Frustrations of this nature only grow worse with time (Myers & Spencer, 2004) and resentments magnify by virtue of internalizing them instead of finding a way of expressing them appropriately (Aronson, Wilson, & Akert, 2003). In many respects, the anger that eventually erupts is more reflective of the additional psychological energy required to repress genuine feelings about coworkers and working situations than it is appropriate to the actual situation itself (Blair, 2003; Myers & Spencer, 2004).
In most cases, the optimal solution requires finding a way to address the problem at the earliest point, before any resentment has had a chance to contribute to negative social relationships at work that can threaten the working environment within work groups and impact the work product negatively (Blair, 2003; Locker, 2003). More often than not, reaching the best possible solution requires an honest expression of concern over the issue without anger, the ability to view the matter from alternate perspectives, input from both parties, and a practical outline for solution that incorporates the concerns of everyone involved (Blair, 2003; Locker, 2003).
After a series of heated exchanges that necessitated my reassignment to another working group, I was determined not to repeat the same mistakes and to develop a method of satisfying my responsibilities while, at the same time, negotiating a method of preventing any recurrence of the same problem in my new group. In that regard, one of the senior group members in the new group explained that I had contributed to the problem by regularly submitting my work on the last possible day for review by senior group members. It had never...
509). Likewise, in a conventional military context, Davis and Shapiro describe anti-access and area denial as being "cost-imposing strategies," a description these authors suggest is particularly useful in the counterterrorism context. In addition, game theory can help avoid military confrontations altogether, thereby avoiding unnecessary friendly casualties. In this regard, Schofield (1999) emphasizes that, "The inevitability of armed conflict in the classical sense is not a foregone conclusion in a
Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration
Organizational Climate Compare and Contrast organizational (command) climate with organizational culture. Organizational climate is the recurring patterns of behavior, attitudes and feelings that characterize life in an organization or company. It is used to describe the dimensions of the environment at work. The factors that determine organizational climate are leadership, organizational structure, historical forces, standards of accountability, standards of behavior, communication, rewards, trust, commitment, vision and strategies, and organizational correctiveness. Leadership is a
Strategic Planning and Performance Measurement The ethical issues that pertain to the assessment of emotional intelligence (EI) among leadership in the Pakistani banking industry are that while EI is recognized as being important to leadership effectiveness, moral aptitude and virtue are seen as most important in being a great leader (Sivanathan, Fekken, 2002). Possessing moral aptitude and communicating virtue through transparent exchanges with followers are qualities that must be possessed alongside
Human Services The field of human services is a burgeoning field that is fairly broad in definition. It requires an interdisciplinary approach to knowledge, one that focuses on prevention as well as solving human problems, and a commitment to improving the quality of life of the population. This field is not just one focusing on delivery systems, but individuals who seek to improve accessibility, accountability, and coordination among all the
Identity Theft: Managing the Risk Management What's New for the Future of Identity Theft Prevention In this paper I examine the basics of identity theft in today's age of widespread and accessible information. The fundamental problem is that while information technologies continue to make aspects of our lives as simple as "point and click," they tend to make certain forms of crime equally simple. The internet, in particular, makes information not only
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now