Free Essay

Two Factor Theory

In:

Submitted By chiomiii
Words 618
Pages 3
The Two-Factor Theory was developed by Frederick Herzberg to determine employee mindsets and level of performance. He believed that the performances of employees are directly related to job satisfaction and job dissatisfaction. These two are normally mistaken to be opposites of each other, but this is incorrect. The opposite of job satisfaction is to have no satisfaction and the opposite of dissatisfaction is to have no satisfaction. These two factors should be addressed separately to properly incorporate Herzberg’s Two Factor Theory. Herzberg’s Theory is split into two parts, Motivators and Hygiene Factors. Motivators within this practice that can lead to job satisfaction are creating more responsibility and providing performance recognition. Increasing a salary will not guarantee job satisfaction. In this situation, giving the employee more responsibility in profits collected within the practice due to their performance will help. Providing incentives for attaining more business will provide recognition of the employees’ hard work and will give them more responsibility in making sure appointment are being met and cancellations are being filled. Once this has been addressed, Hygiene factors need to be concentrated on to minimize job dissatisfaction would be salary and knowledge business expenses, principles behind profits and how their performance can directly effect the practices overall profitability. Educating the employees is crucial to maintaining zero employee turnover and increasing staff morale. A profit sharing plan is a recommendation to provide employees with incentives and motivation in the workplace. The two full-time Hygienists should receive a monthly incentive of billable collections received within the two. Incorporating this plan within the practice for the two full time hygienists should be a smooth transition. The system easily identifies which provider is providing the service, properly dispersing incentives by provider. The recommended incentive percentage for the hygienist would be two percent for each, but will differ in appointment per provider. This will allow room to possibly increase over the years, especially when highest salary within the job position is attained The full time assistant, two part time receptionists and one part time assistant will receive a yearly incentive based on gross collections received from Dr. Perry’s billable collections. Factors that will determine the yearly depend on whether the employee is full time or part time and position attained. The recommendation in percentage of gross profits should be one percent. Within this one percent of gross profits attained by provider the full time assistant will receive forty percent of the one percent. The two full time receptionist will each receive twenty percent, which is a sum of forty percent. The part time assistant will receive a small percentage of ten percent of the gross profit because of experience, and amount of hours. This profit sharing plan will incorporate Herzberg’s Two-Factor Theory. Job satisfaction will increase because more responsibility in profiting in the practice as a whole. The staff will work as a team to ensure appointments are made and cancellations are being filled for all providers. Communication between all is important and crucial. Hygienist will be more attentive of their scheduling and will have to work closely with the receptionists. Receptionist will want to fill more cancellations because they will want to increase overall profit from billable collections. The assistants will make sure to provide quality bedside manner and ensure that the practice has a good reputation. This will allow the practice to continue to grow, which will bring in more business and will increase their yearly incentives.

References
Cummings, P. W. (1975). Does Herzberg's theory really work?. Management Review, 64(2), 35.

Wall, T. D., & Stephenson, G. M. (1970). Herzberg's two-factor theory of job attitudes: a critical evaluation and some fresh evidence. Industrial Relations Journal, 1(3),

Similar Documents

Premium Essay

Two Factor Theory

...Eastern Michigan University DigitalCommons@EMU Senior Honors Theses Honors College 2005 Herzberg's Two-Factor Theory of Motivation Applied to the Motivational Techniques within Financial Institutions Shannon Riley Follow this and additional works at: http://commons.emich.edu/honors Recommended Citation Riley, Shannon, "Herzberg's Two-Factor Theory of Motivation Applied to the Motivational Techniques within Financial Institutions" (2005). Senior Honors Theses. Paper 119. This Open Access Senior Honors Thesis is brought to you for free and open access by the Honors College at DigitalCommons@EMU. It has been accepted for inclusion in Senior Honors Theses by an authorized administrator of DigitalCommons@EMU. For more information, please contact libir@emich.edu. Herzberg's Two-Factor Theory of Motivation Applied to the Motivational Techniques within Financial Institutions Abstract Throughout time, many have attempted to develop detailed theories and studies of motivation, satisfaction, and self-awareness. Each of those theories at some point has been applied and tested as to its effects on people’s lives, jobs, and personal goals in life and in the work place. Due to my strong interest in the management fields specifically, I have decided to look into the different styles of motivation that managers and leaders of organizations within the financial industry typically use. After all, it has been said that one of the manager’s most basic tasks is to communicate...

Words: 22775 - Pages: 92

Free Essay

Two Factor Theory of Emotion

...Two-factor theory of emotion: A Successful Proposal. Terence Tin Wai, CHU Upper Iowa University Term 6, 2014 PSY 190 Elbert Lee 14-8-2014 Abstracts This task is in most use for readers planning to propose, with the help of psychology to increase the chance of a successful marriage propose. The two factor theory of emotions suggested that an event happen triggers of physiological arousal then human cognitive label it. Further discuss on how this theory bring benefit to a proposal of marriage. Preface Propose is generally a huge mile stone to public, asking an individual to dedicate the rest of his/her life to another individual is a serious matter. Normally there are three steps get a ring, get down on one keen and get the other individual say “yes”. As time pass, the methods of proposing were varied tremendously. If the gentleman cannot think of a better way to courtship according to Darwin, they might not be mated. So with the aid of psychology, men should have a better chance with the answer “yes” after a proposal. Two-factor theory of emotion This theory suggest that emotion is based on two factors, firstly physiological arousal and secondly a cognitive label. So first of all an emotion is felt, then a physiological change, it could be heart beat rise, sweaty palms, knees weak, heavy arms, dry eye, dry throat, and change in breath. Then the individual observe environment to reason the physiological arousal...

Words: 1553 - Pages: 7

Premium Essay

Hezberg Two Factor Theory

...produced a variety of theories researching people’s psychological desires; around what do they need in different levels, such as Maslow’s Hierarchy of needs. However, this time we try to focus on two-factor theory. Employees in an organization are either satisfied or dissatisfied with their job based on whether they are motivated or not on their job. However, the kind of motivation employees get determines their output level. Thus, a high level of satisfaction could lead to high output whilst high level of dissatisfaction with the job could lead to low output. However, the opposite of job satisfaction is not dissatisfaction, but rather a simple lack of satisfaction. In the same way, the opposite of job dissatisfaction is not satisfaction, but rather “no dissatisfaction” (Herzberg, Mausner, & Snyderman, The Motivation to Work, 1959). Now, it would interest managers to know the level of employee’s satisfaction and the factor(s) causing such satisfaction/ dissatisfaction. (Herzberg, Mausner, & Snyderman, The Motivation to Work, 1959) proposed that in understanding the relevant attitude of employees, it is possible to best understand such an employee’s motivation to work. That is, if searched by managers, they should get reasonable information on motivation of workers based on the internal concept of attitude which originates from a state of mind. To explain the concept of job satisfaction and dissatisfaction, Herzberg in 1959 developed a theory on job attitudes out of...

Words: 2258 - Pages: 10

Free Essay

Science

...Misattribution of arousal (two factor theory of emotion) People search the immediate environment for emotional relevant clues to label and interpret unexplained physiological arousal, leading to misattribution. Cognitive dissonance: mental discomfort that arises when we are confronted with actions, situations, or feelings that go against our morals values. we seek reduce this dissonance Conformity : a change in ones behavior due to the real or imagined influence of other people Two factor theory of emotion -misattribution. Katniss is “falling in love” with Peeta because of the heightened tension, physical activity. Katniss pretending rue is her sister Deindividuation - it ties with arousal because it causes her to do things she normally wouldn't do, such as kiss Peeta while the world is watching, play pu[[et to the capital, and almost trying to kill herself at the end cognitive dissonance -killing other competitors in order to stay alive, even though participants have always bben taught that killing is wrong. -obeying the orders of the capitol and following along with their hunger games, even though they are being treated unfairly and they do not support the capitol. conformity -citizens of the district have to conform and give up their children in order to save the lives of everyone else -Katniss conforms to what the people of the capitol want so that she can get sponsors for the Hunger Games. -The people of the districts conform to the system in the capitol because...

