After your testimony

    • Understand the legal context in which testimony is seated
    • Describe the substantive foundations of testimony
    • Master the common anxiety and fears that are associated with testifying in court
    • Utilize meeting times with attorneys in ways that lead to better testimony
    • Appreciate the nature of nonverbal communications and improve the totality of verbal and nonverbal aspects of testimony
    • Anticipate typical patterns of cross-examination
    • Comfortably manage attorney efforts at intimidation and bullying
    • Respond appropriately when areas of lack of knowledge are tapped during cross examination
    • Manage surprise attacks, incorporate responsible and professional techniques in testimony

    On Demand Video

    Continuing Education (CE credit): 6.5 hours – watch the video, take notes, pass the test, print your certificate!
    Presenter: Stanley Brodsky, PhD
    Venue: Live Conference Presentation
    Location: San Jose, CA

  • Threat Assessment and Management Strategies: Identifying the Hunters and Howlers, Second Edition

    $77.99

    Threat Assessment and Management Strategies: Identifying the Hunters and Howlers, Second edition

    The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100 new pages of material, including several new chapters, charts, and illustrations, as well as updated cases.

    The book has been reorganized into two parts. The first part offers the authors’ current thinking on how to conduct practical and effective threat management processes. The second provides an in-depth analysis of how howlers and hunters behave and how understanding those behaviors can be used to manage each type of problem individual.

    This new edition draws on the latest research, as well as ideas and concepts from the authors’ previous books. It integrates the sum of their careers in threat management—both their individual experiences managing problem situations and their research and writing on the topic—into a single volume. As in each of their previous books, it focuses on operationally effective and practical methods for managing problem situations.

    This book also covers special issues in threat management, exploring the relationship between the law and the intimacy effect as well as different ways to identify, assess, and manage howlers and hunters. Each chapter concludes with a real-life situation analysis relevant to the subject under focus.

    Drawing upon the latest research and on the previous work of its authors, Threat Assessment and Management Strategies, Second Edition provides a complete guide to setting up successful threat management processes. It approaches the presented strategies as guidelines rather than prescriptions, emphasizing that threat managers must use their intelligence and originality to modify strategies as necessary to suit each situation.

    2016, 259 pages

Showing 51–75 of 88 results

  • The Power of Prevention (On Demand Video Training)

    $729.95$754.95

    Threat Assessment Training

    This premium, on-demand, 18-module course offers world-class foundational education on pre-violence warning signs and risk factors; related stressors and triggers; mental disturbance and its relationship to targeted violence; personal grievance and ideological motivations; signs of potential imminent violence; gathering information, understanding social media impact, and avoiding various critical biases. This course will also teach practical threat assessment and management, offering instruction on the full life cycle of a case including intake, triage, critical threat assessment stages, changing levels of concern, full-spectrum threat management strategies, and responsible follow-up including case closure.

    *****EMAIL US AT INFO@SPECIALIZEDTRAINING.COM TO INQUIRE ABOUT OUR GROUP DISCOUNT*****

    Presenters: Reid Meloy, PhD, ABPP      and     Molly Amman, JD

    Bundle 1 (1 hour CE) contains:

    • Module 1 – Introduction: The course introduction outlines the course content, provides some fundamental concepts, and discusses recent case law in threat assessment and management.
    • Module 2 – Understanding Planned Violence: This module explains different modes of violence and how they intersect with biology and behavior, offers explanatory case examples, and addresses threats versus violence.

    Bundle 2 (1 hour CE) contains:

    • Module 3 – Risk Factors for Violence: Gain an in-depth understanding of how risk factors can create a future vulnerability to considering planned violence, with research findings and case examples.

    Bundle 3 (1.5 hours CE) contains:

    • Module 4 – Proximal Warning Behaviors and the Pathway to Violence: Learn, in compelling detail, about the patterns of behavior that suggest accelerating risk toward planned violence. Filled with real world case examples, current research, and in-depth analysis.

