The Violent Person at Work: The Ultimate Guide to Identifying Dangerous Persons
In The Violent Person @ Work, Laurence Barton, the world's leading threat assessor, outlines how to prevent, manage, and mitigate persons who may pose a threat to an organization's people and other assets. theviolentperson.com
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Anthem Press
2020
|
Ausgabe: | 1st ed |
Schlagworte: | |
Zusammenfassung: | In The Violent Person @ Work, Laurence Barton, the world's leading threat assessor, outlines how to prevent, manage, and mitigate persons who may pose a threat to an organization's people and other assets. theviolentperson.com |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (316 Seiten) |
ISBN: | 9781785272738 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048226979 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220517s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781785272738 |9 978-1-78527-273-8 | ||
035 | |a (ZDB-30-PQE)EBC6167141 | ||
035 | |a (ZDB-30-PAD)EBC6167141 | ||
035 | |a (ZDB-89-EBL)EBL6167141 | ||
035 | |a (OCoLC)1150153986 | ||
035 | |a (DE-599)BVBBV048226979 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.47299999999996 | |
100 | 1 | |a Barton, Laurence |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Violent Person at Work |b The Ultimate Guide to Identifying Dangerous Persons |
250 | |a 1st ed | ||
264 | 1 | |a London |b Anthem Press |c 2020 | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (316 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- Front Matter -- Half-title -- Title page -- Copyright information -- Dedication -- Table of Contents -- Chapters Int-9 -- Introduction -- 1 The Dynamics of Violence @ Work -- The Pathway to Violence -- 2 The Causes of Workplace Violence -- Escalation -- How Can I Learn More? -- Managing Threats After Job and Economic Losses -- 3 Separating the Employee @ Risk -- Notification -- 4 Evaluating Risk Outside the Organization -- Are Facts Enough? -- Acceleration -- "I Have Several Bombs Strapped to My Body, Ready to Go Off" -- Near Misses Are Lessons -- Who Should We Hire to Manage Threats? -- Senior Director, Workplace Violence Prevention and Threat Analysis -- Knowledge and Skills Desired -- Required -- 5 The Work Environment -- Effective Evaluation of Threats -- Learning from the Success and Failure of Others -- Mitigation: Multiple Persons -- Hidden Demons -- Eleven Derailers -- 6 Fitness for Duty Evaluations: Complex and Imperative for At-Risk Employees -- Knowing What to Ask -- Why These Evaluations Matter -- The Role of Personality Tests -- A Fitness Evaluator Answers Your Questions -- 7 Behind the Smiles: Hidden Demons and Employees -- A Case Study in Deception -- The Sociopath @ Work -- Threat Assessment Unmasked -- Intuition and Bias -- Genetics versus Environment -- Adoption -- Twins -- Animals -- Personality and Engagement -- Finances -- 8 Extremism @ Work -- Detecting the Extremist -- 9 Clinical Dynamics of Disruptive Employees -- Emergency Department Process -- The ESI -- Interview Techniques -- Violence in Healthcare Settings -- When a Physician Kills -- Assessing Homicidal Ideation in Employees -- Common Indicators for Violent Behavior -- Substance Abuse at Work -- Stress in Health Settings -- Family Dynamics -- Summary -- Endmatter -- Author Q & -- A -- Urgent and Delivered by Hand -- Threat Assessment Guide | |
505 | 8 | |a Processing a Threat -- Understanding the subject -- During an in-depth assessment, it is important to -- Appendix I -- Appendix II -- Appendix III -- Resources to Consider during Review -- Questions to Consider -- Threat Management System -- Threats -- Incident Type You Are Reporting -- Describe the Threat -- Risk Factors -- After Suicide Impacts a Workplace -- Ten Action Steps after a Suicide -- Immediate and acute phase -- Short-term phase: recovery -- Longer term phase of reconstructing -- Preventing Another Suicide @ Work -- Should You Honor a Suicidal Victim? -- Sample Notification to an Impacted Work Team if Family Concurs -- Sample Media Announcement if High-Profile Tragedy -- Key Words for the Threat and Crisis Team to Understand -- The FBI and Threat Interpretation -- Remain Neutral on Gender -- Unintentional Glorification of Events -- Random Attacks -- Why Do Some with Key Information Remain Silent? -- When Should Authorities Be Contacted? -- Overcoming a Natural Decision to "Wait