Instructions Using the Online Library, identify an article on an ethical issue in the workplace. This article should include a case study of an ethical incident by an organization. Create a case study
Risk Assessment of Workplace Violence:
Ethical and Procedural Issues
in Evaluating Employees
George E. Hargrave
ABSTRACT.
Mental health professionals are frequently called upon to
assess employees whose behaviors are seen as posing threats of work
-
place violence. This article discusses the ethical and procedural issues
involved in these evaluations. It addresses legal-ethical concerns associ-
ated with determining risk, the impact of assessment decisions on the
employee’s job, requirements of relevant employment law, and with
communicating results to others. Since workplace risk assessment fre-
quently involves the potential of targeted violence, the procedures are
discussed within the U.S. Secret Service framework for analyzing tar-
geted violence.
[Article copies available for a fee from The Haworth Document De-
livery Service: 1-800-342-9678. E-mail address: <[email protected]>
Website: <http://www.HaworthPress.com> ©
2001 by The Haworth Press, Inc.
All rights reserved.]
KEYWORDS.
Workplace violence, risk assessment, ethical issues, em
-
ployee evaluation
George E. Hargrave, PhD, is affiliated with the Occupational Psychological Services
and is in independent practice as a forensic psychologist in cases involving employment
law. He is a consultant to employers and law firms throughout northern California. He is
a Diplomate in Forensic Psychology, ABPP, and provides workshops on assessment of
workplace violence for the American Academy of Forensic Psychology.
Address correspondence to: George E. Hargrave, PhD, 2740 Fulton Avenue, Suite
128, Sacramento, CA 95821.
The author wishes to express appreciation to Mary C. Hargrave, PhD, and Deirdre
Hiatt, PhD, for their review and comments on this manuscript.
Journal of Threat Assessment, Vol. 1(2) 2001
2001 by The Haworth Press, Inc. All rights reserved.
1
Workplace violence constitutes a growing problem in the United
States. Although such incidents are still statistically rare, their possibil
-
ity of occurrence is of major concern for employers. The federal Occu
-
pational Safety and Health Act (OSHA) and state counterparts require
that employers take steps to provide a safe workplace. Further, under
the doctrine of
respondeat superior
(let the master answer), an em
-
ployer can be held financially responsible for damage resulting from an
employee’s behavior, if there is evidence that the employer was negli
-
gent in such areas as hiring and retention practices, training, or control
of employees. Therefore, an employer that learns an employee has
threatened violence toward other co-workers or managers is required to
take action to ensure safety in the work environment.
Mental health professionals have a long history of providing services
to employers (e.g., employee assistance programs, fitness for duty and
workers’ compensation evaluations). It is, perhaps, only natural that they
have been called upon to consult in cases involving threats of workplace
violence. This new role, however, necessitates that such professionals
acquire additional knowledge and skills to be effective in their consulta-
tions.
Although the vast majority of workplace violence incidents involve
perpetrators external to the worksite, most mental health professionals
become involved in the relatively small number of cases where employ-
ees are the source of threat. These are also cases where the mental health
consultant may evaluate the identified employee. This article synthe-
sizes the current professional literature and addresses the primary ethi-
cal and procedural issues associated with evaluating employees when
determining risk of violence. It will focus on legal-ethical consider-
ations associated with determining risk, the impact of assessment deci-
sions on the employee’s job, requirements of relevant employment law,
and with communicating results to others. It will then review the proce
-
dural issues associated with conducting a comprehensive and defen
-
sible
evaluation. Finally, since workplace threats frequently involve
identified targets for potential violence, the assessment process will be
examined in the framework developed by the U. S. Secret Service for
evaluating targeted violence (Borum, Fein, Vossekuil, & Berglund,
1999; Fein, Vossekuil, & Holden, 1995).
ETHICAL-LEGAL ISSUES
Inherent in any risk assessment of violence is an element of predic
-
tion. As most clinicians are painfully aware, the professional literature
2
JOURNAL OF THREAT ASSESSMENT
is replete with caveats associated with this process. The early literature
(Monohan, 1981) portrayed efforts at violence prediction as dismal.
The “second generation” of studies (Lidz, Mulvey, & Gardner, 1993;
Menzies & Webster, 1995; Monahan & Steadman, 1994; Mossman,
1994; Otto, 1992), although more charitable toward clinicians’ abilities
to predict violence, were far from glowing in their support of the pro
-
cess. Mossman (1994), for example, summarized clinicians’ ability to
distinguish violent from nonviolent patients as having a “modest,
better-than-chance level of accuracy” (p. 790), noting that past behavior
was frequently a better predictor than clinical judgments or cross-vali
-
dated actuarial techniques.
A major obstacle in any prediction of violence is the very low
base-rate of such behavior. In risk assessment, the term base-rate refers
to the “known prevalence of a specified type of violent behavior within
a given population over a given time period” (Borum, 1996, p. 946). A
low base-rate inherently leads to an unacceptably high false positive
rate, or the incorrect prediction that a given trait (e.g., high potential for
violence) exists. Although most of the previously-noted caveats were
issued in response to research on clinicians’ questionable ability to pre-
dict violence in patients, the prediction problem is even more pro-
nounced in the assessment of workplace violence. In this latter context,
base-rates are unusually low. Data reported by Bulatao and VandenBos
(1996) for the period 1980 to 1992, reflected only 0.7 per 100,000
workers to be victims of homicide, and between 1,000 and 3,000 per
100,000 workers to be victims of non-fatal workplace violence. Since
most violence was committed by individuals who had no legitimate
business relationship with the worksite, the base-rate of actual employ
-
ees committing violence of any type is exceeding low. Given this limi-
tation, a profile of the typical violent employee is of limited value at
best.
A second, related problem involves the lack of data relating employ
-
ees’ characteristics to any actual expression of violence. Several authors
(e.g., Bensimon, 1994; Johnson, Meyer, & Feldmann, 1995; Resnick &
Kausch, 1995) have identified risk factors associated with workplace
violence; however, there is little research on how such factors combine
to produce violent behavior. The reasonable premise that a large num
-
ber of risk factors increases the likelihood of future violence (Resnick &
Kausch, 1995) must be balanced with the knowledge that this assump
-
tion does not have empirical support.
Although an employer is required to take action when confronted
with a potentially violent employee, the previous concerns raise the is
-
George E. Hargrave
3
sue of whether it is ethical to use an assessment process that lacks validity
to take action against an employee. Certainly evaluators’ conclusions
about workplace violence do not have the profound impact of restrict
-
ing another person’s interest in “life and liberty” that Ewing (1991,
p. 161) addressed in his sweeping indictment of predicting dangerous
-
ness in criminal settings. They do, however, have the potential of dam
-
aging the person’s ability to engage in the important life activity of
work. Adopting a model of risk assessment and management, as op
-
posed to violence prediction, has clearly been a step toward resolving
this ethical dilemma. The process of risk assessment must still consider
the impact on the employee as well as the safety and security of others.
Numerous articles have distinguished between the processes of vio-
lence prediction and risk assessment. Heilbrun (1997) noted the general
distinction that prediction involves a single decision that must be in-
formed by the most accurate available information, and after which
there is no continued jurisdiction, while risk assessment/management
involves judgments for which there is an ongoing legal jurisdiction and
where decisions may be made or modified at different times. In assess-
ing the threat of workplace violence, there is the dual focus on deter-
mining the degree of risk posed by the individual and on developing/
implementing policies and procedures to deal with threat and protect
the workplace. This is a dynamic process that typically involves ongo-
ing assessment and multiple interventions. The evaluator, instead of
giving a prediction of violence, provides an assessment of risk by iden-
tifying risk factors and specifying interventions to address them.
One of the most frequent referrals for risk assessment occurs when an
employee threatens violence toward a supervisor or co-worker(s). Such
situations clearly require that the evaluation determine the nature and
degree of risk for potential targets. Under these circumstances, how-
ever, the employee is also frequently evaluated for risk of violence in
the more general context of determining fitness for continued job duty.
This raises the next issue, namely that these assessments must be con
-
ducted within the framework of employment law, the most basic com
-
ponent of which is the 1994 Americans with Disabilities Act (ADA;
1994).
Mental health professionals typically become involved in risk assess
-
ments when the identified employee’s behavior is aberrant, or there is
knowledge that the employee has a history of psychiatric treatment. In
these cases, the individual’s condition may constitute a disability under
the provisions of the ADA and the Equal Employment Opportunity
Commission’s (EEOC, 1997)
Enforcement Guidance on the Americans
4
JOURNAL OF THREAT ASSESSMENT
with Disabilities Act and Psychiatric Disabilities.
