SlideShare a Scribd company logo
1 of 34
Threat Assessments 101:
Understanding the Red Flags of Workplace Violence
Stephen G. White, PhD
President, Work Trauma Services
Co-author of the WAVR-21
swhite@wtsglobal.com
Reid Meloy, PhD
Forensic Psychologist
Co-author of the WAVR-21
DrReidMeloy.com
Meet our Hosts
Agenda ▪ Context for Threat Assessment
▪ An Illustrative Case
▪ What is the Pathway to Violence?
▪ Best Practices in Threat Assessments
▪ Do’s and Don’ts – Strategic Issues
▪ Structured Assessment Guides
▪ The WAVR-21 V3
▪ Q&A Session
A great deal has been learned about
individual and organizational risk factors.
Protocols exist: Threat scenarios can be
assessed and managed safely.
Violence risk is complex but comprehensible.
An Illustrative Case: The “Senseless Supervisor”
Agnes, a young associate in the client group, requests an urgent meeting with her HR manager. Entering the office,
she is obviously very anxious and troubled. Near tears, Agnes discloses, “This is very hard for me but I can’t keep it to
myself any longer. I have been having an affair with Jerry, my manager. He’s married, you know, and I am trying to get
out of our relationship. But he has threatened me and says things like, ‘If I can’t have you, nobody will’.”
Agnes confides that Jerry alludes to having firearms, and has physically abused his wife in the past. The police have
been to their house. Agnes adds that some of the coworkers in their department are aware of the personal relationship
between the two of them. Some fear for her safety as well as their own, and some resent her for their perception of
“favors” that Jerry has extended to her. The HR manager knows that Jerry is rumored to be manipulative and
intimidating; an all-around selfish, dishonest bully. He may have driven his previous boss to quit. He does what he
wants and has never been consistently disciplined. Agnes claims, “He told me if he loses his job over this, he’ll have
nothing left. I'm scared.”
Agnes asks that Jerry will never know that she revealed all this stuff. As she rushes out the door she adds, “He drinks
too much. I’m afraid his life is falling apart.”
Tearfully she exclaims, “I hope I don’t lose my job over this.”
Responding to the “Senseless Supervisor”
▪ How would you estimate Jerry’s risk for violence?
▪ How did you arrive at this conclusion?
▪ How does your organization assess violence risk?
▪ What do you see as viable response alternatives?
▪ Can your current practice withstand scrutiny?
Recognize Important Contextual Factors
▪ A “cultural script” for notorious violence: “copy cats”
▪ Fear & disruption readily follow threats
▪ Low probability catastrophic events: the “haystack”
The Pathway to Violence
The “Grievance”
Violent Ideation
Research & Planning the Attack
Pre-attack Preparation
Probing & Breaches
Attack
Perpetrators don’t “snap”… they decide.
Elements of a Successful Threat Management Program
Violence
prevention
policy
Threat
management
team
Reporting and
response
process
Organization
wide
awareness
Common Program and Response Challenges
The Silo
Effect
Missing a hot
one vs. over
responding to
“nothing
burgers”
The Hasty
Termination
Unintended
Consequences
Strategic
Guidelines
for
Case
Management
1. Slow down, assess first (unless “imminent”)
2. Anticipate triggering events
3. Protect dignity, avoid shaming
4. Avoid “going to war” if possible
5. Use evidence-based assessment tools
6. Judgment will always be necessary
7. “Managing behaviors of concern in the
present”
Inquiry and Intervention Options
▪ Background checks & investigations, social media
▪ Collateral interviews with witnesses, managers, etc.
▪ Interview with subject-employee
▪ Professional risk assessment & defusing actions
▪ Protective orders
▪ Heightened security measures
▪ Law enforcement assistance, arrest & detention
▪ Treatment - voluntary or involuntary
▪ Case-appropriate separation steps & severance packs
No cookbook. Judgment and deliberation are necessary!