it Out" -- Understand the Intimacy Effect -- There Are No "Usual Suspects" in Workplace Violence -- Noteworthy Motives of Attackers -- Mental Illness Is a Factor, but Only One Factor -- Clinicians Often Miss the Mark -- Who Is Most Likely to Target Others for Violence? -- Many Offenders Devote Time before Targeting Victims -- Many Offenders Have Studied Violence Over Time -- Whether in Social Networking, in Person or Elsewhere, Pay Attention to Threats -- What Signals Might Emerge before Suicide or Killing Others? -- Tell the Person You Are Conducting a "Review," Not a "Threat Assessment" -- Many Aggressors Kill Family Members and Caregivers -- What Data Sources Can Be Helpful with a Work Threat Assessment? -- Law Enforcement and Military -- Education and Workplace -- Medical and Mental Health -- Expressions -- Life and Relationships -- Other | |
505 | 8 | |a Why Nonwork Issues Matter When a Person Makes a Threat at Work -- Social Media Plays a Role of Comfort-and Violent Inspiration for Some -- Accountability in Managing a Case Is Essential at All Times -- Threat Mitigation Is Not Static -- Seeking Court Orders Must Be Carefully Deliberated -- Hospitalizing an Aggressor Addresses a Threat for a Limited Time -- Reducing Risk Begins with Trust and Dignity -- Understand Tarasoff when You Are Warned about Potential Harm -- Questions to Ponder before Contacting a Family Member -- When Our Threat Team Convenes, What Should Be Documented? -- Use This Model when Assessing Levels of Concern -- Level of Concern: Low -- Communications of concern -- Persons of Concern -- Level of Concern: Moderate -- Communication of Concern -- Persons of Concern -- Level of Concern: Elevated -- Communications of Concern -- Persons of Concern -- Level of Concern: High -- Communication of Concern -- Persons of concern -- Indications of Potential Imminence -- Communication of Concern -- Persons of Concern -- What Warning Signs Are of Most Concern? -- Final Thought -- About The Author -- Inside Flap -- Back_cover | |
520 | |a In The Violent Person @ Work, Laurence Barton, the world's leading threat assessor, outlines how to prevent, manage, and mitigate persons who may pose a threat to an organization's people and other assets. theviolentperson.com | ||
650 | 4 | |a Violence in the workplace | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Barton, Laurence |t The Violent Person at Work |d London : Anthem Press,c2020 |z 9781785272721 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033607709 |
Datensatz im Suchindex
_version_ | 1804184009508388864 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Barton, Laurence |
author_facet | Barton, Laurence |
author_role | aut |
author_sort | Barton, Laurence |
author_variant | l b lb |
building | Verbundindex |
bvnumber | BV048226979 |
collection | ZDB-30-PQE |
contents | Cover -- Front Matter -- Half-title -- Title page -- Copyright information -- Dedication -- Table of Contents -- Chapters Int-9 -- Introduction -- 1 The Dynamics of Violence @ Work -- The Pathway to Violence -- 2 The Causes of Workplace Violence -- Escalation -- How Can I Learn More? -- Managing Threats After Job and Economic Losses -- 3 Separating the Employee @ Risk -- Notification -- 4 Evaluating Risk Outside the Organization -- Are Facts Enough? -- Acceleration -- "I Have Several Bombs Strapped to My Body, Ready to Go Off" -- Near Misses Are Lessons -- Who Should We Hire to Manage Threats? -- Senior Director, Workplace Violence Prevention and Threat Analysis -- Knowledge and Skills Desired -- Required -- 5 The Work Environment -- Effective Evaluation of Threats -- Learning from the Success and Failure of Others -- Mitigation: Multiple Persons -- Hidden Demons -- Eleven Derailers -- 6 Fitness for Duty Evaluations: Complex and Imperative for At-Risk Employees -- Knowing What to Ask -- Why These Evaluations Matter -- The Role of Personality Tests -- A Fitness Evaluator Answers Your Questions -- 7 Behind the Smiles: Hidden Demons and Employees -- A Case Study in Deception -- The Sociopath @ Work -- Threat Assessment Unmasked -- Intuition and Bias -- Genetics versus Environment -- Adoption -- Twins -- Animals -- Personality and Engagement -- Finances -- 8 Extremism @ Work -- Detecting the Extremist -- 9 Clinical Dynamics of Disruptive Employees -- Emergency Department Process -- The ESI -- Interview Techniques -- Violence in Healthcare Settings -- When a