Risk management in secure care

Geoffrey L. Dickens, Ashimesh Roychowdhury, Muthusamy Natarajan

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Risk management is central to clinical practice in secure settings and should be determined by informed risk assessment. In the previous chapter we identified that risk assessment should use the information gathered to anticipate and plan for likely scenarios where the individual’s risk might be heightened. The subsequent development of risk management strategies from that process is integral to, and is in many respects the most important result of, that process. Risk management has both shorter- and longer-term objectives. The immediate aim is to manage the patient on a day-to-day basis ensuring their safety and that of others. This should be supplemented by the implementation of strategies to reduce risk over the longer term, and to ameliorate and minimise the effects of risk behaviour when it occurs. In the previous chapter we identified that structured professional judgement (SPJ) involves a systematic approach to risk assessment Further, risk assessment is performed for a specific person, at a particular time and for their own unique circumstances. In this chapter we concentrate on risk management in the secure setting, where a considerable proportion of the available risk management interventions are achieved by the therapeutic application of security measures. We therefore provide an overview of physical, procedural and relational security and discuss how their proportionate use can ensure an appropriate level of security for the individual.
Original languageEnglish
Title of host publicationHandbook of secure care
EditorsGeoffrey L. Dickens, Philip A. Sugarman, Marco M. Picchioni
Place of PublicationLondon
PublisherRCPsych Publications
Pages48-66
Number of pages19
ISBN (Print)9781909726369
Publication statusPublished - Jul 2015

Fingerprint Dive into the research topics of 'Risk management in secure care'. Together they form a unique fingerprint.

Cite this