Detecting Nastiness in Social Media

Total Page:16

File Type:pdf, Size:1020Kb

Detecting Nastiness in Social Media Detecting Nastiness in Social Media Niloofar Safi Samghabadi♠, Suraj Maharjan♠, Alan Sprague♣, Raquel Diaz-Sprague♣, Thamar Solorio♠ ♠Department of Computer Science, University of Houston ♣Department of Computer & Information Sciences, University of Alabama at Birmingham [email protected], [email protected], [email protected], [email protected], [email protected] Abstract According to a High School Youth Risk Behav- ior Survey, 14.8% of students surveyed nation- Although social media has made it easy wide in the United States (US) reported being bul- for people to connect on a virtually un- lied electronically (nobullying.com, 2015). An- limited basis, it has also opened doors to other research done by the Cyberbullying Re- people who misuse it to undermine, ha- search Center (Patchin, 2015) from 2007 to 2015 rass, humiliate, threaten and bully others. shows that on average, 26.3% of middle and high There is a lack of adequate resources to de- school students from across the United States have tect and hinder its occurrence. In this pa- been victims of cyberbullying at some point in per, we present our initial NLP approach their lives. Also, on average, about 16% of the to detect invective posts as a first step to students have admitted that they have cyberbul- eventually detect and deter cyberbullying. lied others at some point in their lives. Studies We crawl data containing profanities and have shown that cyberbullying victims face social, then determine whether or not it contains emotional, physiological and psychological disor- invective. Annotations on this data are ders that lead them to harm themselves (Xu et al. improved iteratively by in-lab annotations (2012)). and crowdsourcing. We pursue different In this research we perform the initial step to- NLP approaches containing various typi- wards detecting invective in online posts from so- cal and some newer techniques to distin- cial media sites used by teens, as we believe it guish the use of swear words in a neutral can be the starting point of cyberbullying events. way from those instances in which they are We first create a data set that includes highly used in an insulting way. We also show negative posts from ask.fm. ask.fm is a semi- that this model not only works for our data anonymous social network, where anyone can post set, but also can be successfully applied to a question to any other user, and may choose different data sets. to do so anonymously. Given that people tend 1 Introduction to engage in cyberbullying behavior under the cover of anonymity (Sticca and Perren, 2013), As the internet has become the preferred means the anonymity option in ask.fm, as in other so- of communication worldwide1, it has introduced cial media platforms, allows attackers the power new benefits as well as new dangers. One of the to freely harass users by flooding their pages with most unfortunate effects of online interconnect- profanity-laden questions and comments. Seeing edness is Cyberbullying – defined as the deliber- a lot of vile messages in one’s profile page often ate use of information/communication technolo- disturbs the user. Several teen suicides have been gies (ICT’s) to cause harm to people by causing attributed to cyberbullying in ask.fm (Healy, 2014; a loss of both self-esteem and the esteem of their Shute, 2013). This phenomenon motivated us to friendship circles (Patchin and Hinduja, 2010). crawl a number of ask.fm accounts and to analyze The groups most affected by this phenomenon them manually to ascertain how cyberbullying is are teens and pre-teens (Livingstone et al., 2010). carried out in this particular site. We learned that victims have their profile page flooded with abu- 1The New Era of Communication Among Americans http://www.gallup.com/poll/179288/new- sive posts. Then from identifying victims of cyber- era-communication-americans.aspx bullying, we switched to looking for word patterns 63 Proceedings of the First Workshop on Abusive Language Online, pages 63–72, Vancouver, Canada, July 30 - August 4, 2017. c 2017 Association for Computational Linguistics that make a post abusive. Since, abusive posts are accuracy for detecting cyberbullying in YouTube rare compared to the rest of online posts, in order comments. Xu et al.(2012) identify several key to ensure that we would obtain enough invective problems in using the social media data sources to posts, we decided to focus exclusively on posts study bullying and formulate them as NLP tasks. that contain profanity. This is analogous to the In one of their approaches, they use latent topic method used in data collection by Xu et al.(2012); modeling to analyze the topics people commonly they limited their Twitter data to tweets containing talk about in bullying comments, however they the words bully, bullied, bullying. find most topics were hard to interpret. Van Hee The main contributions of this paper are as fol- et al.