Although this behavior Phone Number Database is largely analog, the signals can also be recognized digitally. When intimidation takes place, it usually takes place on the basis of multiple contact moments. This Phone Number Database usually includes digital contact moments. Assuming that office workers spend about 70% of their time emailing, meeting, and writing and reading documents, it is now possible to develop Phone Number Database algorithms that can spot potentially unwanted behavior. Also read: That changes things: top-down becomes down-top! By analyzing who communicates and agrees with whom, in which patterns, how often and at what times, a lot can be recognized.
If you combine this Phone Number Database with the content, nature, length and tone of the messages, this behavior can be recognized well. You can machine recognize images and photos on adult content and also see how Phone Number Database people react in a group. Law & technology For example, you can recognize behavior that may indicate bullying, sexually transgressive behavior or abuse of a place in the hierarchy. The technology Phone Number Database visualizes organizational health, sounds the alarm in the event of potential calamities and can, if desired, tell you exactly what the exceedance.
But how specific do we Phone Number Database want the technology to be and what does the law say about it? In the GDPR violence, many organizations and CISOs (security and compliance officers) will quickly refer to privacy issues. Beginning of the complexity And what do you do if this behavior is recognized Phone Number Database on the basis of analysis? There are still no certainties. How to deal with it is something we are not yet well acquainted with. Do you approach the manager of the person whose suspicious Phone Number Database behavior was measured? Or the manager of the person who may have undergone behavior? Or just one of the two people in question.