Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Power
The capacity of power is to influence in the behavior of other people so they do things that they would not otherwise do. The most important component of power is dependency. The greater a person's dependency on you the more power you have in that relationship. For the example, machine operators might seem to have low power but the organization is dependent on them to make the goods they sell. Thus, machine operators have power within the organization. The most probably referred to sources of power are:
1. Coercive Power. Power based on fear.
2. Reward Power. Power to give advantages to people.
3. Position Power. Power arising from a position in an organizational group or hierarchy.
4. Expert Power. Influence based on special knowledge or skills.
5. Referent Power. Influences held based on a person's admiration and desire to model themselves after you.
Like many things, power itself is neither good nor bad. It is how it is used by managers that make the difference.
Car Management System: You have been approached by a Used Car Dealership who wishes to introduce an IT system to support their business. You are required to implement a protot
Organizational Culture A common perception held by the industries members is a system of shared meaning. For most people, organizational culture is something they cannot descri
QUESTION CASE STUDY Tesco began in 1919 with one man, Jack Cohen, a market stallholder selling groceries in London. TESCO was formed out of a merger with T.E. Stockwell f
The study of the structure and development of the UoS by the information professional can be shown to be a necessary implication of the five laws of library science. Law 1 And I
Question 1: (a). Outline the major elements which make up the i) Macro (External) environment. ii) Micro (Internal) environment. (b). Discuss five methods that can be use
QUESTION 1 What are the principles that one should take into consideration when dealing with data protection? QUESTION 2 What are the institutions set up for the protec
five to make a displeased student to patonise a school canteen
Question: The Tourist Area Life Cycle as given by Butler (1980) is one of the most popular models which have been used and applied to study the evolution and development of de
Writing a case report analysis on public sector management
Question 1 Explain the various inputs , tools and techniques of qualitative risk analysis process Question 2 The risk mitigation methodology describes the approach to contro
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd