Risk management in secure care

Geoffrey L. Dickens, Ashimesh Roychowdhury, Muthusamy Natarajan

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Abstract

    Risk management is central to clinical practice in secure settings and should be determined by informed risk assessment. In the previous chapter we identified that risk assessment should use the information gathered to anticipate and plan for likely scenarios where the individual’s risk might be heightened. The subsequent development of risk management strategies from that process is integral to, and is in many respects the most important result of, that process. Risk management has both shorter- and longer-term objectives. The immediate aim is to manage the patient on a day-to-day basis ensuring their safety and that of others. This should be supplemented by the implementation of strategies to reduce risk over the longer term, and to ameliorate and minimise the effects of risk behaviour when it occurs. In the previous chapter we identified that structured professional judgement (SPJ) involves a systematic approach to risk assessment Further, risk assessment is performed for a specific person, at a particular time and for their own unique circumstances. In this chapter we concentrate on risk management in the secure setting, where a considerable proportion of the available risk management interventions are achieved by the therapeutic application of security measures. We therefore provide an overview of physical, procedural and relational security and discuss how their proportionate use can ensure an appropriate level of security for the individual.
    Original languageEnglish
    Title of host publicationHandbook of secure care
    EditorsGeoffrey L. Dickens, Philip A. Sugarman, Marco M. Picchioni
    Place of PublicationLondon
    PublisherRCPsych Publications
    Pages48-66
    Number of pages19
    ISBN (Print)9781909726369
    Publication statusPublished - Jul 2015

    Fingerprint

    Dive into the research topics of 'Risk management in secure care'. Together they form a unique fingerprint.

    Cite this