Physician Kills -- Assessing Homicidal Ideation in Employees -- Common Indicators for Violent Behavior -- Substance Abuse at Work -- Stress in Health Settings -- Family Dynamics -- Summary -- Endmatter -- Author Q & -- A -- Urgent and Delivered by Hand -- Threat Assessment Guide Processing a Threat -- Understanding the subject -- During an in-depth assessment, it is important to -- Appendix I -- Appendix II -- Appendix III -- Resources to Consider during Review -- Questions to Consider -- Threat Management System -- Threats -- Incident Type You Are Reporting -- Describe the Threat -- Risk Factors -- After Suicide Impacts a Workplace -- Ten Action Steps after a Suicide -- Immediate and acute phase -- Short-term phase: recovery -- Longer term phase of reconstructing -- Preventing Another Suicide @ Work -- Should You Honor a Suicidal Victim? -- Sample Notification to an Impacted Work Team if Family Concurs -- Sample Media Announcement if High-Profile Tragedy -- Key Words for the Threat and Crisis Team to Understand -- The FBI and Threat Interpretation -- Remain Neutral on Gender -- Unintentional Glorification of Events -- Random Attacks -- Why Do Some with Key Information Remain Silent? -- When Should Authorities Be Contacted? -- Overcoming a Natural Decision to "Wait it Out" -- Understand the Intimacy Effect -- There Are No "Usual Suspects" in Workplace Violence -- Noteworthy Motives of Attackers -- Mental Illness Is a Factor, but Only One Factor -- Clinicians Often Miss the Mark -- Who Is Most Likely to Target Others for Violence? -- Many Offenders Devote Time before Targeting Victims -- Many Offenders Have Studied Violence Over Time -- Whether in Social Networking, in Person or Elsewhere, Pay Attention to Threats -- What Signals Might Emerge before Suicide or Killing Others? -- Tell the Person You Are Conducting a "Review," Not a "Threat Assessment" -- Many Aggressors Kill Family Members and Caregivers -- What Data Sources Can Be Helpful with a Work Threat Assessment? -- Law Enforcement and Military -- Education and Workplace -- Medical and Mental Health -- Expressions -- Life and Relationships -- Other Why Nonwork Issues Matter When a Person Makes a Threat at Work -- Social Media Plays a Role of Comfort-and Violent Inspiration for Some -- Accountability in Managing a Case Is Essential at All Times -- Threat Mitigation Is Not Static -- Seeking Court Orders Must Be Carefully Deliberated -- Hospitalizing an Aggressor Addresses a Threat for a Limited Time -- Reducing Risk Begins with Trust and Dignity -- Understand Tarasoff when You Are Warned about Potential Harm -- Questions to Ponder before Contacting a Family Member -- When Our Threat Team Convenes, What Should Be Documented? -- Use This Model when Assessing Levels of Concern -- Level of Concern: Low -- Communications of concern -- Persons of Concern -- Level of Concern: Moderate -- Communication of Concern -- Persons of Concern -- Level of Concern: Elevated -- Communications of Concern -- Persons of Concern -- Level of Concern: High -- Communication of Concern -- Persons of concern -- Indications of Potential Imminence -- Communication of Concern -- Persons of Concern -- What Warning Signs Are of Most Concern? -- Final Thought -- About The Author -- Inside Flap -- Back_cover |
ctrlnum | (ZDB-30-PQE)EBC6167141 (ZDB-30-PAD)EBC6167141 (ZDB-89-EBL)EBL6167141 (OCoLC)1150153986 (DE-599)BVBBV048226979 |
dewey-full | 658.47299999999996 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.47299999999996 |
dewey-search | 658.47299999999996 |
dewey-sort | 3658.47299999999996 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06388nmm a2200409zc 4500</leader><controlfield tag="001">BV048226979</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220517s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785272738</subfield><subfield code="9">978-1-78527-273-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6167141</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6167141</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6167141</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1150153986</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048226979</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.47299999999996</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Barton, Laurence</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Violent Person at Work</subfield><subfield code="b">The