Words: 293 - Pages: 2

Premium Essay

Herzberg Two- Factor Theory of Motivation

...1.0 EXECUTIVE SUMMARY This Paper critically examines the applicability of the Herzberg two factors of motivation in Tanzania context. In attaining that task, this work has made concern on finding the concept of necessary terms about the theory, salient features of the theory, explanation of the two factors (hygiene and motivational), applicability of the Herzberg’s two factors theory in Tanzania context with practical examples, limitations and implications of the theory, and finally the concluding summary. 2.0 HERZBERG’S TWO FACTOR THEORY OF MOTIVATION This is the theory introduced by Frederick Herzberg who was a behaviorist scientist in 1959 with the aim of finding out factors which lead to job satisfaction in workplace. Herzberg extended the work of Maslow, developed the content theory of motivation. The study was conducted by starting with 200 engineers and accountants at Pittsburgh firm in which workers were asked to recall for situation when they had experienced satisfactory and unsatisfactory feelings about their job (Cole G, 2004). He asked some questions as a means of understanding employee satisfaction. He set out to determine the effect of attitude on motivation, by asking people to describe situations where they felt really good, and really bad, about their jobs. The questions asked were: 1. When did they feel exceptionally good about their job? 2. When did they exceptionally feel bad about their jobs? 3. What do people want from their jobs...

Words: 2645 - Pages: 11

Free Essay

Antiphishing

...A Structured Analysis of PHISHING By Prasath Manimaran ID: 20038303 Table of Contents Chapter One – Introduction 1. Research Questions and Objectives……………….…………………………………………….5 Chapter Two – Literature Review & Definition of Phishing 2.1. Literature Review…………………………………………………………………………………………..8 2.1.2. Definitions of Phishing……………………………………………………………………..8 2.1.3. Outcomes of this Study…………………………………………………………………….16 2.2. Research Details 2.2.1. Scope of the Research……………………………………………………………………….17 2.2.2. Research Methodology……………………………………………………………………..17 2.2.3Inductive versus Deductive Study……..………………………………………………..20 2.2.4. Qualitative versus Quantative……………………………………………………..20 Chapter Three – Phishing in a Banking Context 3.1. Confidence in Internet Banking……………………………………………………………………22 3.1.1. Security Requirements………………………………………………………………………23 3.2. Threat Models……………………………………………………………………………………………….25 3.2.1. The Internet Threat Model……………………………………………………..25 3.2.2. Thompson Threat Model……………………………………………………….26 3.2.3. Viral Threaet Model………………………………………………………………26 3.3. The Phishing Threat Model…………………………………………………………………………..26 3.3.1. Identification of Internet Banking Components………………………………..27 3.3.2. Identification of Phishing Threats………………………………………………29 Chapter 4 – Analysis of Current Phishing Techniques 4.1. Modus Operandi………………………………………………………………………………………….…36 4.2. Roles of Adversary in Phishing………………………………………………………………………...

Words: 15039 - Pages: 61

Free Essay

Usability and Security

...Running Head: USABLE SECURITY THE IMPLEMENTATION Usable Security the Implementation Name Institution Abstract This project was about usability security and its implementation. It involved the designing and development of a suitable human computer interface to provide a log on module for the Kuwait armed forces computer system. The development focused on relieving the user from the load of creating, remembering and maintaining their passwords for the login process. Based on the fact that the Kuwait information and communication technology literacy levels are still in their infancy stage, the conventional authentication system was proved unfriendly to the user. This system was developed with this in mind. This proposed system relies on the user logging in to the system after identifying five pictures they uploaded earlier from among a grid of twenty five pictures. By selecting the five correct pictures which they uploaded, the system was able to successfully authenticate the user. Using these pictures greatly reduced the mental load on a user who was required to remember strong passwords that ended up being compromised (Badre 2002). The use of pictures or graphical images for authentication or access control is a practice called biometrics that is gaining popularity in establishing system security today. Due to the need to deliver a solution in the shortest time possible the...

