Wednesday, July 31, 2019

Cognitive Ability

Journal of Applied Psychology 2010, Vol. 95, No. 5, 889 –901  © 2010 American Psychological Association 0021-9010/10/$12. 00 DOI: 10. 1037/a0019985 Get Smarty Pants: Cognitive Ability, Personality, and Victimization Eugene Kim and Theresa M. Glomb University of Minnesota Drawing on the victim precipitation model, this study provides an empirical investigation of the relationship between cognitive ability and victimization at work. We propose that people high in cognitive ability are more prone to victimization.In this study, we also examine the direct and moderating effects of victims’ personality traits, specifically the 2 interpersonally oriented personality dimensions of agency and communion. Results support the direct positive relationship of cognitive ability and victimization. The positive relationship between high cognitive ability and victimization is moderated by the victims’ personality traits; agency personality traits strengthen the relationship of cognitive ability and victimization, whereas communion personality traits weaken this relationship.Keywords: cognitive ability, victimization, personality, agency, communion Recently, a Seattle Times article described the victimization of Suzuki Ichiro, a high-ability baseball player who achieved 200 hits for 8 consecutive years and was the 2007 All Star Game Most Valuable Player (see Baker, 2008). The article reported that his teammates from the Seattle Mariners stated they â€Å"really dislike him† and wanted to â€Å"knock him out† because this high-ability player cares more about individual records than team records.A popular press article (Bruzzese, 2002) reported that victims of workplace bullying are often employees who are â€Å"smart† and â€Å"talented,† and organizations that fail to prevent victimization against these talented employees will experience their turnover, decreases in productivity, and increases in health care costs (see also Murp hy, 2006). Similarly, a survey of workplace victimization suggests that â€Å"bright† people are often targets of interpersonal aggression because of their high level of ability (Namie & Namie, 2000).In the school context, research by Peterson and Ray (2006a, 2006b) on gifted children suggests that many high-ability students experience bullying in school because of their intellectual capability. Although each of the above examples provides a mere glimpse into the phenomena of victimization, together they suggest that ability may be a critical precipitating factor in victimization. However, there is limited research attention to the possibility that ability, specifically cognitive ability, may be associated with being a target of victimization—the possibility of â€Å"smart victims. Given that Brand (1987) posited â€Å"cognitive ability is to psychol- This article was published Online First August 16, 2010. Eugene Kim and Theresa M. Glomb, Department of Human Resourc es and Industrial Relations, Carlson School of Management, University of Minnesota. An earlier version of this article was presented at the 2009 Society for Industrial and Organizational Psychology Conference, New Orleans, Louisiana.We are grateful to Michelle Duffy, Paul Sackett, and the participants of the Center for Human Resources and Labor Studies Workshop for comments on earlier versions of this article. Correspondence concerning this article should be addressed to Eugene Kim, Carlson School of Management, University of Minnesota, 321 19th Avenue South, Room 3-300, Minneapolis, MN 55455. E-mail: [email  protected] umn. edu 889 ogy as carbon is to chemistry† (p. 257), it is surprising that cognitive ability has not received attention in the workplace victimization literature.This study takes an important first step in establishing the relationship between cognitive ability and victimization in an organizational context; it builds the scholarly knowledge base of workplac e victimization and suggests that smart victims may be important to consider in attempts to prevent workplace victimization. In doing so, it makes contributions to the literature on cognitive ability, victimization, and an emerging theme in management research suggesting that victims may precipitate aggression from others in the workplace (for review, see Aquino & Thau, 2009).We outline these contributions below. First, this study suggests an exception to the generally accepted idea that cognitive ability is associated with various positive outcomes. Previous research confirming that cognitive ability predicts many job and real-life outcomes is plentiful (see Brand, 1987; Jensen, 1998; Kuncel, Hezlett, & Ones, 2004; Schmidt & Hunter, 1998); however, typically these outcomes are favorable. In comparison, we propose victimization, a negative outcome, will be higher for those high in cognitive ability.Understanding the relationship between cognitive ability and workplace victimization is particularly relevant because cognitive ability is used in selection