This website uses cookies to ensure you have the best experience. Learn more

Chapter Review

2243 words - 9 pages

FACULTY OF TECHNOLOGY MANAGEMENT AND TECHOPRENEURSHIP
BACHELOR OF TECHNOLOGY MANAGEMENT
(HIGH TECH MARKETING)
1BTMM
SEMESTER II SESSION 1 2015/2016
BTMP 1063: HR MANANGEMENT & TECHNOLOGY
CHAPTER REVIEW: EFFECTIVE DISCIPLINE AND DOMESTIC INQUIRY PROCEDURES
PREPARED FOR:
PUAN EDNA BINTI BUYONG
PREPARED BY:
NO. | NAME | MATRIX NO. |
1. | TOH HUI LING | B061510068 |

DATE O,F SUBMISSION : 23RD MARCH 2016

Chapter 20: Effective Discipline and Domestic Inquiry Procedures
The purpose of discipline is to encourage employees to meet established standards of job performance and behaviour. This means all employees are expected to adhere to rules and regulations. Discipline is ...view middle of the document...

Termination simpliciter (a simple termination by the employer without reason following the terms of the letter of appointment) is not acceptable by the Industrial Court in Malaysia.
Misconduct may be described as conduct which is not consistent with the conditions of the employee’s contract of service. A major misconduct is a serious action or failure to act by an employee that may lead to immediate dismissal. For example is wilful insubordination or disobedience. A minor misconduct is an offence which is not serious enough to take serious disciplinary action. However, minor misconduct, if allowed to be repeated often, will become a major misconduct. Employees who commit offences at work may be charged twice, that is a charge of misconduct to be heard at the domestic inquiry within the company and a criminal charge in the Criminal Court.
Positive discipline is that if an employee who develops a disciplinary problem is treated with self-respect and given an opportunity to solve the problem. The focus of positive discipline is on correcting the behaviour and communicating the expected change rather than threatening and punishing. However, negative discipline means that the employees were treated as a child who must be punished. Negative discipline process has two major weaknesses. First, no one ever feels good about being punished. When a person is punished, that is negative, and there may be some residual bad feelings among all those involved. The second weakness is that punishment will force a person to conform but a person convinced against his will does not change his opinion. He may comply in the short-term because he is forced, but there is no active co-operation and when no one is there to enforce the rules, the person will still break them. Employee seem to welcome the less punitive aspects of positive discipline.
Progressive discipline may be positive or negative, depending on the policy or philosophy of the manager or organization. When positive discipline is adopted, an employee who commits a minor offence will initially be given an opportunity to correct himself. On the other hand, progressive discipline may adopt a negative approach whereby each step is a warning of more severe disciplinary action. For the positive discipline, firstly, the superior has a verbal discussion with the employee when he identifies the problem. The superior will keep a written record of the discussion in a separate working file in his desk and not in the employee’s personnel file. If the employee’s performance improves, the superior will advise and compliment him so that he will keep up the good work. If there is no improvement despite all the help given, then the process goes to step 2. In step 2, the superior has a serious counselling session with the employee where he will stress the need for improving performance. No threats are given because the aim is to discuss the need for performance to improve. The counselling session is recorded. Should the...

Other Papers Like Chapter Review

Chapter 2 Review Questions Solutions

913 words - 4 pages Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom

Mcts Server 2008 Chapter Seven Review

879 words - 4 pages Chapter Seven Review Questions  MCTS Guide to Microsoft Windows Network Infrastructure Configuration  1. What protocol is used by Windows clients for accessing shared resources in Windows Server 2008?    c. SMB  2. User‐level permissions in Windows Server 2008 are based on NTFS, or the New Technology File  Service.  3. Which of the following are not share‐level permissions in Windows Server 2008?  b. Execute  c. Write  e. Modify

Chapter 3 Ghatt Chart Review Questions

697 words - 3 pages Review Questions - Chapter 3 Page 77 1. Contrast the following terms: a) Critical path scheduling, Gantt network diagramming, slack time Network diagramming is a critical path scheduling technique whose sequence of task activities directly affect the completion date of a project. A major strength for network diagramming is its ability to represent how completion dates can vary for activates or task and is more used that Gantt Charts

Principles of Information Security Chapter 3 Review

1301 words - 6 pages Chapter 3 Review 1. What is the difference between law and ethics? The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another 2

Chapter 1-3 Computer Structure And Logic Review

2681 words - 11 pages Chapter 1 review questions 1. Which of the following is an example of a PC? The 8088 processor marked the start of the home and office based PC’s given that it had a 1mb address limit making a more efficient machine. 2. Who is credited with the patent of the first computer? John V. Atanasoff was the first person accredited for the invention of the computer due to his use of modern digital switching techniques. 3. In the Von Neumann

Pricinples of Information Security, Chapter 3 Review Questions

1536 words - 7 pages Week 2, Chapter 3 Name: ------------------------------------------------- Review Questions p. 114 Assignment 3          1. What is the difference between law and ethics? Laws are formally adopted rules for acceptable behavior in modern society. Ethics are socially acceptable behaviors. The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on

Chapter 1 Review Questions

870 words - 4 pages 1. What is the difference between a threat agent and a threat? A. A threat agent is the person who facilitates the attack while the threat is a constant danger to something. 2. What is the difference between vulnerability and exposure? A. Vulnerability is a flaw within the system or a weakness, usually where the attackers attack. While Exposure is a single situation when the system is prone to be harmed. 3. How is infrastructure

Chapter 1 Review

760 words - 4 pages 1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday morning and you can’t find a pen to make a note as a reminder. What Linux command can you use to make a quick note to store in a file called Meeting? B. cat > Meeting 2. Before you make the note in Question 1, you decide to determine Friday’s date, so that you can include it in your note. What Linux command can you use to quickly determine the

Chapter 12 Review Questions

1571 words - 7 pages SOLUTIONS TO REVIEW QUESTIONS 1. NFPOs provide goods and/or services to society without the expectation of profit, while profit-oriented organizations provide goods and/or services with the expectation of earning a profit. Many resources are provided to NFPOs without any expectation of remuneration or repayment, including volunteer services and gifts in cash or in kind. Providers of resources to a profit-oriented organization expect

Analytical Review Chapter 15 & 16 Yukl Leadership in Organizations (Eighth Edition)

807 words - 4 pages ANALYTICAL REVIEW CHAPTER 15 & 16 YUKL Leadership in Organizations (eighth edition) CAVRIL ROMBLEY 4/13/2015 Facilitating conditions for leadership development Leaders face new challenges and changes in organizations on a daily basis. In order to better prepare for these changes leaders need to continue to develop their skills and competencies. There are different leadership training programs but the effectiveness of

Chapter 9 Review Questions and Answers

1855 words - 8 pages 1. a) What is a database? A database is an organized collection of related data. b) How does an RDBMS store data? An RDBMS stores related data in tables. 2. What is one benefit of dividing data into tables? Dividing data into tables eliminates unnecessary data duplication, or data redundancy. 3. a) What is a database schema? A database schema is a

Related Essays

Chapter Review

1812 words - 8 pages Presented to: JIMA A. DE LEON, B.S.I.M., M.B.A School of Graduate Studies Central Philippine University Jaro, Iloilo City Chapter Two and Three of Mishkin’s The Economics of Money, Banking and Financial Market Chapter Review Faculty, College of Business and Accountancy Graduate Programs Central Philippine University Iloilo City In partial fulfilment Of the Course Requirements In Philippine Financial System MBA 612a Presented by: JOYNEN A

Chapter Review

789 words - 4 pages CHAPTER 8 through 10 REVIEW The "hierarchical" fief-holding system in which vassals in turn had vassals owing them services was known as subinfeudation. The VIKINGS used iron weapons, had superior shipbuilding skills, did raids onto continent (they came from Scandinavia) , established settlements, aided growth of fief-holding., and in time - Christianity assimilated them into European civilization. In Western Europe, the chief political

Chapter 2 Review Questions

744 words - 3 pages Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the

Chapter 6 Review Questions

541 words - 3 pages Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and