Child Welfare Practices for Cases with Child Sexual Abuse This Is the First Edition of Child Welfare Practices for Cases with Child Sexual Abuse

Total Page:16

File Type:pdf, Size:1020Kb

Child Welfare Practices for Cases with Child Sexual Abuse This Is the First Edition of Child Welfare Practices for Cases with Child Sexual Abuse The Oregon Department of Human Services Child Welfare Practices for Cases with Child Sexual Abuse This is the first edition of Child Welfare Practices for Cases with Child Sexual Abuse. One of the goals of the Department of Human Services (DHS) is to help protect children and promote children’s safety in their homes. Assisting victims of child sexual abuse and their families helps us achieve this goal. Acknowledgements The collaborative group effort resulting in the development of these guidelines was funded by a federal grant under the Child Abuse Prevention and Treatment Act (CAPTA). The initial work group was made up of community experts who have an active role in the sexual abuse field, including victim treatment providers, sex offender treatment providers (adult and juvenile), child welfare staff, law enforcement agency (LEA) staff, child abuse intervention center (CAIC) staff (interviewers and medical providers), district attorneys, providers for exploited youth, and probation officers. Using a multidisciplinary approach, they created these guidelines for DHS staff to provide training assistance for effective intervention in child sexual abuse. These guidelines are also based on the work and ideas from DHS child welfare staff, specifically the Child Protective Services (CPS) Program. These guidelines were developed by Karen Gibbs, DHS Child Protective Services Consultant, and Skylar Kendoll, DHS CPS caseworker, with considerable assistance from the following individuals: Kim Goldstien – CARES NW Interviewer Katie Gotch – Multnomah County Department of Community Justice, Clinical Coordinator Kim Jacobowitz – CARES NW Family Support Team Cory Jewell-Jensen – Center for Behavioral Intervention (Sex Offender Treatment) Dawn Montgomery – CPS Supervisor (Retired) Keith Ovelmen – Cordero Janus Youth (Adolescent Sex Offender Treatment) Judith Swanson – Multnomah County District Attorney Published – (September 2012) Oregon Department of Human Services – Children, Adults and Families Division Office of Safety & Permanency for Children – Child Protective Services Program 500 Summer Street NE, Salem, Oregon 97301 1 Table of Contents Section I. Introduction ..................................................................................... 5 I. How to Use These Guidelines .......................................................................................... 5 II. Definitions ....................................................................................................................... 6 III. Prevalence of Child Sexual Abuse ................................................................................ 10 Section II. Working with Victims of Child Sexual Abuse .................... 13 I. How Children Disclose ................................................................................................... 13 II. Poly-victimization .......................................................................................................... 14 III. Understanding Trauma ................................................................................................ 15 IV. What Is Recantation? ................................................................................................... 18 V. Reducing the Risk of Recantation ................................................................................. 18 VI. Representing Recantation as a Child Safety Issue ....................................................... 20 VII. Creating Emotional Safety for Children: Assessing Non-offending Parents ............... 22 VIII. Assessment and Treatment for Child Victims ........................................................... 25 IX. Tips for Interviewing Children ...................................................................................... 27 Section III. Understanding Sexual Offenders ......................................... 38 I. Relevance to Child Welfare ............................................................................................ 38 II. Criminal Intervention and Child Safety ......................................................................... 39 III. The Importance of “Crossover” or “Crime-Switching” Data........................................ 41 IV. Understanding Recidivism Versus Re-offense ............................................................. 44 V. Special Population Considerations ............................................................................... 45 VI. Sex Offender Evaluations ............................................................................................. 50 VII. Caseworker Guide to Determining the Appropriateness of an Evaluator ................. 55 VIII. Sex Offender Treatment ............................................................................................ 57 Section IV: Familial Sexual Abuse .............................................................. 65 I. Understanding Familial Sex Abuse ................................................................................. 65 II. Familial Sexual Abuse: Screening .................................................................................. 67 III. Familial Sexual Abuse: Initial Contacts ........................................................................ 68 2 IV. Familial Sexual Abuse: Assessing Safety ...................................................................... 