...A White Paper from the Society for Human Resource Management BULLIES IN THE WORKPLACE: A FOCUS ON THE “ABUSIVE DISRESPECT” OF EMPLOYEES By Teresa A. Daniel “Bullying is the sexual harassment of 20 years ago; everybody knows about it, but nobody wants to admit it”. —Lewis Maltby (Russell, 2001) The purpose of this paper is to review the current research and literature about workplace bullying, to provide information about how organizations can learn to more quickly identify bullies and to suggest ways of dealing with these toxic people so that the corporate culture is not negatively impacted by their behavior. Overview To be successful, organizations must create an atmosphere that inspires both innovation and risk-taking. In an increasingly competitive global economy, such innovation is more important than ever before (Hamel, 2000). However, not only does workplace bullying stifle productivity and innovative practices, but bullies often target the organization’s most talented employees—those individuals who are generally the most threatening to bullies (McCord & Richardson, 2001). As a result, the creativity and productivity of the organization’s most talented human capital is often negatively affected by this type of behavior at work or, worse yet, good employees are driven out of the company altogether. Bullies are often hard to identify because they operate “under cover”—that is, on the surface they appear to be civil and cooperative, while they do ...
Words: 4655 - Pages: 19
...Abstract Nowadays, workplace bullying becomes one of the major unethical issues in organizations. Workplace bullying expressed as unethical behavior or unethical business practice in organizations. Bullying in workplace is unhealthy, mistreatment and unfair supervision for one employee, by one or more employees and employers. The unhealthy, mistreatment and unfair supervision is form as violence that prevents somebody or employee to perform in his / her works. This issues being popular and serious problem among researcher. In addition, it will demonstrate negative impact to categories such as individual, team and organizations as well as to country. In this study, the problem of workplace bullying will be explored by using several of review papers / articles. The purpose of the study is to determine the potential factor or causes of workplace bullying on employees. Other than that, this study also wants to explore what is workplace bullying and unethical behavior as well as its consequences or the effect to individual and organization. Furthermore, the relationship or correlations between workplace bullying and unethical behavior will be identify. The review papers / articles taken between year 2010 and 2015. The conclusion and recommendation for this study are provided as purpose to further study and research. Keywords: Workplace Bullying, Unethical Behaviors 1.0 Introduction This study includes two sections which are background of the study that will explain the unethical...
Words: 2106 - Pages: 9
... the report identifies three forms of harassment, which are bullying, sexual and racial harassment. It examines the differences in people’s perception of harassment in general as well as the factors influencing individuals’ experience of it. The report describes the risks for businesses experiencing harassment in the workplace; it examines the negative effects they can have on organizational environment, and its impacts on the organizations’ professional image. The findings of this report suggest that organizations can prevent and resolve harassment in the workplace by improving leadership and communication among employees, and by implementing and enforcing a clear and effective anti-harassment policy. The recommendations made in this report are to: * Provide basic guidelines on how to create and enforce effective human rights policies in organizations * Provide the necessary elements an effective anti-harassment policy should have * Provide adequate training and education programs for everyone at the organization INTRODUCTION Over the last years, there has been a rising concern over the issue of harassment in the workplace. Despite some employees may ignore or find harassment as a rather rare occurrence, it has become a very serious problem for many companies. Harassment is defined as “any unwelcome behaviour that demeans, humiliates, or embarrasses a person and that a reasonable person should have known would be unwelcome” (Cole & Dessler, 2011). There...
Words: 3144 - Pages: 13
...navigation, search Bullying is detrimental to students’ well-being and development.[1] Bullying is a form of aggressive behavior manifested by the use of force or coercion to affect others, particularly when the behavior is habitual and involves an imbalance of power. It can include verbal harassment, physical assault or coercion and may be directed repeatedly towards particular victims, perhaps on grounds of race, religion, gender, sexuality, or ability.[2][3] The "imbalance of power" may be social power and/or physical power. The victim of bullying is sometimes referred to as a "target". Bullying consists of three basic types of abuse – emotional, verbal, and physical. It typically involves subtle methods of coercion such as intimidation. Bullying can be defined in many different ways. The UK currently has no legal definition of bullying,[4] while some U.S. states have laws against it.[5] Bullying ranges from simple one-on-one bullying to more complex bullying in which the bully may have one or more 'lieutenants' who may seem to be willing to assist the primary bully in his or her bullying activities. Bullying in school and the workplace is also referred to as peer abuse.[6] Robert W. Fuller has analyzed bullying in the context of rankism. Bullying can occur in any context in which human beings interact with each other. This includes school, church, family, the workplace, home, and neighborhoods. It is even a common push factor in migration. Bullying can exist between social...
