Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and Management

Could Wearables and Big Data Mitigate Workplace Violence?

One promising technology for predicting violent outbreaks is wearables and big data.

By Barry Nixon
Could Wearables and Big Data Mitigate Workplace Violence?
W. Barry Nixon, SHRM-SCP

W. Barry Nixon

Could Wearables and Big Data Mitigate Workplace Violence?
W. Barry Nixon, SHRM-SCP
February 1, 2017

One of the most frequently asked question after a workplace violence incident has occurred is how could it have been prevented from occurring? Most experts have relied heavily on the “early warning signs,” which are behaviors and events that historically have preceded incidents of violence. These behaviors and events are based on research that tracked multiple incidents over the years. Some examples of behaviors typically included in the “early warning signs” include acting in an unusually bizarre manner, overly aggressive or angry response to regular situations, paranoia, psychotic episodes (hearing voices,  hallucinations or delusions), overly controlling, power obsessions, drastic change in behavior, etc., to name a few.

The general approach is to teach supervisors and employees to know what the signs are and to report them to management or human resources if they observe someone acting is this manner. One of the challenges of this approach is that the observance of the behavior is in “the eye of the beholder,” meaning it is not only subjective, but open to wide interpretations. Most experts will say it’s better to err on the side of caution and if you “think” the behavior fits the model report it. While this is certainly true, the problem is that the vast majority of employees are reluctant to report someone based on what they perceive to be a “guess” or simple conjecture. This is why after an incident occurs we typically learn about many different behaviors that fit into the “early warning signs,” but they were not noticed, taken seriously or reported. The other challenge with the “early warning” approach is that supervisors and employees are taught that it’s not just when you observe one sign, it’s when there is an accumulation of the signs over time. The obvious challenge with this approach is that it requires a vague conclusion about how many signs must be observed over what time period for it to reach the level worthy of reporting?

Beyond the challenge of teaching supervisor and employees to be trained observers of the early warning signs, one of the biggest issues is that the signs are historically focused; and while they provide insightful information they are not predictive of an incident occurring.

The emergence of predictive analytics has the promise of providing another tool which can help to identify the potential for violence to occur and its focus is prediction. We have seen the application of predictive policing, which is still in its infancy, and perhaps one day organizations will be able to deploy a similar technology as the field matures.

The other promising technology that may be able to help with predicting violent outbreaks is wearables and big data which are already upending how athletic performance is measured and analyzed. Is it possible that this emerging capability which can analyze a person’s behavior patterns could be the Holy Grail for predicting violence behavior we have all been wishing for?

This entire article is based on the concepts identified in the article “How Data Will Disrupt Talent Management,” by Himanshu Tambe and Brian Payne. I have adapted their concept and applied it to threat assessment.

Consider the following. A new generation of personal and environmental technologies can collect unprecedented levels of information about individual’s social and emotional states at work. Watches, headbands and rings detect physiological data such as heart rate, skin temperature and brain waves to accurately read a person’s mood.

But what does this have to do with threat assessment? Accenture research suggests that data from sensors can paint a vivid picture using input about emotions, stress levels, relationships, performance, productivity and collaboration patterns. This information could be used as the basis for identifying when an individual is approaching a predefined stress tipping point in their behavior that signals a problem is about to occur.

Data can be collected on individuals and provided back to them in real time or a trained observer. This field is called auto analytics. It is already popular in sports, where teams use heart rate and other biometric feedback to make real-time decisions about the players on the field. Consumers are enthusiastically embracing auto analytics to gauge how factors like mood, sleep and exercise are influencing physical and mental performance. Now, the technology is entering the workplace.

One example is real-time feedback tools that highlight use of positive and negative words in conversation.

With a reservoir of accurate data, an organization can experiment with interventions to boost the accuracy of threat assessments. This includes using intelligent machines to predict emotions and behaviors. These insights could help guide interventions.

Machines can also use analytics and cognitive computing to teach people how to improve their social skills or more accurately read other people’s emotions.

Perhaps the most sophisticated use of technology – and also the most intrusive – involves changing people’s social and emotional behaviors in real time. Yes, we are talking about mood-altering interventions. Technology with GPS functionality might suggest to an employee when they have had a negative interaction with someone an appropriate way to ease the tension in the situation.

Just imagine being able to receive an alert when an employee reaches a stress tipping point. The employee could receive immediate “computer generated” input focused on reducing their stress level, notification that they will be receiving a call from the company’s EAP representative in one minute, and that their supervisor has been notified that the employee will be taking a company-approved break immediately.

The monitored workplace is already evident in areas such as logistics or call centers – and is spreading rapidly. As organizations start to develop a strong analytics capability and learn what to do with all the data collected by smart sensors, they can move to the next level: using more sophisticated analytics capabilities to predict the social and emotional effect on behavior at work.

Admittedly, there are numerous issues and concerns about the emerging field of auto analytics, but there is also promise that we may be getting closer to being able to actually analyze human behavior to predict violence before it occurs. This may seem like a pipe dream, but rest assured it’s not science fiction, but more so an emerging reality.

 

Note: A version of this article was originally published in the July edition of The Workplace Violence Prevention eReport. It is based on the article “Data Disruption,” which appeared in Talent Management magazine, at http://www.talentmgt-digital.com/read-tm/may_june_2016?folio=10&pg=9#pg9

KEYWORDS: big data security leadership wearable device security workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Barry nixon 168px

W. Barry Nixon, SPHR, is the Executive Director, the National Institute for Prevention of Workplace Violence, Inc., a company focused on assisting organizations to effectively implement programs to prevent workplace violence. He is the author of “Background Screening and Investigations: Managing Risk in the Hiring Process,” “Zero Tolerance is Not Enough: How to Really Implement Workplace Violence Prevention,” as well as numerous articles. He is also the creator of the Ultimate Workplace Violence Policymaker Software. He is an internationally recognized expert in workplace violence prevention and background screening and was recently recognized as being one of the Most Influential People in Security by Security magazine. Nixon also teaches human resource management, organization development and management courses at several local universities. His web site is www.Workplaceviolence911.com and he can be reached via email.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Barry Nixon

    The Emergence of Infinity Screening to Mitigate Risk

    See More
  • Complying with California's Workplace Violence Prevention in Healthcare Rule

    Complying with California's Workplace Violence Prevention in Healthcare Rule

    See More
  • Request for criminal background check; reference checking, security interviews

    Why Reference Checking Matters

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing