...The personality profile that our team chose is Work Personality Profile. In this paper we will describe how the Work Personality Profile works. We will also explain why this profile was chosen for reorganization. Our team also will analyze how the profile will be administered to help in the reorganization. Finally we will explain the common decision-making models and described which one the we used to decide on the personality profile. Personality Profile The Work Personality Profile (WPP) according to Bolton, Roessler (1986) was developed at Arkansas Research and Training Center in Vocational Rehabilitation, University of Arkansas, Fayetteville, in the United States (para. 1) to make available a comprehensive observational instrument for assessing critical work role requirements (para. 1). This particular assessment has been repeatedly used on the workforce to originally test employees who possessed a variety of clinical disorders (Occupational Medicine Journal, 2013, p. 361). This type of profile contains about 58 “behavioral oriented items related to work attitudes, habits, and behaviors” (Bolton, Roessler, 1986, para. 3). It uses a four point scale to determine strength, employment asset, adequate performance, and performance inconsistency, which could lead to problems down the line according to Bolton, Roesler (1986). This 58 item profile forms 11(11) “rationally derived scales (Tyerman, & Young, 2000, p. 15): • Acceptance of the work role • Ability to profit from...
Words: 1365 - Pages: 6
...an effort to better understand myself and why I make some of the choices in my life, I have taken two personality profile questionnaires online; the first was one recommended by my professor, called Keirsey Character Sorter, the second was of choosing and that led me to Humanmetrics Jung Typology Test. After careful dissection of the results I found that even though some of the findings were similar, the two tests painted different pictures of my personality. I will contrast and attempt to compare both examinations, showing why I believe the Keiser test is a more accurate description of my personality and character. I took both tests within one day of each other, to avoid an influence from one test on the other. After completion of the Keirsey test, I found the results to be surprisingly accurate, especially its description of the way my type makes decisions and view important choices. As for the Jung Typology test, I found it to be only accurate in generalities; the same way a daily horoscope found in the back of a newspaper would be. Both tests consisted of more than 60 questions with only two possible answers, all of which I answered with an open mind and honesty. The Keirsey test described my personality as a Rational Inventor or (ENTP), in it I found deep connection with its key characteristics, specially the first paragraph where it describes how this type of personality “is always trying to build a better mouse trap”(Keirsey, n.d., para1). From a very young age I found...
Words: 678 - Pages: 3
...INFP Personality Type: Not Just Dreamers – Healing The Wounded My confirmed MBTI profile is INFP, which was no surprise because this were the same letter preferences I had pick last week during the reading exercises. Being an INFP academically means that we are more interested in topics that covers humanities and the human experience as a whole. Autonomous - is probably the best word to describe an INFP like me. We do not much conform to rules, guidelines. We like to experiment and apply theories to real life. We thrive in an educational system where our interests are piqued. Topics such as human and social sciences interests us the most. While we learn new theories easily, we also tend to apply and validate these theories in real life....
Words: 1180 - Pages: 5
...After discovering my personality/behavioral blend as depicted in Uniquely You DISC Personality Profile developed by Mels Carbonell in 1987, I finally understand what makes me who I am and how I might use these behavioral style blends as a way to frame my interactions with others both personally, spiritually, and professionally. According to Carbonell (2014) as an “S” type I do exhibit and am known for having a “humble spirit and quiet demeanor” (p. 7). Unfortunately, as a former victim of childhood abuse (different forms) and abandonment I sometimes “feel inadequate and unworthy” (Carbonell, p. 7) and I have been labeled as damaged by some experts in the field of psychology and other professions. Today because of all that God has done for me...