74 V. Familial Sexual Abuse: Dispositional Guidance ............................................................ 80 VI. Familial Sexual Abuse: Summary ................................................................................. 83 Section V: Threat of Harm Sexual Abuse ................................................. 85 I. Threat of Harm and Child Pornography ......................................................................... 85 II. Threat of Harm Sexual Abuse: Screening ..................................................................... 87 III. Threat of Harm Sexual Abuse: Initial Contacts ............................................................ 89 IV. Threat of Harm Sexual Abuse: Assessing Safety .......................................................... 96 V. Threat of Harm Sexual Abuse: Dispositional Guidance .............................................. 101 VI. Threat of Harm Sexual Abuse: Summary ................................................................... 105 Section VI: Abuse Between Siblings and Other Young Children ... 107 I. Introduction ................................................................................................................. 107 II. Child Sexual Behaviors ................................................................................................ 108 III. Child Safety and Adolescent Sexual Offending Behavior: Changing Our Practice..... 111 IV. Abuse Between Siblings and Other Young Children: Screening ................................ 113 V. Abuse Between Siblings and Other Young Children: Initial Contacts......................... 114 VI. Abuse Between Siblings and Other Young Children: Assessing Safety ..................... 119 VII. Abuse Between Siblings and Other Young Children: Dispositional Guidance .......... 125 VIII. Abuse Between Siblings and Other Young Children: Summary .............................. 127 Section VII: Teen “Compliant” Sexual Abuse ....................................... 129 I. Perception of Teens as Victims .................................................................................... 129 II. Adult Offenders of “Compliant” Sexual Abuse ........................................................... 131 III. Teen “Compliant” Sexual Abuse: Screening .............................................................. 133 IV. Teen “Compliant” Sexual Abuse: Initial Contacts ...................................................... 134 V. Teen “Compliant” Sexual Abuse: Assessing Safety .................................................... 138 VI. Teen “Compliant” Sexual Abuse: Dispositional Guidance ......................................... 140 VII. Teen “Compliant” Sexual Abuse: Summary ............................................................. 142 Section VIII: Commercial Sexual Exploitation of Children ............. 143 I. Understanding Commercial Sexual Exploitation of Children ....................................... 144 3 II. Commercial Sexual Exploitation of Children: Screening ............................................. 150 III. Commercial Sexual Exploitation of Children: Initial Contacts ................................... 155 IV. Comercial Sexual Exploitation of Children: Assessing Safety .................................... 160 V. Commercial Sexual Exploitation of Children: Dispositions ......................................... 165 VI. Commercial Sexual Exploitation of Children- Summary ............................................ 168 Section IX: Case Planning and Resources ............................................. 170 I. Conditions for Return and Expected Outcomes .......................................................... 170 II. Requesting Records .................................................................................................... 174 III. Child Abuse Intervention Centers and Regional Service Providers ........................... 176 IV. Sexual Assault Resource Centers ............................................................................... 177 V. Relevant Websites ...................................................................................................... 178 4 Section I.
Recommended publications
  • Emotion, Seduction and Intimacy: Alternative Perspectives on Human Behaviour RIDLEY-DUFF, R
    Emotion, seduction and intimacy: alternative perspectives on human behaviour RIDLEY-DUFF, R. J. Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/2619/ This document is the author deposited version. You are advised to consult the publisher's version if you wish to cite from it. Published version RIDLEY-DUFF, R. J. (2010). Emotion, seduction and intimacy: alternative perspectives on human behaviour. Silent Revolution Series . Seattle, Libertary Editions. Repository use policy Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in SHURA to facilitate their private study or for non- commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. Sheffield Hallam University Research Archive http://shura.shu.ac.uk Silent Revolution Series Emotion Seduction & Intimacy Alternative Perspectives on Human Behaviour Third Edition © Dr Rory Ridley-Duff, 2010 Edited by Dr Poonam Thapa Libertary Editions Seattle © Dr Rory Ridley‐Duff, 2010 Rory Ridley‐Duff has asserted his right to be identified as the author of this work in accordance with the Copyright, Designs and Patents Acts 1988. This work is licensed under a Creative Commons Attribution‐Noncommercial‐No Derivative Works 3.0 Unported License. Attribution — You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial — You may not use this work for commercial purposes.
    [Show full text]
  • Incurable Psychopaths?
    Incurable Psychopaths? Marianne Kristiansson, MD Treatment, comprising pharmacotherapy and an educational program based on cognitive behavior therapy, of four psychopathic, criminal men fulfilling the crite- ria for borderline personality disorder and antisocial personality disorder is de- scribed. The diagnoses were made during a forensic psychiatric evaluation. An estimation of the capacity of the central serotonergic system was performed by analysing the platelet monoamine oxidase (MAO) activity. The pharmacotherapy was combined with an educational program involving strategies for developing better impulse control. All four men had earlier been regarded as resistant to conventional therapy. In the present cases, a combined psychosocial and biolog- ical approach seemed to be effective in developing an increased control of im- pulses, leading to improved coping strategies. Controlled studies are needed in order to clarify whether the described treatment program proves beneficial. Psychopathy, as originally described by personality disorder according to DSM- Cleckley,' comprises a set of clinical 111-R.~ characteristics including superficial The possibility of curing or even trying charm, unreliability, untruthfulness, lack to treat criminal psychopathic individuals of remorse or shame, failure to learn by is often looked upon as futile. Most treat- experience, incapacity for love, general ment programs involve various psycho- poverty in major affective relations, and social interventions and little effort has failure to follow any life
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Action to End Child Sexual Abuse and Exploitation
    ACTION TO END CHILD SEXUAL ABUSE AND EXPLOITATION Published by UNICEF Child Protection Section Programme Division 3 United Nations Plaza New York, NY 10017 Email: [email protected] Website: www.unicef.org © United Nations Children’s Fund (UNICEF) December 2020. Permission is required to reproduce any part of this publication. Permission will be freely granted to educational or non-profit organizations. For more information on usage rights, please contact: [email protected] Cover photo: © UNICEF/UNI303881/Zaidi Design and layout by Big Yellow Taxi, Inc. Suggested citation: United Nations Children’s Fund (2020) Action to end child sexual abuse and exploitation, UNICEF, New York This publication has been produced with financial support from the End Violence Fund. However, the opinions, findings, conclusions, and recommendations expressed herein do not necessarily reflect those of the End Violence Fund. Click on section bars to navigate publication CONTENTS 1. Introduction ............................................3 6. Service delivery ...................................21 2. A Global Problem...................................5 7. Social & behavioural change ................27 3. Building on the evidence .................... 11 8. Gaps & challenges ...............................31 4. A Theory of Change ............................13 Endnotes .................................................32 5. Enabling National Environments ..........15 1 Ending Child Sexual Abuse and Exploitation: A Review of the Evidence ACKNOWLEDGEMENTS
    [Show full text]
  • Correlates of Imaginative Suggestibility and Hypnotizability in Children
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations 1896 - February 2014 1-1-2000 Correlates of imaginative suggestibility and hypnotizability in children. Bruce C. Poulsen University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/dissertations_1 Recommended Citation Poulsen, Bruce C., "Correlates of imaginative suggestibility and hypnotizability in children." (2000). Doctoral Dissertations 1896 - February 2014. 1271. https://scholarworks.umass.edu/dissertations_1/1271 This Open Access Dissertation is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Doctoral Dissertations 1896 - February 2014 by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. CORRELATES OF IMAGINATIVE SUGGESTIBILITY AND HYPNOTIZABILITY IN CHILDREN A Dissertation Presented by BRUCE C. POULSEN Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY February 2000 Education © Copyright by Bruce Craig Poulsen 2000 All Rights Reserved CORRELATES OF IMAGINATIVE SUGGESTIBILITY AND HYPNOTIZABILITY IN CHILDREN A Dissertation Presented by BRUCE C. POULSEN B^\ty W. Jackson, Dean S^hqol of Education ACKNOWLEDGMENTS I would like to gratefully acknowledge the assistance and support of several individuals, without whom this project would not have been possible. First, I am indebted to William Matthews, Jr., Ph.D. and Irving Kirsch, Ph.D. for mitial suggestions for both the research design and statistical analysis. Karen Olness, M.D. and Steven Jay Lynn, Ph.D. both provided helpful suggestions for selecting the measurement instruments. Several individuals at Primary Children's Medical Center provided invaluable support during the data collection procedures.
