Motivation of Personnel and Practical Reflection

In this week’s discussion, answer the following questions… What is motivation? What factors must be considered in maximizing productivity? What are the various theories of motivation?

Over the past two weeks, you have shared where you want to work and why. This week, take a look at job prospects and outlook. For this week’s discussion research, go to the Bureau of Labor Statistics’ website, and search for the specific job you are looking to acquire after graduation and discuss salary information, growth potential, and job outlook. Discuss how this compared with your expectations.

RESPOND TO THE FOLLOWING STATEMENT:

Motivation-are factors that stimulate desire and energy in people to be continually interested and committed to something. It be a job,education, people around you, e.t.c.

Factors that are to be considered to maximize productivity include;

  • Motivation
  • Team work
  • Breaking of monotony/routine
  • Spend less time on meetings
  • Avoiding micromanagement

Theories of motivation

  • Three-Dimensional Theory of Attribution.
  • Expectancy Teory
  • Hawthorne Effect
  • Hertz berg’s Two-Factor Theory or dual factor theory.
  • Maslow’s Hierarchy of Needs

CYBER SECURITY

It can also be referred to as information security analysis. Job of data security specialists is anticipated to grow 18 percent from 2014 to 2024, much quicker than the normal for all occupations.

Interest for data security investigators is relied upon to be high. Cyberattacks have developed in recurrence, and examiners will be expected to think of imaginative answers for keep programmers from taking basic data or making issues for computer systems.

The central government is required to enormously expand its utilization of data security examiners to ensure the country’s basic data innovation (IT) frameworks. Furthermore, as the medicinal services industry grows its utilization of electronic therapeutic records, guaranteeing patients’ security and ensuring individual information are turning out to be more imperative. More data security investigators are prone to be expected to make the shields that will fulfil patients’ worries.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support