Ultimate Guide to Identifying Dangerous Persons</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Anthem Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (316 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Front Matter -- Half-title -- Title page -- Copyright information -- Dedication -- Table of Contents -- Chapters Int-9 -- Introduction -- 1 The Dynamics of Violence @ Work -- The Pathway to Violence -- 2 The Causes of Workplace Violence -- Escalation -- How Can I Learn More? -- Managing Threats After Job and Economic Losses -- 3 Separating the Employee @ Risk -- Notification -- 4 Evaluating Risk Outside the Organization -- Are Facts Enough? -- Acceleration -- "I Have Several Bombs Strapped to My Body, Ready to Go Off" -- Near Misses Are Lessons -- Who Should We Hire to Manage Threats? -- Senior Director, Workplace Violence Prevention and Threat Analysis -- Knowledge and Skills Desired -- Required -- 5 The Work Environment -- Effective Evaluation of Threats -- Learning from the Success and Failure of Others -- Mitigation: Multiple Persons -- Hidden Demons -- Eleven Derailers -- 6 Fitness for Duty Evaluations: Complex and Imperative for At-Risk Employees -- Knowing What to Ask -- Why These Evaluations Matter -- The Role of Personality Tests -- A Fitness Evaluator Answers Your Questions -- 7 Behind the Smiles: Hidden Demons and Employees -- A Case Study in Deception -- The Sociopath @ Work -- Threat Assessment Unmasked -- Intuition and Bias -- Genetics versus Environment -- Adoption -- Twins -- Animals -- Personality and Engagement -- Finances -- 8 Extremism @ Work -- Detecting the Extremist -- 9 Clinical Dynamics of Disruptive Employees -- Emergency Department Process -- The ESI -- Interview Techniques -- Violence in Healthcare Settings -- When a Physician Kills -- Assessing Homicidal Ideation in Employees -- Common Indicators for Violent Behavior -- Substance Abuse at Work -- Stress in Health Settings -- Family Dynamics -- Summary -- Endmatter -- Author Q &amp -- A -- Urgent and Delivered by Hand -- Threat Assessment Guide</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Processing a Threat -- Understanding the subject -- During an in-depth assessment, it is important to -- Appendix I -- Appendix II -- Appendix III -- Resources to Consider during Review -- Questions to Consider -- Threat Management System -- Threats -- Incident Type You Are Reporting -- Describe the Threat -- Risk Factors -- After Suicide Impacts a Workplace -- Ten Action Steps after a Suicide -- Immediate and acute phase -- Short-term phase: recovery -- Longer term phase of reconstructing -- Preventing Another Suicide @ Work -- Should You Honor a Suicidal Victim? -- Sample Notification to an Impacted Work Team if Family Concurs -- Sample Media Announcement if High-Profile Tragedy -- Key Words for the Threat and Crisis Team to Understand -- The FBI and Threat Interpretation -- Remain Neutral on Gender -- Unintentional Glorification of Events -- Random Attacks -- Why Do Some with Key Information Remain Silent? -- When Should Authorities Be Contacted? -- Overcoming a Natural Decision to "Wait it Out" -- Understand the Intimacy Effect -- There Are No "Usual Suspects" in Workplace Violence -- Noteworthy Motives of Attackers -- Mental Illness Is a Factor, but Only One Factor -- Clinicians Often Miss the Mark -- Who Is Most Likely to Target Others for Violence? -- Many Offenders Devote Time before Targeting Victims -- Many Offenders Have Studied Violence Over Time -- Whether in Social Networking, in Person or Elsewhere, Pay Attention to Threats -- What Signals Might Emerge before Suicide or Killing Others? -- Tell the Person You Are Conducting a "Review," Not a "Threat Assessment" -- Many Aggressors Kill Family Members and Caregivers -- What Data Sources Can Be Helpful with a Work Threat Assessment? -- Law Enforcement and Military -- Education and Workplace -- Medical and Mental Health -- Expressions -- Life and Relationships -- Other</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Why Nonwork Issues Matter When a Person Makes a Threat at Work -- Social Media Plays a Role of Comfort-and Violent Inspiration for Some -- Accountability in Managing a Case Is Essential at All Times -- Threat Mitigation Is Not Static -- Seeking Court Orders Must Be Carefully Deliberated -- Hospitalizing an Aggressor Addresses a Threat for a Limited Time -- Reducing Risk Begins with