    [Show full text]
  • Victimology Exploring the Experience of Victimization Distribute Or John Sutcliff’S Entire Adult Life Has Been Devoted to the Sexual Seduction of Teenage Boys
    CHAPTER 3 Victimology Exploring the Experience of Victimization distribute or John Sutcliff’s entire adult life has been devoted to the sexual seduction of teenage boys. At the age of 33 he was arrested and sentenced to prison for sexually assaulting a 13-year-old boy who was a member of his “Big Brother’s Club.” By his own admission he had sexually molested over 200 “members” of his club. John’s favorite activity with these boys was giving and receiving enemas. John became involved with the fetish while enrolled in a residential boy’s school where many of the boys were subjected to enemas administered in front of the entire dormitory. After his release from prison, John became much more “scientific” in his efforts to procure victims. A “theoretical” paper he wrote indicated that father-absent boys werepost, “ripe” for seduction, and he would entice them with his friendly ways and with a houseful of electronic equipment he would teach the boys to repair and operate. He weeded out boys with a father in the home and would spend at least 6 weeks grooming each victim. He used systematic desensitization techniques, starting with simply getting the boys to agree to type in answers to innocuous questions and escalating to having them view pornographic homosexual pictures and giving them “pretend” enemas, actual enemas, and enemas accompanied by sexual activity. With each successive approximation toward John’s goal the boys were reinforced by material and nonmaterial rewards (friendship, attention, praise) that made the final events seem almost natural. copy, John’s activities came to light when U.S.
    [Show full text]
  • Prison Victimization: High-Risk Characteristics and Prevention
    PRISON VICTIMIZATION: HIGH-RISK CHARACTERISTICS AND PREVENTION A thesis submitted to Kent State University in partial fulfillment of the requirements for the degree of Master of Arts by Leslie A. Swales August, 2008 Thesis written by Leslie A. Swales B.A., Kent State University, 2006 M.A., Kent State University, 2008 Approved by Shelley Listwan, Ph.D. , Advisor Marc Colvin, Ph.D. , Chair, Department of Justice Studies John Stalvey, Ph.D. , Dean, College of Arts and Sciences ii TABLE OF CONTENTS LIST OF TABLES………….………………………….………………………………….v ACKNOWLEDGMENTS…………..................................................................................vi INTRODUCTION…...........................................................................................................1 Prison Victimization…………..……………..……………………………………6 Importation vs. Deprivation……….………………………………………6 Prison Inmate-on-Inmate Victimization……………….……………………...…13 Physical Victimization…………………..….……..….………….………14 Psychological Victimization……………...……………….…….……….16 Sexual Victimization………………………...……………..…………….18 Risk Factors and Characteristics………………...……………………….22 Impact of Victimization…………………………...…..…………………………29 Psychological Consequences…………...….…………………………….29 METHODS…………………………….………………………………………………..33 Sample…………………..………………...……………………………………...33 Data Collection………………….…………...…………………………………..35 Variables…………………..…………………..…………………………………36 Analysis………………………..………………..………………………………..39 RESULTS………………………………………………..………………………………40 Demographic Information…………………..……………………………………40 Prior Record………………………………….…………………………………..42
    [Show full text]
  • PSYCHOPATHY in ADOLESCENCE: CAUSES, TRAITS and RISK BEHAVIOURS Maria Vincenza Minò Brindisi, Italy
