The Resource The workplace violence prevention handbook, Don Philpott and Don Grimme
The workplace violence prevention handbook, Don Philpott and Don Grimme
Resource Information
The item The workplace violence prevention handbook, Don Philpott and Don Grimme represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Indiana State Library.This item is available to borrow from 1 library branch.
Resource Information
The item The workplace violence prevention handbook, Don Philpott and Don Grimme represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Indiana State Library.
This item is available to borrow from 1 library branch.
- Extent
- xv, 207 pages
- Contents
-
- Introduction -- The five steps -- Step 1. Understand -- Two myths -- Myth 1 : "It can't happen here" -- Myth 2 : :It can't be prevented" -- The nature and scope of workplace violence -- Types of workplace violence and their characteristics -- Type 1 : violence by strangers -- Type 2 : violence by customers or clients -- Type 3 : violence by coworkers -- Type 4 : violence by personal relations -- Type 5 : violence by terrorism -- Who is vulnerable? -- Is your workplace a breeding ground for violence? -- Negative interpersonal behavior -- Negative organizational behavior -- The stressful workplace -- The consequences -- The monetary impact --
- Step 2. Detect -- Behavioral profiles -- Formula for workplace violence -- Profile -- 1. Previous history of violence -- 2. Loner -- 3. Emotional problems -- 4. Career frustration -- 5. Antagonistic relationship with others -- 6. Obsession -- A word of caution -- Applying the profile -- Observable warning signs -- 1. Violent and threatening behavior -- 2. Strange behavior -- 3. Emotional problems -- 4. Performance problems -- 5. Interpersonal problems -- 6. At the end of his rope -- Shotgun -- Triggering event(s) -- 1. Job/career related -- 2. Institutional -- 3. Personal crisis -- 4. Benchmark date -- Applying the warning signs and triggering events -- The one absolute : never ignore! -- Five levels of instability -- Preventing employee violence -- Detecting domestic violence -- Detecting terrorism -- Review possible suspicious activity -- Fraudulent identification -- Unusual purchases or thefts -- Workplace violence case studies -- Case study 1 : the romantic stalker -- Case study 2 : the violent security guard -- Case study 3 : domestic violence -- Case study 4 : terrorism --
- Step 3. Defuse and protect -- Defusing a hostile coworker or customer -- Suggestions for responding to the five levels of instability -- Defusing practice activity -- Situation 1 : the demanding supervisor -- Situation 2 : the denied insurance claim -- Situation 3 : the work/family crisis -- Coping with someone threatening you with a weapon -- Coping with telephone threats -- Self-protection tips -- How to break up a fight -- How to protect yourself while shopping -- How to protect yourself in a parking lot/garage -- How to protect yourself while walking at night -- How to protect yourself against domestic violence -- Physical security -- Access controls -- Duress code -- Two-person rule -- Computer security -- Law enforcement -- Jurisdiction -- "What would you do if" scenarios -- Scenario 1 : the tired truck driver -- Scenario 2 : the stubborn smoker -- Scenario 3 : the drunken contractors -- Scenario 4 : hunting season -- Scenario 5 : the jealous husband -- Scenario 6 : hey, there's a fight! -- Scenario 7 : I'm fired?! --
- Step 4. Assess and contain -- Risk assessment team -- Employees -- Managers and supervisors -- Organization's heads -- Human resources staff -- Employee assistance program counselors -- Unions/employee organizations -- Security/facilities staff -- Law enforcement staff -- Conflict resolution officers -- Conduct a risk assessment -- Incident response -- Incident response planning -- Emergency plans -- Immediate response to a severe incident -- Response when immediate danger has ceased -- Follow-up -- Violence response protocols -- Response protocol : dangerous or armed person -- If you witness an armed individual at any time -- If an armed suspect is outside your building -- If an armed suspect is inside the building -- If an armed suspect comes into your workplace office -- Response protocol : suspicious individual -- Response protocol : situations where immediate action is not required -- Response protocol : emergency evacuation -- Response protocol : bomb threats -- Plan your encounter with a potentially violent person -- Personal safety tips -- The aftermath -- Deal with the aftermath -- Critical incident stress management -- Debriefings -- Management steps to help an organization recover -- Dealing with the consequences of violence -- "What would you do if" scenarios -- Scenario I--the drunken contractors (alternate version) -- Scenario 2--the terrorist -- Case studies -- Case study 1 : domestic violence in the workplace -- Case study 2 : threatened suicide -- Risk assessment checklist -- 1. Conventional security measures -- 2. Means to safely communicate dangerous situation -- 3. Policies -- 4. Incident reporting and tracking process -- 5. An alternative reporting process -- 6. Clear and consistent commitment by management -- 7. Hiring process -- 8. Discipline, termination, and lay-off processes -- 9. Training of supervisors and managers -- 10. Training of employees -- 11. Employee assistance program -- 12. Crisis management program -- 13. Periodic testing of the systems and processes -- 14. Ongoing reviews and assessments of the program -- Incident report form -- Bomb threat check sheet --
- Step 5. Prevent -- 10 Keys to prevent violence from scarring your workplace -- 1. Ensure a culture of respect -- Respect -- Appreciation -- Involvement -- Inquiry -- Active listening -- 2. Reduce workplace stress -- What the employer can do -- What individuals can do for themselves -- Cool tool 1 : the physical arena -- Cool tool 2 : the mental arena -- Cool tool 3 : the interpersonal arena -- Cool tool 4 : the spiritual arena -- Stress application -- 3. Establish violence and weapons policies -- 4. Use proper employee-selection techniques -- 5. Standardize discipline and termination procedures -- 6. Recognize signs of trouble, and ensure they are reported -- 7. Investigate all threats, complaints, and red flags -- What constitutes a threat? -- Addressing threatening behavior -- Questions to ask -- 8. Take appropriate action -- 9. Train managers, employees, and security personnel -- Employees -- Managers -- Security personnel -- 10. Conduct a risk assessment -- Case Studies -- Case study 1 : stalking -- Case study 2 : threat of violence -- Case study 3 : threatening behavior -- Case study 4 : threat to kill -- Case study 5 : intimidation -- Case study 6 : frightening behavior -- Case study 7 : disruptive behavior -- Case study 8 : threat assessment -- Components of a domestic violence workplace safety plan -- Appendices -- Appendix A. Special-interest areas -- Appendix B. What to do in an emergency -- Appendix C. Terrorism -- Appendix D. Bomb threat procedures -- Appendix E. Physical security -- Appendix F. Legal issues -- Appendix G. Violence prevention resources -- Bibliography -- About the authors
- Isbn
- 9781605906683
- Label
- The workplace violence prevention handbook
- Title
- The workplace violence prevention handbook
- Statement of responsibility
- Don Philpott and Don Grimme
- Language
- eng
- Cataloging source
- DLC
- http://library.link/vocab/creatorName
- Philpott, Don
- Dewey number
- 658.3/8
- Illustrations
- illustrations
- Index
- no index present
- LC call number
- HF5549.5.E43
- LC item number
- P49 2009
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Grimme, Don
- http://library.link/vocab/subjectName
-
- Violence in the workplace
- Violence in the workplace
- Label
- The workplace violence prevention handbook, Don Philpott and Don Grimme
- Bibliography note
- Includes bibliographical references
- Carrier category
- volume
- Carrier category code
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Introduction -- The five steps -- Step 1. Understand -- Two myths -- Myth 1 : "It can't happen here" -- Myth 2 : :It can't be prevented" -- The nature and scope of workplace violence -- Types of workplace violence and their characteristics -- Type 1 : violence by strangers -- Type 2 : violence by customers or clients -- Type 3 : violence by coworkers -- Type 4 : violence by personal relations -- Type 5 : violence by terrorism -- Who is vulnerable? -- Is your workplace a breeding ground for violence? -- Negative interpersonal behavior -- Negative organizational behavior -- The stressful workplace -- The consequences -- The monetary impact --
