Instructions Using the Online Library, identify an article on an ethical issue in the workplace. This article should include a case study of an ethical incident by an organization. Create a case study

Would you like us to handle your paper? Use our company for better grades and meet your deadlines.

Order a Similar Paper Order a Different Paper


Using the Online Library, identify an article on an ethical issue in the workplace. This article should include a case study of an ethical incident by an organization.

Create a case study that addresses the following questions:

  • What was the ethical situation, and what led to the problem?
  • How did the organization respond?
  • What were the consequences of these actions?
  • What did you learn about professional ethics through this case study?

Your complete case study must be at least two pages in length. Adhere to APA Style when constructing this assignment, including in-text citations and references for all sources that are used.

Article attached


Consider an organization for which you have worked in the past or one in which you currently work or have observed in a movie or series. Write an essay responding to the following prompts:

  1. Explain organizational culture, and describe your experience or observation of an organizational culture.
  2. How did shared values, beliefs, assumptions, and behaviors influence the culture?
  3. Explain your experience or observation of group development referring to Tuckman’s model.
  4. Compare a homogeneous and heterogeneous culture, and describe how either relates to your experience.
  5. Explain how a diverse culture contributes to organizational performance.
  6. Explain how leadership affects a diverse culture within a global organization.

Your submission should be at least two pages in essay format with an introduction and conclusion. Headings and subheadings are encouraged. You must include at least one outside source. All sources used must be referenced; paraphrased and quoted material must have accompanying citations. Be sure to use APA Style for citations and references.

