Concept explainers
GROUP LEARNING
Current Events of an Unethical Type83
Step I. Prior to meeting as a group, each person should find two newspaper or magazine articles from the past several months relating to someone violating
Step 2. Summarize the key points of the articles you found.
Step 3. Meet as a group. Have each person share key points from articles with group members.
Step 4. Identify similar themes across the unethical incidents reported in the articles. What was the source or underlying cause of the unethical behavior? What was the hoped—for outcome? Was an individual or a group involved? Did the accused seem repentant or defensive? Can you identify similar conditions of any kind across incidents? Write the common themes in a list on a sheet of paper or whiteboard.
Step 5. What could you as a manager do to prevent such unethical behavior in your organization? What could you do to fix this kind of problem after it occurred in your organization?
Step 6. Report your findings to the class if asked to do so by your instructor.
Then fill in these boxes.
Look at the underlying causes of the unethical behavior.
How often was a group?
How often an individual?
Want to see the full answer?
Check out a sample textbook solutionChapter 4 Solutions
Understanding Management (MindTap Course List)
- Create a Group Control System Step 1. From into groups of three to five students. Each group will assume that another student group has been given an assignment of writing a major paper that will involve research by individual group members that will be integrated into the final paper. Each group member has to do his or part. Step 2. Your assignment is develop a list of rules and identify some statistics by which to control the behavior of members in that group. Brainstorm and discuss potential to govern member behavior and consequences for breaking those rules. Step 3. First, select the five rules that you think are most important for governing group member behavior. Consider the following situations that rules might cover; arriving late for a meeting: missing a meeting: failing to complete a work assignment; disagreements about desired quality of work; how to resolve conflicts about paper content; differences in participation , such as one person doing all the talking and someone else talking hardly at all; how to handle meetings that start late; the use of an agenda and handling deviations from the agenda; and any other situation that your group a cover. Step 4. Now consider what statistics could be developed to measure the behavior and outcome of the group pertaining to those five rules. What kinds of things could be counted to understand how group is performing and whether members are the following rules? Step 5. Discuss the following questions. Why are rules important as a means of control? What are the advantages and disadvantages of having many rules (hierarchical control) versus few rules (decentralized control) for a student group? How can statistics help a group ensure? appropriate behavior and a high-quality product? Step 6. Be prepared to present your conclusions to the Class.arrow_forwardImagine you are the managing director of a full service restaurant. One day you receive a complaint letter from a guest reporting s/he was not satisfied with the follow up regarding their criticism of being overcharged in one of your restaurants. 1. Why was the complaint made? Discuss.arrow_forwardWriting an Op-ed in any area of Consumer Behaviour.Topic: An MBA student must be a unique resource to help the organization grow and expandarrow_forward
- a) Should managers monitor employee e-mail and Internet usage? Answer this question using the objective stance as being in agreement with the question. b) Do you think managers should inform employees that their web behaviour is being monitored? Or should that activity be done secretly? Defend your answer.arrow_forward2. If you will be assigned as a Student DRRM coordinator, what possible solutions to the problem can you suggest? - 10 3. What possible activities can you suggest to increase the awareness of the learners on how to lessen the vulnerability of your previous school?arrow_forwardCarter cleaning company The Job Description Based on her review of the stores, Jennifer concluded that one of the first matters she had to attend to involved developing job descriptions for her store managers. As Jennifer tells it, her lessons regarding job descriptions in her basic management and HR management courses were insufficient to convince her of the pivotal role job descriptions actually play in the smooth functioning of an enterprise. Many times during her first few weeks on the job, Jennifer found herself asking one of her store managers why he was violating what she knew to be recommended company policies and procedures. Repeatedly, the answers were either "Because didn't know it was my job" or "Because I didn't know that was the way we were supposed to do it." Jennifer knew that a job description, along with a set of standards and procedures that specified what was to be done and how to do it, would go a long way toward alleviating this problem. In general, the store…arrow_forward
- Considering the list of 12 types of misconduct in Table 3.1, what are the top three you have observed in any organization? Be sure to include examples as warranted.arrow_forward1. A description of the injury prevention intervention use of seat belts 2. Explain how you might apply the Diffusion of Innovations theory to the seatbelts intervention. Include characteristics of the innovations, characteristics of adopters, and features of the settings or environmental contexts. 3. Explain the strengths and limitations of using Diffusion of Innovations theory with the intervention. Resources: Sharma, M., & Kanekar, A. (2008). Diffusion of Innovations theory for alcohol, tobacco, and drugs. Journal of Alcohol and Drug Education, 52(1), 3–7. Note: Retrieved from the Walden Library databases. Doll, L. S., Bonzo, S. E., Mercy, J. A., & Sleet, D. A. (Eds.). (2008). Handbook of injury and violence prevention. New York, NY: Springer. Handbook of injury and violence prevention by L. S. Doll, S. E. Bonzo, J. A. Mercy, & D. A. Sleet. Copyright 2008 by SPRINGER-VERLAG NEW YORK INC. Reprinted by permission of SPRINGER-VERLAG NEW YORK INC. via…arrow_forwardB/ Choose the correct answer and justify why you chose it? 1. What is a Safety and Health Management System? A) A set of interrelated elements that support occupational safety and health policy and objective. B) Mechanisms that are in place to achieve safety objectives C) Methods that are in place to continually improve safety and health performance D) All of the above. 2. What are the two most important factors in creating a culture of safe work practices? A) Praise and Discipline B) Networking and Compliance C) Management Commitment and Employee Involvement D) Decision Making and Problem Solving 3. When assessing your organization's safety performance, what are the key area(s) that OSHÁ suggests you focus? A) Management leadership and employee participation B) Hazard prevention and control C) Safety and health training D) All the abovearrow_forward
- not related to what specific subject you are expertise in, but what would be a good psychomotor activity for students? Please see the image (applicable within 5 minutes) Context: This is basic and core competencies about the overview of Trainer's Methodology 1 of TESDA.arrow_forwardWhich of the following is wrong regarding descriptive studies? * Offer ideas for further probing and research. Involve proving if a hypothesis is wrong. Understand the characteristics of a group in a given situation. Think systematically about aspects in a given situation.arrow_forwardCase StudyCyber bullying is a unique form of bullying that continues in spite of the dire consequences that can and do occur. Cyberbullying has gained significant media attention and countless incidents of bullying continue to occur. Although may cases are reported in the news, probably as many if not more go unreported. Bullying has been defined as something that one repeatedly does or says to gain power over another person. Unlike traditional bullying, cyberbullying eliminates the need for physical contact with others in order to make them feel inferior. Cyberbullying is “when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. Technology as an avenue for intimidation is a hot-button issue for school systems and parents alike. This is uncharted territory, and legislation does not always provide guidance and structure. The…arrow_forward
- Understanding Management (MindTap Course List)ManagementISBN:9781305502215Author:Richard L. Daft, Dorothy MarcicPublisher:Cengage LearningManagement, Loose-Leaf VersionManagementISBN:9781305969308Author:Richard L. DaftPublisher:South-Western College Pub