[go: up one dir, main page]

Liebert et al., 2016 - Google Patents

Psychiatric Criminology: A Roadmap for Rapid Assessment

Liebert et al., 2016

Document ID
12896177841809236175
Author
Liebert J
Birnes W
et al.
Publication year

External Links

Snippet

Since the shutdown of our public psychiatry system, the seriously mentally ill are now mostly managed by public safety officers, school officials, emergency first responders and social workers with little experience in recognizing symptoms, triggers and issues. This book …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting

Similar Documents

Publication Publication Date Title
Baird-Windle et al. Targets of hatred: Anti-abortion terrorism
Nadal Queering law and order: LGBTQ communities and the criminal justice system
Maguire et al. Bodies as evidence: security, knowledge, and power
Richards Desistance from sexual offending: The role of Circles of Support and Accountability
Morewitz Death threats and violence: New research and clinical perspectives
Clark et al. Trauma: community of color exposure to the criminal justice system as an adverse childhood experience
McQuire Black Witness: The Power of Indigenous Media
Ansari British Anti-terrosism: A Modern Day Witch-hunt
Liebert et al. Suicidal mass murderers: A criminological study of why they kill
Marcus Out of breath and down to the wire: a call for constitution-focused police reform
Jacobsen et al. The truth of the error: Making identity and security through biometric discrimination
Betancourt What to do when love turns violent: A practical resource for women in abusive relationships
Maguire et al. Introduction: bodies as evidence
Abrahams et al. An overview of gender-based violence in South Africa and South African responses
Liebert et al. Psychiatric Criminology: A Roadmap for Rapid Assessment
Otey Toward improving policing in African American communities
United States. President's Commission on Law Enforcement et al. The Challenge of Crime in a Free Society: A Report
Fischer The case for Youth Police Initiative: interdependent fates and the power of peace
Welch Preventing school shootings: A public health approach to gun violence
van Wormer et al. Intimate Partner Violence
Chamblee Post-War Iraq: Prosecuting Saddam Hussein
Zurawski et al. Bodies as Evidence: Security, Knowledge, and Power
Gold Selective Persecution: The Legalization of American Fascism
Weaver The Texas Mis-step: Why the largest child removal in modern US history failed
Conner Salvaging Safe Spaces: Toward Model Standards for LGBTQ Youth-Serving Professionals Encountering Law Enforcement