    Psychiatria Danubina, 2019; Vol. 31, Suppl. 3, pp 443-446 Conference paper © Medicinska naklada - Zagreb, Croatia PSYCHOPATHY IN ADOLESCENCE: CAUSES, TRAITS AND RISK BEHAVIOURS Maria Vincenza Minò Brindisi, Italy SUMMARY Psychopathy is a personality disorder defined by a specific set of behaviours and personality traits evaluated as negative and socially harmful. The modern conception of Psychopathy was introduced by Clerckley in "Mask of Sanity" (1941), and refined by Hare with the construction of the PCL (1980, 1991), a gold standard instrument for the evaluation of the disorder. Manipulation, deception, grandeur, emotional superficiality, lack of empathy and remorse, impulsive and irresponsible lifestyle, persistent violation of social norms and expectations (Cleckley 1976, Hare 2003) are some behavioural aspects that characterize psychopathic subjects. With this work we intend to study in depth the causes, the traits, in particular the so-called callous-unemotional and risk factors that lead a teenager to become a psychopathic subject. The diagnostic tools useful for the assessment and for the possibilities of intervention that can be put into practice will also be described. Key words: psychopathy - adolescence - DSM-5 - traits - assessment * * * * * INTRODUCTION Secondary psychopaths The word psychopathy literally means "mental Secondary psychopaths, on the other hand, have illness" (from psyche, "mind" and pathos "suffering"). severe emotional problems; their delinquency is attri- According to Cleckley (1976) and Hare (1991, 1993), buted to the social isolation that characterizes them a psychopath is an individual who presents antisocial (Bartol 1995). Although the primary psychopath is the behaviour, but at an interpersonal level he is at the true psychopath, it is the secondary psychopaths that same time engaging and emotionally detached, cen- are most frequently in contact with the law.
    [Show full text]
  • Reactions to Flattery As a Function of Self- Esteem
    Br. I. soc. din. Psychol. (1978), 17, 25-29 Printed in Great Britain 25 Reactions to flattery as a function of self-esteem: Self-enhancement and cognitive consistency theories Andrew M. Colman and Kevin R. Olver Male subjects who had previously scored either very high or very low on a self-esteem scale were interviewed about personal characteristics, biographical details, social activities, etc. They then received, via closed-circuit television, flattering or neutral character assessments which were apparently based on their performance in the interviews. A highly significant interaction (P< 0.(01) showed that whereas the subjects of high self-esteem responded with far greater liking for the evaluator in the flattery than in the neutral condition, those of low self-esteem somewhat preferred the neutral evaluator. These findings provide clear-cut support for the cognitive consistency theory regarding reactions to flattery, but do not rule out a concomitant though weaker self-enhancement effect. One of the most well-established techniques of ingratiation encountered in everyday social interaction is flattery, or what Edward Jones (1964), in his influential monograph, calls 'complimentary other-enhancement'. An admonition given great prominence in Dale Carnegie's best-selling manual, How to Win Friends and Influence People (Carnegie, 1936), is to 'dole out praise lavishly', and there is now a considerable body of empirical evidence indicating that people do indeed typically increase their liking for someone who expresses approval of them (e.g. Backman & Secord, 1959; Jones, Gergen & Davis, 1962). From a common-sense point of view these findings are not surprising, although as Jones has pointed out, one might expect excessive flattery to backfire in certain circumstances.