Who should assess what?
▪ A continuum of expertise – no clear line
▪ Inter-disciplinary specialization
▪ Risk screening vs. risk assessment
▪ Professional assessment: indirect vs direct
“When in doubt, confer”
Structured Professional Judgement Guides
▪ Developed to reflect the “state of the
discipline”
▪ Empirical knowledge
▪ Professional Practice
▪ Identify a core set of factors to consider in
assessment
▪ Improves consistency, utility, &
transparency of decision making
Examples of Structured Professional Judgement Guides
▪ Historical Clinical Risk Management (HCRV3)
▪ Stalking Risk Profile (SRP)
▪ Spousal Assault Risk Assessment (SARA)
▪ Risk for Sexual Violence Protocol (RSVP)
▪ Terrorist Radicalization Assessment Protocol (TRAP-18)
▪ Workplace Assessment of Violence Risk (WAVR-21)
The WAVR-21 V3
A Structured Professional Judgement Guide for the
Workplace Assessment of Violence Risk, 3rd Edition, 2016
Including Campus and Student Contexts
Stephen G. White, Ph.D.
J. Reid Meloy, Ph.D., ABPP
Targeted Violence
The major focus
A Gateway
Instrument
Can use other SPJs
Broader Net
Bullying
Stalking
Maliciousness
Subjects
Employees
Contractors
Outsiders
Intimate Partners
Customers
The WAVR-21
The WAVR-21 Violence Risk Factors
1. Motives for Violence
2. Homicidal Fantasies, Violent Preoccupations or
Identifications
3. Threatening Communications or Expressed Intent
4. Weapons Skill and/or Access
5. Pre-attack Planning and Preparation
6. Stalking or Menacing Behavior
7. Current Job or Academic Problems
8. Extreme Job or Academic Attachment
9. Loss, Personal Stressors and Negative Coping
10. Entitlement and Other Negative Traits
11. Lack of Conscience and Irresponsibility
12. Anger Problems
13. Suicidality and/or Depressive Mood
14. Irrationally Suspicious or Bizarre Beliefs
15. Substance Abuse and/or Dependence
16. Increasing Isolation
17. History of Violence, Criminality, and Conflict
18. Domestic/intimate Partner Violence
19. Situational and Organizational Contributors to
Violence
20. Stabilizers and Buffers Against Violence
21. Organizational Impact of Real or Perceived Threats
Scientific Basis for the WAVR-21
Empirical
research on
violence risk
and protective
factors
Reliability
Validity –
University of
Nebraska study
Accumulated
professional
practice
Caution: The WAVR is not a psychological test or quantitative measure of risk.
How the WAVR helps teams
1.
Focused on risk-relevant information and the direction of further
inquiries
2. Transparency of assessment criteria improves team communication
3. Demonstrates reasonableness of the organization’s actions
Jerry allegedly threatened Agnes if she broke off for their relationship.
Jerry
Michelle L. 09/20/2017
HR Intake
Jerry
09/20/2017
Stephen White
09/20/2017
Jerry has threatened Agnes that if he can’t have her,
nobody will.
Agnes
Stephen White
Jerry has threatened Agnes that if he can’t have her,
nobody will.
Agnes
09/20/2017
Stephen White
Stephen White
Stephen White
The WAVR-21 Violence Risk Factors
1. Motives for Violence
2. Homicidal Fantasies, Violent Preoccupations or
Identifications
3. Threatening Communications or Expressed Intent
4. Weapons Skill and/or Access
5. Pre-attack Planning and Preparation
6. Stalking or Menacing Behavior
7. Current Job or Academic Problems
8. Extreme Job or Academic Attachment
9. Loss, Personal Stressors and Negative Coping
10. Entitlement and Other Negative Traits
11. Lack of Conscience and Irresponsibility
12. Anger Problems
13. Suicidality and/or Depressive Mood
14. Irrationally Suspicious or Bizarre Beliefs
15. Substance Abuse and/or Dependence
16. Increasing Isolation
17. History of Violence, Criminality, and Conflict
18. Domestic/intimate Partner Violence
19. Situational and Organizational Contributors to
Violence
20. Stabilizers and Buffers Against Violence
21. Organizational Impact of Real or Perceived
Threats
Identify the issues before
they become incidents.
Questions?