decisions (Heneman & Judge, 2005) and is strongly related to skill and knowledge acquisition, task performance, and creativity at work (Kuncel et al. , 2004). Thus, understanding workplace victimization for those high in cognitive ability can reduce the risk of negative outcomes for these highly desirable employees, including decreased motivation, job satisfaction, and task performance (Glomb, 2002, in press) as well as lower team and organizational performance (Aquino & Thau, 2009).Second, this study extends the scope of the victim precipitation model, the idea that victims either intentionally or unintentionally provoke potential perpetrators. The limited application of the victim precipitation model emphasizes submissive and provocative victim characteristics (Aquino, 2000; Olweus, 1993) but has not posed the possibility of smart victims (for exceptions, see Namie & Namie, 2000; Peterson & Ray, 2006a, 2006b). By positing and testing the idea that smart victims may also adhere to the victim 890 KIM AND GLOMB recipitation model, we extend this theoretical framework beyond the typical submissive and provocative victim typologies. Third, we extend previous research by considering two basic personality dimensions—agency and communion (Digman, 1997; Wiggins, 1991)—and their interplay with cognitive ability and victimization. According to Bakan (1966), agency is defined as individualization in a group, and it involves independence, dominance, and personal growth; communion is defined as integration of the individual in a group, and it involves cooperation, attachment, and caring (see alsoWiggins, 1991). The original aim of agency and communion personality traits was to understand and distinguish interpersonal behaviors between individuals (Wiggins, 1991), thereby making agency and communion especially relevant to workplace victimization in which the interpersonal relationship of perpetrators and victims is critical for understanding victimization motives (see Schafer, 1977).Drawing primarily on the theory of reciprocity (Gouldner, 1960), we propose that communion is negatively related to victimization and also buffers the relationship of cognitive ability and victimization, whereas agency is positively related to victimization and also strengthens the relationship between cognitive ability and victimization. In summary, in this study we advance theoretical and empirical research on workplace victimization by examining the role of cognitive ability in precipitating victimization at work and how personality traits linked to more favorable interpersonal interactions (i. e. agency and communion) may have direct and moderating effects on victimization. Workplace Victimization The prevalence of harmful behaviors among employees has been reflected in a growing body of academic research (e. g. , Aquino & Thau, 2009; Barling, Dupre, & Kelloway, 2009; Bowl? ing & Bee hr, 2006; Douglas et al. , 2008; Glomb, Steel, & Arvey, 2002; Hershcovis et al. , 2007; Neuman & Baron, 2005; Sackett & DeVore, 2001). Researchers have examined interpersonal workplace aggression—any form of interpersonal behavior to harm, injure, or discomfort the target at work (Baron & Richardson, 1994; Glomb, 2002)—at the individual level (e. . , Baron & Neuman, 1996) and have also extended theoretical and empirical frameworks to consider group-level (e. g. , Glomb & Liao, 2003) and dyadic (e. g. , Andersson & Pearson, 1999) relationships. Drawing on theories of victimization (e. g. , Curtis, 1974; Schafer, 1968; Sparks, Genn, & Dodd, 1977), researchers have also examined workplace victimization—the self-perception of being a target of interpersonal aggression at work (Aquino, Grover, Bradfield, & Allen, 1999; Aquino & Thau, 2009)—at the individual level (e. g. , Aquino et al. 1999; Glomb, 2002), group level (e. g. , Aquino & Byron, 2002), and dyadic level (e. g. , Aquino & Lamertz, 2004). Drawing on criminology theory in which victim precipitation (Curtis, 1974) and victim elements (Schafer, 1968) are studied, researchers have suggested typical characteristics of victims. For example, Olweus’s (1978, 1993) work in school settings resulted in the proposition of two types of victims. One type of victim is labeled submissive victim and is more anxious, cautious, quiet, and sensitive than other students.In contrast to submissive victims, some students who show highly aggressive behaviors can also become the targets of aggression; Olweus (1993) referred to them as provocative victims. Although Olweus’s research was in a school setting, similar themes of victim types have been suggested in organizational contexts. For example, Aquino and colleagues (Aquino & Bradfield, 2000; Aquino & Byron, 2002; Aquino et al. , 1999) posited that self-determination, aggressiveness, dominating interpersonal behavior, and negative affect ivity are typical characteristics of victims.Individuals low in self-determination are more likely to be targets of aggression (e. g. , Aquino et al. , 1999) and may be likened to submissive victims. Individuals high in aggressiveness (e. g. , Aquino & Bradfield, 2000) and dominating interpersonal behavior (e. g. , Aquino & Byron, 2002) may be likened to provocative victims. Individuals high in negative affectivity may be likened to either submissive or provocative victims because negative affectivity is related to either insecurity and anxiety or hostility and aggression (e. . , Aquino & Bradfield, 2000; Aquino et al. , 1999). In other words, previous research suggests that certain types of individuals, either submissive or aggressive people, may be more frequent targets of aggression in both school and organizational contexts. Although existing research has enhanced the understanding of victimization, there is limited attention to the role of an important individual differenceâ₠¬â€ cognitive ability (for possible exceptions, see Namie & Namie, 2000; Peterson & Ray, 2006a, 2006b).Peterson and Ray (2006b) showed that many smart students experienced bullying in school contexts and that intellectual capability is one of the most frequently reported reasons for being bullied. In their study, 36% of smart students were called derogatory names (e. g. , dork, geek, nerd, smarty, idiot, moron, retard, dumb), and 19% of them were teased about their grades and intelligence. According to Peterson and Ray’s (2006a) qualitative study, some high-ability students reported that the envy of lowability students contributes to targeting smart students.Interviewees stated that â€Å"gifted kids have the upper hand in classrooms† and â€Å"good kids usually get what they want† (p. 257). In addition, some students responded that competition between gifted students contributes to targeting one another. One interviewee reported being the target of bullying fr om â€Å"other gifted kids who didn’t like that I was smarter than they were† (p. 258). One exception to the lack of research on ability and victimization in organizational contexts is a survey of working adults by Namie and Namie (2000).Although this study was not focused on the relationship between cognitive ability and victimization, their survey data provide insight into this issue. In their survey, more than 20% of survey participants (i. e. , targets and witnesses) responded that bright people were targets of interpersonal aggression, reporting that perpetrators envied the targets’ high level of competence and abilities (21%) and that perpetrators treated them as competitors or challengers who threatened their superiority (31%).Literature on school bullying among gifted children, employee reports of smart victims, and the submissive/provocative victim typology suggest that understanding the relationship between cognitive ability and victimization in an org anizational context is valuable. Linking Cognitive Ability and Victimization The victim precipitation model (e. g. , Amir, 1967; Curtis, 1974; Gottfredson, 1981; Schafer, 1968, 1977; Sparks et al. , 1977) undergirds the proposed relationship between cognitive ability and victimization. The core argument of the model is that victimsCOGNITIVE ABILITY AND VICTIMIZATION 891 exhibit behavioral tendencies (either intentional or unintentional) that provoke potential perpetrators to respond to them with harmful behaviors (see Aquino et al. , 1999; Schafer, 1977). In other words, at a minimum, victims unknowingly are at risk of victimization for their individual characteristics; at a maximum, individual characteristics lead to behaviors that elicit victimization from potential perpetrators. Cognitive ability may function as a â€Å"victim precipitator† for several reasons.First, the desirable characteristics of high-cognitive employees may unintentionally instigate other employees to react to them with harmful behaviors. As noted above, cognitive ability plays a central role in the prediction of myriad important workplace outcomes, including task performance, training performance, counterproductive work behavior, creativity, and career success (e. g. , Dilchert, Ones, Davis, & Rostow, 2007; Jensen, 1998; Judge, Higgins, Thoreson, & Barrick, 1999; Kuncel et al. , 2004; Ng, Eby, Sorensen, & Feldman, 2005; O’Reilly & Chatman, 1994; Schmidt & Hunter, 1998).For example, the validity of cognitive ability in predicting task performance, training performance, and creativity is . 51, . 57 (Schmidt & Hunter, 1998), and . 36 (Kuncel et al. , 2004), respectively. However, these favorable outcomes may also create conditions for victimization. Such positive outcomes of highcognitive-ability employees make them more likely to be targets of an upward or a lateral social comparison process within a work group because individuals choose a â€Å"standard setter† who has high ability as a comparative target (Feldman & Ruble, 1981; Festinger, 1954).As a consequence, these comparisons may elicit negative cognitive and affective states, such as lowered self-evaluation and emotions of envy, shame, hostility, and interpersonal competition (e. g. , Garcia, Tor, Gonzalez, 2006; Smith, 2000; Tesser, Millar, & Moore, 1988), which in turn increase the likelihood of becoming the target of victimization.In other words, the positive characteristics of high-cognitive-ability employees unintentionally place them at risk of being a target because others want to restore their lowered self-evaluation and negative emotions following comparison (see Fein & Spencer, 1997; Smith, 1991). Schafer (1977) categorized this type of victim as someone who has done nothing against the perpetrators but whose unintentional behaviors or outcomes instigate the perpetrators to commit aggressive behaviors toward the victim.Second, the favorable characteristics of high-cognitive-abi lity employees may instigate other employees within a work group to react to them with harming behaviors in a more intentional way. An experimental study by Menon and Thompson (2007) found that individuals in higher (relative) social comparison positions are more likely to overestimate that they are a threat to others. This perceptual bias leads them to experience uncomfortable interpersonal relationships as â€Å"asymmetries in threat appraisal [strain] social interactions during a conflict situation† (p. 6). In their study, people who regarded themselves as threatening elicited less favorable reactions from a counterpart and lower satisfaction with the interaction, even though these perceptions about threat were not communicated explicitly during the interaction. In an organizational context, because of the positive work outcomes of highcognitive-ability employees, they are more likely to have favorable views of themselves, to perceive that others are threatened by them, an d to distrust others’ motives (i. e. , self-enhancing bias; Menon & Thompson, 2007).In other words, high-cognitive employees may overestimate the comparison threat they pose to other group members, which may result in a change in behaviors—for example, avoidance or condescension—toward other group members. This change in behavior then elicits harming behaviors from others (see Duffy, Shaw, & Schaubroeck, 2008). In summary, drawing on the victim precipitation model, we argue that high-cognitive-ability employees may instigate other individuals to respond to them with interpersonally aggressive behaviors.First, high-cognitive-ability employees may unintentionally provoke potential perpetrators because of their position as upward or lateral social comparison targets, thereby fostering negative affective and cognitive states in others who turn to harming behaviors. Second, high-cognitive-ability employees may provoke potential perpetrators because of their overestim ates of how threatening they are, which results in changed behaviors against coworkers that promote more negative interactions.Accordingly, we hypothesized the following: Hypothesis 1: High cognitive ability is positively related to victimization. We note that the current study is unable to address the specific mechanism for the association between cognitive ability and victimization. Rather, we propose likely theoretical mechanisms and conduct empirical tests that would lend support for this association without testing the exact meditational processes. The Role of Personality Traits: Agency and CommunionAccording to Bakan (1966), there are â€Å"two fundamental modalities in the existence of living forms, agency for the existence of an organism as an individual and communion for the participation of the individual in some larger organism of which the individual is part [emphasis added]† (p. 14). Wiggins (1991) integrated Bakan’s idea into the personality literature, d efining agency and communion as â€Å"the condition of being a differentiated individual and the condition of being part of a larger social or spiritual entity [emphasis added]† (p. 9), and proposed that the agency– communion model is relevant to understand and distinguish interpersonal behaviors between individuals. Personality researchers have used agency and communion as umbrella terms that broadly cover self-oriented terms (including independence, egoistic bias, ambition, self-competence, personal growth, and instrumentality) versus group-oriented terms (including cooperation, attachment, consideration, warmth, nurturance, and socialization), although these constructs are not exactly the same (e. g. Abele & Wojciszke, 2007; Digman, 1997; Wiggins, 1991). Previous research suggested that two broad dimensions—akin to agency and communion—are independent higher order dimensions of personality in the interpersonal circumplex (e. g. , Blackburn, Renwick, Do nnelly, & Logan, 2004; Digman, 1997; Wiggins, 1991). With regard to the five-factor model of personality, Trapnell and Wiggins (1990) found that agency corresponds primarily to the dominance aspect of extraversion and that communion corresponds primarily to agreeableness (see also Peabody & Goldberg, 1989; Wiggins, 1991).Digman (1997) has also derived