Reference no: EM131030661
An employee in the finance department (Susan) was promoted recently to supervisor of a unit, which consists of six employees who are friendly with one another and often socialize outside of work. Susan hosts a barbecue to celebrate the promotion and invites all of her former co-workers, whom she now supervises. During the barbecue, Susan tells a couple of jokes about Muslims. Later in the evening, she shares two cartoons that show demeaning caricatures of the Prophet Mohammed. One employee (Emily) is visibly upset by the jokes and cartoons and abruptly leaves the barbecue without saying anything to the supervisor. Over the course of the next few months, the supervisor Susan repeatedly makes derogatory comments about people of the Islamic faith. The same employee who abruptly left the barbecue (Emily) is increasingly uncomfortable with the supervisor's religious statements but is afraid to speak up. Consider the following questions.
1. Could the supervisor’s behavior be considered harassment based on religion, even if the employee in question is not Muslim? Explain in a paragraph.
2. Is Emily required to speak up even if she’s uncomfortable? After all, this is her supervisor that she’d be complaining about. Explain in a paragraph.
3. You are a manager in another department and are close friends with Emily. She confides her discomfort in hearing all of these things from her supervisor. How should you handle that conversation? Explain in a paragraph.
4. Do you have a responsibility to share this information with anyone else? If so, whom, and what would you say in that email?
The answer need to be specific, and necessary steps or decisions ( relevant HR information).
Briefly describe the supplier management practices
: Briefly describe the supplier management practices at a current or former employer. Focus on the measurement aspects, and discuss and evaluate the process using the concepts and best practices described in the Monczka text in chapter 9.
|
Equal protection under the law against occurrence of crimes
: Some citizens complained to city council members that there should be equal protection under the law against the occurrence of crimes. The citizens argued that this equal protection should be interpreted as indicating that high-crime areas should hav..
|
Single stocking quantity is ordered for each issue
: The Penn Bookstore sells several magazines. A single stocking quantity is ordered for each issue. When a new issue arrives, any remaining copies of the old issue are returned to the publisher. If a magazine sells out, then it remains unavailable unti..
|
Role in healthcare administration teams
: To what extent do you agree that administrators should play a prominent role in clinical healthcare delivery teams while clinicians should play a prominent role in healthcare administration teams? Why or why not?
|
Finance department promoted recently to supervisor of unit
: An employee in the finance department (Susan) was promoted recently to supervisor of a unit, which consists of six employees who are friendly with one another and often socialize outside of work. Could the supervisor’s behavior be considered harassme..
|
Product is proportional to the quantity produced
: The cost to manufacture a product is proportional to the quantity produced, with a cost of $90000 dollars per day when 300 items are produced. The cost to store n items is proportional to the square of n, with a daily storage cost of $720 dollars whe..
|
Characteristics of an asset from security breaches
: IT Professional work hard to protect key characteristics of an asset from security breaches. One of these characteristics is ______, or the property that data is accessible and modifiable when needed by those authorized to do. a) intergrity, b) confi..
|
Calculate each stocks coefficient of variation
: Evaluating Risk and Return: Stock X has a 10% expected return, a beta coefficient of .9, and a 35% Standard deviation of expected returns. Stock Y has a 12.5% expected return, a beta coefficient of 1.2 and a 25% standard deviation. The risk free rate..
|
Vulnerabilities are found in operating systems
: "When new vulnerabilities are found in operating systems, applications, or wired adn wireless networks, vendors of those products release_________or_________to fix the vulnerabilities. a) apatches; service packs, b) patches; downloads, c)firewalls; s..
|