The Permissive Environment is the Perpetrator

Written by Felix P. Nater

The Permissive Environment Is The Suspect...

The permissive and participatory conduct which most employees take for granted,eventually escalates intorepparttar more serious assaultive behavior commonly referred to as employee on employee workplace violence starts with innuendos, a bad word, or simple jokes taken out of context or used to inflame another. Initiation of a proper and thorough investigation is possible underrepparttar 131998 auspices of a Threat Assessment Team. Banter between employees if left alone by supervisors becomes tense and often results in a more aggressive response. The truth ofrepparttar 131999 matter is that in most cases this banter is perceived as harmless shop talk.

Supervisors often believe that this healthy shop talk builds camaraderie and does not detract from performance. However, such permissive behavior empowersrepparttar 132000 potential perpetrator who may feel he enjoysrepparttar 132001 partiality ofrepparttar 132002 supervisor. After all, he does his job, pumps outrepparttar 132003 numbers and meets repparttar 132004 "bosses" demands. Regardless ofrepparttar 132005 relationship and his performance, definite and clear action should be taken initially to curtailrepparttar 132006 potential of an explosive situation from impactingrepparttar 132007 workplace. The spontaneous reaction by repparttar 132008 victim is surprising and could be sufficiently volatile to affect bystanders as well.

Remembering thatrepparttar 132009 business owner is ultimately responsible forrepparttar 132010 actions they fail to take in any situation placesrepparttar 132011 decision in question. The prevention of workplace violence requires a proactive response. Security is everyone's responsibility but ultimately but ultimately management's duty. The exposure to violent behavior by non employees is yet another issue which will be presented in future articles.

In a permissive environment,repparttar 132012 uninformed employee has no idea that emotions tied into simple acts of harassment are an explosive combination often leading to a spontaneous counter response byrepparttar 132013 victim. Whilerepparttar 132014 response is unfortunate in terms of who ultimately precipitatedrepparttar 132015 incident,repparttar 132016 victim who is now takingrepparttar 132017 action into his hands becomesrepparttar 132018 aggressor and must be held accountable.

Using a Threat Assessment Team or a trained group of individuals would berepparttar 132019 proper approach in this scenario and in future incidents. The conduct ofrepparttar 132020 Threat Assessment Process would involverepparttar 132021 total analysis of information and intelligence available aboutrepparttar 132022 participants,repparttar 132023 incident andrepparttar 132024 environment in order to render a fair and impartial outcome. Being properly trained is key. Knowledge of how to conduct a fact finding investigation is critical torepparttar 132025 successful determination of repparttar 132026 type of disciplinary action or criminal prosecution might bring. The process should synchronized and well coordinated and reflective ofrepparttar 132027 organization's leadership team if possible to insure thatrepparttar 132028 preliminary responsibility of conductingrepparttar 132029 fact finding investigative process does not fall onrepparttar 132030 shoulders ofrepparttar 132031 Security Director only. The major players ofrepparttar 132032 Threat Assessment Team should include at a minimum:repparttar 132033 Immediate Supervisor, Personnel & Human Resource Managers, Employee Assistance, Safety and Security Managers, to insure a thorough Threat Assessment (Investigation) is conducted.

A Hacker Inside Your Computer?

Written by Jim Edwards

Imagine this nightmare scenario...

You check your e-mail program and it reports your username and password as no longer valid. You call your Internet service provider (ISP) to discussrepparttar problem and they tell you they turned off your account due to "abuse". "Abuse!" you cry torepparttar 131996 customer service operator, "What are you talking about?"

"Someone used your computer this past Saturday night in an attempt to hack into a government computer system. They maderepparttar 131997 attempt at 1:20 a.m. from your account," repliesrepparttar 131998 rep. "Look in your windows registry for a file called QAZWSX.hsq."

You punch a few keys and sure enoughrepparttar 131999 file stares right back at you. "What is it?" you ask, scared to knowrepparttar 132000 answer.

"Someone used a Trojan Horse virus to remotely control your computer and cloakrepparttar 132001 identity ofrepparttar 132002 hacker. Here's how to get rid of it, just..."

What you just read happened very recently to someone I know quite well. A computer hacker found an open port on his computer when he switched over from a dial-up Internet connection to an "always-on" high-speed connection.

The hacker used a robot scanningrepparttar 132003 Internet for available "ports", openings in a computer that allow data to pass back and forth from a network connection likerepparttar 132004 Internet. Oncerepparttar 132005 hacker found an unprotected port on my friend's computer he simply inserted a Trojan Horse virus that rides along with Windows Notepad, a handy utility used by just about everyone who makes web pages.

When my friend activatedrepparttar 132006 notepad program he also activatedrepparttar 132007 virus. The virus in turn transmitted all of my friend's security information torepparttar 132008 hacker and allowed him to gain access and control his victim's computer inrepparttar 132009 middle ofrepparttar 132010 night.

Count me asrepparttar 132011 last person to sound paranoid, but, as always-on connections through DSL, cable, and T-1 lines proliferate, this story will repeat itself over and over until people learn to protect themselves.

Cont'd on page 2 ==> © 2005
Terms of Use