Words: 556 - Pages: 3
...PERSONALITY PROFILES FOR DOGS Dog owners know that dogs’ variances are numerous. There are hundreds of different breeds and types of dogs, each breed with its own distinct personality traits and behaviors. These distinctive behaviors can be broken down into six separate categories based on the dog’s breed and instinctive qualities. These six categories are aggressive, confident, outgoing, adaptable, insecure and independent. These categories can be broken down individually, listing main characteristics for each division that will separate and individualize each category and can lend valuable information to potential dog owners when choosing a pet. The first division is the aggressive dog. This dog has an extremely dominant personality. He or she can be easily provoked to bite. The dominant nature of this dog can make him or her extremely resistant to human leadership or dominance. This type of dog will need persistent and rigorous training. This dog type will need a human to provide precise guidance and instruction. This type of dog does best with a one owner household or dominant alpha figure. They make excellent guard dogs or police dogs. Such examples of this being the German Shepard, Chow Chow and Doberman Pincher to name a few of the top nine most aggressive dog breeds. The next division would be the confident dog. This dog can be dominant and self-assured. This category can also be provoked to bite, but perhaps not as easily as the aggressive division...
Words: 1024 - Pages: 5
...Personality Profile-Marie Ziegler, John Deere Trisha MGT/360 August 13, 2012 Todd Trammell Personality Profile-Marie Ziegler, John Deere The characteristics of effective sustainable business leadership include having a vision of what the company is trying to attain, seeing the value in the process and providing the leadership to attain the goal. The leadership starts with believing in the process, and practicing the steps themselves. Lead by example. Marie Ziegler of John Deere has set the precedence for her company. As Vice President and Treasurer for Deere & Company, it is her responsibility to ensure that the company's products meet the standards of the industry. John Deere products meet the United States Environmental Protection Agencies (EPA) new off-highway equipment emission regulations as of 2011. The regulations reduce particulate matter by 90% and reduce oxides of nitrogen emissions by 50% (John Deere, 2012). Marie Ziegler has been with the company in one position or another since 1978. She knows the company and has worked hard to help it grow and remain profitable. The move to making sure the products meet the EPA standards was just another step in that goal. The steps to becoming a good leader in an effective sustainable business are vision, values, strategy, and systems. Marie started with the vision of achieving a product that met the EPA guidelines and moved forward. Values include the beliefs and practices that the company uses to be successful...
Words: 902 - Pages: 4
...Galura The aim of this study is to describe and identify the most common types of coping strategy used by wives who were affected by the infidelity of their partner. It also sought to provide demographic profiles of these wives. The researchers’ motivation of choosing this topic had been influenced by the everyday situation of people they knew who had experienced being separated to their husbands due to infidelity. Also, the media had contributed to their choice because nowadays, infidelity has been featured to many movies, television shows and social media sites. In this study, the researchers have employed a descriptive design. The participants involved in this research were 40 wives, age ranging from 25 to 65 years old and coming from different cities and towns of Pampanga, who have experienced infidelity of their husbands. Their sample was gathered through snowball sampling. For their theoretical framework, the researchers used the Lazarus model of stress and model of behavioral self-regulation. To quantify it, they used the Coping Orientation to Problem Experienced (COPE) inventory of Carver, Scheier, and Weintraub (1989). With the help of a professor, they have translated the inventory for their Filipino participants. They have also developed a demographic profile checklist. There were five variables in the checklist which were age, socio economic status, educational attainment, religion and occupation. The results showed that majority of the wives used turning to...
Words: 561 - Pages: 3
...efficiency by focusing marketing efforts to a particular group, maximize scarce marketing resources, find a market with limited competition and select the most profitable segment. It has four major market segmentation variables, there are geographic, demographic, psychographic and behavioral. Geographic segmentation tries to divide the market into different geographical units such as location, regions, population density, climate and countries. Demographic segmentation consists of dividing the market into groups based on variables such as gender, family size, family life cycle, income, occupation, education, religion, race and nationality. Psychographic segmentation divides buyers into different groups based on social class, lifestyle or personality characteristics. Behavioral segmentation divides buyers into groups based on their knowledge, attitudes, response to a product. There are four consumer and industrial product that we are going to discuss about their market segmentation, which are McDonald, Hugo Boss perfume, Mobil Nokia and magazine of National Geographic. Fast food: McDonalds Geographic segmentation Nowadays, McDonalds is a very famous brand in all over the world. It franchises and operates more than 32,000 fast-food restaurants in over 100 countries. In Malaysia, you can find McDonalds at every shopping complex of the city. These brands of the product are very Bestsellers because people have high purchasing powers and enable to spend it. Demographic segmentation ...
