Get perfect grades by consistently using Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20

Order a Similar Paper Order a Different Paper

In this week’s discussion, answer the following questions… What is motivation? What factors must be considered in maximizing productivity? What are the various theories of motivation?

Over the past two weeks, you have shared where you want to work and why. This week, take a look at job prospects and outlook. For this week’s discussion research, go to the Bureau of Labor Statistics’ website, and search for the specific job you are looking to acquire after graduation and discuss salary information, growth potential, and job outlook. Discuss how this compared with your expectations.


Motivation-are factors that stimulate desire and energy in people to be continually interested and committed to something. It be a job,education, people around you, e.t.c.

Factors that are to be considered to maximize productivity include;

  • Motivation
  • Team work
  • Breaking of monotony/routine
  • Spend less time on meetings
  • Avoiding micromanagement

Theories of motivation

  • Three-Dimensional Theory of Attribution.
  • Expectancy Teory
  • Hawthorne Effect
  • Hertz berg’s Two-Factor Theory or dual factor theory.
  • Maslow’s Hierarchy of Needs


It can also be referred to as information security analysis. Job of data security specialists is anticipated to grow 18 percent from 2014 to 2024, much quicker than the normal for all occupations.

Interest for data security investigators is relied upon to be high. Cyberattacks have developed in recurrence, and examiners will be expected to think of imaginative answers for keep programmers from taking basic data or making issues for computer systems.

The central government is required to enormously expand its utilization of data security examiners to ensure the country’s basic data innovation (IT) frameworks. Furthermore, as the medicinal services industry grows its utilization of electronic therapeutic records, guaranteeing patients’ security and ensuring individual information are turning out to be more imperative. More data security investigators are prone to be expected to make the shields that will fulfil patients’ worries.

"Is this question part of your assignment? We can help"


Need help with an assignment? We work for the best interests of our clients. We maintain professionalism and offer brilliant writing services in most of the fields ranging from nursing, philosophy, psychology, biology, finance, accounting, criminal justice, mathematics, computer science, among others. We offer CONFIDENTIAL, ORIGINAL (Turnitin & SafeAssign checks), and PRIVATE services using the latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and doctorate-prepared writers. Thank you in advance!

Get a 15% discount on your order using the following coupon code SAVE15

Order a Similar Paper Order a Different Paper