    Bundle 4 (1 hour CE) contains:

    • Module 5 – Signs of Imminence: This succinct module describes those behaviors which appear to be associated with a short period before violence could unfold.
    • Module 6 – Stressors and Triggers: Events or circumstances with the potential to degrade a person of concern’s coping abilities are described, along with a framework for analysis and case example
    • Module 7 – Threat Reducing Factors: Facts, circumstances, or even personal attributes of the person of concern that may operate to reduce violence potential are described and explained.
    • Module 8 – Violence Risk and Threat Assessment Instruments: These important tools are categorized and explained, along with examples in each category and a source for additional information.
    • Module 9 – Deciding on a Level of Concern: This module offers a framework by which the threat assessor may consistently assess and label cases, which is a key to effective communication and appropriate action.

    Bundle 5 (.75 hour CE) contains:

    • Module 10 – Stalking and Intimate Partner Violence: Unparalleled analysis and explanation of stalkers, stalking behaviors and violence, and key aspects of intimate partner violence for threat assessors.

    Bundle 6 (.5 hour CE) contains:

    • Module 11 – Avoiding Cognitive Biases That Derail Assessment and Management: Different forms of bias are revealed and explained, to enable threat assessors to avoid them in case work.

    Bundle 7 (1.5 hours CE) contains:

    • Module 12 – Information Gathering and Interviewing: An important discussion of data in threat assessment investigations and how this concept differs from other types of investigations. Special tips for interviewing the subject of inquiry.
    • Module 13 – Social Media’s Place in Threat Assessment: Describes the ways in which social media relates to on-the-ground behavior, plus key psychological and behavioral concepts.

    Bundle 8 (1 hour CE) contains:

    • Module 14 – Threat Management: Informed by the assessment, threat management is the key to altering the course of events. This module describes the threat management spectrum of options, illustrated by numerous case examples. Particular attention is paid to safe  and future-oriented terminations, expulsions, and long suspensions..

    Bundle 9 (.5 hour CE) contains:

    • Module 15 – Special Considerations in the K-12 Environment: Special characteristics of the K-12 environment are discussed, along with zero tolerance policies, K-12 threat assessment structured professional judgment tools, and attachment and its relationship to targeted violence by juveniles. Particular attention is paid to safe  and future-oriented terminations, expulsions, and long suspensions.

    Bundle 10 (1.25 hours CE) contains:

    • Module 16 – Threat Assessment Mechanics: This crucial module describes each step—and the reasons for them—in the lifecycle of a threat assessment and management case, from intake to case closure.
    • Module 17 – Setting Up your Program and Threat Assessment Team: This module is for anyone responsible for writing or evaluating workplace violence prevention policy, establishing a program, or setting up a threat assessment team. It also addresses maximizing bystander reporting of concerning behavior
    • Module 18 – Overview of the Threat Assessment and Management Arc: Review of the threat assessment and management process, discussion of resources for networking, knowledge and training, and final thoughts of the presenters.

    CLICK HERE to purchase individual bundles – with APA Continuing Education credits

    CLICK HERE to purchase individual bundles – without CEs

  • Preventing and Managing Violence in Organizations – Workplace Violence, Targeted Violence, and Active Shooters

    $69.99

    Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue.  As such, the book’s objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach.

    The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager.

    While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization’s system of management and all its activities and functions.  The “Introduction” section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization’s overall business management strategy. The “Framework” section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The “Tactics and Control Measures” section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events.  For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach.

    Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization’s day-to-day activities—as an integral part of these activities—rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

    Dr. Marc H. Siegel

  • Preventing Domestic Homicides

    $84.99

    Preventing Domestic Homicides: Lessons Learned from Tragedies focuses on the diverse nature of domestic homicides and what has been learned about the most effective prevention strategies from emerging research and the work of domestic violence death review committees in Canada, the US, the UK, NZ and AU. Each chapter focuses on different populations—specifically older women, youth dating relationships, indigenous women, immigrant and refugee populations, rural/remote communities, same-sex relationships, homicides with police & military, domestic homicide in the workplace, and children killed in the context of domestic violence. Topics cover current research, risk factors, and include case studies from domestic homicide review committees.

    Cases are summarized regarding major themes and recommendations, such as public awareness, professional training, risk assessment, intervention and collaboration amongst service systems. Written for academic and domestic violence researchers in sociology, criminology, psychology and psychiatry by global contributors with on-the-ground domestic homicide experience.

    1st Edition – March 24, 2020

  • The Psychology of Insider Risk – Detection, Investigation and Case Management

    $54.99

    Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. After a career in counterterrorism, Dr. Shaw spent the last 20 years concentrating on insiders—employees who commit espionage, sabotage, intellectual property theft, present risks of harm to self and others, and other workplace risks, especially those influenced by mental health conditions.

    Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personal characteristics, resources and support that can mitigate these risks. Dr. Shaw also examines specific risk accelerators like subject disgruntlement, personality disorders and problematic organizational responses that can escalate the speed and intensity of insider risks. The investigative applications, strengths and weaknesses of the CPIR are also considered.

    This work also describes the behavioral science tools deployed in insider investigations, especially those designed to locate and understand persons at-risk and help organizations intervene to avoid escalation or manage potential damage. Case examples are drawn from intelligence community, corporate and law enforcement investigations. Specific insider cases where the use of behavioral science tools is described in detail include leaks, anonymous threats, erotomania, hacking, violence risk, mass destruction threats and espionage.

    The work closes with consideration of the many current and future challenges insider risk professionals face. These include the challenge of recognizing suicidal ideation as a gateway to other forms of insider risk, understanding when subject therapy will, and will not reduce risk, deciphering belief in conspiracy theory from significant extremist risk, appreciating insider threats to our elections and the unique challenges posed when the insider is a leader.

    Eric Shaw, PhD

  • The Psychology of Stalking

    $20.00$69.99

    8 CE hours available

    Specialized Training Services is approved by the
    American Psychological Association to sponsor
    continuing education for psychologists.
    Specialized Training Services retains
    responsibility for this program.

  • The Psychology of Stalking: Clinical and Forensic Perspectives

    $49.99

    327 pages, published in 1998.
    J. Reid Meloy

    “The Psychology of Stalking is the first Scholarly book on stalking ever published. Virtually every serious writer and researcher in this area of criminal psychopathology has contributed to this comprehensive resource. These chapters explore stalking from social, psychiatric, psychological, legal and behavioral perspectives. New thinking and data are presented on threats, pursuit characteristics, psychiatric diagnosis, offender-victim typologies, cyberstalking, false victimization syndrome, erotmania, stalking and domestic violence, stalking of public figures, and many other aspects of stalking. This landmark text is of interest to both professionals and other thoughtful individuals who recognize the serious nature of this ominous social behavior at the end of the millennium.” Excerpt taken from bookcover

    “The Psychology of Stalking is a comprehensive, up to date, scholarly review that includes everything from Shakespeare’s stalking sonnets to cyberstalking. It provides a wealth of useful information. The book is must reading for law enforcement and mental health professionals that deal with stalkers.” Phillip J. Resnick, M.D. Director of Forensic Psychiatry, Case Western Reserve University

    “J. Reid Meloy and his colleagues have blended clinical insight, scientific rigor, and legal precision to produce the one indispensable book on stalking. Encyclopedic in coverage and gracefully written, this work will have enormous influence on practice, policy, and research. With the publication of The Psychology of Stalking: Clinical and Forensic Perspectives, the study of stalking has come of age.” John Monahan, Ph.D. University of Virginia School of Law

  • Reading Red Flags, Separating Danger from Drama and Desire, Wendy Patrick, JD, MDiv, PhD

    $49.99$69.99

    Reading Red Flags is now available. This is an on-demand video that is sold with or without CE units.