Instructions Using the Online Library, identify an article on an ethical issue in the workplace. This article should include a case study of an ethical incident by an organization. Create a case study
Risk Assessment of Workplace Violence: Ethical and Procedural Issues in Evaluating Employees George E. Hargrave ABSTRACT. Mental health professionals are frequently called upon to assess employees whose behaviors are seen as posing threats of work – place violence. This article discusses the ethical and procedural issues involved in these evaluations. It addresses legal-ethical concerns associ- ated with determining risk, the impact of assessment decisions on the employee’s job, requirements of relevant employment law, and with communicating results to others. Since workplace risk assessment fre- quently involves the potential of targeted violence, the procedures are discussed within the U.S. Secret Service framework for analyzing tar- geted violence. [Article copies available for a fee from The Haworth Document De- livery Service: 1-800-342-9678. E-mail address: <[email protected]> Website: © 2001 by The Haworth Press, Inc. All rights reserved.] KEYWORDS. Workplace violence, risk assessment, ethical issues, em – ployee evaluation George E. Hargrave, PhD, is affiliated with the Occupational Psychological Services and is in independent practice as a forensic psychologist in cases involving employment law. He is a consultant to employers and law firms throughout northern California. He is a Diplomate in Forensic Psychology, ABPP, and provides workshops on assessment of workplace violence for the American Academy of Forensic Psychology. Address correspondence to: George E. Hargrave, PhD, 2740 Fulton Avenue, Suite 128, Sacramento, CA 95821. The author wishes to express appreciation to Mary C. Hargrave, PhD, and Deirdre Hiatt, PhD, for their review and comments on this manuscript. Journal of Threat Assessment, Vol. 1(2) 2001  2001 by The Haworth Press, Inc. All rights reserved. 1 Workplace violence constitutes a growing problem in the United States. Although such incidents are still statistically rare, their possibil – ity of occurrence is of major concern for employers. The federal Occu – pational Safety and Health Act (OSHA) and state counterparts require that employers take steps to provide a safe workplace. Further, under the doctrine of respondeat superior (let the master answer), an em – ployer can be held financially responsible for damage resulting from an employee’s behavior, if there is evidence that the employer was negli – gent in such areas as hiring and retention practices, training, or control of employees. Therefore, an employer that learns an employee has threatened violence toward other co-workers or managers is required to take action to ensure safety in the work environment. Mental health professionals have a long history of providing services to employers (e.g., employee assistance programs, fitness for duty and workers’ compensation evaluations). It is, perhaps, only natural that they have been called upon to consult in cases involving threats of workplace violence. This new role, however, necessitates that such professionals acquire additional knowledge and skills to be effective in their consulta- tions. Although the vast majority of workplace violence incidents involve perpetrators external to the worksite, most mental health professionals become involved in the relatively small number of cases where employ- ees are the source of threat. These are also cases where the mental health consultant may evaluate the identified employee. This article synthe- sizes the current professional literature and addresses the primary ethi- cal and procedural issues associated with evaluating employees when determining risk of violence. It will focus on legal-ethical consider- ations associated with determining risk, the impact of assessment deci- sions on the employee’s job, requirements of relevant employment law, and with communicating results to others. It will then review the proce – dural issues associated with conducting a comprehensive and defen – sible evaluation. Finally, since workplace threats frequently involve identified targets for potential violence, the assessment process will be examined in the framework developed by the U. S. Secret Service for evaluating targeted violence (Borum, Fein, Vossekuil, & Berglund, 1999; Fein, Vossekuil, & Holden, 1995). ETHICAL-LEGAL ISSUES Inherent in any risk assessment of violence is an element of predic – tion. As most clinicians are painfully aware, the professional literature 2 JOURNAL OF THREAT ASSESSMENT is replete with caveats associated with this process. The early literature (Monohan, 1981) portrayed efforts at violence prediction as dismal. The “second generation” of studies (Lidz, Mulvey, & Gardner, 1993; Menzies & Webster, 1995; Monahan & Steadman, 1994; Mossman, 1994; Otto, 1992), although more charitable toward clinicians’ abilities to predict violence, were far from glowing in their support of the pro – cess. Mossman (1994), for example, summarized clinicians’ ability to distinguish violent from nonviolent patients as having a “modest, better-than-chance level of accuracy” (p. 790), noting that past behavior was frequently a better predictor than clinical judgments or cross-vali – dated actuarial techniques. A major obstacle in any prediction of violence is the very low base-rate of such behavior. In risk assessment, the term base-rate refers to the “known prevalence of a specified type of violent behavior within a given population over a given time period” (Borum, 1996, p. 946). A low base-rate inherently leads to an unacceptably high false positive rate, or the incorrect prediction that a given trait (e.g., high potential for violence) exists. Although most of the previously-noted caveats were issued in response to research on clinicians’ questionable ability to pre- dict violence in patients, the prediction problem is even more pro- nounced in the assessment of workplace violence. In this latter context, base-rates are unusually low. Data reported by Bulatao and VandenBos (1996) for the period 1980 to 1992, reflected only 0.7 per 100,000 workers to be victims of homicide, and between 1,000 and 3,000 per 100,000 workers to be victims of non-fatal workplace violence. Since most violence was committed by individuals who had no legitimate business relationship with the worksite, the base-rate of actual employ – ees committing violence of any type is exceeding low. Given this limi- tation, a profile of the typical violent employee is of limited value at best. A