{"title":"Conducted electrical weapons within healthcare: a comprehensive use of force model.","authors":"Jeffrey D Ho, Martin F Williams, Michael J Coplen","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Healthcare settings are experiencing increased amounts of violent activity that are challenging to the health care security profession. There is difficulty in addressing this issue completely. Some of this difficulty is because of factors that include inexperienced and untrained clinicians and administrators that are often the decision-makers in the health care setting. As part of an effective solution, we propose that a security plan, including a comprehensive use of force program incorporating conducted electrical weapons, is a necessary and best-practice goal. This paper outlines the background of the problem and discusses the challenges we encountered in reaching this goal as well as the benefits we have discovered along the way. This paper will be beneficial to any healthcare security professional that is interested in enhancing or improving their current health care security use of force model to further counter the increasing violent activity in their respective healthcare setting.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"47-56"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anthony J Luizzo, Bernard J Scaglione, Philip F Luizzo
{"title":"Background checks: a diagnostic tool to decipher deception.","authors":"Anthony J Luizzo, Bernard J Scaglione, Philip F Luizzo","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"57-65"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The strategic security officer.","authors":"Charles Hodges","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the \"strategic corporal\" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"35-45"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security customer services: the tangibles and intangibles.","authors":"James O Bailey","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The hospital security officer of all hospital employees, has many opportunities to provide customer service, in addition to traditional security services, according to the author. In this article, he gives examples of intangible benefits which can be achieved when carrying out tangible duties.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"73-6"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How better collaboration among all ED services enhances staff safety and patient satisfaction.","authors":"Anthony S Notaroberta","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"83-7"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security awareness: raising the bar at regional clinics/offsite locations.","authors":"Ronald J Morris, Laura L Oswalt","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"98-106"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hospital gun discharge events 2011-2013.","authors":"Justin Harnum","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"36-46"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CMS, conditions of participation and use of force in the healthcare setting.","authors":"Bryan Warren","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>CMS regulations defining the use of force against patients must be understood and complied with by hospital security departments working with other departments and employees to avoid the loss of participation in the Medicare and Medicaid program. In this article, the author focuses on guidelines that are most commonly associated with the use of force by security in the healthcare setting.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"13-20"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social engineering: mitigating a stealthy risk.","authors":"Jos Maas","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Can a Healthcare Facility (HCF) be victimized by Social Engineering (SE)? Yes, says the author If so, what can you do about it? This article explains what Social Engineering is; how it is used; and how to use proactive security to prevent such an attack.</p>","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 1","pages":"55-60"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32240432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic patients: a policy and protocol discussion.","authors":"Roger L Sheets","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":73772,"journal":{"name":"Journal of healthcare protection management : publication of the International Association for Hospital Security","volume":"30 2","pages":"66-71"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"32634682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}