Coverart for item
The Resource The workplace violence prevention handbook, Don Philpott and Don Grimme

The workplace violence prevention handbook, Don Philpott and Don Grimme

Label
The workplace violence prevention handbook
Title
The workplace violence prevention handbook
Statement of responsibility
Don Philpott and Don Grimme
Creator
Contributor
Subject
Language
eng
Cataloging source
DLC
http://library.link/vocab/creatorName
Philpott, Don
Dewey number
658.3/8
Illustrations
illustrations
Index
no index present
LC call number
HF5549.5.E43
LC item number
P49 2009
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
Grimme, Don
http://library.link/vocab/subjectName
  • Violence in the workplace
  • Violence in the workplace
Label
The workplace violence prevention handbook, Don Philpott and Don Grimme
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Introduction -- The five steps -- Step 1. Understand -- Two myths -- Myth 1 : "It can't happen here" -- Myth 2 : :It can't be prevented" -- The nature and scope of workplace violence -- Types of workplace violence and their characteristics -- Type 1 : violence by strangers -- Type 2 : violence by customers or clients -- Type 3 : violence by coworkers -- Type 4 : violence by personal relations -- Type 5 : violence by terrorism -- Who is vulnerable? -- Is your workplace a breeding ground for violence? -- Negative interpersonal behavior -- Negative organizational behavior -- The stressful workplace -- The consequences -- The monetary impact --
  • Step 2. Detect -- Behavioral profiles -- Formula for workplace violence -- Profile -- 1. Previous history of violence -- 2. Loner -- 3. Emotional problems -- 4. Career frustration -- 5. Antagonistic relationship with others -- 6. Obsession -- A word of caution -- Applying the profile -- Observable warning signs -- 1. Violent and threatening behavior -- 2. Strange behavior -- 3. Emotional problems -- 4. Performance problems -- 5. Interpersonal problems -- 6. At the end of his rope -- Shotgun -- Triggering event(s) -- 1. Job/career related -- 2. Institutional -- 3. Personal crisis -- 4. Benchmark date -- Applying the warning signs and triggering events -- The one absolute : never ignore! -- Five levels of instability -- Preventing employee violence -- Detecting domestic violence -- Detecting terrorism -- Review possible suspicious activity -- Fraudulent identification -- Unusual purchases or thefts -- Workplace violence case studies -- Case study 1 : the romantic stalker -- Case study 2 : the violent security guard -- Case study 3 : domestic violence -- Case study 4 : terrorism --
  • Step 3. Defuse and protect -- Defusing a hostile coworker or customer -- Suggestions for responding to the five levels of instability -- Defusing practice activity -- Situation 1 : the demanding supervisor -- Situation 2 : the denied insurance claim -- Situation 3 : the work/family crisis -- Coping with someone threatening you with a weapon -- Coping with telephone threats -- Self-protection tips -- How to break up a fight -- How to protect yourself while shopping -- How to protect yourself in a parking lot/garage -- How to protect yourself while walking at night -- How to protect yourself against domestic violence -- Physical security -- Access controls -- Duress code -- Two-person rule -- Computer security -- Law enforcement -- Jurisdiction -- "What would you do if" scenarios -- Scenario 1 : the tired truck driver -- Scenario 2 : the stubborn smoker -- Scenario 3 : the drunken contractors -- Scenario 4 : hunting season -- Scenario 5 : the jealous husband -- Scenario 6 : hey, there's a fight! -- Scenario 7 : I'm fired?! --
  • Step 4. Assess and contain -- Risk assessment team -- Employees -- Managers and supervisors -- Organization's heads -- Human resources staff -- Employee assistance program counselors -- Unions/employee organizations -- Security/facilities staff -- Law enforcement staff -- Conflict resolution officers -- Conduct a risk assessment -- Incident response -- Incident response planning -- Emergency plans -- Immediate response to a severe incident -- Response when immediate danger has ceased -- Follow-up -- Violence response protocols -- Response protocol : dangerous or armed person -- If you witness an armed individual at any time -- If an armed suspect is outside your building -- If an armed suspect is inside the building -- If an armed suspect comes into your workplace office -- Response protocol : suspicious individual -- Response protocol : situations where immediate action is not required -- Response protocol : emergency evacuation -- Response protocol : bomb threats -- Plan your encounter with a potentially violent person -- Personal safety tips -- The aftermath -- Deal with the aftermath -- Critical incident stress management -- Debriefings -- Management steps to help an organization recover -- Dealing with the consequences of violence -- "What would you do if" scenarios -- Scenario I--the drunken contractors (alternate version) -- Scenario 2--the terrorist -- Case studies -- Case study 1 : domestic violence in the workplace -- Case study 2 : threatened suicide -- Risk assessment checklist -- 1. Conventional security measures -- 2. Means to safely communicate dangerous situation -- 3. Policies -- 4. Incident reporting and tracking process -- 5. An alternative reporting process -- 6. Clear and consistent commitment by management -- 7. Hiring process -- 8. Discipline, termination, and lay-off processes -- 9. Training of supervisors and managers -- 10. Training of employees -- 11. Employee assistance program -- 12. Crisis management program -- 13. Periodic testing of the systems and processes -- 14. Ongoing reviews and assessments of the program -- Incident report form -- Bomb threat check sheet --
  • Step 5. Prevent -- 10 Keys to prevent violence from scarring your workplace -- 1. Ensure a culture of respect -- Respect -- Appreciation -- Involvement -- Inquiry -- Active listening -- 2. Reduce workplace stress -- What the employer can do -- What individuals can do for themselves -- Cool tool 1 : the physical arena -- Cool tool 2 : the mental arena -- Cool tool 3 : the interpersonal arena -- Cool tool 4 : the spiritual arena -- Stress application -- 3. Establish violence and weapons policies -- 4. Use proper employee-selection techniques -- 5. Standardize discipline and termination procedures -- 6. Recognize signs of trouble, and ensure they are reported -- 7. Investigate all threats, complaints, and red flags -- What constitutes a threat? -- Addressing threatening behavior -- Questions to ask -- 8. Take appropriate action -- 9. Train managers, employees, and security personnel -- Employees -- Managers -- Security personnel -- 10. Conduct a risk assessment -- Case Studies -- Case study 1 : stalking -- Case study 2 : threat of violence -- Case study 3 : threatening behavior -- Case study 4 : threat to kill -- Case study 5 : intimidation -- Case study 6 : frightening behavior -- Case study 7 : disruptive behavior -- Case study 8 : threat assessment -- Components of a domestic violence workplace safety plan -- Appendices -- Appendix A. Special-interest areas -- Appendix B. What to do in an emergency -- Appendix C. Terrorism -- Appendix D. Bomb threat procedures -- Appendix E. Physical security -- Appendix F. Legal issues -- Appendix G. Violence prevention resources -- Bibliography -- About the authors
Control code
19516897
Dimensions
26 cm
Extent
xv, 207 pages
Isbn
9781605906461
Isbn Type
(pbk. : alk. paper)
Lccn
2009008626
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
  • (OCoLC)ocn311310326
  • (OCoLC)311310326
Label
The workplace violence prevention handbook, Don Philpott and Don Grimme
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Introduction -- The five steps -- Step 1. Understand -- Two myths -- Myth 1 : "It can't happen here" -- Myth 2 : :It can't be prevented" -- The nature and scope of workplace violence -- Types of workplace violence and their characteristics -- Type 1 : violence by strangers -- Type 2 : violence by customers or clients -- Type 3 : violence by coworkers -- Type 4 : violence by personal relations -- Type 5 : violence by terrorism -- Who is vulnerable? -- Is your workplace a breeding ground for violence? -- Negative interpersonal behavior -- Negative organizational behavior -- The stressful workplace -- The consequences -- The monetary impact --
  • Step 2. Detect -- Behavioral profiles -- Formula for workplace violence -- Profile -- 1. Previous history of violence -- 2. Loner -- 3. Emotional problems -- 4. Career frustration -- 5. Antagonistic relationship with others -- 6. Obsession -- A word of caution -- Applying the profile -- Observable warning signs -- 1. Violent and threatening behavior -- 2. Strange behavior -- 3. Emotional problems -- 4. Performance problems -- 5. Interpersonal problems -- 6. At the end of his rope -- Shotgun -- Triggering event(s) -- 1. Job/career related -- 2. Institutional -- 3. Personal crisis -- 4. Benchmark date -- Applying the warning signs and triggering events -- The one absolute : never ignore! -- Five levels of instability -- Preventing employee violence -- Detecting domestic violence -- Detecting terrorism -- Review possible suspicious activity -- Fraudulent identification -- Unusual purchases or thefts -- Workplace violence case studies -- Case study 1 : the romantic stalker -- Case study 2 : the violent security guard -- Case study 3 : domestic violence -- Case study 4 : terrorism --
  • Step 3. Defuse and protect -- Defusing a hostile coworker or customer -- Suggestions for responding to the five levels of instability -- Defusing practice activity -- Situation 1 : the demanding supervisor -- Situation 2 : the denied insurance claim -- Situation 3 : the work/family crisis -- Coping with someone threatening you with a weapon -- Coping with telephone threats -- Self-protection tips -- How to break up a fight -- How to protect yourself while shopping -- How to protect yourself in a parking lot/garage -- How to protect yourself while walking at night -- How to protect yourself against domestic violence -- Physical security -- Access controls -- Duress code -- Two-person rule -- Computer security -- Law enforcement -- Jurisdiction -- "What would you do if" scenarios -- Scenario 1 : the tired truck driver -- Scenario 2 : the stubborn smoker -- Scenario 3 : the drunken contractors -- Scenario 4 : hunting season -- Scenario 5 : the jealous husband -- Scenario 6 : hey, there's a fight! -- Scenario 7 : I'm fired?! --
  • Step 4. Assess and contain -- Risk assessment team -- Employees -- Managers and supervisors -- Organization's heads -- Human resources staff -- Employee assistance program counselors -- Unions/employee organizations -- Security/facilities staff -- Law enforcement staff -- Conflict resolution officers -- Conduct a risk assessment -- Incident response -- Incident response planning -- Emergency plans -- Immediate response to a severe incident -- Response when immediate danger has ceased -- Follow-up -- Violence response protocols -- Response protocol : dangerous or armed person -- If you witness an armed individual at any time -- If an armed suspect is outside your building -- If an armed suspect is inside the building -- If an armed suspect comes into your workplace office -- Response protocol : suspicious individual -- Response protocol : situations where immediate action is not required -- Response protocol : emergency evacuation -- Response protocol : bomb threats -- Plan your encounter with a potentially violent person -- Personal safety tips -- The aftermath -- Deal with the aftermath -- Critical incident stress management -- Debriefings -- Management steps to help an organization recover -- Dealing with the consequences of violence -- "What would you do if" scenarios -- Scenario I--the drunken contractors (alternate version) -- Scenario 2--the terrorist -- Case studies -- Case study 1 : domestic violence in the workplace -- Case study 2 : threatened suicide -- Risk assessment checklist -- 1. Conventional security measures -- 2. Means to safely communicate dangerous situation -- 3. Policies -- 4. Incident reporting and tracking process -- 5. An alternative reporting process -- 6. Clear and consistent commitment by management -- 7. Hiring process -- 8. Discipline, termination, and lay-off processes -- 9. Training of supervisors and managers -- 10. Training of employees -- 11. Employee assistance program -- 12. Crisis management program -- 13. Periodic testing of the systems and processes -- 14. Ongoing reviews and assessments of the program -- Incident report form -- Bomb threat check sheet --
  • Step 5. Prevent -- 10 Keys to prevent violence from scarring your workplace -- 1. Ensure a culture of respect -- Respect -- Appreciation -- Involvement -- Inquiry -- Active listening -- 2. Reduce workplace stress -- What the employer can do -- What individuals can do for themselves -- Cool tool 1 : the physical arena -- Cool tool 2 : the mental arena -- Cool tool 3 : the interpersonal arena -- Cool tool 4 : the spiritual arena -- Stress application -- 3. Establish violence and weapons policies -- 4. Use proper employee-selection techniques -- 5. Standardize discipline and termination procedures -- 6. Recognize signs of trouble, and ensure they are reported -- 7. Investigate all threats, complaints, and red flags -- What constitutes a threat? -- Addressing threatening behavior -- Questions to ask -- 8. Take appropriate action -- 9. Train managers, employees, and security personnel -- Employees -- Managers -- Security personnel -- 10. Conduct a risk assessment -- Case Studies -- Case study 1 : stalking -- Case study 2 : threat of violence -- Case study 3 : threatening behavior -- Case study 4 : threat to kill -- Case study 5 : intimidation -- Case study 6 : frightening behavior -- Case study 7 : disruptive behavior -- Case study 8 : threat assessment -- Components of a domestic violence workplace safety plan -- Appendices -- Appendix A. Special-interest areas -- Appendix B. What to do in an emergency -- Appendix C. Terrorism -- Appendix D. Bomb threat procedures -- Appendix E. Physical security -- Appendix F. Legal issues -- Appendix G. Violence prevention resources -- Bibliography -- About the authors
Control code
19516897
Dimensions
26 cm
Extent
xv, 207 pages
Isbn
9781605906461
Isbn Type
(pbk. : alk. paper)
Lccn
2009008626
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
System control number
  • (OCoLC)ocn311310326
  • (OCoLC)311310326

Library Locations

    • Indiana State LibraryBorrow it
      315 W. Ohio St., Indianapolis, IN, 46202, US
      39.77004 -86.164015

Library Links

Processing Feedback ...