Trust and Dignity -- Understand Tarasoff when You Are Warned about Potential Harm -- Questions to Ponder before Contacting a Family Member -- When Our Threat Team Convenes, What Should Be Documented? -- Use This Model when Assessing Levels of Concern -- Level of Concern: Low -- Communications of concern -- Persons of Concern -- Level of Concern: Moderate -- Communication of Concern -- Persons of Concern -- Level of Concern: Elevated -- Communications of Concern -- Persons of Concern -- Level of Concern: High -- Communication of Concern -- Persons of concern -- Indications of Potential Imminence -- Communication of Concern -- Persons of Concern -- What Warning Signs Are of Most Concern? -- Final Thought -- About The Author -- Inside Flap -- Back_cover</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In The Violent Person @ Work, Laurence Barton, the world's leading threat assessor, outlines how to prevent, manage, and mitigate persons who may pose a threat to an organization's people and other assets. theviolentperson.com</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Violence in the workplace</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Barton, Laurence</subfield><subfield code="t">The Violent Person at Work</subfield><subfield code="d">London : Anthem Press,c2020</subfield><subfield code="z">9781785272721</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033607709</subfield></datafield></record></collection> |
id | DE-604.BV048226979 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:45Z |
indexdate | 2024-07-10T09:32:31Z |
institution | BVB |
isbn | 9781785272738 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033607709 |
oclc_num | 1150153986 |
open_access_boolean | |
physical | 1 Online-Ressource (316 Seiten) |
psigel | ZDB-30-PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Anthem Press |
record_format | marc |
spelling | Barton, Laurence Verfasser aut The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons 1st ed London Anthem Press 2020 ©2020 1 Online-Ressource (316 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Cover -- Front Matter -- Half-title -- Title page -- Copyright information -- Dedication -- Table of Contents -- Chapters Int-9 -- Introduction -- 1 The Dynamics of Violence @ Work -- The Pathway to Violence -- 2 The Causes of Workplace Violence -- Escalation -- How Can I Learn More? -- Managing Threats After Job and Economic Losses -- 3 Separating the Employee @ Risk -- Notification -- 4 Evaluating Risk Outside the Organization -- Are Facts Enough? -- Acceleration -- "I Have Several Bombs Strapped to My Body, Ready to Go Off" -- Near Misses Are Lessons -- Who Should We Hire to Manage Threats? -- Senior Director, Workplace Violence Prevention and Threat Analysis -- Knowledge and Skills Desired -- Required -- 5 The Work Environment -- Effective Evaluation of Threats -- Learning from the Success and Failure of Others -- Mitigation: Multiple Persons -- Hidden Demons -- Eleven Derailers -- 6 Fitness for Duty Evaluations: Complex and Imperative for At-Risk Employees -- Knowing What to Ask -- Why These Evaluations Matter -- The Role of Personality Tests -- A Fitness Evaluator Answers Your Questions -- 7 Behind the Smiles: Hidden Demons and Employees -- A Case Study in Deception -- The Sociopath @ Work -- Threat Assessment Unmasked -- Intuition and Bias -- Genetics versus Environment -- Adoption -- Twins -- Animals -- Personality and Engagement -- Finances -- 8 Extremism @ Work -- Detecting the Extremist -- 9 Clinical Dynamics of Disruptive Employees -- Emergency Department Process -- The ESI -- Interview Techniques -- Violence in Healthcare Settings -- When a Physician Kills -- Assessing Homicidal Ideation in Employees -- Common Indicators for Violent Behavior -- Substance Abuse at Work -- Stress in Health Settings -- Family Dynamics -- Summary -- Endmatter -- Author Q & -- A -- Urgent and Delivered by Hand -- Threat Assessment Guide Processing a Threat -- Understanding the subject -- During an in-depth assessment, it is important to -- Appendix I -- Appendix II -- Appendix III -- Resources to Consider during Review -- Questions to Consider -- Threat Management System -- Threats -- Incident Type You Are Reporting -- Describe the Threat -- Risk Factors -- After Suicide Impacts a Workplace -- Ten Action Steps after a Suicide -- Immediate and acute phase -- Short-term phase: recovery -- Longer term