- Step 2. Detect -- Behavioral profiles -- Formula for workplace violence -- Profile -- 1. Previous history of violence -- 2. Loner -- 3. Emotional problems -- 4. Career frustration -- 5. Antagonistic relationship with others -- 6. Obsession -- A word of caution -- Applying the profile -- Observable warning signs -- 1. Violent and threatening behavior -- 2. Strange behavior -- 3. Emotional problems -- 4. Performance problems -- 5. Interpersonal problems -- 6. At the end of his rope -- Shotgun -- Triggering event(s) -- 1. Job/career related -- 2. Institutional -- 3. Personal crisis -- 4. Benchmark date -- Applying the warning signs and triggering events -- The one absolute : never ignore! -- Five levels of instability -- Preventing employee violence -- Detecting domestic violence -- Detecting terrorism -- Review possible suspicious activity -- Fraudulent identification -- Unusual purchases or thefts -- Workplace violence case studies -- Case study 1 : the romantic stalker -- Case study 2 : the violent security guard -- Case study 3 : domestic violence -- Case study 4 : terrorism --
- Step 3. Defuse and protect -- Defusing a hostile coworker or customer -- Suggestions for responding to the five levels of instability -- Defusing practice activity -- Situation 1 : the demanding supervisor -- Situation 2 : the denied insurance claim -- Situation 3 : the work/family crisis -- Coping with someone threatening you with a weapon -- Coping with telephone threats -- Self-protection tips -- How to break up a fight -- How to protect yourself while shopping -- How to protect yourself in a parking lot/garage -- How to protect yourself while walking at night -- How to protect yourself against domestic violence -- Physical security -- Access controls -- Duress code -- Two-person rule -- Computer security -- Law enforcement -- Jurisdiction -- "What would you do if" scenarios -- Scenario 1 : the tired truck driver -- Scenario 2 : the stubborn smoker -- Scenario 3 : the drunken contractors -- Scenario 4 : hunting season -- Scenario 5 : the jealous husband -- Scenario 6 : hey, there's a fight! -- Scenario 7 : I'm fired?! --
- Step 4. Assess and contain -- Risk assessment team -- Employees -- Managers and supervisors -- Organization's heads -- Human resources staff -- Employee assistance program counselors -- Unions/employee organizations -- Security/facilities staff -- Law enforcement staff -- Conflict resolution officers -- Conduct a risk assessment -- Incident response -- Incident response planning -- Emergency plans -- Immediate response to a severe incident -- Response when immediate danger has ceased -- Follow-up -- Violence response protocols -- Response protocol : dangerous or armed person -- If you witness an armed individual at any time -- If an armed suspect is outside your building -- If an armed suspect is inside the building -- If an armed suspect comes into your workplace office -- Response protocol : suspicious individual -- Response protocol : situations where immediate action is not required -- Response protocol : emergency evacuation -- Response protocol : bomb threats -- Plan your encounter with a potentially violent person -- Personal safety tips -- The aftermath -- Deal with the aftermath -- Critical incident stress management -- Debriefings -- Management steps to help an organization recover -- Dealing with the consequences of violence -- "What would you do if" scenarios -- Scenario I--the drunken contractors (alternate version) -- Scenario 2--the terrorist -- Case studies -- Case study 1 : domestic violence in the workplace -- Case study 2 : threatened suicide -- Risk assessment checklist -- 1. Conventional security measures -- 2. Means to safely communicate dangerous situation -- 3. Policies -- 4. Incident reporting and tracking process -- 5. An alternative reporting process -- 6. Clear and consistent commitment by management -- 7. Hiring process -- 8. Discipline, termination, and lay-off processes -- 9. Training of supervisors and managers -- 10. Training of employees -- 11. Employee assistance program -- 12. Crisis management program -- 13. Periodic testing of the systems and processes -- 14. Ongoing reviews and assessments of the program -- Incident report form -- Bomb threat check sheet --
- Step 5. Prevent -- 10 Keys to prevent violence from scarring your workplace -- 1. Ensure a culture of respect -- Respect -- Appreciation -- Involvement -- Inquiry -- Active listening -- 2. Reduce workplace stress -- What the employer can do -- What individuals can do for themselves -- Cool tool 1 : the physical arena -- Cool tool 2 : the mental arena -- Cool tool 3 : the interpersonal arena -- Cool tool 4 : the spiritual arena -- Stress application -- 3. Establish violence and weapons policies -- 4. Use proper employee-selection techniques -- 5. Standardize discipline and termination procedures -- 6. Recognize signs of trouble, and ensure they are reported -- 7. Investigate