More Related Content

What's hot

Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
SlideTeam
 
Sexual Harassment Training by Montana Dept. of Labor and Industry
Sexual Harassment Training by Montana Dept. of Labor and IndustrySexual Harassment Training by Montana Dept. of Labor and Industry
Sexual Harassment Training by Montana Dept. of Labor and Industry
Atlantic Training, LLC.
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014
Paul Simidi
 
Workplace Violence
Workplace ViolenceWorkplace Violence
Workplace Violence
rstuart
 
Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461
Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461
Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461
Bonnie Black
 
Ролята на изобразителното изкуство при работа
Ролята на изобразителното изкуство при работаРолята на изобразителното изкуство при работа
Ролята на изобразителното изкуство при работа
RCRusse
 
Risk Management
Risk ManagementRisk Management
Risk Management
ysshah
 
Workplace Violence Training by Johns Hopkins University
Workplace Violence Training by Johns Hopkins UniversityWorkplace Violence Training by Johns Hopkins University
Workplace Violence Training by Johns Hopkins University
Atlantic Training, LLC.
 
KPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for ChangeKPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for Change
Nanda Thiruvengadam
 

What's hot (20)

Ajoterveys 2-kliininen-arvioiminen
Ajoterveys 2-kliininen-arvioiminenAjoterveys 2-kliininen-arvioiminen
Ajoterveys 2-kliininen-arvioiminen
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 
Key Risk Indicator Example in Business Process Outsourcing for Banking
Key Risk Indicator Example in Business Process Outsourcing for BankingKey Risk Indicator Example in Business Process Outsourcing for Banking
Key Risk Indicator Example in Business Process Outsourcing for Banking
 
Sexual Harassment Training by Montana Dept. of Labor and Industry
Sexual Harassment Training by Montana Dept. of Labor and IndustrySexual Harassment Training by Montana Dept. of Labor and Industry
Sexual Harassment Training by Montana Dept. of Labor and Industry
 
Save Girl Child - Facts
Save Girl Child - FactsSave Girl Child - Facts
Save Girl Child - Facts
 
Business Risk Management Overview PowerPoint Presentation Slides
Business Risk Management Overview PowerPoint Presentation SlidesBusiness Risk Management Overview PowerPoint Presentation Slides
Business Risk Management Overview PowerPoint Presentation Slides
 
GRC
GRCGRC
GRC
 
GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014GRC - Isaca Training 16.9.2014
GRC - Isaca Training 16.9.2014
 
KRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & ITKRI (Key Risk Indicators) & IT
KRI (Key Risk Indicators) & IT
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 
Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)Sharing Practice on Enterprise Risk Management (ERM)
Sharing Practice on Enterprise Risk Management (ERM)
 
Workplace Violence
Workplace ViolenceWorkplace Violence
Workplace Violence
 
Risk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation SlidesRisk Management Plan Powerpoint Presentation Slides
Risk Management Plan Powerpoint Presentation Slides
 
Managing Your Risk Taxonomy within StratexPoint
Managing Your Risk Taxonomy within StratexPointManaging Your Risk Taxonomy within StratexPoint
Managing Your Risk Taxonomy within StratexPoint
 
Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461
Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461
Learning Unit 2 - Victim Blaming and Frustrations-CRJ 461
 
Ролята на изобразителното изкуство при работа
Ролята на изобразителното изкуство при работаРолята на изобразителното изкуство при работа
Ролята на изобразителното изкуство при работа
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
Workplace Violence Training by Johns Hopkins University
Workplace Violence Training by Johns Hopkins UniversityWorkplace Violence Training by Johns Hopkins University
Workplace Violence Training by Johns Hopkins University
 
KPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for ChangeKPMG - BCBS239_Bracing for Change
KPMG - BCBS239_Bracing for Change
 

Similar to Threat Assessments 101: Understanding the Red Flags of Workplace Violence

Workplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You WorryWorkplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You Worry
Michael Julian, CPI PPS CSP
 
Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!
Luke Allen
 
Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!
Luke Allen
 
Workplace counselling for specific work problems
Workplace counselling for specific work problemsWorkplace counselling for specific work problems
Workplace counselling for specific work problems
Pragnya Mishra
 
Workplace environment preventing_violence_in_the_workplace_(presentation_style)
Workplace environment preventing_violence_in_the_workplace_(presentation_style)Workplace environment preventing_violence_in_the_workplace_(presentation_style)
Workplace environment preventing_violence_in_the_workplace_(presentation_style)
Shankar Myadharaveni
 
ILLUSTRATION BY KEN
ILLUSTRATION BY KENILLUSTRATION BY KEN
ILLUSTRATION BY KEN
MalikPinckney86
 
Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar) Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar)
Cooperative of American Physicians, Inc.
 