Words: 2153 - Pages: 9
...Alyssa Miller MKTG 320 SWOT Analysis Las Vegas The LVCVA has a strength with predicting trends and for the most part has been on top of changing their marketing techniques to suit those trends. Las Vegas is one of the most famous cities in the world and it is known for a great and crazy time. Las Vegas also has an enormous customer base. Las Vegas’s image is weak in the fact that it only appeals to some customers. The smaller audience it attracts and that there are almost no options for any other age group besides 21-50 year olds also weakens it. Las Vegas has an opportunity to expand and make it’s business and experience even bigger because almost no one is competing with them. There is also an opportunity to improve hotels, casinos, resorts, and other main attraction buildings with all the new technology that comes out every year. Las Vegas has an opportunity to expand their customer base and try to reach different and new demographics. The business also has an opportunity to try and make its large industry greener. They could find ways to save electricity and water at hotels and casinos and be sure that all public bathrooms in the city have automatic air hand dryers. A threat in Las Vegas’s microenvironment is that since they virtually have no competitors, it could eventually become a boring trend or a place that everyone’s already been to. On the other hand, places like Dubai are becoming trendy with new modern infrastructure and many opportunities to attract...
Words: 401 - Pages: 2
...SURVEY Please read each of the following questions carefully. Please select the letter that most closely reflects your actual response to that question. Please just highlight your response and then UNDERLINE it. Please be honest with your responses. These responses will be held confidential and will not identify you in any way. Thank you for responding to these questions. You will note your responses can be from Strongly Disagree (SD), Disagree (D), Neutral (N), Agree (A), or Strongly Agree (SA). If you have no opinion, please select the N for Neutral. Again, please just highlight your response and then UNDERLINE it. Q1: I like a boss who watches my every move. SD D N A SA Q2. I like a boss who is there when I need them but allows me freedom to perform my duties independently. SD D N A SA Q3. I prefer a boss who allows me to be involved in the decision making process on issues that affect me directly. SD D N A SA Q4. I prefer a boss who inspires confidence and is charismatic. SD D N A SA Q5. I like a boss that has a passion for the work. SD D N A SA Q6. I prefer a boss who gives credit where credit is due. SD D N A SA Q7. I like a boss who feels that the company has a responsibility to society. SD D N A SA Q8. I prefer a boss that expects his or her orders to be carried out immediately. SD D N A SA Please...
Words: 311 - Pages: 2
...Social Networking and Security Tips Unfortunately, we live in a world where some individuals think that causing virtual aggravation and loss of time and money is entertaining and productive. Ever since we have been connected to the digital highway through internet access, computers have been vulnerable to malicious intrusion by programs that were designed with intent to do harm. The amount of money that organizations and consumers have spent in securing their computer data and company networks is overwhelming. Everyone can protect himself or herself by making sure they have a security plan in place by equipping the computers with the necessary defense mechanisms. Social Engineering Awareness: One of the major elements of a security plan is to increase the knowledge of the common user and to make sure they are aware of the risks and how to take precautions. Consumers must be aware of the different methods that are used in order to breach the security system in place. Surprisingly, many of the tactics are not very technical at all. It is very important to know whether or not the sites you are visiting are secure and how your data is being used while you are visiting these sites. One should definitely use extra caution when downloading files and even clicking on links. Consumers should also beware of direct social engineering tactics used to persuade you to willingly give your information to unauthorized individuals. Never share your passwords with anyone. Do not be...
