Social Sanctions’ Impacts on Individual Behavior

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Qualitative Statement of the Problem

In this case study, we would like to comprehend and illustrate the extent at which social sanctions influences individual behavior in an organization among employees. The objective at this stage in the study is to commonly define and establish the link between behavior control and production (Kuhn, 1996).

This is a very complex study as it involves human behavior and can be carried out by both qualitative and quantitative research methods.. After identifying the problem, the researcher identifies a sample population. The type of sampling employed will be convenience sampling because it is not possible to undertake a total random survey.

The researcher will therefore interview a few available respondents including friends, relatives working in various organizations as well as colleagues. Interviewing will be utilized as a data collection technique. The qualitative interviews are equipped with unrestricted questions, whose responses must capture the structure of a narrative by the respondent regarding his or her knowledge.

The research will commonly be much lesser in capacity because of the complete quantity of information, which must be evaluated by the canvasser. This provides researchers and ultimately readers an additionally inclusive image of the viewpoint of the themes of the study.

The canvasser commissioning qualitative study should set up a straightforward sketch of subject matters that he/she desires to cover in the interview. These themes are used as guidelines particularly when the respondent appears to be swerving from the subject or a concise set of queries that have to be inquired consecutively by the interview.

The study guide method permits the interviewer and respondent to figure a correlation within the interview and can enable the progression to encompass the experience of a dialogue as opposed to a prearranged intellectual process. The investigator should settle on how to document the interview (Leedy & Ormrod, 2010). There are three options available.

One being tape-recording, another one being taking detailed notes and finally the researcher can decide to combine the two. Note taking is more advisable because the researcher gives attention to the study more. Tape recording dissatisfies many respondents, which may sometimes make them to uphold important information.

Conversely, it is impossible for an interviewer to record every word on a notebook because it cannot explain hiatus in the interview. This is the reason why both are more frequently applied.

This is much more discussion of the design of the study than is needed in the problem statement. The problem statement should include a discussion of a general problem, then a specific problem that will be studied among an identified group of participants.

Quantitative Statement of the Problem

Sexual harassment is one of the felonies that have recently taken root in the society mainly because of the idea of male p patriarchy. Women have stood out firm to challenge the position in the society by coming up with various feminine organizations with a sole purpose of eradicating this injustice.

The problem of male domination has in the recent years extended to work places where the bosses force their junior female employees to extend sexual favors in return for beneficial gains such as promotions and other rewards.

The female bodies have stood firm against this menace and have gone a notch higher to formulate policies that will make it hard for this cadre of perverted individuals who extend their unethical behaviors to work places. This quantitative study will therefore strive to examine the degree that the vice has extended to in regards to public and private sectors.

It will be based on a few institutions that will be able to give us a guideline on the extent of the vice in both sectors as a whole. The study will take a form of a survey whereby the population to be studied will be identified and selected basing on various office situations. Stakeholders working with several IT related corporations came up with some feasible conclusions.

They agreed that there is need to focus on practical and feasible solutions to the unethical use of technology in the departments.

The stakeholders have devoted considerable attention to this topic, primarily on the issues of less use of social networks during working hours, containing costs, increasing employee productivity, mobilizing new resources, allocating existing resources more efficiently and increasing the role of the IT departments.

Experience up to date has shown that, in general, almost every strategy to reign in the lack of IT ethics, works somewhere under some set of circumstances. On the other hand, specific restraining schemes that are flourishing in one place of work are not necessarily successful in another. Since each institution has different needs, standard set solutions cannot be imposed.

The group that will benefit from the findings of the study will be mostly organizations. Policy makers will utilize the findings in coming up with regulations aiming at achieving effective controls over social network use during official working hours in work places.

The veracity and tactic of the statistics and collection used was survey on questionnaires. The evaluation was not to be used as a prognostic economic analysis of the brunt of the unethical use of IT. It zooms in on the stance of employers and avails a perception of the issues that could sway decision making allied to employee and employer benefits.

As such, our survey conclusions are not on a par with similar surveys and analysis carried out by others. Each one of those studies used economic reproductions, not opinion surveys, and founded on the impact of unethical utilization of social networks on persons, not employer stance. The method benefits from the advantages of the diverse research designs.

Feedback summary

In conclusion at hand is the need to accentuate that basically, there is no blue print for control over individual unethical behavior that may instigate the use of IT to access explicit material.

As an alternative, the approach projected to affiliate employees is to use the policy objectives to familiarize the course for unethical IT behavior reform, comprehend the on hand structure in terms of purpose and policies to set the preliminary position from which any modification must embark on and recognize the monetary and any other supplementary contextual aspects to ascertain reasonable confines on the scope to which the realization of strategy objectives can be nonstop and the assortment of policy reforms that can be well thought-out.

Hence, while the advance is basically grounded in a widespread set of principles and target, it is also tolerant towards analysis and suggestions that are IT-specific and pragmatic.

References

Kuhn, T. (1996). The structure of scientific revolutions. Chicago, IL: The University of Chicago Press.

Leedy, P.D. & Ormrod, J.E. (2010). Practical research: Planning and design. 9 Ed. Upper Saddle River, NJ: Prentice Hall.

Neuman, W.L. (2005). Social research methods: Qualitative and quantitative approaches. 6 Ed. Boston, MA: Allyn & Bacon.

Willis, J.W. (2007). Foundations of qualitative research: Interpretive and critical approaches. Thousand Oaks, CA: Sage.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!