(2015) study ask.fm Dutch posts, and de- lows: We create a new resource to investigate neg- velop a new scheme for cyberbullying annotation ative posts in a social media platform used pre- based on the presence and severity of cyberbully- dominantly by teens, and make our data set public. ing, the role of the post’s author, and a number of The most noticeable difference of our data set with fine-grained categories associated with cyberbul- previous similar corpora is that it provides a gener- lying. They use the same two class classification alized view of invective posts, which is not biased tasks as the previous studies to automatically de- towards a specific topic or target group. In our tect cyberbullying posts and achieve an F-score of data, each post is judged by three different annota- 55.39%. Kansara and Shekokar(2015) combine tors. Then we perform experiments with both typi- text and image analysis techniques and propose cal features (e.g. linguistic, sentiment and domain a framework for detecting potential cyberbullying related) and newer features (e.g. embedding and threats that analyze texts and images using a bag topic modeling), and combinations of these fea- of words and a bag of visual word models respec- tures to automatically identify potential invective tively. posts. We also show the robustness of our model There is also some research in the field of on- by evaluating it on different data sets (Wikipedia line harassment and hate speech detection. Yin Abusive Language Data Set, and Kaggle). Finally, et al.(2009) apply a supervised machine learn- we do an analysis of bad word distributions in our ing approach to the automatic detection of on- data that, among other things, reflects a sexualized line harassment. They combine content, senti- teen culture. ment, and contextual features and achieve an F- score of 44%. Nobata et al.(2016) use data 2 Related Research gathered from Yahoo! Finance and News, then Since our research goal is to detect nastiness in present a hate speech detection framework using social media as an initial step to detect cyber- n-gram, linguistic, syntactic and distributional se- bullying, we analyze previous works focusing on mantic features and get an F-score of 81% for a cyberbullying detection. Researchers (Macbeth combination of all features. et al., 2013; Lieberman et al., 2011) have reported In this study, we present a data set containing that cyberbullying posts are contextual, personal- question-answer pairs from ask.fm, which are la- ized and creative, which make them harder to de- beled as positive (neutral), or negative (invective). tect than detecting spam. Even without using bad Our data is conversational data from teenagers. words, the post can be hostile to the receiver. On We also have metadata containing information the other hand, the use of negative words does about the users that eventually can help us to focus not necessarily have a cyberbullying effect (al- on users who are being bullied with frequent pro- Khateeb and Epiphaniou, 2016). Researchers have fanity and also in analyzing the patterns used by used different approaches to find cyberbullying attackers. Moreover, compared to previous work, traces. we apply a wider range of different types of typical Dinakar et al.(2012) concentrate on sexual- and newer NLP features, and their combinations ity, race and culture, and intelligence as the pri- to improve the classification performance. Fol- mary categories related to cyberbullying. Then, lowing this approach, we reach F-scores of 59% they construct a common sense knowledge base - for identifying invective posts in our own data BullySpace - with knowledge about bullying sit- set. Applying our classification model on Kaggle uations and a wide range of everyday life topics. and Wikipedia data (we will introduce them later) The overall success of this experiment is 66.7% shows that our method is robust and applicable to 64 other data. We also do an analysis of bad word 3.1 Crowdsourcing Annotations distribution in our data set that shows that most of With our small gold annotated data, we started these bad words are often used in a casual way, so a crowdsourcing task of annotating around 600 detecting cases in which there are potential invec- question-answer pairs in CrowdFlower. We pro- tive requires careful feature engineering. vided a simple annotation guideline for contribu- 3 Data Collection and Annotation tors with some positive and negative examples to ease their task. Each question-answer pair was an- Since most of the abusive posts we observed on notated by three different contributors. Figure1 our small scale study contained profanities, we shows the interface we designed for the task. decided to analyze the occurrence of bad words in a random collection of social media data.