Words: 661 - Pages: 3
...technology on the Web. On the contrary, social networks had been studied from the beginning of 20th century with the aim to comprehend how the members of a certain community interact and which mechanism can determine the interaction itself. In shorter terms it’s the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself. In today’s social networking refers to all activities that are carried out with-in specific online services that provides free space and software tools which allows you to create networks of people. In other words social networking is a Web site that allows individuals to construct a public or semi-public profile. The mechanism following: social networking services enable users to create a profile for themselves, by inserting their personal data. Users’ data are not only constituted by vital statistics, but they include a lot of other information which pertains to user hobbies, passions, interests, professional background and so on. This kind of personal data, all spontaneously provided by the user her/himself, permit to create interconnected networks of people who decide to put in common their interests and to have an online identity which fully describes them. The great strength of social networking are the multiple ways the users have to interact. Below is a list of the main communication resources used to build social networks: chat; messaging; wiki; email; video; voice; ...
Words: 383 - Pages: 2
...Growth Stocks vs. Value Stocks Thomas Anderton MBA 570 Professor Scott Growth stocks generally come from companies of high quality and who are considered successful. Investors expect the earnings of these companies to keep growing above the market average. If an investor were to analyze the companies with growth stock they would notice that these stocks have high price to earnings ratios and high price to book ratios. The price to earnings ratio shows the market price per share divided by the earnings. In order to have a high ratio generally the market price per share is high. Value stocks are the exact opposite of growth stock in terms of their price per earnings ratio and their price to book ratio, which means they generally have low ratios. These companies are generally expected by investors to increase in value when the rest of the market recognizes their potential. According to Bryan Rich of Forbes, “Value stocks are stocks with the lowest P/E, price to book, price to sales and price to cash flow. Other twists on value investing are simply looking at the lowest priced stocks in a major index or stocks with the highest dividend yield in a major index” (Rich, 2016). To some investors, growth stocks may seem to be expensive and at times overhauled, which could cause them to invest in value stocks. Investors may chase value stock because they don’t have as much money to invest as other investors who choose growth stocks. Some investors may choose to invest in growth...
Words: 743 - Pages: 3
...Gmo: the Value Versus Growth Dilemma GMO: The Value Versus Growth Dilemma | 1. What is value investing? What is its rationale? What are GMO’s main arguments in favor of value investing? Value investing is a way of investing in company stocks that are considered either undervalued or out-of-favor by the market. In other word, a value investment is one where the intrinsic value of the stock is not accurately reflected in the current market valuation. The underlying reason of too much decreasing in the stock price is that the company may be losing market shares or even in trouble due to market’s panic attributed to negative rumors as well as having management problems. Since the market price has dramatically descended, the book to market ratio of that stock will conversely increase. Consequently, this fraction is an important indicator that value investors will look at in order to justify if a particular stock is value stock or not. The rationale for investing in such value stock is that after the forces that are depressing the stock have diminished, the market price of value stock can only go upward from the bottom position to realize the stock’s hidden potential value at some point in the future. Notably, the key assumption is that once the market finally acknowledges the inefficiency that the price is too low when compared to the expected future returns, it will bump up the price and the value investors will directly benefit from the capital gain on those value stocks. Basing...
Words: 1441 - Pages: 6
...Name: Taneika Powell Centre #: Candidate #:100088 Territory: Jamaica Subject: Social Studies Acknowledgement The successful completion of this study would not have been possible without the assistance of my Social Studies teachers. The researcher would like to express sincere gratitude to the residents of Brown’s Hall for their valuable time spent in answering the questionnaires given to them. Introduction This is a course work requirement for the Social Studies C.X.C examination. This School Based Assessment (S.B.A) entails the study and results of a Community of the researcher’s choice Brown’s Hall in St. Catherine, Jamaica. It focuses on a specific social problem that the community is currently experiencing, the cause, effects and solutions of a problem. This project is also in the aid of highlighting the problems that face the residents of the community while ensuring confidentiality. Statement of Problem To what extent does inadequate water supply affects the residents of my community? Research Questions 1. What is the level of efficiency of water supply in my community? 2. What is the cause of inadequate water supply in my community? 3. What are some of the effects of inadequate water supply in my community? 4. What...
Words: 1971 - Pages: 8