Words: 4630 - Pages: 19
...Bullying is the use of force, threat, or coercion to abuse, intimidate, or aggressively impose domination over others. The behavior is often repeated and habitual. One essential prerequisite is the perception, by the bully or by others, of an imbalance of social or physical power. Behaviors used to assert such domination can include verbal harassment or threat, physical assault or coercion, and such acts may be directed repeatedly towards particular targets. Justifications and rationalizations for such behavior sometimes include differences of class, race, religion, gender, sexuality, appearance, behavior, strength, size or ability. If bullying is done by a group, it is called mobbing. "Targets" of bullying are also sometimes referred to as "victims" of bullying. Bullying can be defined in many different ways. The UK currently has no legal definition of bullying, while some U.S. states, including Oklahoma have laws against it. Bullying consists of four basic types of abuse - emotional, verbal, physical, and cyber. It typically involves subtle methods of coercion such as intimidation. Bullying has become such a problem in many places. How can we solve this problem? Bullying ranges from simple one-on-one bullying to more complex bullying in which the bully may have one or more "lieutenants" who may seem to be willing to assist the primary bully in his or her bullying activities. Bullying in school and the workplace is also referred to as peer abuse. Robert W. Fuller has analyzed...
Words: 5023 - Pages: 21
...consuming marijuana. The availability and distribution of hemp, and let’s not forget about the insane overflow of cash in tax revenue. This is not your average ‘dirty money’, this is supporting, providing, and bettering the lively hood for its resident’s type of money. It is time to throw away that stereotypical pot head image, and start understanding actuality. Let’s face it, when most people think about legalizing marijuana they probably are not thinking about how it can better their state. The profit that can be made is a major part of legalization that should not be ignored. Only 4 of states have legalized recreational marijuana and have taken advantage of all of the benefits, and then there are 24 states that are starting to get on board by having legalized marijuana medically. Take Colorado for example, one of the 4 states that has fully legalized recreational marijuana. When the state asked its people what they should do with all of the additional taxes gained from the sales of marijuana, they chose the less selfish road. The options they were given was to either return the $66 million of tax revenue back to the tax payer and pot grower or to give it to the state to be fairly distributed for public service. The majority of the vote, around 70 percent, agreed to use the revenue for schools and other public services in the state. So, where exactly is this money going and how is it even helping the state? Some remarkable ways that the tax revenue is helping the state is by;...
Words: 1721 - Pages: 7
...Necessity of an Acceptable Internet Use Policy for Business William E. Boyle Point Park University Abstract This paper will argue that an Acceptable Internet Use Policy, combined with effective network monitoring and policy enforcement is an essential requirement for businesses to protect business assets and resources. It discusses the potential loss to business from employee misuse of internet access and the danger from external sources. Necessity of an Acceptable Internet Use Policy for Business The internet is an integral part of today’s business resources. Organizations, large and small use the internet to improve organizational efficiencies. Businesses use the internet for everything from worldwide sales using websites, workforce collaboration using email and network data access, and for business research. In most business organizations, all types of devices, from desktop computers to cell phones and PDA’s, allow workers to access the internet and send and receive email on demand. A 2008 study by the Pew Internet & American Life Project found that 53% of Americans are employed, and 96% of these workers have some access to these tools. (Madden, M. & Jones, S., 2008). This allows workers instant access to websites, email and instant messages, but uncontrolled access exposes a business organization to a great risk of financial loss. All businesses must manage this risk through the implementation of an Internet Use Policy combined with employee education...