    • Career prosecutor (over 110 jury trials)
    • Association of Threat Assessment Professionals Certified Threat Manager
    • Author of Red Flags: How to Spot Frenemies, Underminers, and Ruthless People
    • Co-author of New York Times bestseller Reading People (revision)
    • Author of Why Bad Looks Good: Biblical Wisdom to Make Smart Choices
    • Psychology Today columnist: Why Bad Looks Good
    • Host, Today with Dr. Wendy KCBQ radio
  • Red Flags: Frenemies, Underminers, and Ruthless People

    $15.99

    We all wear emotional blinders: keeping society moving smoothly depends on it. But when you absolutely must rely on another person, you have to be able to assess them objectively. Red Flags will train you to spot deceptive or dangerous people.

    Learn how to:
    – Avoid selective attention
    – Observe people over time (bad guys rely on first impressions)
    – Ask questions: most people’s favorite topic is themselves
    – Cybersleuth to verify information and track down inconsistencies

    If you want to know whether a potential boyfriend is trustworthy, are hiring employees, selecting a child care worker, or have partners in business, you need RED FLAGS.

    Wendy L. Patrick, Ph.D.

    Paperback
    Published: 05-17-16
    Pages: 320

  • The Risks Within: Preventing & Managing Workplace Violence

    $34.99

    156 pages, published in 2022.
    Marc Mcelhaney, Ph.D.

    The term, “workplace violence” has become a frightful one, suggesting the seemingly sudden emergence of a crazed “active shooter”, resulting in multiple casualties. Dr. McElhaney, a psychological specialist in the prevention and management of high-risk behavior, urges us to reconsider our preconceptions and stereotypes if we are ever going to be able to successfully prevent these often-fatal events. Relying on real examples from his files, he demonstrates that these at-risk individuals always exist among us, often unrecognized, but for a variety of reasons and circumstances, have come to pose a danger to those around them. He introduces us specifically to the events surrounding Maria, Patrick, and Neil, otherwise “normal” individuals in most circumstances, but who had encountered a perfect storm of events in their lives that, without early recognition and intervention, could have resulted in violent consequences. In the second half of this book, the author provides us with a step-by-step guide to establishing a process that enables us to identify and safely manage these behaviors before they result in dangerous and fatal consequences. This is a critical read for any manager – or for any of us for that matter.

  • Schizoid, Schizotypal, and Paranoid Personality Disorders (3.5 Hours)

    $29.99$49.99

    The DSM-IV-TR personality disorders (PDs) classified in Cluster A are referred to as the “odd/eccentric” group of PDs. These Axis II disorders are considered to be on the “schizophrenia spectrum” along with the different categories of schizophrenia on Axis I. Patients with schizoid PD resemble those in the early stages of schizophrenia but, unlike those in such an early, prodromal phase of the Axis I condition, do not go on to develop schizophrenia. Schizotypal PD most closely fits the “odd/eccentric” label. Patients with schizotypal PD and Paranoid PD are thought to be genetically predisposed to develop these conditions, yet less vulnerable than those predisposed to develop schizophrenia itself. Good data about the prevalence of these disorders are not available as patients with these disorders are not generally treatment seeking. As is characteristic of all PDs, the diagnostic features of the Cluster A disorders are relatively stable over time, although under stress, peaks of more disabling pathology may occur. Comorbidity with other disorders (Axis I and II) is common. State-of-the-art assessment and treatment of the Cluster A PDs will be presented in this half day program.

    Workshop Content

    • DSM-IV-TR diagnosis of the Cluster A PDs
    • How to differentiate Cluster A PDs from Axis I psychotic disorders
    • Common patterns of comorbidity
    • A vulnerability/stress model for the development of these personality disorders
    • Treatment strategies to deal with the high levels of mistrust typical of these patients
    • Countertransference difficulties in working with Cluster A patients
    • Symptom-targeted psychopharmacological strategies
    • An integrated psychotherapy/psychopharmacology approach

    On Demand Video

    Continuing Education (CE credit): 3.5 hours– watch the video, take notes, pass the test, print your certificate!