The ADA obviously
allows for an employer to take action if an employee’s behavior consti
-
tutes a “direct threat to the health or safety of the individual or others
that cannot be eliminated or reduced by reasonable accommodation”
(p. 19). The EEOC regulations explain, however, that “direct threat
means a significant risk of substantial harm to the health or safety of the
individual or others that cannot be eliminated or reduced by reasonable
accommodation” (p. 19). The significant risk must be “high and not just
slightly increased,” and the determination of threat “must be based on
an individualized assessment of the individual’s present ability to safely
perform the functions of the job, considering a reasonable medical judg
-
ment relying on the most current medical knowledge and/or the best
available objective evidence” (p. 19). To take personnel action against
an employee who poses a risk of violence, the employer “must identify
the specific behavior that would pose the direct threat” (p. 19). If the
employer’s action relies on a psychological evaluation, it places consid-
erable demands on the evaluator. In addition to being knowledgeable in
threat assessment, evaluators conducting these assessments must en-
sure that their procedures are consistent with standard practice for their
locale, be knowledgeable about essential duties of the employee’s job,
and be able to consult effectively with the employer on efforts to ac-
commodate the employee.
A fourth issue that arises in assessing risk of workplace violence is
that of confidentiality and informed consent. The evaluator’s role fre-
quently begins as a consultant to various members of the employer’s
risk management team, during which time there is typically much dis-
cussion of the case. Although hypothetical input from the mental health
consultant is valuable to this process, he/she must exercise caution in
commenting on the individual employee’s characteristics in the absence
of adequate data. The consultant should also assume from the outset that
he or she will be called upon to subsequently evaluate the employee.
Once this latter process is initiated, it is essential that all of the steps
necessary for an ethical forensic evaluation identified by such sources
as Melton, Petrila, Poythress, and Slobogin (1997) be followed. This
includes: (a) informing the employee of who initiated the evaluation;
(b) the professional’s role as an evaluator as opposed to a therapist;
(c) to whom any report will be sent; (d) what issues will be addressed in
the evaluation; (e) the foreseeable uses of evaluation data; (f) the pro
-
posed evaluation procedures; (g) the kinds of information that may re
-
quire disclosure to third parties; and (h) issues surrounding the legal
right to decline participation.
George E. Hargrave
5
Of particular significance is the issue of confidentiality. It is impor
-
tant for the evaluator to know how the jurisdiction’s statutes governing
medical records pertain to employment-related evaluations. For exam
-
ple, an employee undergoing such an assessment in California is con
-
sidered a
patient
under the statute governing the confidentiality of
medical records (
Pettus v. Cole,
1996). This exists in spite of the fact
that there is no
doctor-patient
treatment relationship. The release of any
clinical data to the employer can occur only with the specific written
consent of the employee. In the absence of this consent, the evaluator
can report back only the recommended action. Under all circumstances,
the evaluator must minimize intrusions into the employee’s life and
limit any feedback to that which is germane to the purpose of the evalu-
ation.
One of the exceptions to most states’ confidentiality laws is the men-
tal health professional’s duty to warn or protect potential victims of vio-
lence based on
Tarasoff v. Regents of the University of California,
(1976) and subsequent legal decisions. Whether this issue applies to
such professionals serving as evaluators depends on the context (Mel-
ton et al., 1997). Evaluators assessing an individual for the threat of
workplace violence must, therefore, know their jurisdictions’ legal
standards for the duty to warn or protect an identifiable third party when
they know, or should know, that the individual constitutes a significant
threat of violence. Resnick and Kausch (1995) note that in such situa-
tions the evaluator may need to take such protective steps as notifying
the employer or coworkers, contacting law enforcement, hospitalizing
the employee, or taking other reasonable actions.
PROCEDURAL ISSUES
Over the past twenty years, several authors have proposed proce
-
dures for assessing risk of violence. Monahan’s (1981) prototypic work
on violence prediction was important, because it shifted the assessment
process from variables internal to the subject to a focus on factors that
precipitated former violence; these included the context in which vio
-
lence occurred, the individual’s history of violence, base-rates of vio
-
lence for similar individuals, stressors in the individual’s life, the
similarity of current context to former contexts associated with vio
-
lence, and the availability of both means and victims for violence. More
recently, the U.S. Secret Service adopted a schema for assessing the
general risk of targeted violence (Borum et al., 1999; Fein & Vossekuil,
6
JOURNAL OF THREAT ASSESSMENT
1998; Fein et al., 1995). This latter approach does not rely on subject
profile data or threats as a threshold for risk; rather, it is based on three
principles and the responses to ten key assessment questions (Borum et
al., 1999). As noted previously, this framework appears to be well
suited for workplace risk assessments due to the potential for targeted
violence against others in this setting (e.g., supervisors, co-workers, hu
-
man resource personnel).