phase of reconstructing -- Preventing Another Suicide @ Work -- Should You Honor a Suicidal Victim? -- Sample Notification to an Impacted Work Team if Family Concurs -- Sample Media Announcement if High-Profile Tragedy -- Key Words for the Threat and Crisis Team to Understand -- The FBI and Threat Interpretation -- Remain Neutral on Gender -- Unintentional Glorification of Events -- Random Attacks -- Why Do Some with Key Information Remain Silent? -- When Should Authorities Be Contacted? -- Overcoming a Natural Decision to "Wait it Out" -- Understand the Intimacy Effect -- There Are No "Usual Suspects" in Workplace Violence -- Noteworthy Motives of Attackers -- Mental Illness Is a Factor, but Only One Factor -- Clinicians Often Miss the Mark -- Who Is Most Likely to Target Others for Violence? -- Many Offenders Devote Time before Targeting Victims -- Many Offenders Have Studied Violence Over Time -- Whether in Social Networking, in Person or Elsewhere, Pay Attention to Threats -- What Signals Might Emerge before Suicide or Killing Others? -- Tell the Person You Are Conducting a "Review," Not a "Threat Assessment" -- Many Aggressors Kill Family Members and Caregivers -- What Data Sources Can Be Helpful with a Work Threat Assessment? -- Law Enforcement and Military -- Education and Workplace -- Medical and Mental Health -- Expressions -- Life and Relationships -- Other Why Nonwork Issues Matter When a Person Makes a Threat at Work -- Social Media Plays a Role of Comfort-and Violent Inspiration for Some -- Accountability in Managing a Case Is Essential at All Times -- Threat Mitigation Is Not Static -- Seeking Court Orders Must Be Carefully Deliberated -- Hospitalizing an Aggressor Addresses a Threat for a Limited Time -- Reducing Risk Begins with Trust and Dignity -- Understand Tarasoff when You Are Warned about Potential Harm -- Questions to Ponder before Contacting a Family Member -- When Our Threat Team Convenes, What Should Be Documented? -- Use This Model when Assessing Levels of Concern -- Level of Concern: Low -- Communications of concern -- Persons of Concern -- Level of Concern: Moderate -- Communication of Concern -- Persons of Concern -- Level of Concern: Elevated -- Communications of Concern -- Persons of Concern -- Level of Concern: High -- Communication of Concern -- Persons of concern -- Indications of Potential Imminence -- Communication of Concern -- Persons of Concern -- What Warning Signs Are of Most Concern? -- Final Thought -- About The Author -- Inside Flap -- Back_cover In The Violent Person @ Work, Laurence Barton, the world's leading threat assessor, outlines how to prevent, manage, and mitigate persons who may pose a threat to an organization's people and other assets. theviolentperson.com Violence in the workplace Erscheint auch als Druck-Ausgabe Barton, Laurence The Violent Person at Work London : Anthem Press,c2020 9781785272721 |
spellingShingle | Barton, Laurence The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons Cover -- Front Matter -- Half-title -- Title page -- Copyright information -- Dedication -- Table of Contents -- Chapters Int-9 -- Introduction -- 1 The Dynamics of Violence @ Work -- The Pathway to Violence -- 2 The Causes of Workplace Violence -- Escalation -- How Can I Learn More? -- Managing Threats After Job and Economic Losses -- 3 Separating the Employee @ Risk -- Notification -- 4 Evaluating Risk Outside the Organization -- Are Facts Enough? -- Acceleration -- "I Have Several Bombs Strapped to My Body, Ready to Go Off" -- Near Misses Are Lessons -- Who Should We Hire to Manage Threats? -- Senior Director, Workplace Violence Prevention and Threat Analysis -- Knowledge and Skills Desired -- Required -- 5 The Work Environment -- Effective Evaluation of Threats -- Learning from the Success and Failure of Others -- Mitigation: Multiple Persons -- Hidden Demons -- Eleven Derailers -- 6 Fitness for Duty Evaluations: Complex and Imperative for At-Risk Employees -- Knowing What to Ask -- Why These Evaluations Matter -- The Role of Personality Tests -- A Fitness Evaluator Answers Your Questions -- 7 Behind the Smiles: Hidden Demons and Employees -- A Case Study in Deception -- The Sociopath @ Work -- Threat Assessment Unmasked -- Intuition and Bias -- Genetics versus Environment -- Adoption -- Twins -- Animals -- Personality and Engagement -- Finances -- 8 Extremism @ Work -- Detecting the Extremist -- 