all threats, complaints, and red flags -- What constitutes a threat? -- Addressing threatening behavior -- Questions to ask -- 8. Take appropriate action -- 9. Train managers, employees, and security personnel -- Employees -- Managers -- Security personnel -- 10. Conduct a risk assessment -- Case Studies -- Case study 1 : stalking -- Case study 2 : threat of violence -- Case study 3 : threatening behavior -- Case study 4 : threat to kill -- Case study 5 : intimidation -- Case study 6 : frightening behavior -- Case study 7 : disruptive behavior -- Case study 8 : threat assessment -- Components of a domestic violence workplace safety plan -- Appendices -- Appendix A. Special-interest areas -- Appendix B. What to do in an emergency -- Appendix C. Terrorism -- Appendix D. Bomb threat procedures -- Appendix E. Physical security -- Appendix F. Legal issues -- Appendix G. Violence prevention resources -- Bibliography -- About the authors
- Control code
- 19516897
- Dimensions
- 26 cm
- Extent
- xv, 207 pages
- Isbn
- 9781605906683
- Lccn
- 2009008626
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
- n
- Other physical details
- illustrations
- System control number
-
- (OCoLC)ocn311310326
- (OCoLC)311310326
- Label
- The workplace violence prevention handbook, Don Philpott and Don Grimme
- Bibliography note
- Includes bibliographical references
- Carrier category
- volume
- Carrier category code
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Introduction -- The five steps -- Step 1. Understand -- Two myths -- Myth 1 : "It can't happen here" -- Myth 2 : :It can't be prevented" -- The nature and scope of workplace violence -- Types of workplace violence and their characteristics -- Type 1 : violence by strangers -- Type 2 : violence by customers or clients -- Type 3 : violence by coworkers -- Type 4 : violence by personal relations -- Type 5 : violence by terrorism -- Who is vulnerable? -- Is your workplace a breeding ground for violence? -- Negative interpersonal behavior -- Negative organizational behavior -- The stressful workplace -- The consequences -- The monetary impact --
- Step 2. Detect -- Behavioral profiles -- Formula for workplace violence -- Profile -- 1. Previous history of violence -- 2. Loner -- 3. Emotional problems -- 4. Career frustration -- 5. Antagonistic relationship with others -- 6. Obsession -- A word of caution -- Applying the profile -- Observable warning signs -- 1. Violent and threatening behavior -- 2. Strange behavior -- 3. Emotional problems -- 4. Performance problems -- 5. Interpersonal problems -- 6. At the end of his rope -- Shotgun -- Triggering event(s) -- 1. Job/career related -- 2. Institutional -- 3. Personal crisis -- 4. Benchmark date -- Applying the warning signs and triggering events -- The one absolute : never ignore! -- Five levels of instability -- Preventing employee violence -- Detecting domestic violence -- Detecting terrorism -- Review possible suspicious activity -- Fraudulent identification -- Unusual purchases or thefts -- Workplace violence case studies -- Case study 1 : the romantic stalker -- Case study 2 : the violent security guard -- Case study 3 : domestic violence -- Case study 4 : terrorism --
- Step 3. Defuse and protect -- Defusing a hostile coworker or customer -- Suggestions for responding to the five levels of instability -- Defusing practice activity -- Situation 1 : the demanding supervisor -- Situation 2 : the denied insurance claim -- Situation 3 : the work/family crisis -- Coping with someone threatening you with a weapon -- Coping with telephone threats -- Self-protection tips -- How to break up a fight -- How to protect yourself while shopping -- How to protect yourself in a parking lot/garage -- How to protect yourself while walking at night -- How to protect yourself against domestic violence -- Physical security -- Access controls -- Duress code -- Two-person rule -- Computer security -- Law enforcement -- Jurisdiction -- "What would you do if" scenarios -- Scenario 1 : the tired truck driver -- Scenario 2 : the stubborn smoker -- Scenario 3 : the drunken contractors -- Scenario 4 : hunting season -- Scenario 5 : the jealous husband -- Scenario 6 : hey, there's a fight! -- Scenario 7 : I'm fired?! --