The three fundamental principles underlying the Secret Service as
-
sessment approach involve the interaction between the subject and
his/her environment. The first principle assumes that targeted violence
results from an understandable process of a subject’s thinking and be
-
havior. The second principle states that violence emanates from the in-
teraction between the subject and past stressful situations, current
situation, and the targeted victim. The third principle views an identifi-
cation of the subject’s “attack-related” behaviors as critical to the inves-
tigation and resolution of the threat assessment (Borum et al., 1999).
The following discussion will examine the procedural issues for assess-
ing the threat of workplace violence in the framework of the ten ques-
tions outlined by Borum and his colleagues (1999).
Question 1: What motivated the subject to make statements or take
action, that caused him/her to come to attention?
When assessing the threat of workplace violence, the process of an-
swering this question is typically underway prior to the mental health
consultant’s arrival. An increasing number of companies and govern-
mental agencies have adopted procedures for dealing with workplace
violence, such as those modeled after guidelines published by the Inter
-
national Association of Chiefs of Police (1997), Littler, Mendelsen,
Fastiff, Tichy, and Mathiason (1996), and other sources. In such cases,
employers approach the investigation through risk management teams
and procedures they have in place. In the event that there is no organiza
-
tional framework for handling threats, the mental health consultant can
provide a valuable service in assisting the employer with this process.
This, of course, requires that the consultant have a sound knowledge of
issues the employer must attend to as well as the procedures for address
-
ing them.
Once the mental health consultant enters the assessment process, a
typical starting point is to review information that has been collected on
the threatening situation and to interview the individuals who provided
this information. The employee’s personnel records are generally an
George E. Hargrave
7
initial focus and provide such data as identifying information, work his
-
tory and performance ratings, grievances, and disciplinary actions. Risk
assessments differ from typical clinical evaluations by their emphasis
on data obtained from collateral sources. Input from co-workers and su
-
pervisors provide valuable information about the employee’s job status,
work and personal problems, aggressive displays, and statements of
threat. In some situations, concerned friends and/or family members are
willing to be interviewed; obviously, they are a valuable source in as
-
sessing the subject’s motivation. In addition to obtaining others’ per
-
ceptions of the reason for referral, it is important that interviews with
collateral sources focus on characteristics of the subject shown by the
professional literature to be associated with workplace violence (e.g.,
Bensimon, 1994; Johnson et al., 1995; Resnick & Kausch, 1995). This
includes information on the individual’s personal history, personality
characteristics, past incidents of aggression, ownership of weapons, and
substance abuse, as well as current factors that signal possible escalat-
ing violence (e.g., indications of increased problems outside of work,
increased expression of anger, drastic change in belief systems, de-
creased emotional control).
Question 2: What has the subject communicated to anyone
concerning his/her intentions?
This question can obviously be investigated during the interviews
noted in Question 1. When assessing threatening communications by
the subject, collateral sources should be queried about any unusual or
inappropriate ideas that indicate desperation, decompensation, and po
-
tential targets of violence.
If the data suggest that the employee poses a threat to others, he or
she should be set up for an immediate individual evaluation. In consul
-
tation with the evaluator, the employer must also implement an immedi
-
ate plan for protecting others. However, in many cases this initial
process does not indicate a need for immediate action and the employee
can be evaluated at a later date. This may occur when the problem was
resolved by some administrative action or when the employee entered
the hospital or other treatment. These latter cases, however, frequently
involve a risk assessment when the employee is cleared to return to
work.
Obviously, the subject’s motivation will be a focus of interviews
with the individual. When interviewing the employee, it is important to
use a structured format that contains the areas identified as relevant by
8
JOURNAL OF THREAT ASSESSMENT
the risk assessment literature (e.g., Heilbrun, 1998; Johnson et al., 1995;
Monahan, 1981; Resnick & Kausch, 1995). These will be covered in the
response to Question 5.
Once information is collected from both collateral sources and the in
-
dividual, it can be
organized in a framework that assesses individual/ per
-
sonal variables (e.g., substance abuse, violence history, psychopathology,
impulse control, weapons access, etc.), situational factors (e.g., job prob
-
lems, conflicts with co-workers, other stressors in the individual’s life),
and the interaction between these two sets of variables (Barling, 1996;
Heilbrun, 1998). Overall, the data should provide an understanding of
the employee’s motivation for the threatening behavior.
Question 3: Has the subject shown an interest in targeted violence,
perpetrators of targeted violence, weapons, extremist groups,
or murder?
Borum and his colleagues (1999) noted that, “some perpetrators of
targeted violence show an unusual interest in acts similar to the one they
are planning,” and that the individual’s affiliation with extremist groups
may provide “permission” for such an act (p. 332). If there is evidence
of extremist group membership, the assessment focus should include
such areas as those identified by Pynchon and Borum (1999), including
distorted perceptions (e.g., prejudices), tendencies to dehumanize non-
group members, a diminished sense of accountability or self-awareness,
support of violence as a legitimate means to accomplish an objective,
and willingness to violate group norms toward more deviant behavior.
Although some authors have listed fascination with workplace vio
-
lence as a warning sign (e.g., Hatcher & Reynolds, 1996), how this in-
terest correlates with actual violence is unknown. If present, such
interests should be assessed both in discussions with collateral sources
and during the interview(s) with the individual. These inquiries should
also include questions about any individuals the employee perceives as
enemies. An expressed interest in weapons is an important assessment
area, since it likely correlates with possession of weapons. Given the
lethality of guns and their prevalence in workplace violence (Johnson,
Meyer, & Feldmann, 1995), a weapons assessment should focus on
such factors as the number and types of guns owned, any recent acquisi
-
tions, whether the individual legally or illegally carries a gun, any re
-
cent renewed interest in guns, any history of brandishing a gun, and any
incidents of using a gun or other weapon in a conflict. Information ob
-
tained in response to this question provides additional data as to the in
-
George E. Hargrave
9
dividual’s motivation for violence as well as an assessment of potential
targets and the means to carry out violence.
Question 4: Has the subject engaged in attack-related behavior,
including any menacing, harassing, and/or stalking-type behavior?
Responses given to questions about the subject’s interest in targeted
violence, weapons, and extremist groups naturally lead into an assess
-
ment of the individual’s history of violence and intimidation. Clearly,
evidence of past aggression and violence is the primary predictor of
subsequent violence, particularly if the circumstances of the past and
future incidents are similar. Thus, any evaluation should focus on deter-
mining frequency and severity of such acts, circumstances under which
they occurred, the contribution of drugs and/or alcohol to the process,
whether the acts were planned or impulsive, and the subject’s thoughts
and feelings associated with each incident. In circumstances where the
behavior was associated with actual violence, it is also important to as-
sess the types and severity of acts, the role of weapons, and the specific
contexts under which violence occurred. This information should be
sought from both the individual and collateral sources. The interview
focused on current concerns should include any indications of specific
targets and the individual’s access to weapons.
One particular concern is stalking behavior, which is defined as “the
willful, malicious, and repeated following of another that threatens his
or her safety” (Meloy & Gothard, 1995, p. 258). The act of following
that does not rise to this level is generally referred to as
obsessional fol-
lowing
(Meloy, 1996). In the data reported by Johnson and colleagues
(1995), stalking or hostage-taking occurred in approximately one-third
of workplace violence cases. Data compiled by Hargrave (1999, 2000)
comparably found stalking or obsessive following to have occurred in
approximately one-third of cases where an actual threat of violence was
found. Given this prevalence of stalking or obsessional following
among individuals who perpetrate workplace violence, it becomes an
important area to assess. A relatively frequent threat of workplace vio
-
lence involves the stalking of employees by intimate or formerly inti
-
mate others. In such instances, it may become necessary to protect the
targeted employee and co-workers without being able to evaluate the
stalker. This typically requires that the evaluator interview the victim to
assess the relationship between victim and stalker. In addition, any ob
-
tainable information from the victim or others should be used to assess
the suspect’s history of general and domestic violence, psychiatric and
10
JOURNAL OF THREAT ASSESSMENT
Top of Form
/ 21
Bottom of Form