second, related problem involves the lack of data relating employ – ees’ characteristics to any actual expression of violence. Several authors (e.g., Bensimon, 1994; Johnson, Meyer, & Feldmann, 1995; Resnick & Kausch, 1995) have identified risk factors associated with workplace violence; however, there is little research on how such factors combine to produce violent behavior. The reasonable premise that a large num – ber of risk factors increases the likelihood of future violence (Resnick & Kausch, 1995) must be balanced with the knowledge that this assump – tion does not have empirical support. Although an employer is required to take action when confronted with a potentially violent employee, the previous concerns raise the is – George E. Hargrave 3 sue of whether it is ethical to use an assessment process that lacks validity to take action against an employee. Certainly evaluators’ conclusions about workplace violence do not have the profound impact of restrict – ing another person’s interest in “life and liberty” that Ewing (1991, p. 161) addressed in his sweeping indictment of predicting dangerous – ness in criminal settings. They do, however, have the potential of dam – aging the person’s ability to engage in the important life activity of work. Adopting a model of risk assessment and management, as op – posed to violence prediction, has clearly been a step toward resolving this ethical dilemma. The process of risk assessment must still consider the impact on the employee as well as the safety and security of others. Numerous articles have distinguished between the processes of vio- lence prediction and risk assessment. Heilbrun (1997) noted the general distinction that prediction involves a single decision that must be in- formed by the most accurate available information, and after which there is no continued jurisdiction, while risk assessment/management involves judgments for which there is an ongoing legal jurisdiction and where decisions may be made or modified at different times. In assess- ing the threat of workplace violence, there is the dual focus on deter- mining the degree of risk posed by the individual and on developing/ implementing policies and procedures to deal with threat and protect the workplace. This is a dynamic process that typically involves ongo- ing assessment and multiple interventions. The evaluator, instead of giving a prediction of violence, provides an assessment of risk by iden- tifying risk factors and specifying interventions to address them. One of the most frequent referrals for risk assessment occurs when an employee threatens violence toward a supervisor or co-worker(s). Such situations clearly require that the evaluation determine the nature and degree of risk for potential targets. Under these circumstances, how- ever, the employee is also frequently evaluated for risk of violence in the more general context of determining fitness for continued job duty. This raises the next issue, namely that these assessments must be con – ducted within the framework of employment law, the most basic com – ponent of which is the 1994 Americans with Disabilities Act (ADA; 1994). Mental health professionals typically become involved in risk assess – ments when the identified employee’s behavior is aberrant, or there is knowledge that the employee has a history of psychiatric treatment. In these cases, the individual’s condition may constitute a disability under the provisions of the ADA and the Equal Employment Opportunity Commission’s (EEOC, 1997) Enforcement Guidance on the Americans 4 JOURNAL OF THREAT ASSESSMENT with Disabilities Act and Psychiatric Disabilities. The ADA obviously allows for an employer to take action if an employee’s behavior consti – tutes a “direct threat to the health or safety of the individual or others that cannot be eliminated or reduced by reasonable accommodation” (p. 19). The EEOC regulations explain, however, that “direct threat means a significant risk of substantial harm to the health or safety of the individual or others that cannot be eliminated or reduced by reasonable accommodation” (p. 19). The significant risk must be “high and not just slightly increased,” and the determination of threat “must be based on an individualized assessment of the individual’s present ability to safely perform the functions of the job, considering a reasonable medical judg – ment relying on the most current medical knowledge and/or the best available objective evidence” (p. 19). To take personnel action against an employee who poses a risk of violence, the employer “must identify the specific behavior that would pose the direct threat” (p. 19). If the employer’s action relies on a psychological evaluation, it places consid- erable demands on the evaluator. In addition to being knowledgeable in threat assessment, evaluators conducting these assessments must en- sure that their procedures are consistent with standard practice for their locale, be knowledgeable about essential duties of the employee’s job, and be able to consult effectively with the employer on efforts to ac- commodate the employee. A fourth issue that arises in assessing risk of workplace violence is that of confidentiality and informed consent. The evaluator’s role fre- quently begins as a consultant to various members of the employer’s risk management team, during which time there is typically much dis- cussion of the case. Although hypothetical input from the mental health consultant is valuable to this process, he/she must exercise caution in commenting on the individual employee’s characteristics in the absence of adequate data. The consultant should also assume from the outset that he or she will be called upon to subsequently evaluate the employee. Once this latter process is initiated, it is essential that all of the steps necessary for an ethical forensic evaluation identified by such sources as Melton, Petrila, Poythress, and Slobogin (1997) be followed. This includes: (a) informing the employee of who initiated the evaluation; (b) the professional’s role as an evaluator as opposed to a therapist; (c) to whom any report will be sent; (d) what issues will be addressed in the evaluation; (e) the foreseeable uses of evaluation data; (f) the pro – posed evaluation procedures; (g) the kinds of information that may re – quire disclosure to third parties; and (h) issues surrounding the legal right to decline participation. George E. Hargrave 5 Of particular significance is the issue of confidentiality. It is impor – tant for the evaluator to know how the jurisdiction’s statutes governing medical records pertain to