Family mediation week 6 dv and mediation 2022 (1)
Family mediation week 6 dv and mediation 2022 (1)Family mediation week 6 dv and mediation 2022 (1)
Family mediation week 6 dv and mediation 2022 (1)
MelanieKatz8
 
Family mediation week 6 dv and mediation 2022
Family mediation week 6 dv and mediation 2022Family mediation week 6 dv and mediation 2022
Family mediation week 6 dv and mediation 2022
MelanieKatz8
 

Similar to Threat Assessments 101: Understanding the Red Flags of Workplace Violence (20)

Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment TeamCreating an Enterprise-Wide Workplace Violence & Threat Assessment Team
Creating an Enterprise-Wide Workplace Violence & Threat Assessment Team
 
Workplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You WorryWorkplace Violence - Your Recieved a Threat, Should You Worry
Workplace Violence - Your Recieved a Threat, Should You Worry
 
Navigating Workplace Violence - A Managers Guide
Navigating Workplace Violence - A Managers GuideNavigating Workplace Violence - A Managers Guide
Navigating Workplace Violence - A Managers Guide
 
Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!
 
Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!Bullying: What to do if it happens to you!
Bullying: What to do if it happens to you!
 
Safety assessment in dv Keith
Safety assessment in dv KeithSafety assessment in dv Keith
Safety assessment in dv Keith
 
Workplace violence by Brad Hyde
Workplace violence by Brad HydeWorkplace violence by Brad Hyde
Workplace violence by Brad Hyde
 
Prevent Disruptive Behavior from Escalating at Work (general awareness brochure)
Prevent Disruptive Behavior from Escalating at Work (general awareness brochure)Prevent Disruptive Behavior from Escalating at Work (general awareness brochure)
Prevent Disruptive Behavior from Escalating at Work (general awareness brochure)
 
Workplace Violence by CEAC
Workplace Violence by CEACWorkplace Violence by CEAC
Workplace Violence by CEAC
 
Workplace counselling for specific work problems
Workplace counselling for specific work problemsWorkplace counselling for specific work problems
Workplace counselling for specific work problems
 
The Workplace Silent Enemy: Harassment PowerPoint
The Workplace Silent Enemy: Harassment PowerPointThe Workplace Silent Enemy: Harassment PowerPoint
The Workplace Silent Enemy: Harassment PowerPoint
 
Prevent Disruptive Behaviors from Escalating at Work (brochure for leaders)
Prevent Disruptive Behaviors from Escalating at Work (brochure for leaders)Prevent Disruptive Behaviors from Escalating at Work (brochure for leaders)
Prevent Disruptive Behaviors from Escalating at Work (brochure for leaders)
 
Workplace environment preventing_violence_in_the_workplace_(presentation_style)
Workplace environment preventing_violence_in_the_workplace_(presentation_style)Workplace environment preventing_violence_in_the_workplace_(presentation_style)
Workplace environment preventing_violence_in_the_workplace_(presentation_style)
 
ILLUSTRATION BY KEN
ILLUSTRATION BY KENILLUSTRATION BY KEN
ILLUSTRATION BY KEN
 
Bullying in Academia
Bullying in AcademiaBullying in Academia
Bullying in Academia
 
Workplace bullies ob
Workplace bullies  obWorkplace bullies  ob
Workplace bullies ob
 
Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar) Workplace Violence: Responding to the Challenges (Free Webinar)
Workplace Violence: Responding to the Challenges (Free Webinar)
 
Domestic Abuse, FL Realities and Mediator Perceptions
Domestic Abuse, FL Realities and Mediator PerceptionsDomestic Abuse, FL Realities and Mediator Perceptions
Domestic Abuse, FL Realities and Mediator Perceptions
 
Family mediation week 6 dv and mediation 2022 (1)
Family mediation week 6 dv and mediation 2022 (1)Family mediation week 6 dv and mediation 2022 (1)
Family mediation week 6 dv and mediation 2022 (1)
 
Family mediation week 6 dv and mediation 2022
Family mediation week 6 dv and mediation 2022Family mediation week 6 dv and mediation 2022
Family mediation week 6 dv and mediation 2022
 

More from Resolver Inc.

More from Resolver Inc. (20)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 

Recently uploaded

Recently uploaded (12)

"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptxDAY 0 8 A Revelation 05-19-2024 PPT.pptx
DAY 0 8 A Revelation 05-19-2024 PPT.pptx
 
SaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of GuruSaaStr Workshop Wednesday with CEO of Guru
SaaStr Workshop Wednesday with CEO of Guru
 
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdfMicrosoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
Microsoft Fabric Analytics Engineer (DP-600) Exam Dumps 2024.pdf
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
Databricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdfDatabricks Machine Learning Associate Exam Dumps 2024.pdf
Databricks Machine Learning Associate Exam Dumps 2024.pdf
 
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdfACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
ACM CHT Best Inspection Practices Kinben Innovation MIC Slideshare.pdf
 
TSM unit 5 Toxicokinetics seminar by Ansari Aashif Raza.pptx
TSM unit 5 Toxicokinetics seminar by  Ansari Aashif Raza.pptxTSM unit 5 Toxicokinetics seminar by  Ansari Aashif Raza.pptx
TSM unit 5 Toxicokinetics seminar by Ansari Aashif Raza.pptx
 
2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx2024-05-15-Surat Meetup-Hyperautomation.pptx
2024-05-15-Surat Meetup-Hyperautomation.pptx
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...
 
STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...
STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...
STM valmiusseminaari 26-04-2024 PUUMALAINEN Ajankohtaista kansainvälisestä yh...
 

Threat Assessments 101: Understanding the Red Flags of Workplace Violence

  • 1.
  • 2. Threat Assessments 101: Understanding the Red Flags of Workplace Violence
  • 3. Stephen G. White, PhD President, Work Trauma Services Co-author of the WAVR-21 swhite@wtsglobal.com Reid Meloy, PhD Forensic Psychologist Co-author of the WAVR-21 DrReidMeloy.com Meet our Hosts
  • 4. Agenda ▪ Context for Threat Assessment ▪ An Illustrative Case ▪ What is the Pathway to Violence? ▪ Best Practices in Threat Assessments ▪ Do’s and Don’ts – Strategic Issues ▪ Structured Assessment Guides ▪ The WAVR-21 V3 ▪ Q&A Session
  • 5. A great deal has been learned about individual and organizational risk factors. Protocols exist: Threat scenarios can be assessed and managed safely. Violence risk is complex but comprehensible.
  • 6. An Illustrative Case: The “Senseless Supervisor” Agnes, a young associate in the client group, requests an urgent meeting with her HR manager. Entering the office, she is obviously very anxious and troubled. Near tears, Agnes discloses, “This is very hard for me but I can’t keep it to myself any longer. I have been having an affair with Jerry, my manager. He’s married, you know, and I am trying to get out of our relationship. But he has threatened me and says things like, ‘If I can’t have you, nobody will’.” Agnes confides that Jerry alludes to having firearms, and has physically abused his wife in the past. The police have been to their house. Agnes adds that some of the coworkers in their department are aware of the personal relationship between the two of them. Some fear for her safety as well as their own, and some resent her for their perception of “favors” that Jerry has extended to her. The HR manager knows that Jerry is rumored to be manipulative and intimidating; an all-around selfish, dishonest bully. He may have driven his previous boss to quit. He does what he wants and has never been consistently disciplined. Agnes claims, “He told me if he loses his job over this, he’ll have nothing left. I'm scared.” Agnes asks that Jerry will never know that she revealed all this stuff. As she rushes out the door she adds, “He drinks too much. I’m afraid his life is falling apart.” Tearfully she exclaims, “I hope I don’t lose my job over this.”
  • 7. Responding to the “Senseless Supervisor” ▪ How would you estimate Jerry’s risk for violence? ▪ How did you arrive at this conclusion? ▪ How does your organization assess violence risk? ▪ What do you see as viable response alternatives? ▪ Can your current practice withstand scrutiny?
  • 8. Recognize Important Contextual Factors ▪ A “cultural script” for notorious violence: “copy cats” ▪ Fear & disruption readily follow threats ▪ Low probability catastrophic events: the “haystack”
  • 9. The Pathway to Violence The “Grievance” Violent Ideation Research & Planning the Attack Pre-attack Preparation Probing & Breaches Attack Perpetrators don’t “snap”… they decide.
  • 10. Elements of a Successful Threat Management Program Violence prevention policy Threat management team Reporting and response process Organization wide awareness
  • 11. Common Program and Response Challenges The Silo Effect Missing a hot one vs. over responding to “nothing burgers” The Hasty Termination Unintended Consequences
  • 12. Strategic Guidelines for Case Management 1. Slow down, assess first (unless “imminent”) 2. Anticipate triggering events 3. Protect dignity, avoid shaming 4. Avoid “going to war” if possible 5. Use evidence-based assessment tools 6. Judgment will always be necessary 7. “Managing behaviors of concern in the present”
  • 13. Inquiry and Intervention Options ▪ Background checks & investigations, social media ▪ Collateral interviews with witnesses, managers, etc. ▪ Interview with subject-employee ▪ Professional risk assessment & defusing actions ▪ Protective orders ▪ Heightened security measures ▪ Law enforcement assistance, arrest & detention ▪ Treatment - voluntary or involuntary ▪ Case-appropriate separation steps & severance packs No cookbook. Judgment and deliberation are necessary!
  • 14. Who should assess what? ▪ A continuum of expertise – no clear line ▪ Inter-disciplinary specialization ▪ Risk screening vs. risk assessment ▪ Professional assessment: indirect vs direct “When in doubt, confer”
  • 15. Structured Professional Judgement Guides ▪ Developed to reflect the “state of the discipline” ▪ Empirical knowledge ▪ Professional Practice ▪ Identify a core set of factors to consider in assessment ▪ Improves consistency, utility, & transparency of decision making
  • 16. Examples of Structured Professional Judgement Guides ▪ Historical Clinical Risk Management (HCRV3) ▪ Stalking Risk Profile (SRP) ▪ Spousal Assault Risk Assessment (SARA) ▪ Risk for Sexual Violence Protocol (RSVP) ▪ Terrorist Radicalization Assessment Protocol (TRAP-18) ▪ Workplace Assessment of Violence Risk (WAVR-21)
  • 17. The WAVR-21 V3 A Structured Professional Judgement Guide for the Workplace Assessment of Violence Risk, 3rd Edition, 2016 Including Campus and Student Contexts Stephen G. White, Ph.D. J. Reid Meloy, Ph.D., ABPP
  • 18. Targeted Violence The major focus A Gateway Instrument Can use other SPJs Broader Net Bullying Stalking Maliciousness Subjects Employees Contractors Outsiders Intimate Partners Customers The WAVR-21
  • 19. The WAVR-21 Violence Risk Factors 1. Motives for Violence 2. Homicidal Fantasies, Violent Preoccupations or Identifications 3. Threatening Communications or Expressed Intent 4. Weapons Skill and/or Access 5. Pre-attack Planning and Preparation 6. Stalking or Menacing Behavior 7. Current Job or Academic Problems 8. Extreme Job or Academic Attachment 9. Loss, Personal Stressors and Negative Coping 10. Entitlement and Other Negative Traits 11. Lack of Conscience and Irresponsibility 12. Anger Problems 13. Suicidality and/or Depressive Mood 14. Irrationally Suspicious or Bizarre Beliefs 15. Substance Abuse and/or Dependence 16. Increasing Isolation 17. History of Violence, Criminality, and Conflict 18. Domestic/intimate Partner Violence 19. Situational and Organizational Contributors to Violence 20. Stabilizers and Buffers Against Violence 21. Organizational Impact of Real or Perceived Threats
  • 20. Scientific Basis for the WAVR-21 Empirical research on violence risk and protective factors Reliability Validity – University of Nebraska study Accumulated professional practice Caution: The WAVR is not a psychological test or quantitative measure of risk.
  • 21. How the WAVR helps teams 1. Focused on risk-relevant information and the direction of further inquiries 2. Transparency of assessment criteria improves team communication 3. Demonstrates reasonableness of the organization’s actions
  • 22.
  • 23.
  • 24.
  • 25. Jerry allegedly threatened Agnes if she broke off for their relationship. Jerry Michelle L. 09/20/2017 HR Intake
  • 26.
  • 27.
  • 29. 09/20/2017 Jerry has threatened Agnes that if he can’t have her, nobody will. Agnes Stephen White
  • 30. Jerry has threatened Agnes that if he can’t have her, nobody will. Agnes 09/20/2017 Stephen White
  • 32. The WAVR-21 Violence Risk Factors 1. Motives for Violence 2. Homicidal Fantasies, Violent Preoccupations or Identifications 3. Threatening Communications or Expressed Intent 4. Weapons Skill and/or Access 5. Pre-attack Planning and Preparation 6. Stalking or Menacing Behavior 7. Current Job or Academic Problems 8. Extreme Job or Academic Attachment 9. Loss, Personal Stressors and Negative Coping 10. Entitlement and Other Negative Traits 11. Lack of Conscience and Irresponsibility 12. Anger Problems 13. Suicidality and/or Depressive Mood 14. Irrationally Suspicious or Bizarre Beliefs 15. Substance Abuse and/or Dependence 16. Increasing Isolation 17. History of Violence, Criminality, and Conflict 18. Domestic/intimate Partner Violence 19. Situational and Organizational Contributors to Violence 20. Stabilizers and Buffers Against Violence 21. Organizational Impact of Real or Perceived Threats
  • 33. Identify the issues before they become incidents.