9 Clinical Dynamics of Disruptive Employees -- Emergency Department Process -- The ESI -- Interview Techniques -- Violence in Healthcare Settings -- When a Physician Kills -- Assessing Homicidal Ideation in Employees -- Common Indicators for Violent Behavior -- Substance Abuse at Work -- Stress in Health Settings -- Family Dynamics -- Summary -- Endmatter -- Author Q & -- A -- Urgent and Delivered by Hand -- Threat Assessment Guide Processing a Threat -- Understanding the subject -- During an in-depth assessment, it is important to -- Appendix I -- Appendix II -- Appendix III -- Resources to Consider during Review -- Questions to Consider -- Threat Management System -- Threats -- Incident Type You Are Reporting -- Describe the Threat -- Risk Factors -- After Suicide Impacts a Workplace -- Ten Action Steps after a Suicide -- Immediate and acute phase -- Short-term phase: recovery -- Longer term phase of reconstructing -- Preventing Another Suicide @ Work -- Should You Honor a Suicidal Victim? -- Sample Notification to an Impacted Work Team if Family Concurs -- Sample Media Announcement if High-Profile Tragedy -- Key Words for the Threat and Crisis Team to Understand -- The FBI and Threat Interpretation -- Remain Neutral on Gender -- Unintentional Glorification of Events -- Random Attacks -- Why Do Some with Key Information Remain Silent? -- When Should Authorities Be Contacted? -- Overcoming a Natural Decision to "Wait it Out" -- Understand the Intimacy Effect -- There Are No "Usual Suspects" in Workplace Violence -- Noteworthy Motives of Attackers -- Mental Illness Is a Factor, but Only One Factor -- Clinicians Often Miss the Mark -- Who Is Most Likely to Target Others for Violence? -- Many Offenders Devote Time before Targeting Victims -- Many Offenders Have Studied Violence Over Time -- Whether in Social Networking, in Person or Elsewhere, Pay Attention to Threats -- What Signals Might Emerge before Suicide or Killing Others? -- Tell the Person You Are Conducting a "Review," Not a "Threat Assessment" -- Many Aggressors Kill Family Members and Caregivers -- What Data Sources Can Be Helpful with a Work Threat Assessment? -- Law Enforcement and Military -- Education and Workplace -- Medical and Mental Health -- Expressions -- Life and Relationships -- Other Why Nonwork Issues Matter When a Person Makes a Threat at Work -- Social Media Plays a Role of Comfort-and Violent Inspiration for Some -- Accountability in Managing a Case Is Essential at All Times -- Threat Mitigation Is Not Static -- Seeking Court Orders Must Be Carefully Deliberated -- Hospitalizing an Aggressor Addresses a Threat for a Limited Time -- Reducing Risk Begins with Trust and Dignity -- Understand Tarasoff when You Are Warned about Potential Harm -- Questions to Ponder before Contacting a Family Member -- When Our Threat Team Convenes, What Should Be Documented? -- Use This Model when Assessing Levels of Concern -- Level of Concern: Low -- Communications of concern -- Persons of Concern -- Level of Concern: Moderate -- Communication of Concern -- Persons of Concern -- Level of Concern: Elevated -- Communications of Concern -- Persons of Concern -- Level of Concern: High -- Communication of Concern -- Persons of concern -- Indications of Potential Imminence -- Communication of Concern -- Persons of Concern -- What Warning Signs Are of Most Concern? -- Final Thought -- About The Author -- Inside Flap -- Back_cover Violence in the workplace |
title | The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons |
title_auth | The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons |
title_exact_search | The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons |
title_exact_search_txtP | The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons |
title_full | The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons |
title_fullStr | The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons |
title_full_unstemmed | The Violent Person at Work The Ultimate Guide to Identifying Dangerous Persons |
title_short | The Violent Person at Work |
title_sort | the violent person at work the ultimate guide to identifying dangerous persons |
title_sub | The Ultimate Guide to Identifying Dangerous Persons |
topic | Violence in the workplace |
topic_facet | Violence in the workplace |
work_keys_str_mv | AT bartonlaurence theviolentpersonatworktheultimateguidetoidentifyingdangerouspersons |