two independent higher order factors that correspond to an agency and communion taxonomy; agency corresponds to extraversion and openness (i. e. , personal growth), and communion corresponds to agreeableness, con- 892 KIM AND GLOMB scientiousness, and emotional stability (i. e. , socialization; see also John, 1990; McCrae & Costa, 1996). Recently, Abele and Wojciszke (2007) confirmed previous studies by showing that a pool of 300 trait items (e. g. , communion, collectivism, morality, and femininity items for communion; agency, individualism, competence, and masculinity items for agency) is educed to the two broad dimensions of agency and communion. This idea is well summarized by Abele and Wojciszke, who stated the following: There is a long tradition in social and personality psychology to distinguish fundamental dimensions for the description of persons and groups: social and intellectual desirability, individualism and collectivism, independent and interdependent self, competence and morality, competence and warmth, dominance and nurturance, masculinity and femininity, and so on.Following Bakan (1966), we call these fundamental dimensions agency and communion. (p. 759) a similar vein, Aquino and Bommer (2003) showed that high levels of organizational citizenship behavior decreases victimization; presumably, this relationship may be due to a positive reciprocity norm. Overall, targets who have high agency personality traits do not engage in the positive reciprocity cycle and are more likely to be engaged in the negative reciprocity circle, which increases the likelihood of victimization.Targets who have high c ommunion personality traits are more likely to be engaged in the positive reciprocity circle with coworkers, which decreases the likelihood of victimization. Therefore, we hypothesized the following: Hypothesis 2: High agency is positively related to victimization. Hypothesis 3: High communion is negatively related to victimization. Integrating the victim precipitation model with theories of reciprocity, we propose the moderating roles of agency and communion personality traits on the relationship between cognitive ability and victimization.Although high levels of cognitive ability and competence may make someone predisposed to victimization, this may depend on their interpersonal interactions with others as influenced by their agency and communion personality traits. Because agency-driven behaviors do not build a norm of positive reciprocity or possibly initiate a norm of negative reciprocity, it strengthens the positive relationship between targets’ cognitive ability and vi ctimization. For example, employees who are high in cognitive ability and agency traits may use their talent to increase individual performance, which may negatively impact other group members.Conversely, because communion-driven behaviors initiate a norm of positive reciprocity between the giver and the taker, it circumvents or buffers the positive relationship between targets’ cognitive ability and victimization. For example, employees who are high in both cognitive ability and communion traits may use their talent to increase group performance (e. g. , help coworkers with workloads or problems). Such behaviors contribute to build the positive reciprocity cycle with coworkers and thereby weaken the likelihood of victimization because of high cognitive ability.Put simply, being smart and focused on oneself will lead to more victimization, but being smart and focused on group members will lead to less victimization. Although there is no direct empirical evidence suggesting an interactive effect of cognitive ability and agency and communion traits on victimization, recent studies hint at the plausibility of such an effect. For example, Fiske, Cuddy, and Glick (2006) suggested that people differentiate one another by competence as well as likeability, which in turn affects their cognitive and affective content of interpersonal perception (see also Collins, 1981).Similarly, Casciaro and Lobo (2005) suggested the importance of competence and likeability in a work setting; when individuals were high in both competence and likeability, coworkers treated them as â€Å"lovable stars,† but when individuals were high in competence and low in likeability, coworkers treated them as â€Å"competent jerks. † Consistent with the previous conceptual arguments, Casciaro and Lobo (2008) showed that individuals who are competent and likeable form more task interaction networks, whereas individuals who are competent and dislikeable fail to form taskPut simply , agency and communion personality traits are independent multidimensional constructs (Saragovi, Koestner, Dio, & Aube, 1997) that reflect self-oriented and group-oriented behaviors. Given that behaviors are rooted in personality traits (see Fleeson, 2001; Hogan & Holland, 2003; Moskowitz & Cote, 1995) and that agency and communion personality traits serve to describe interpersonal behaviors (Wiggins, 1991), we