    Presenter: Philip Erdberg, Ph.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

  • School Resource Bundle

    $76.99
    This special, discounted price is for the following four exceptional school-based resources:
    • Assessing Student Threats, Van Dreal
    • Youth Violence Prevention, Van Dreal
    • School Violence Threat Management, Mohandie
    • Threats in Schools, A Practical Guide for Managing Violence, McCann
  • School Violence Threat Management

    $4.99

    230 pages, published 11/00. Updated 02/02 for second printing.

    Section One: Overview 1. Introduction to School Violence

    Section Two: School Violence Threat Assessment 2. Threat Assessment: Warning Signs 3. Threat Assessment: Risk and Stability Factors 4. Threat Assessment: Applying the Concepts

    Section Three: School Violence Intervention 5. General Intervention Strategies 6. High Risk Case Intervention Consideration 7. Moderate/Lower Risk Case Intervention Considerations

    Section Four: School Violence Aftermath 8. Aftermath Crisis Management References Recommended Resources

     

  • School Violence Threat Management

    $20.00$25.99

    8 CE hours available

    Specialized Training Services is approved by the
    American Psychological Association to sponsor
    continuing education for psychologists.
    Specialized Training Services retains
    responsibility for this program.

  • School Violence Threat Management (3.5 Hours)

    $29.99$49.99

    Program description :

    The 21st Century has arrived with a new sense of urgency to keep our children and schools safe. The Virginia Tech tragedy reminds us that these issues can occur in universities as they have in middle and high schools. The recent deaths of students in Colorado and Pennsylvania at the hands of outside offenders highlights that students are not the only threat sources and the need exists to protect our schools from outsiders with unique and dangerous agendas. The tragic deaths of hundreds of people, many of whom were children, in a school based terrorism incident in Russia further underscores this issue. There are new dimensions of threat for school personnel, mental health, legal, and school police and security professionals to consider. This presentation will provide attendees with an overview of cutting edge information about school based threat assessment, violence prevention and intervention strategies. It will assist in understanding the unique assessment, management, criminal, and civil legal issues associated with these cases and how to reduce one’s liability in the process. The material presented will be based on over 17 years of topic-specific experience, pre/post conviction interviews and reviews of school violence perpetrators, victims, and incidents. Participants will gain practical ideas that may be applied to their own educational setting.

    Workshop Content

    Extent of the school violence problem
    Three types of potential offenders
    Warning signs and risk factors associated with school violence
    Improving early warning detection systems
    Applied threat assessment principles
    Interview strategies for potential offenders
    Systemic and multidisciplinary aspects of school based threat management-integrating mental health, law enforcement, and school resources
    Perpetrator’s stories from videotaped interviews and other sources

    This video is from a live conference presentation and is largely unedited. In some cases you may not hear a question asked by a participant however, in most cases the presenter will repeat the question.  Video resolution is very good but not as high as possible to decrease downloading time. Best viewing is done with a mid-sized screen as a full screen will lose some of its resolution. We recommend you take notes just as you would if you were in a live conference as those notes will be helpful to learning and will come in handy for the test.

    On Demand Video

    Continuing Education (CE credit): 3.5 hours– watch the video, pass the test, print your certificate!

    Presenter: Kris Mohandie, Ph.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

     

  • Schools at Risk: Managing Bullying, Gangs and Violent Females (3.5 Hours)

    $29.99$49.99

    Maintaining a safe school environment means managing bullying, gangs, violent males and increasing female violence. Problems associated with bullying, gangs, and violence are well documented in their adverse affects on a positive learning environment. Nevertheless, many successful programs have been implemented nationwide to address these issues. Participants will be presented with overview of how these behaviors impact the social environment of the school, attendance and academic performance of students. State of the art, research-based prevention and intervention approaches will be presented in a “nuts and bolts” format. Attendees will be able to follow and implement five planning steps to improve school climate, attendance and academic achievement. Many of these interventions are valid for those working with youth in a non-school environment as well. School site teams will be able to personalize the information directly to their school site.