    [Show full text]
  • Insincere Flattery Actually Works: a Dual Attitudes Perspective
    ELAINE CHAN and JAIDEEP SENGUPTA This research uses a dual attitudes perspective to offer new insights into flattery and its consequences. The authors show that even when flat- tery by marketingagentsis accompanied by an obvious ulterior motive that leads targets to discount the proffered compliments, the initial favor- able reaction (the implicit attitude) continues to coexist with the dis- counted evaluation (the explicit attitude). Furthermore, the implicit attitude has more influential consequences than the explicit attitude, highlighting the possible subtle impact of flattery even when a person has consciously corrected for it. The authors also clarify the underlyingprocess by show- inghow and why the discrepancy between the implicit and explicit atti- tudes induced by flattery may be reduced. Collectively, the findings from this investigation provide implications for both flattery research and the dual attitudes literature. Keywords: flattery, implicit attitudes, dual attitudes, persuasion, long-term consequences Insincere Flattery Actually Works: A Dual Attitudes Perspective Flattery—the art of offering pleasing compliments—is In cases such as these, in which the prospective con- one of the oldest and most commonly used of persuasion sumer is aware of a clear ulterior motive underlying the methods. Research in this area provides a reason for the compliment, both research (e.g., Campbell and Kirmani popularity of this tactic. Put simply, flattery works. Various 2000; Vonk 1998) and intuition suggest that recipients will studies have shown that the target of the flattery evaluates discount the flattering comments and correct their other- the flatterer positively because human beings have a basic wise favorable reactions. Though in partial agreement with desire to believe in good things about themselves (Fogg this premise, the current investigation proposes that despite and Nass 1997; Gordon 1996; Vonk 2002).
    [Show full text]
  • Social Engineering in Cybersecurity: a Domain Ontology and Knowledge Graph Application Examples Zuoguang Wang1,2* , Hongsong Zhu1,2* ,Peipeiliu1,2 and Limin Sun1,2
    Wang et al. Cybersecurity (2021) 4:31 Cybersecurity https://doi.org/10.1186/s42400-021-00094-6 RESEARCH Open Access Social engineering in cybersecurity: a domain ontology and knowledge graph application examples Zuoguang Wang1,2* , Hongsong Zhu1,2* ,PeipeiLiu1,2 and Limin Sun1,2 Abstract Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering. This paper first develops a domain ontology of social engineering in cybersecurity and conducts ontology evaluation by its knowledge graph application. The domain ontology defines 11 concepts of core entities that significantly constitute or affect social engineering domain, together with 22 kinds of relations describing how these entities related to each other. It provides a formal and explicit knowledge schema to understand, analyze, reuse and share domain knowledge of social engineering. Furthermore, this paper builds a knowledge graph based on 15 social engineering attack incidents and scenarios. 7 knowledge graph application examples (in 6 analysis patterns) demonstrate that the ontology together with knowledge graph is useful to 1) understand and analyze social engineering attack scenario and incident, 2) find the top ranked social engineering threat elements (e.g. the most exploited human vulnerabilities and most used attack mediums), 3) find potential social engineering threats to victims, 4) find potential targets for social engineering attackers, 5) find potential attack paths from specific attacker to specific target, and 6) analyze the same origin attacks. Keywords: Social engineering attack, Cyber security, Ontology, Knowledge graph, Attack scenarios, Threat analysis, Attack path, Attack model, Taxonomy, Composition and structure Introduction (Wang et al.
    [Show full text]
  • A Researcher Speaks to Ombudsmen About Workplace Bullying LORALE IGH KEASHLY
    Journal of the International Ombudsman Association Keashly Some Things You Need to Know but may have been Afraid to Ask: A Researcher Speaks to Ombudsmen about Workplace Bullying LORALE IGH KEASHLY ABSTRACT In the early 1990’s, I became interested in understand- ing persistent and enduring hostility at work. That Workplace bullying is repeated and prolonged hostile interest was spurred by a colleague’s experience at mistreatment of one or more people at work. It has the hands of her director. He yelled and screamed tremendous potential to escalate, drawing in others at her (and others), accusing her of not completing beyond the initial actor-target relationship. Its effects assignments, which she actually had. He lied about can be devastating and widespread individually, her and other subordinates. He would deliberately organizationally and beyond. It is fundamentally a avoid when staff needed his input and then berate systemic phenomenon grounded in the organization’s them for not consulting with him. At other times, he culture. In this article, I identify from my perspective was thoughtful, apologetic, and even constructive. My as a researcher and professional in this area current colleague felt like she was walking on eggshells, never thinking and research findings that may be useful for sure how he would be. Her coworkers had similar ombudsmen in their deliberations and investigations experiences and the group developed ways of coping as well as in their intervention and management of and handling it. For example, his secretary would these hostile behaviors and relationships. warn staff when it was not a good idea to speak with him.
    [Show full text]