propose that individuals who have more agency traits, such as independence, egoistic bias, ambition, and self-competence, are involved in agency-driven behaviors, such as seeking goals and being less concerned about others.Conversely, individuals who have more communion traits, such as communality, socialization, consideration, and warmth, are involved in communion-driven behaviors, such as helping and nurturing coworkers and developing harmonious interpersonal relationships with coworkers. The direct relationship between agency and communion personality traits and victimizat ion is supported by theories of reciprocity. Agency-driven behaviors do not build a norm of positive reciprocity, at best (Axelrod, 1984), and initiate a norm of negative reciprocity, at worst (Andersson & Pearson, 1999).In the absence of a norm of positive reciprocity, employees do not feel obligated to respond to (positive) actions with other positive actions. Individuals high in agency engage in agency-driven behaviors, which may be at the expense of and harmful to others. A norm of negative reciprocity will perpetuate these harmful behaviors. Thus, aggressive behaviors against individuals who are high in agency may, in fact, increase. This implies higher victimization for people who have agency traits that either block the positive reciprocity norm or elicit the negative reciprocity norm through agency-driven behaviors.Conversely, communion-driven behaviors initiate a norm of positive reciprocity between the giver and the taker (Gouldner, 1960). In other words, the taker general ly responds to the communion-driven behavior with another communion-driven behavior toward the giver. After building a norm of positive reciprocity, both givers and takers are reluctant to violate this relationship through harming one another because it breaks the social norm and promotes a reputation for being untrustworthy, unkind, and unthankful (Cialdini, 2001; Gouldner, 1960).Thus, individuals who are high in communion traits engage in communion-driven behaviors and perpetuate a norm of positive reciprocity in which they are less likely to be the targets of interpersonal aggression. In COGNITIVE ABILITY AND VICTIMIZATION 893 interaction networks. Although failure to form task networks with â€Å"competent jerks† is distinct from victimizing them, this work does suggest withholding something favorable from them—a behavior that is consistent with some passive, indirect forms of victimization examined here (e. . , withholding information or resources). In line with t his research, we predict that two interpersonally oriented personality dimensions that affect likeability play a critical role in the relationship between cognitive ability and victimization; smart individuals who are high in agency traits may experience more victimization, whereas smart individuals who are high in communion traits may experience less victimization.Therefore, we hypothesized the following: Hypothesis 4: The relationship between cognitive ability and victimization is moderated by agency, such that when targets are high in cognitive ability, targets high in agency will experience more victimization than those lower on agency. Hypothesis 5: The relationship between cognitive ability and victimization is moderated by communion, such that when targets are high in cognitive ability, targets high in communion will experience less victimization than those lower on communion.Method Participants and Procedure Two hundred and seventeen employees of an organization that manages health care homes for individuals with disabilities voluntarily completed paper-and-pencil surveys during on-site survey administration with researchers. 1 Participants were guaranteed confidentiality. Employees within a health care home worked closely with one another to provide excellent care and service for the residents, and they constitute our work groups.Of the respondents, 95% were Caucasian, 74% were women, and 35% were employed full time. Average tenure was 22 months, and average age was 24 years. The organization had administered the Wonderlic Personnel Test (Wonderlic, 1984) and the California Psychological Inventory (CPI; Gough & Bradley, 1996) to job applicants prior to hire, and the Wonderlic and CPI scores of our respondents were linked to the survey data from the current study using identifiers. Fifty employees who did not have Wonderlic and CPI scores were excluded.After listwise deletion of individuals with incomplete information, the final sample was composed of 133 employees in 27 groups (i. e. , health care homes). Group size ranged from two to 10 members (average 4. 93). Comparisons between those respondents who were in our final sample and those who were deleted because of missing data revealed only one significant difference; excluded employees had slightly lower negative affectivity scores ( p . 