    The Impact of Bullying, Gangs and Female Aggression in Schools
    Early Warning Signs
    Gang Behaviors and Intervention Strategies
    How to “Bully Proof” the School Environment
    Recognize and Intervene with Aggressive and Potentially Violent Females

    On Demand Video

    Continuing Education (CE credit): 3.5 hours)– watch the video, pass the test, print your certificate!

    Presenter: Wayne Sakamoto

    Venue: Live Conference Presentation

    Location: San Diego, CA

    This video is designed to play on a normal cable or DSL broadband internet connection. Dial up connections will probably not load this video quickly enough for proper viewing. Video resolution is very good but not as high as possible to decrease downloading time. Best viewing is done with a mid-sized screen as a full screen will lose some of its resolution.

    This video is from a live conference presentation and is largely unedited. In some cases you may not hear a question asked by a participant however, in most cases the presenter will repeat the question.

    We recommend you take notes just as you would if you were in a live conference as those notes will be helpful to learning and will come in handy for the test which follows.

  • The Scientific Pursuit of Stalking

    $25.00$29.99

    10 CE hours available

    Specialized Training Services is approved by the
    American Psychological Association to sponsor
    continuing education for psychologists.
    Specialized Training Services retains
    responsibility for this program.

  • The Scientific Pursuit of Stalking

    $4.99

    August, 2006, 374 pages.

    Dr. Reid Meloy’s ninth book provides his vast research on stalking and obsessional following and summarizes the implications of that research. Framed with a beautifully haunting cover painting by Konstantin Dikovsky titled, “The Hidden,” Dr. Meloy has produced the most comprehensive chronology of what we know about stalking yet published. It is a must for every forensic library and any professional working in this area.

    From the Foreword
    “Stalking is neither new nor rare. Examples of intrusive behaviors that would now be identified as stalking have been described for centuries, but in the late 1980s these behaviors finally found a name. Initially, the American media applied the evocative term “stalkers” to those who pursued the famous. This label gripped the public’s imagination and rapidly propelled stalking into the public’s consciousness. It exposed a once obscure form of social deviance and provided the impetus for its criminalization.”

    Though not a new behavior, stalking may well be more prevalent in a new millennium characterized by…”

    Table of Contents

    Foreword
    1. Unrequited Love and the Wish to Kill
    2. Nondelusional or Borderline Erotomania: A Disagreement
    3. A Case Study: Revisiting the Rorschach of Sirhan Sirhan
    4. Demographic and Clinical Comparison of Obsessional Followers and Offenders with Mental Disorders
    5. A Case Study: Erotomania in a Shi’ite Islamic Male
    6. Stalking (Obsessional Following): A Review of Some Preliminary Studies
    7. A Case Study: “All I wanted was to love you…”
    8. The Clinical Risk Management of Stalking: “Someone is watching over me…”
    9. A Comparative Study of Psychotic and Nonpsychotic Stalking
    10. Domestic Protection Orders and the Prediction of Subsequent Criminality and Violence Toward Protectees
    11. Stalking: An Old Behavior, A New Crime
    12. A Case Study: Erotomania, Triangulation, and Homicide
    13. A Replication Study of Obsessional Followers and Offenders with Mental Disorders
    14. Risk Factors for Violence Among Stalkers
    15. Stalking and Violence
    16. Communicated Threats and Violence Toward Public and Private Targets: Discerning Differences Among Those Who Stalk and Attack
    17. Pathologies of Attachment, Violence, and Criminality
    18. Stalking, Threatening, and Harassing Behavior by Patients – The Risk Management Response
    19. When Stalkers Become Violent: The Threat to Public Figures and Private Lives
    20. Female Stalkers and Their Victims
    21. A Research Review of Public Figure Threats, Approaches, Attacks, and Assassinations in the United States
    22. Some Thoughts on the Neurobiology of Stalking
    Acknowledgements

  • Snakes in Suits: Understanding and Surviving the Psychopaths in Your Office

    $29.99

    Revised and updated with the latest scientific research and case studies, the business classic that offers a revealing looks at psychopaths in the workplace – how to spot their destructive behavior and stop them from creating chaos in the modern corporate organization. Snakes in Suits: When Psychopaths go to Work Paul Babiak, Ph.D & Robert…

  • Stalking, Threatening, and Attacking Public Figures [backordered]

    $74.99

    Published 2008. 474 pages.

    Public figures require attention, whether from a constituency who votes them in or out of office, shareholders who decide their economic benefit to the corporation, or fans who judge their performances. However, on the periphery of this normal attention resides a very real risk; that of a much smaller group of individuals who lack the ability to discriminate between their own private fantasies and the figure’s public behavior. They may be personally insulted by perceived betrayal, fanatically in love due to a perceived affectionate or sexual invitation, or simply preoccupied with the daily life of the public figure. Such individuals may fixate and do nothing more. Others communicate or approach in a disturbing way. A few will threaten. And on rare occasions, one will breach the public figure’s security perimeter and attack.

    Stalking, Threatening, and Attacking Public Figures is a comprehensive survey of the current knowledge about stalking, violence risk, and threat management towards public figures. With contributions from forensic psychologists and psychiatrists, clinicians, researchers, attorneys, profilers, and current and former law enforcement enforcement professionals, this book is the first of its kind, international in scope, and rich in both depth and complexity.

    The book is divided into three sections which, in turn, focus upon defining, explaining, and risk managing this increasingly complex global reality. Chapters include detailed case studies, analyses of quantitative data, reflections from attachment theory and psychoanalytic thought, descriptions of law enforcement and protective organization activities, mental health and psychiatric categorizations and understandings, consideration of risk assessment models and variables, victim perspectives, and others.

  • The Stop Child Molestation Book

    $4.99

    Published in 2001, 363 pages

    Contents
    1. The Stop Child Molestation Plan: Into a New Era
    2. Childhood Beginnings of the Desire to Molest
    3. Child Molesters by Accident
    4. Victims of Molestation Who Become Molesters
    5. A Child Molester in the Family: Father Molests Daughter
    6. The Magic of Early Diagnosis
    7. Treatment: The Medicines and the Therapies
    8. How Many Children can you Save?
    Appendices

  • Suicide by Cop

    $14.99

    Originally presented live in February, 2008, this brief training provides an overview of the phenomenon known as Suicide by Cop

    Running time: Approximately 35 minutes

  • Suicide Risk Assessment in Youth and Young Adults (3.5 Hours)

    $29.99$49.99

    Program description from brochure:

    It was well known that many examples of youth-perpetrated catastrophic violence were carried out by highly disturbed young men who were fundamentally suicidal. In many such cases, the suicidal risk of youth perpetrators is well known to parents, teachers, administrators, law enforcement personnel, and mental health professionals, yet tragic outcomes still occur. This presentation will offer practical information on the assessment of suicide risk, the interplay between suicidal and homicidal behaviors and a full range of intervention strategies suitable to a variety of settings. Using a lively case example approach, this presentation will provide critical information about how suicidal youth think, feel, and behave. Contemporary issues such as the influence of media, the role of internet, and peer influences will also be considered. Bottom-line, this training will enable participants to better recognize who is at risk for suicide and what can realistically be done to intervene and save lives.

    On Demand Video

    Continuing Education (CE credit): 3.5 hours, watch the video, pass the test, print your certificate!
    Presenter: David Jobes, Ph.D.
    Venue: Live Conference Presentation
    Location: San Diego, CA

    This video is designed to play on a normal cable or DSL broadband internet connection. Dial up connections will probably not load this video quickly enough for proper viewing. Video resolution is very good but not as high as possible to decrease downloading time. Best viewing is done with a mid-sized screen as a full screen will lose some of its resolution.

    This video is from a live conference presentation and is largely unedited. In some cases you may not hear a question asked by a participant however, in most cases the presenter will repeat the question.

    We recommend you take notes just as you would if you were in a live conference as those notes will be helpful to learning and will come in handy for the test which follows.

  • Testifying in Court

    $29.99

    Stanley Brodsky, Ph.D.
    208 pages, published in 1991

    Extremely well written, Testifying in Court provides the reader with a unique perspective on providing court testimony. It serves the reader by demonstrating an alternative approach to courtroom testimony in theory, as well as in application.

  • Testifying in Court (6.5 Hours)

    $59.99$79.99

    Original Program Description:

    Testifying in court is a time of anxiety for the first time witnesses and aggressive cross-examinations are particularly stressful, even for the experienced witness. This workshop begins by presenting ways of understanding the common problems faced on the witness stand. No techniques can take the place of good knowledge and careful preparation, and the foundations of such knowledge and preparation are described. The masterful expert witness knows what to expect in direct examinations and in cross-examinations. Drawing on the professional literature, on scientific findings, and on his own experience in court, Dr. Brodsky will present pathways towards reducing anxiety on the witness stand and specific methods for dealing with the most aggressive cross-examinations. This workshop will be didactic in part, but will use a highly interactive format. Participants will have the opportunity to try out the techniques presented for deflecting and mastering cross-examination challenges to their experience, to their thoroughness, to their competency, and to their impartiality. The workshop will include examples of worst scenario examinations and will draw on examples from Dr. Brodsky’s recent testimony.

    Topics may include:

    Preparation for testimony, Meeting with counsel
    The direct examination, Coping with examination in depositions
    Nonverbal behaviors and communication: Gestures, voice, and posture
    Handling anxiety about testimony, Specific techniques for mastery of the witness role
    Suspicion-evoking and trust-evoking testimony, Findings from the Witness Research Lab
    Coping with Cross-Examination: General considerations, The Push-Pull, The Admit-Deny, Answer yes or no, Eye Contact, Pace and Thought, Personal Space, Negative Assertions, Damage Control
    Examples of challenging and difficult questions and answers
    Gender and attempted invasions of personal privacy on the stand, After your testimony

    • Understand the legal context in which testimony is seated
    • Describe the substantive foundations of testimony
    • Master the common anxiety and fears that are associated with testifying in court
    • Utilize meeting times with attorneys in ways that lead to better testimony
    • Appreciate the nature of nonverbal communications and improve the totality of verbal and nonverbal aspects of testimony
    • Anticipate typical patterns of cross-examination
    • Comfortably manage attorney efforts at intimidation and bullying
    • Respond appropriately when areas of lack of knowledge are tapped during cross examination
    • Manage surprise attacks, incorporate responsible and professional techniques in testimony

    On Demand Video

    Continuing Education (CE credit): 6.5 hours – watch the video, take notes, pass the test, print your certificate!
    Presenter: Stanley Brodsky, PhD
    Venue: Live Conference Presentation
    Location: San Jose, CA

  • Threat Assessment and Management Strategies: Identifying the Hunters and Howlers, Second Edition

    $77.99

    Threat Assessment and Management Strategies: Identifying the Hunters and Howlers, Second edition

    The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100 new pages of material, including several new chapters, charts, and illustrations, as well as updated cases.

    The book has been reorganized into two parts. The first part offers the authors’ current thinking on how to conduct practical and effective threat management processes. The second provides an in-depth analysis of how howlers and hunters behave and how understanding those behaviors can be used to manage each type of problem individual.

    This new edition draws on the latest research, as well as ideas and concepts from the authors’ previous books. It integrates the sum of their careers in threat management—both their individual experiences managing problem situations and their research and writing on the topic—into a single volume. As in each of their previous books, it focuses on operationally effective and practical methods for managing problem situations.

    This book also covers special issues in threat management, exploring the relationship between the law and the intimacy effect as well as different ways to identify, assess, and manage howlers and hunters. Each chapter concludes with a real-life situation analysis relevant to the subject under focus.

    Drawing upon the latest research and on the previous work of its authors, Threat Assessment and Management Strategies, Second Edition provides a complete guide to setting up successful threat management processes. It approaches the presented strategies as guidelines rather than prescriptions, emphasizing that threat managers must use their intelligence and originality to modify strategies as necessary to suit each situation.

    2016, 259 pages

0