Words: 17373 - Pages: 70

Premium Essay

Disaster Securing and Protecting Information

...December 10, 2012 Dr. Derek Sedlack Disaster Securing and Protecting Information Authentication, verifying a user’s identity, is an important way to establish trust in business processes. Authentication is the process of verifying a user’s claim of identity and is most commonly implemented through a username and password combination when logging into a business’ system or application. While the password and username combination is the most common, there are various other methods of authentication such as: voice recognition, a token device, or swiping a smart card. Authentication is based on the principle that a proper form of identification is not produced by the user that the system will not correlate an authentication factor with a specific subject. Many factors can contribute to a system’s security, but the authentication is a key element to the success of a secure information system. Authentication is vital for maintaining the integrity, confidentiality, and availability of a business’ IT infrastructure. The application of access controls includes 4 processes: * Identification- obtaining the identity of the user that is seeking access to a physical or logical area * Authentication- confirming the user’s identity that is requesting access to a physical or logical area * Authorization- determining which specific actions can be performed by the authenticated user in a specific logical or physical area * Accountability- documenting the activities of the authorized...

Words: 1433 - Pages: 6

Premium Essay

Jacket-X Paper

...Vulnerability Assessment for Jacket-X Corporation University of Maryland University College Abstract The Jacket-X Corporation is a manufacturer of industrial-grade gloves, jackets, and other safety-related clothing applications. The Chief Information Officer (CIO) at Jacket-X is concerned with the current Information Technology (IT) security implementations and procedures. He has valid concerns due to reports from Human Resources (HR) stating financial issues with last year’s payrolls. There are also concerns with external network vulnerabilities that possibly can give hackers unauthorized access to company data and information. The CIO has internal IT security concerns due to a recent incident with an executive employee infecting the company’s network with malicious software from a company issued laptop. To help stay current with technology and compliant with federal laws Jacket-X decided to install a new Identity Management (IdM) system with Single Sign On (SSO) features. Several employees and customers do not like the new IdM system due to having privacy and data access concerns. This paper will analyze and discuss potential threats and vulnerabilities within the Jacket-X Corporation enterprise network. The paper will identify various IT security measures that will address the known threats and vulnerabilities. There will be discussions and recommendations made for choosing the best IdM system for Jacket-X. These discussions will also consist of the company addressing...

Words: 6831 - Pages: 28

Premium Essay

Computers

...Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.  http://searchcompliance.techtarget.com/definition/cloud-computing-security https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf Threats from cloud computing IaaS providers offer their customers the illusion of unlimited compute, network, and storage capacity — often coupled with a ‘frictionless’ registration process where anyone with a valid credit card can register and immediately begin using cloud services. Some providers even offer free limited trial periods. By abusing the relative anonymity behind these registration and usage models, spammers, malicious code authors, and other criminals have been able to conduct their activities with relative impunity. PaaS providers have traditionally suffered most from this kind of attacks; however, recent evidence shows that hackers have begun to target IaaS vendors as well. Future areas of concern include password and key cracking, DDOS, launching dynamic attack points, hosting malicious data, botnet command and control, building rainbow tables, and CAPTCHA solving farms. Threat #3: Malicious Insiders Description The threat of a malicious insider is well-known to most organizations. This threat is amplified for consumers of cloud services by the convergence of IT...

Words: 1105 - Pages: 5

Premium Essay

User Authentication: Doing Us a Disservice

...ANTIA, GODWIN COURSEWORK ASSINGMENT 2013 USER AUTHENTICATION: DOING US A DISSERVICE INTRODUCTION: Several Years ago the growth of internet wasn’t rapidly and there were few limited online application. Today, almost everything that can be done offline has an online counterpart. This goes from simple email, access to paying your bill online (Roger ,M.and Carlos,C., 2007). Therefore, authentication is a process in which a user is asked to identify itself by providing certain details. Authentication has become the most integral part of all web based application nowadays. The most used form of authentication is the password and pin approach. Internet usage and online application are experiencing spectacular growth worldwide; there are over a billion internet users at present which utilises the use of the internet. Authentication is necessary in our everyday business because it will cut down the rate of identity theft and also stabilize confidentiality. User authentication faces a major problem as many security geniuses came out to proof that no single security completely protects users from theft. This essay will describe the limitations that can occur in practice of authenticating a user. It will help improve the reader’s knowledge on issue with authentication process, which is done according to the level of authentication. It will review the state of practice of a user authentication; also evaluate the authentication process with three website such as Facebook, Barclays bank...

