Verified Document

Management - Self-Awareness Deception In Research Proposal

Frustrations of this nature only grow worse with time (Myers & Spencer, 2004) and resentments magnify by virtue of internalizing them instead of finding a way of expressing them appropriately (Aronson, Wilson, & Akert, 2003). In many respects, the anger that eventually erupts is more reflective of the additional psychological energy required to repress genuine feelings about coworkers and working situations than it is appropriate to the actual situation itself (Blair, 2003; Myers & Spencer, 2004). In most cases, the optimal solution requires finding a way to address the problem at the earliest point, before any resentment has had a chance to contribute to negative social relationships at work that can threaten the working environment within work groups and impact the work product negatively (Blair, 2003; Locker, 2003). More often than not, reaching the best possible solution requires an honest expression of concern over the issue without anger, the ability to view the matter from alternate perspectives, input from both parties, and a practical outline for solution that incorporates the concerns of everyone involved (Blair, 2003; Locker, 2003).

After a series of heated exchanges that necessitated my reassignment to another working group, I was determined not to repeat the same mistakes and to develop a method of satisfying my responsibilities while, at the same time, negotiating a method of preventing any recurrence of the same problem in my new group. In that regard, one of the senior group members in the new group explained that I had contributed to the problem by regularly submitting my work on the last possible day for review by senior group members. It had never...

That senior group member suggested that we negotiate a solution that incorporated our respective needs to ensure a more positive working relationship without compromising our responsibilities to submit a timely draft report.
Recommendations for Improvement: As a result, I suggested that we agree on a specific unofficial schedule that accommodated my desire to be consulted on proposed changes to my sections of the draft report, particularly on stylistic issues; that I commit to submitting my draft section with sufficient time left to allow for a second round of edits within our group; and that we discuss our respective perceptions on non-substantive changes proposed by senior group members to reach a mutually satisfactory resolution on matters of writing style and report organization that reflected individual preference more than technical requirements. I resolved not to delay my reactions to avoid harboring increased frustration and anger, and the senior group member acknowledged that junior members had no less right to contribute their stylistic preferences in areas outside of technical matters. References Aronson E., Wilson T., Akert R. (2003). Social Psychology. New York: Longman.

Blair G. (2003). Groups that Work. Washington, DC: IEEE Press.

Gerrig R., Zimbardo, P. (2005). Psychology and Life. Princeton, NJ: Pearson.

Locker K. (2003). Business and Administrative Communication. Boston: Irwin McGraw-Hill.

Myers D., Spencer S. (2004). Social…

Sources used in this document:
References Aronson E., Wilson T., Akert R. (2003). Social Psychology. New York: Longman.

Blair G. (2003). Groups that Work. Washington, DC: IEEE Press.

Gerrig R., Zimbardo, P. (2005). Psychology and Life. Princeton, NJ: Pearson.

Locker K. (2003). Business and Administrative Communication. Boston: Irwin McGraw-Hill.

Myers D., Spencer S. (2004). Social Psychology. Toronto: McGraw-Hill Ryerson.
Cite this Document:
Copy Bibliography Citation

Related Documents

Game of Deception Game Theory
Words: 4172 Length: 15 Document Type: Research Proposal

509). Likewise, in a conventional military context, Davis and Shapiro describe anti-access and area denial as being "cost-imposing strategies," a description these authors suggest is particularly useful in the counterterrorism context. In addition, game theory can help avoid military confrontations altogether, thereby avoiding unnecessary friendly casualties. In this regard, Schofield (1999) emphasizes that, "The inevitability of armed conflict in the classical sense is not a foregone conclusion in a

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Organizational Climate Compare and Contrast Organizational Command ...
Words: 1277 Length: 5 Document Type: Essay

Organizational Climate Compare and Contrast organizational (command) climate with organizational culture. Organizational climate is the recurring patterns of behavior, attitudes and feelings that characterize life in an organization or company. It is used to describe the dimensions of the environment at work. The factors that determine organizational climate are leadership, organizational structure, historical forces, standards of accountability, standards of behavior, communication, rewards, trust, commitment, vision and strategies, and organizational correctiveness. Leadership is a

Ethical Leadership in Banking in Pakistan
Words: 975 Length: 3 Document Type: Essay

Strategic Planning and Performance Measurement The ethical issues that pertain to the assessment of emotional intelligence (EI) among leadership in the Pakistani banking industry are that while EI is recognized as being important to leadership effectiveness, moral aptitude and virtue are seen as most important in being a great leader (Sivanathan, Fekken, 2002). Possessing moral aptitude and communicating virtue through transparent exchanges with followers are qualities that must be possessed alongside

Human Services the Field of Human Services
Words: 1740 Length: 6 Document Type: Research Paper

Human Services The field of human services is a burgeoning field that is fairly broad in definition. It requires an interdisciplinary approach to knowledge, one that focuses on prevention as well as solving human problems, and a commitment to improving the quality of life of the population. This field is not just one focusing on delivery systems, but individuals who seek to improve accessibility, accountability, and coordination among all the

Identity Theft
Words: 2926 Length: 10 Document Type: Term Paper

Identity Theft: Managing the Risk Management What's New for the Future of Identity Theft Prevention In this paper I examine the basics of identity theft in today's age of widespread and accessible information. The fundamental problem is that while information technologies continue to make aspects of our lives as simple as "point and click," they tend to make certain forms of crime equally simple. The internet, in particular, makes information not only

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now