Recommended publications
  • And Others TITLE Family Empowerment. INSTITUTION Minnesota Univ., Minneapolis
    DOCUMENT RESUME ED 348 793 EC 301 413 AUTHOR Sinclair, Mary F., Ed.; And Others TITLE Family Empowerment. INSTITUTION Minnesota Univ., Minneapolis. Inst. on Community Integration. SPONS AGENCY Administration on Developmental Disabilities (DHHS), Washington, D.C.; Minnesota Governor's Planning Council on Developmental Disabilities, St. Paul.; Special Education Programs (ED/OSERS), Washington, DC. PUB DATE 92 CONTRACT 90DD0204/Ol; 23946; H023K00017 NOTE 26p. AVAILABLE FROM Institute on Community Integration, 6 Pattee Hall, University of Minnesota, 150 Pillsbury Dr., S.E., Minneapolis, MN 55455. PUB TYPE Collected Works - Serials (022) JOURNAL CIT IMPACT; v5 n2 Sum 1992 EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS Accessibility (for Disabled); *Advocacy; Cultural Differences; *Delivery Systems; *Developmental Disabilities; Interpersonal Relationship; Intervention; Models; Older Adults; *Parent Participation; Parent School Relationship; Rural Areas; *Teamwork IDENTIFIERS Case Management; *Empowerment ABSTRACT This feature issue of IMPACT focuses on the empowerment of families with a member who has a developmental disability. It presents strategies and models for a collaborative, respectful approach to service provision, and presents the experiences of families in seeking support and assistance. Feature articles include "Two Generations of Disability: A Family and Community Affair" (Vivienne Kaufman); "Decision Making in the 90s: A New Paradigm for Family, Professional, and Consumer Roles" (Jean Ann Summers); "Access to Services: Sharing
    [Show full text]
  • The Therapeutic Implications of Swearing and Its Impact on Nurses
    Swearing: Impact on Nurses and Implications for Therapeutic Practice Teresa Elizabeth Stone RN, RPN, BA, MHM A thesis presented in fulfilment of the requirements for the degree of Doctor of Philosophy University of Newcastle January 2009 Teresa Elizabeth Stone 1 Declaration I hereby certify that the work embodied in this thesis is the result of original research and has not been submitted for a higher degree to any other University or Institution. Signed: ……………………………………………………. Date: ………………………………………………… Teresa Elizabeth Stone Teresa Elizabeth Stone 2 Dedication This thesis is dedicated to my Mother and Pa who have given me a lifetime of love and support. Teresa Elizabeth Stone 3 Acknowledgments My list of dramatis personae for this study is long. My principal supervisor, Mike Hazelton, remained unfailingly encouraging and optimistic and his wealth of experience in research was invaluable. He told me he had been caught laughing to himself while reading through the questionnaire, a cameo of him that I treasure. Ed Clayton and Kim Colyas worked wonders with my statistics, and I painfully and slowly learned much and forgot more. Margaret McMillan came in slightly later in the piece, was completely inspirational, and really got me over the line. Jill Valdar is the editor and friend every girl needs, despite language that made her hair curl. Associate Professor Brian Taylor was a wonderful resource for all things linguistic and he gave freely of his own time. Heartfelt thanks to my wonderful husband Scott, who is forever supportive, and to Claudia, my dog, who has patiently accompanied me, snoring, as I wrote. Thanks, too, to the many nurses who participated in the study.
    [Show full text]
  • The OHSU Code of Conduct Applies to All OHSU Members, Defi Ned As
    INTEGRITY DEPARTMENT Code of Conduct A message from Joe Robertson Dear Colleagues, As Oregon’s academic health center, we hold ourselves to a higher stan- dard. As a large organization, we abide by numerous laws, regulations and professional standards. But here at OHSU we seek to go beyond that. We seek to model best practices in education, research and patient care and to lead change. This edition of the Code of Conduct (“Code”) includes, for the fi rst time, our core values of quality, transparency, service excellence and diversity. Much of OHSU’s success over the past few years has grown out of our commit- ment to collaboration and innovation, two cornerstones of our Vision 2020 strategic plan. Our values and our strategy are intertwined, and our ability to collaborate successfully depends in large part on how potential partners view our institutional integrity and the depth of commitment to our values. As a mission-based organization, we rely deeply on the public trust. How we behave individually and collectively is every bit as important as our pro- grammatic excellence. Our reputation is earned, not bestowed, and it is made one encounter at a time. Now, more than ever, our continued success depends on collaboration, honesty, respect and the trust of those we serve. Please join me in carefully reviewing this Code, adhering to the standards it outlines, and modeling best practices and behaviors in each and every interaction. Thank you. Joe Robertson, M.D., M.B.A. OHSU President 2 Table of contents Introduction The OHSU Community 5
    [Show full text]
  • The Influence of Police Profanity on Public Perception of Excessive Force" (2017)
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by The Research Repository @ WVU (West Virginia University) Graduate Theses, Dissertations, and Problem Reports 2017 The Influence of oliceP Profanity on Public Perception of Excessive Force Christina Patton Follow this and additional works at: https://researchrepository.wvu.edu/etd Recommended Citation Patton, Christina, "The Influence of Police Profanity on Public Perception of Excessive Force" (2017). Graduate Theses, Dissertations, and Problem Reports. 6387. https://researchrepository.wvu.edu/etd/6387 This Dissertation is protected by copyright and/or related rights. It has been brought to you by the The Research Repository @ WVU with permission from the rights-holder(s). You are free to use this Dissertation in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you must obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Dissertation has been accepted for inclusion in WVU Graduate Theses, Dissertations, and Problem Reports collection by an authorized administrator of The Research Repository @ WVU. For more information, please contact [email protected]. iii The Influence of Police Profanity on Public Perception of Excessive Force Christina Patton, M. S. Dissertation submitted to The Eberly College of Arts and Sciences at West Virginia University in partial fulfillment of the requirements for the degree of Doctorate of Philosophy in Psychology William Fremouw, Ph.D., Chair Michael Asken, Ph.D. Barry Edelstein, Ph.D.
    [Show full text]
  • Obscenities in the Workplace: a Comment on Foul and Fair Expression and Status Relationships
    University at Buffalo School of Law Digital Commons @ University at Buffalo School of Law Journal Articles Faculty Scholarship Fall 1-1-1985 Obscenities in the Workplace: A Comment on Foul and Fair Expression and Status Relationships James B. Atleson University at Buffalo School of Law Follow this and additional works at: https://digitalcommons.law.buffalo.edu/journal_articles Part of the Labor and Employment Law Commons Recommended Citation James B. Atleson, Obscenities in the Workplace: A Comment on Foul and Fair Expression and Status Relationships, 34 Buff. L. Rev. 693 (1985). Available at: https://digitalcommons.law.buffalo.edu/journal_articles/786 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Commons @ University at Buffalo School of Law. It has been accepted for inclusion in Journal Articles by an authorized administrator of Digital Commons @ University at Buffalo School of Law. For more information, please contact [email protected]. Obscenities in the Workplace: A Comment on Fair and Foul Expression and Status Relationships JAMES B. ATLESON* The right of management to run its business presumes respect on the part of employ- eesfor their supervisors. Profanity, epithets and verbal abuse interfere with the kind of continuous control which management must have over its workforce.' [A]rbitrators have almost unanimously supported the notion that the hourly em- ployee should not exhibit willful, personal disrespect of the foreman's position... [I]t seems reasonable to conclude that the existence of a union does not obviate 2 employee respect of supervision. Russell, this is not the type of language we use in a civilized society.3 INTRODUCTION T has often been said that arbitrators are neutral deci- sionmakers; as servants of the parties, they discover the inten- tions that lie behind often vague or inconclusive contractual lan- guage.
    [Show full text]
  • Broadcast Profanity and the Right to Be Let Alone: Can the FCC Regulate Non-Indecent Fleeting Expletives Under a Privacy Model Edward L
    Hastings Communications and Entertainment Law Journal Volume 31 | Number 1 Article 1 1-1-2008 Broadcast Profanity and the Right to Be Let Alone: Can the FCC Regulate Non-Indecent Fleeting Expletives under a Privacy Model Edward L. Carter R. Trevor Hall James C. Phillips Follow this and additional works at: https://repository.uchastings.edu/ hastings_comm_ent_law_journal Part of the Communications Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Edward L. Carter, R. Trevor Hall, and James C. Phillips, Broadcast Profanity and the Right to Be Let Alone: Can the FCC Regulate Non- Indecent Fleeting Expletives under a Privacy Model, 31 Hastings Comm. & Ent. L.J. 1 (2008). Available at: https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol31/iss1/1 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Communications and Entertainment Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Broadcast Profanity and the "Right to Be Let Alone": Can the FCC Regulate Non-Indecent Fleeting Expletives Under a Privacy Model? by EDWARD L. CARTER,* R. TREVOR HALL' AND JAMES C. PHILLIPS I. Introduction .................................................................................................. 2 II. Brief Legal History of Profanity .................................................................. 7 A. Profanity Under the Common Law of Nuisance ................................... 8 B. The U.S. Supreme Court and Profanity ............................................... 12 C. Profanity's Place in the Law Today ................................................... 16 III. Free Speech Rationales and Profanity ....................................................... 22 IV. The FCC and Regulation of Profanity ....................................................... 26 A .
    [Show full text]
  • OSC's Role in Protecting Whistleblowers and Serving As A
    The U.S. Office of Special Counsel’s Role in Protecting Whistleblowers and Serving as a Safe Channel for Government Employees to Disclose Wrongdoing The Honorable Carolyn N. Lerner Special Counsel U.S. Office of Special Counsel1 Jason M. Zuckerman Senior Legal Advisor U.S. Office of Special Counsel DISCLAIMER: This paper is offered only for educational and informational purposes and does not constitute legal advice, a statement of agency policy or a legal opinion. The material is a summary of the area of law and does not purport to exhaust its subject. The reader can use the outline as a tool for further research, but this paper should not be relied upon or cited in any proceeding, including in litigation before the Merit Systems Protection Board or the U.S. Court of Appeals for the Federal Circuit. This paper does not create, and shall not be construed as creating, any right or benefit, substantive or procedural, enforceable at law by any person against the United States, its agencies, its officers or employees, or any other person. 1 The authors acknowledge the assistance of Gregory Giaccio and Grace Williams in preparing this outline. TABLE OF CONTENTS I. Establishment of OSC 2 II. OSC’s Independence and Powers 3 III. Investigating and Resolving Complaints of Whistleblower Retaliation 4 IV. Obtaining Corrective Action for Whistleblowers 5 V. Pursuing Disciplinary Action 7 VI. Serving as a Secure Channel to Disclose Wrongdoing 9 VII. Scope of OSC Jurisdiction in Whistleblower Retaliation Cases 10 VIII. Prohibitions Against Whistleblower Retaliation 13 A. Whistleblower Retaliation, § 2302(b)(8) 13 1.
    [Show full text]
  • Abstract Mcginnis, Jennifer Tricia
    ABSTRACT MCGINNIS, JENNIFER TRICIA LINDBERG. Leaders Behaving Badly: Antecedents and Consequences of Abuse. (Under the direction of S. Bartholomew Craig.) Although the leadership field has been preoccupied with identifying the leader traits and behaviors that evoke positive employee work attitudes and behaviors and maximize effectiveness (Bass, 1990; Yukl, 2002), the field has become increasingly interested in understanding the “dark side” of leader behavior. However, this research is still in its infancy. The current study increases our understanding of one class of negative leader behavior, abusive supervision, by examining supervisor personality as an antecedent of abusive supervision, along with several individual-level and organization-level consequences. An archival database was obtained from a leadership training and development consulting firm for the current study. Participants were focal managers (N = 121) who participated in a leadership development program. The managers completed a personality measure prior to the program. In addition, the managers’ subordinates ( N = 779) completed a customized, qualitative 360-degree assessment instrument that asked for examples of the focal managers’ use of “bad leadership” behaviors and both their reactions to and the consequences (i.e., impacts) of these behaviors. A preliminary content analysis was conducted on the 360-degree data for 10 managers to develop the initial coding scheme. After this analysis, a content analysis was conducted on the 360-degree data for all 121 managers, resulting in 45 behavior categories and 59 reaction/impact categories. Next, 10 subject matter experts (SMEs) provided their ratings of abusive supervision and destructive leadership for the behavior categories. Eight behaviors were rated as abusive supervision; the same eight behaviors and an additional 16 behaviors were rated as destructive leadership, and 20 other behaviors were rated as non- destructive leadership.
    [Show full text]
  • Addressing Bullying and Incivility Among Nurses
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2020 Addressing Bullying and Incivility Among Nurses Caroline Holland Combs Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Nursing Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Health Sciences This is to certify that the doctoral study by Caroline Combs has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Robert McWhirt, Committee Chairperson, Nursing Faculty Dr. Melanie Braswell, Committee Member, Nursing Faculty Dr. Faisal Aboul-Enein, University Reviewer, Nursing Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2020 Abstract Addressing Bullying and Incivility Among Nurses by Caroline Combs MS, Walden University, 2012 Project Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Nursing Practice Walden University June 2020 Abstract For decades, nurses have experienced some form of bullying and incivility throughout their careers. Incivility contributes to behaviors that constrain the sense of empowerment among nurses and directly encroach upon Provision 6 of the American Nurses Association code of ethics, which addresses sustaining a moral environment and the need to create a contagious culture of respect that is free from uncivil behavior.