Words: 3317 - Pages: 14

Free Essay

Cmgt/400 Securing and Protecting Information

...Computers, networks, and software are the heart and soul of the IT world today. Because of the availability of those systems, they are very vulnerable to malicious attacks and activity. It is of upmost importance that an organization takes security seriously and takes the proper measures to protect their systems. They can do this through a number of different ways, but one area of focus is through the authentication process and the related hardware and software to go along with it. Identification and Authentication Authentication is the process of the system or program recognizing the user and granting them access, which has been predetermined by access controls. It begins with two major parts; Identification and Authentication. Identification is the process in which the system recognizes the user and gives them access according to Abstract object that are controlled by the administrators of the files and systems. Privileges will be granted based on their user account having been verified. This process is usually a user ID. The system recognized the ID and knows the access right and privileges of that individual that have been verified. The Authentication begins once the user account ID has been identified. This is the process in which the user credentials are actually verified, meaning the specific attributes of their specific user account and authenticated and verified to make sure the access rights are correct. This process uses a password or some sort of credential such...

Words: 2199 - Pages: 9

Free Essay

Security and Social Engineering

...SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say Something! 1 Objectives Understand the principles of social engineering Define the goals of social engineering Recognize the signs of social engineering Identify ways to protect yourself from social engineering Security is Everyone's Responsibility – See Something, Say Something! 2 What is Social Engineering 1. At its core it is manipulating a person into knowingly or unknowingly giving up information; essentially 'hacking' into a person to steal valuable information. • Psychological manipulation • Trickery or Deception for the purpose of information gathering Security is Everyone's Responsibility – See Something, Say Something! 3 What is Social Engineering 2. It is a way for criminals to gain access to information systems. The purpose of social engineering is usually to secretly install spyware, other malicious software or to trick persons into handing over passwords and/or other sensitive financial or personal information Security is Everyone's Responsibility – See Something, Say Something! 4 What is Social Engineering 3. Social engineering is one of the most effective routes to stealing confidential data from organizations, according to Siemens Enterprise Communications, based in Germany. In a recent Siemens test, 85 percent of office workers were duped...

Words: 608 - Pages: 3

Premium Essay

Music

...John Wilson Joel Stone Courtney Lindenman 10/29/12 Exercise 4-3 Introduction The purpose of this exercise is to figure out how to structure our marketing mix variables and successfully engage in marketing tactics. First we will state our positioning statement. Secondly, we will show our objectives and tactics for each P of the marketing mix elements. Next, we will talk about how our marketing mix creates a sustainable competitive advantage. Lastly, we will talk about how our marketing tactics achieve desired marketing outcomes. Positioning Statement “We can better serve the needs of baby boomers than our competitors in terms of privacy, relationship building, access to information and simplicity.” Baby boomers have needs. We want to change our positioning statement because in retrospect our initial positioning statement did not really all of the baby boomer needs we identified. We can co-create value by helping fulfill these needs. Table 1 shows a simple table defining the needs. In short they are: Relationship Building, Simplicity, Access to Information, and Privacy/Security. (Table 1: Needs) |Needs |Definition of the need |Gender |Justification that it is a need |Source/Citation | | | |Affected | | | |Relationship |Using technology to |Both |Baby boomers...

Words: 1080 - Pages: 5

Free Essay

U4:A1 Itt Paper

...Kent O’Brien NT2580 U4:A1 Remote Access refers to the ability to access UMW network resources while off campus. Security measures for remote access should be implemented based on sensitivity and risk to University systems and data. A VPN connection is off-site remote access of sensitive IT systems to ensure exchanges of information are encrypted. With that being said I’m going to talk about a networked VPN infrastructure and what I would have in it. If I was doing a school I would have the VPN accessible to all Faculty and Staff members by default and is authenticated against the ALL_Faculty_Staff Security group in Active Directory. Students do not have VPN privileges. A Contractor, Temporary, or Volunteer worker requiring VPN access, must fill out a compulsory form in Human Resources prior to be granted access.  They will require a UMW sponsor who must submit the request to the ISO for final approval. Once approved, they will be entered into Banner whereby an account will then be created in Banner and AD. They can get instructions on how to install the required Cisco software client. Users using non-university owned equipment must follow IT Malicious Code Protection Standard. Records logging remote connections must be maintained and reviewed according to the University Monitoring and Logging Procedure. VPN authentication is required in addition to network authentication to remotely access backend servers and is limited to local accounts provisioned by the Server Administrator...

Words: 284 - Pages: 2