National Academies Press: OpenBook
« Previous: Front Matter
Page 1
Suggested Citation:"Introduction." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 1
Page 2
Suggested Citation:"Introduction." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 2

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

2 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide Chapter 3 provides a detailed listing of security countermeasures and strategies to combat operator assaults to support the decisionmaking risk management tools in the toolbox. Chapter 4 outlines an “incident-based” threat assessment response protocol and evalu- ation process based on effective practices found in transit agencies and literature review. It assists transit agencies in (1) identifying and reporting threats and threatening behavior, (2) conducting the threat assessment of specific incidents, and (3) managing specific threats of violence against individual transit operators. Key elements of the protocol and evaluation process include • Policy and standard operating procedures (SOPs), • Reporting process and procedures, • Threat assessment and response protocols, and • Follow-up and feedback procedures. Chapter 5 discusses the importance of reporting and tracking incidents as well as threats to provide data for use during hazard identification and the determination of risk control strategies. Methods for identifying and collecting data related to employee assaults both for internal risk analysis and for the FTA national trend analysis are included. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

3 Assaults against transit workers and operators are a significant concern in the transit industry. It is an unfortunate and all too frequent workplace occurrence that year after year transit employees in the United States have been killed or injured as the result of violent aggression by system users. Transit agencies as employers have a legal and ethical obligation to promote a work environment free from threats and violence. In addition, the agency can face economic loss as the result of violence due to lost work time, damaged employee morale and productivity, increased employee compensation payments, medical expenses, and possible lawsuits and liability costs. In addition to causing injuries and increased levels of stress for the operators and potential injury, assaults cause fear and a perception of lack of safety for the public, transit passengers, and transit workers. A reduction in the number and severity of assaults would provide corresponding economic benefits to an agency. Recent legislative activity surrounding this issue reinforces that managing operator assault risk is a priority for transit agencies around the country. Definition of Operator Assault The definition of operator assault is important to clarify. The National Transit Database (NTD) defines assault as “an unlawful attack by one person on another.” Assaults are categorized within NTD as personal security events, which are security events that occur to individuals on transit property. Reporting to law enforcement and the NTD is required for Part I and Part II assaults, including simple assaults, aggravated assaults, sexual assaults, and homicides. For Part II assaults, incidents that result in an arrest are reportable. The NTD definition does not provide a complete representation of all types of assaults (such as harassment, verbal abuse, and injuries that do not require transport from the scene). It captures those assaults that are more likely to result in physically or emotionally compromised or debilitating operator condition. TCRP Synthesis 93: Practices to Protect Bus Operators from Passenger Assault defined assault more broadly. A survey of transit agencies conducted as part of the research found verbal threats or intimidation to be the most common form of transit workplace violence, with spitting being the next most problematic. As pointed out in the study, defining threatening or intimidating behavior is not clear-cut. At times, it can be difficult to distinguish between behavior that ultimately threatens safety and those that are merely rude and obnoxious. A broader definition of operator assault is found in TCRP Synthesis 93: Overt physical and verbal acts of aggression by a passenger that interfere with the mission of a transit operator—to complete his or her scheduled run safely— and that adversely affect the safety of the operator and customers. Introduction Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

Next: 1 Operator Assault Risk Management »
Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Get This Book
×
 Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB's Transit Cooperative Research Program (TCRP) Research Report 193: Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide provides potential countermeasures and strategies to prevent or mitigate assaults against transit operators. The User Guide includes an operator assault risk management toolbox developed to support transit agencies in their efforts to prevent, mitigate, and respond to assaults against operators. The User Guide also provides transit agencies with guidance in the use and deployment of the vulnerability self-assessment tool and the route-based risk calculator and includes supportive checklists, guidelines, and methodologies.

Transit industry policies, practices, and operating procedures related to preventing, mitigating, and responding to operator assaults are not uniform. The policies and procedures set by the transit agency and situational and design factors can shape mitigation approaches. The format, scale, and implementation of these measures vary greatly among transit agencies. Many agencies have written policies that address workplace violence prevention, but they vary widely in content, scope, and application. Relevant skills and training required by transit operators to address this issue vary as well.

TCRP Research Report 193: Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 1: Research Overview documents the materials and methodology used to develop Volume 2: User Guide.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!