Words: 2537 - Pages: 11
...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...
Words: 1432 - Pages: 6
...Joaquin Raphael Deato Dr. Aileen Salonga 2014 13491 April 15, 2015 English 10: Concept and Position Paper Homosexuality In 1935, Sigmund Freud wrote a letter to an American mother saying: “Homosexuality is assuredly no advantage, but it is nothing to be ashamed of, no vice, no degradation, it cannot be classified as an illness; we consider it to be a variation of the sexual function produced by a certain arrest of sexual development. Many highly respectable individuals of ancient and modern times have been homosexuals, several of the greatest men among them (Plato, Michaelangelo, Leonardo Da Vinci, etc.) It is a great injustice to persecute homosexuality as a crime, and cruelty too...” ADDIN EN.CITE <EndNote><Cite><Author>Ph.D. Gregory M. Herek</Author><Year>2012</Year><DisplayText>(Gregory M. Herek)</DisplayText><record><ref-type name="Web Page">12</ref-type><contributors><authors><author>Ph.D. Gregory M. Herek</author></authors></contributors><titles/><title>Facts About Homosexuality and Mental Health</title><periodical/><dates><year>2012</year><pub-dates/></dates></record></Cite></EndNote>(Gregory M. Herek) There have been a lot of changes in the society ever since the twentieth century came and this affected even the intangible and most absurd things such as how people interact...
Words: 2882 - Pages: 12
...from former USSR experience and cope with workplace aggression. In this qualitative study I analyze the way immigrant workers experience workplace aggression in Israeli companies, actions taken to deal with aggression and possible actions to be taken in future. Study participants were immigrant workers, emigrated from former USSR during last 23 years. Their narratives were analyzed for common topics. Data show that most participants did not take some actions to cope with aggression; however, some mentioned a few different ways. Two participants’ strategies were successful. Employer responses included indifference and various forms of retaliation. Most participants would allegedly act differently in future. Questions for future research are suggested. Table of Contents I. Introduction 4 II. Theoretical background 6 1. Workplace aggression 6 2. Types of workplace aggression. 7 3. Measuring Workplace aggression 8 4. Immigrants as victims of aggression 9 5. Immigrants form former USSR in Israel 11 6. Preventing and coping with workplace aggression 12 III. Method 14 VI. Findings and discussion 16 V. Summary and Conclusions 28 VI. Bibliography 30 VII. Appendix 35 I. Introduction Almost anyone who has ever worked has experienced workplace aggression in one form or another. Workplace aggression is something we do not like to talk about and something that a lot of people would rather suppress and pretend it has never happened,...
Words: 6576 - Pages: 27
...Research Paper The experience of ethnic minority workers in the hotel and catering industry: Routes to support and advice on workplace problems Ref: 03/06 2006 Prepared by: Tessa Wright and Anna Pollert (Working Lives Research Institute, London Metropolitan University) Funded by Acas and the European Social Fund For any further information on this study, or other aspects of the Acas Research and Evaluation programme, please telephone 020 7210 3673 or email research@acas.org.uk Acas research publications can be found at http://www.acas.org.uk/index.aspx?articleid=405 ISBN 0-9554830-0-X ISBN 978-0-9554830-0-4 The Experience of Ethnic Minority Workers in the Hotel and Catering Industry: Routes to Support and Advice on Workplace Problems Ref: 03/06 2006 Prepared by: Tessa Wright and Anna Pollert (Working Lives Research Institute, London Metropolitan University) Funded by Acas and the European Social Fund Acknowledgements The authors would like to thank the European Social Fund and Acas for providing financial support to the project, and Acas staff also for their guidance during the project, in particular Margaret Fox, Anthony Gould and Gill Dix. The project benefited greatly from the contributions of the Project Advisory Group, both in suggestions made on methodology, access and content at meetings, and help in accessing research participants. Many individuals and organisations helped us in gaining access to workers to interview...
Words: 28672 - Pages: 115
...Media Issue Paper and Info. Literacy Worksheet Student’s Name University Affiliation Governments should be allowed to monitor and/or censor the Internet use of citizens Introduction Internet censorship is the restriction of the content that can be accessed, published, or viewed through the internet. In any country, the government has a vital role and responsibility in the enhancement of information and technology. It is the right of everyone to have freedom of opinion and expression. Every person has freedom to hold their own opinions without hindrance and to seek, get and pass information and opinions via any media channels. However, in many countries this important human right is usually curtailed through various ways which include censorship, laws that restrict the press, molestation of journalists and other people who articulate their views and opinions. It is also important any government to monitor and control the information which can be accessed by its citizens without infringing the fundamental right to information and opinions. Failure to censor the internet can cause extreme harm to the citizens or even the government (Constance, Theo & Ina, n.d.). Firstly, if the content that can be accessed or published in the internet is not filtered malicious people can spread information that can jeopardize the security of a country. Many countries argue that lack of internet censorship could lead to spread of secret information that is necessary for protecting the country...
Words: 1358 - Pages: 6
...of general characteristics. If someone pretending to represent a company or organization contact you by e-mail to supply them with usernames, passwords or other critical information by e-mail, then you can be certain it’s fraudulent. Today we have something we call SSL (Secure Socket Layer). E-mail is one of the most un-secure methods to send user information and passwords. Most organizations have secure servers, which apply SSL technology to keep your personal information safe. II Statement of the Problem 1. What are the different types of cyber scams? 2. What are the signs of being scammed? 3. How can we avoid cyber scams? III Relevance of the Study The relevance of this research to us, as an Information Technology students is that this research gives...
Words: 2516 - Pages: 11
...ETHICAL ISSUES OF HUMAN RESOURCE MANAGEMENT IN HEALTH CARE MANAGMENT HIRA TOOR HCAD 660 11/01/2015 TURN-IT-IN SCORE: 13% Total paper content: 18 pages Abstract This paper deals with ethical issues encountered by human resource managers in various healthcare settings. The ethical problems that the paper highlights includes issues related to overworked employees, employee discrimination, disabled worker disparities, age-related employee discrimination, difficulties in maintaining employee relations, problems with downsizing workforce, workplace bullying, conflict of interest and compliance issues. The research paper also gives recommendations on how to maintain an ethical environment by: hiring of adequate staff, conducting fair employment testing, rewarding disabled employees, educating on age-discrimination, creating a diverse workforce, communicating to build employee relationships, executing a strategic plan to mitigate bullying and presenting fair judgments. The paper also address issues associated with ethics of flu shots, employment hurdles of medical marijuana patients, inequality of women’s compensation and safety hazards of employees. In conclusion, my personal experience with ethical issues at laurel regional hospital is discussed. Introduction: The human resource department is the heart of every healthcare organization. The human resource functions deals with variety of ethical challenges on daily basis. Human resource includes...
Words: 5845 - Pages: 24
...RESEARCH METHODS IN CRIME AND JUSTICE CHAPTER 1 – THE RESEARCH PRACTICE Chapter Review Questions Respond to each of the following questions using the information from this chapter. 1. During a recent meeting of the command staff at a mid-sized police department, the chief asks the patrol captain for his recommendation for new flashlights. The captain responds, “I did a little research and I recommend that we purchase the DryLight, Model X flashlight”. The patrol captain’s research consisted of “asking a few of the officers” what they thought would be a good flashlight. Did the patrol captain actually conduct research? Why or why not? ANSWER: Technically, the patrol captain did some research. He conducted interviews which is a form of data collection. One could argue, however, that the patrol captain’s research was limited (pp. 7-8). 2. Respond to the following statement in 3-5 sentences: Conducting research in the social sciences and in criminal justice in particular is easier than in other sciences because the things we measure are so vague that nobody really cares if we get it right or not. ANSWER: Generally speaking, social science research is more challenging than some of the ‘hard sciences’ because the things social scientists study are difficult to measure objectively. As a result social scientists spend a great deal of time justifying how they measure concepts to their peers (pp. 4-5). 3. Read the following scenarios and identify which of the following...
Words: 11905 - Pages: 48