- Step 4. Assess and contain -- Risk assessment team -- Employees -- Managers and supervisors -- Organization's heads -- Human resources staff -- Employee assistance program counselors -- Unions/employee organizations -- Security/facilities staff -- Law enforcement staff -- Conflict resolution officers -- Conduct a risk assessment -- Incident response -- Incident response planning -- Emergency plans -- Immediate response to a severe incident -- Response when immediate danger has ceased -- Follow-up -- Violence response protocols -- Response protocol : dangerous or armed person -- If you witness an armed individual at any time -- If an armed suspect is outside your building -- If an armed suspect is inside the building -- If an armed suspect comes into your workplace office -- Response protocol : suspicious individual -- Response protocol : situations where immediate action is not required -- Response protocol : emergency evacuation -- Response protocol : bomb threats -- Plan your encounter with a potentially violent person -- Personal safety tips -- The aftermath -- Deal with the aftermath -- Critical incident stress management -- Debriefings -- Management steps to help an organization recover -- Dealing with the consequences of violence -- "What would you do if" scenarios -- Scenario I--the drunken contractors (alternate version) -- Scenario 2--the terrorist -- Case studies -- Case study 1 : domestic violence in the workplace -- Case study 2 : threatened suicide -- Risk assessment checklist -- 1. Conventional security measures -- 2. Means to safely communicate dangerous situation -- 3. Policies -- 4. Incident reporting and tracking process -- 5. An alternative reporting process -- 6. Clear and consistent commitment by management -- 7. Hiring process -- 8. Discipline, termination, and lay-off processes -- 9. Training of supervisors and managers -- 10. Training of employees -- 11. Employee assistance program -- 12. Crisis management program -- 13. Periodic testing of the systems and processes -- 14. Ongoing reviews and assessments of the program -- Incident report form -- Bomb threat check sheet --
- Step 5. Prevent -- 10 Keys to prevent violence from scarring your workplace -- 1. Ensure a culture of respect -- Respect -- Appreciation -- Involvement -- Inquiry -- Active listening -- 2. Reduce workplace stress -- What the employer can do -- What individuals can do for themselves -- Cool tool 1 : the physical arena -- Cool tool 2 : the mental arena -- Cool tool 3 : the interpersonal arena -- Cool tool 4 : the spiritual arena -- Stress application -- 3. Establish violence and weapons policies -- 4. Use proper employee-selection techniques -- 5. Standardize discipline and termination procedures -- 6. Recognize signs of trouble, and ensure they are reported -- 7. Investigate all threats, complaints, and red flags -- What constitutes a threat? -- Addressing threatening behavior -- Questions to ask -- 8. Take appropriate action -- 9. Train managers, employees, and security personnel -- Employees -- Managers -- Security personnel -- 10. Conduct a risk assessment -- Case Studies -- Case study 1 : stalking -- Case study 2 : threat of violence -- Case study 3 : threatening behavior -- Case study 4 : threat to kill -- Case study 5 : intimidation -- Case study 6 : frightening behavior -- Case study 7 : disruptive behavior -- Case study 8 : threat assessment -- Components of a domestic violence workplace safety plan -- Appendices -- Appendix A. Special-interest areas -- Appendix B. What to do in an emergency -- Appendix C. Terrorism -- Appendix D. Bomb threat procedures -- Appendix E. Physical security -- Appendix F. Legal issues -- Appendix G. Violence prevention resources -- Bibliography -- About the authors
- Control code
- 19516897
- Dimensions
- 26 cm
- Extent
- xv, 207 pages
- Isbn
- 9781605906683
- Lccn
- 2009008626
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
- n
- Other physical details
- illustrations
- System control number
-
- (OCoLC)ocn311310326
- (OCoLC)311310326
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/portal/The-workplace-violence-prevention-handbook-Don/sCdWRLRTm4w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/portal/The-workplace-violence-prevention-handbook-Don/sCdWRLRTm4w/">The workplace violence prevention handbook, Don Philpott and Don Grimme</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item The workplace violence prevention handbook, Don Philpott and Don Grimme
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/portal/The-workplace-violence-prevention-handbook-Don/sCdWRLRTm4w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/portal/The-workplace-violence-prevention-handbook-Don/sCdWRLRTm4w/">The workplace violence prevention handbook, Don Philpott and Don Grimme</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>