employment-related evaluations. For exam – ple, an employee undergoing such an assessment in California is con – sidered a patient under the statute governing the confidentiality of medical records ( Pettus v. Cole, 1996). This exists in spite of the fact that there is no doctor-patient treatment relationship. The release of any clinical data to the employer can occur only with the specific written consent of the employee. In the absence of this consent, the evaluator can report back only the recommended action. Under all circumstances, the evaluator must minimize intrusions into the employee’s life and limit any feedback to that which is germane to the purpose of the evalu- ation. One of the exceptions to most states’ confidentiality laws is the men- tal health professional’s duty to warn or protect potential victims of vio- lence based on Tarasoff v. Regents of the University of California, (1976) and subsequent legal decisions. Whether this issue applies to such professionals serving as evaluators depends on the context (Mel- ton et al., 1997). Evaluators assessing an individual for the threat of workplace violence must, therefore, know their jurisdictions’ legal standards for the duty to warn or protect an identifiable third party when they know, or should know, that the individual constitutes a significant threat of violence. Resnick and Kausch (1995) note that in such situa- tions the evaluator may need to take such protective steps as notifying the employer or coworkers, contacting law enforcement, hospitalizing the employee, or taking other reasonable actions. PROCEDURAL ISSUES Over the past twenty years, several authors have proposed proce – dures for assessing risk of violence. Monahan’s (1981) prototypic work on violence prediction was important, because it shifted the assessment process from variables internal to the subject to a focus on factors that precipitated former violence; these included the context in which vio – lence occurred, the individual’s history of violence, base-rates of vio – lence for similar individuals, stressors in the individual’s life, the similarity of current context to former contexts associated with vio – lence, and the availability of both means and victims for violence. More recently, the U.S. Secret Service adopted a schema for assessing the general risk of targeted violence (Borum et al., 1999; Fein & Vossekuil, 6 JOURNAL OF THREAT ASSESSMENT 1998; Fein et al., 1995). This latter approach does not rely on subject profile data or threats as a threshold for risk; rather, it is based on three principles and the responses to ten key assessment questions (Borum et al., 1999). As noted previously, this framework appears to be well suited for workplace risk assessments due to the potential for targeted violence against others in this setting (e.g., supervisors, co-workers, hu – man resource personnel). The three fundamental principles underlying the Secret Service as – sessment approach involve the interaction between the subject and his/her environment. The first principle assumes that targeted violence results from an understandable process of a subject’s thinking and be – havior. The second principle states that violence emanates from the in- teraction between the subject and past stressful situations, current situation, and the targeted victim. The third principle views an identifi- cation of the subject’s “attack-related” behaviors as critical to the inves- tigation and resolution of the threat assessment (Borum et al., 1999). The following discussion will examine the procedural issues for assess- ing the threat of workplace violence in the framework of the ten ques- tions outlined by Borum and his colleagues (1999). Question 1: What motivated the subject to make statements or take action, that caused him/her to come to attention? When assessing the threat of workplace violence, the process of an- swering this question is typically underway prior to the mental health consultant’s arrival. An increasing number of companies and govern- mental agencies have adopted procedures for dealing with workplace violence, such as those modeled after guidelines published by the Inter – national Association of Chiefs of Police (1997), Littler, Mendelsen, Fastiff, Tichy, and Mathiason (1996), and other sources. In such cases, employers approach the investigation through risk management teams and procedures they have in place. In the event that there is no organiza – tional framework for handling threats, the mental health consultant can provide a valuable service in assisting the employer with this process. This, of course, requires that the consultant have a sound knowledge of issues the employer must attend to as well as the procedures for address – ing them. Once the mental health consultant enters the assessment process, a typical starting point is to review information that has been collected on the threatening situation and to interview the individuals who provided this information. The employee’s personnel records are generally an George E. Hargrave 7 initial focus and provide such data as identifying information, work his – tory and performance ratings, grievances, and disciplinary actions. Risk assessments differ from typical clinical evaluations by their emphasis on data obtained from collateral sources. Input from co-workers and su – pervisors provide valuable information about the employee’s job status, work and personal problems, aggressive displays, and statements of threat. In some situations, concerned friends and/or family members are willing to be interviewed; obviously, they are a valuable source in as – sessing the subject’s motivation. In addition to obtaining others’ per – ceptions of the reason for referral, it is important that interviews with collateral sources focus on characteristics of the subject shown by the professional literature to be associated with workplace violence (e.g., Bensimon, 1994; Johnson et al., 1995; Resnick & Kausch, 1995). This includes information on the individual’s personal history, personality characteristics, past incidents of aggression, ownership of weapons, and substance abuse, as well as current factors that signal possible escalat- ing violence (e.g., indications of increased problems outside of work, increased expression of anger, drastic change in belief systems, de- creased emotional control). Question 2: What has the subject communicated to anyone concerning his/her intentions? This question can obviously be investigated during the interviews noted in Question 1. When assessing threatening communications by the subject, collateral sources should