    [Show full text]
  • Shepherd Youth Staff
    ----------h_ CALENDAR January 29 Kick Off February 05 Open House 12 D-Groups + Leader Dinner 19 D-Groups 26D-Groups March 04 D-Groups + Leader Dinner 11 D-Groups 18 D-Groups 25 D-Groups April 01 D-Groups 08 NO D-Groups 15 D-Groups + Incoming Freshman Dinner 22 D-Groups 29 D-Groups + Senior Dinner May 06 D-Groups + Leader Dinner 13 Leader Choice Night TRAINING General D-Groups Schedule: 6:14 pm - Leader Meeting in Room 143 6:30 pm - Programmed Content (Announcements, Worship, Message) 7:20 pm - Transition to Groups *Take Attendance 8:25 pm - Middle School to Youth and Sports Center 8:30 pm - Dismiss *Report Any Red Flag Activity to Staff Important Information: D-Groups Hotline: 818.722.8468 shepherdyouth.com/resources shepherdchurch.com/dgroupstool 8 GLASS HOUSE AGREEMENT As Christian leaders who are in places of responsibility in the church, we are required to be examples in faith, conduct, and purity. We have an obligation, when presenting Christ to students, to live godly lives and be “above reproach,” acknowledging the “glass house” we live in. As a D-Group Leader we ask that you… Have accepted Jesus Christ as your Lord and Savior and been baptized. Have been at Shepherd Church for at least 6 months and attend services each week on campus. Commit to actively pursuing God through regularly practicing spiritual disciplines and participating in community (preferably through LifeGroups). Pursue physical, emotional, and spiritual purity. This includes things like fleeing from sexual immorality (whether married or single), not forming inappropriate or unhealthy emotional relationships, and not viewing pornographic or explicit material.
    [Show full text]
  • Why You Must Archive All of Your Business Records
    Osterman Research WHITE PAPER White Paper by Osterman Research Published May 2021 Sponsored by Zix Why You Must Archive All of YourO Business Records Why You Must Archive All of Your Business Records Executive Summary Organizations generate large volumes of electronic data, most of it unstructured. Content-generating sources include email, text messaging, telephony, collaboration systems like Microsoft Teams and Zoom, desktop productivity applications, CRM systems, social media and a wide range of other tools and capabilities. Much of the content generated by an organization constitutes some form of business record: invoices, policy statements, client files, communications with members of a supply chain, orders, prospect inquiries, employee records, and the like. Organizations are obligated to retain these business records for varying lengths of time and for a variety of reasons: regulatory obligations, legal requirements, or best practice considerations. Retaining records can be accomplished with simple backup, but this is an inefficient method of records retention that is fraught with problems: it normally retains an incomplete set of business records, data can easily be deleted or modified, and searching for and producing data is difficult, time-consuming and risky. Instead, organizations should deploy an archiving solution that will do the following: • Index all of the relevant content that an organization generates as close to real time as possible. The vast majority of • Place this content into archival storage where it cannot be deleted before it is permissible to do so, and where it cannot be modified either intentionally or organizations accidentally. are archiving • Enable robust search capabilities so that legal counsel, senior managers, corporate email, individual users and others can search for content in support of a variety but significantly purposes for which the data might be needed.
    [Show full text]
  • Workplace Bullying and Offensive Conduct
    Town of Canton Policy Number: Human Resources Policy Subject: Workplace Bullying and Offensive Conduct Policy: It is the goal of the Town of Canton to eliminate and prevent any bullying or offensive conduct in the workplace. Scope: This policy and procedure is applicable to allTown of Canton and Canton Public School employees, every officer including all elected and appointed town officers, all members of multiple member bodies, agents, consultants, volunteers and any person conducting business with or on behalf of the Town of Canton. Definitions: Workplace bullying is defined as repeated unreasonably or offensive actions in the workplace that impact the psychological or physical health, safety, or economic security of an employee, or create a risk to the health, safety, or security of an employee. While it is not possible to list all of the circumstances that may constitute bullying, the following are some examples of conduct that may constitute bullying depending upon the totality of the circumstances, including the severity of the conduct and its pervasiveness: Rudeness and discourteous verbal and non-verbal behaviors or other types of incivility; Criticizing employees’ work or reminding employees of mistakes in a persistent and unprofessional manner; Excessive monitoring; Yelling; Spreading gossip or lies; Ostracizing, ignoring, or excluding workers; Blaming an employee without factual justification, or unwarranted or invalid criticism; Directing profanity at an employee; Insulting employees’ habits, attitudes, or private life; Humiliating employees or making employees the target of practical jokes; Hostile behavior, verbal aggression, or angry exchanges. Procedure: Managers and supervisors are obligated to implement and enforce this policy. If an employee believes that his or she has been subjected to bullying or conduct prohibited by this policy, the employee is encouraged to report this matter to any supervisor or manager or to the Human Resource Administrator.
    [Show full text]