be queried about any unusual or inappropriate ideas that indicate desperation, decompensation, and po – tential targets of violence. If the data suggest that the employee poses a threat to others, he or she should be set up for an immediate individual evaluation. In consul – tation with the evaluator, the employer must also implement an immedi – ate plan for protecting others. However, in many cases this initial process does not indicate a need for immediate action and the employee can be evaluated at a later date. This may occur when the problem was resolved by some administrative action or when the employee entered the hospital or other treatment. These latter cases, however, frequently involve a risk assessment when the employee is cleared to return to work. Obviously, the subject’s motivation will be a focus of interviews with the individual. When interviewing the employee, it is important to use a structured format that contains the areas identified as relevant by 8 JOURNAL OF THREAT ASSESSMENT the risk assessment literature (e.g., Heilbrun, 1998; Johnson et al., 1995; Monahan, 1981; Resnick & Kausch, 1995). These will be covered in the response to Question 5. Once information is collected from both collateral sources and the in – dividual, it can be organized in a framework that assesses individual/ per – sonal variables (e.g., substance abuse, violence history, psychopathology, impulse control, weapons access, etc.), situational factors (e.g., job prob – lems, conflicts with co-workers, other stressors in the individual’s life), and the interaction between these two sets of variables (Barling, 1996; Heilbrun, 1998). Overall, the data should provide an understanding of the employee’s motivation for the threatening behavior. Question 3: Has the subject shown an interest in targeted violence, perpetrators of targeted violence, weapons, extremist groups, or murder? Borum and his colleagues (1999) noted that, “some perpetrators of targeted violence show an unusual interest in acts similar to the one they are planning,” and that the individual’s affiliation with extremist groups may provide “permission” for such an act (p. 332). If there is evidence of extremist group membership, the assessment focus should include such areas as those identified by Pynchon and Borum (1999), including distorted perceptions (e.g., prejudices), tendencies to dehumanize non- group members, a diminished sense of accountability or self-awareness, support of violence as a legitimate means to accomplish an objective, and willingness to violate group norms toward more deviant behavior. Although some authors have listed fascination with workplace vio – lence as a warning sign (e.g., Hatcher & Reynolds, 1996), how this in- terest correlates with actual violence is unknown. If present, such interests should be assessed both in discussions with collateral sources and during the interview(s) with the individual. These inquiries should also include questions about any individuals the employee perceives as enemies. An expressed interest in weapons is an important assessment area, since it likely correlates with possession of weapons. Given the lethality of guns and their prevalence in workplace violence (Johnson, Meyer, & Feldmann, 1995), a weapons assessment should focus on such factors as the number and types of guns owned, any recent acquisi – tions, whether the individual legally or illegally carries a gun, any re – cent renewed interest in guns, any history of brandishing a gun, and any incidents of using a gun or other weapon in a conflict. Information ob – tained in response to this question provides additional data as to the in – George E. Hargrave 9 dividual’s motivation for violence as well as an assessment of potential targets and the means to carry out violence. Question 4: Has the subject engaged in attack-related behavior, including any menacing, harassing, and/or stalking-type behavior? Responses given to questions about the subject’s interest in targeted violence, weapons, and extremist groups naturally lead into an assess – ment of the individual’s history of violence and intimidation. Clearly, evidence of past aggression and violence is the primary predictor of subsequent violence, particularly if the circumstances of the past and future incidents are similar. Thus, any evaluation should focus on deter- mining frequency and severity of such acts, circumstances under which they occurred, the contribution of drugs and/or alcohol to the process, whether the acts were planned or impulsive, and the subject’s thoughts and feelings associated with each incident. In circumstances where the behavior was associated with actual violence, it is also important to as- sess the types and severity of acts, the role of weapons, and the specific contexts under which violence occurred. This information should be sought from both the individual and collateral sources. The interview focused on current concerns should include any indications of specific targets and the individual’s access to weapons. One particular concern is stalking behavior, which is defined as “the willful, malicious, and repeated following of another that threatens his or her safety” (Meloy & Gothard, 1995, p. 258). The act of following that does not rise to this level is generally referred to as obsessional fol- lowing (Meloy, 1996). In the data reported by Johnson and colleagues (1995), stalking or hostage-taking occurred in approximately one-third of workplace violence cases. Data compiled by Hargrave (1999, 2000) comparably found stalking or obsessive following to have occurred in approximately one-third of cases where an actual threat of violence was found. Given this prevalence of stalking or obsessional following among individuals who perpetrate workplace violence, it becomes an important area to assess. A relatively frequent threat of workplace vio – lence involves the stalking of employees by intimate or formerly inti – mate others. In such instances, it may become necessary to protect the targeted employee and co-workers without being able to evaluate the stalker. This typically requires that the evaluator interview the victim to assess the relationship between victim and stalker. In addition, any ob – tainable information from the victim or others should be used to assess the suspect’s history of general and domestic violence, psychiatric and 10 JOURNAL OF THREAT ASSESSMENT Top of Form  / 21 Bottom of Form

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers. Get a 15% discount on your order using the following coupon code SAVE15

Order a Similar Paper Order a Different Paper