05). Measures Cognitive ability. Cognitive ability was assessed using the Wonderlic Personnel Test prior to hire.The Wonderlic Personnel Test is a 50-item, 12–20-min omnibus test of intelligence, and it was originally designed to measure general mental ability for personnel selection. The manual reports that test–retest reliability ranges from . 82 to . 94 and that interform reliabilities range from . 73 to . 95 (Wonderlic, 1984). Victimization. Victimization was assessed using the 20-item Aggressive Experiences Scale (AES)-Target scale (Glomb, in press; Glomb & Liao, 2003). Illustrative items are â€Å"how often has a coworker or supervisor made angry gestures toward you? â€Å"how often has a coworker or supervisor spread rumors about you? † and â€Å"how often has a coworker or supervisor belittled your opinions in front of others? † Respondents indicated the frequency of their victimization experience using a 5-point scale ranging from 1 (never) to 5 (once a week or more). One item was removed because of zero variance (â€Å"how often has a coworker or supervisor physically assaulted you? †). The coefficient alpha of the AESTarget scale was . 87. Agency and communion.At present, there are not commonly accepted assessments of agency and communion, perhaps because of their designation as higher order constructs. Agency and communion have been measured by the Masculinity and Femininity scales from several personality inventories, including the Personal Attributes Questionnaire (Spence, Helmreich, & Stapp, 1974) and the Bem Sex Role Inventory (Bem, 1974; for review, see Helgeson, 1994; Saragovi et al. , 1997). Agency and communion have also been measured using the five-factor model; Wiggins (1991) suggested using the Extraversion (i. e. dominance facet only) and Agreeableness scales because these capture a substantial portion of variance in agency and communion, respectively (for empirical support, see also Peabody & Goldberg, 1989; Trapnell & Wiggins, 1990). Also, using the Big Five framework, Digman (1997) suggested using the Extraversion and Openness scales for agency (i. e. , personal growth) and the Agreeableness, Conscientiousness, and Emotional Stability scales for communion (i. e. , socialization). In this study, agency and communion were operationalized using both Wiggins’s (1991) specific measure approach and Digman’s (1997) broad measure approach.Following Wiggins’s approach, we selected the CPI scale of Dominance ( . 83) for agency and the CPI scale of Communality ( . 71) for communion. The CPI-Dominance is highly correlated with extraversion (r . 82; Fleenor & Eastman, 1997), and dominance is a key facet of extraversion (DeYoung, Quilty, & Peterson, 2007). The construct definition also supported our choice: Individuals high in dominance are assertive, dominant, and task-oriented; individuals low in dominance are quiet and cautious. The CPI-Communality is highly correlated with agreeableness (r . 0; Fleenor & Eastman, 1997), and agreeableness corresponds to communion (Wiggins, 1991). The construct definition of communality supports our decision: Individuals who are high in communality are likely to be team players who fit in with other people easily, agreeable, cooperative, reasonable, approachable for advice, dependable, and contented; individuals who are low in communality are likely to be nonconformers, changeable, moody, and reckless (Gough & Bradley, 1996; Groth-Marnat, 1990). Following Digman’s (1997) broader approach to agency measurement, we selected the CPI scales of Social Presence ( . 2), 1 This data set was used to examine different research questions in Glomb and Liao (2003), Glomb and Tews (2004), and Glomb and Welsh (2005). 894 KIM AND GLOMB Capacity for Status ( . 72), and Independence ( . 74) in addition to Dominance. These additional three scales have been identified as compound traits of extraversion and openness (Fleenor & Eastman, 1997), and extraversion and openness correspond to agency (Digman, 1997). CPI-Social Presence also corresponds to the dominance facet rather than the sociability facet of extraversion (Hough & Ones, 2001).The construct definition supported our choice: Individuals high in social presence are self-assured in social settings, and individuals low in social presence are reserved; individuals high in capacity for status are likely to be ambitious and to have high desire to succeed, and individuals low in capacity for status dislike competition; individuals high in independence are likely to be self-sufficient, persistent in seeking goals whether others agree, aggressive, and assertive, and individuals low in independence are likely to seek support from others, avoid conflict, be meek, and be mild (Gough & Bradley, 1996).We used similar conceptual and construct evidence for the Communion scale. In addition to CPI-Communality, we selected the CPI scales of Socialization ( . 78) and Responsibility ( . 77) because these two scales have been identified by Hough and Ones (2001) as compound traits of agreeableness, conscientiousness, and emotional stability (see also Fleenor & Eastman, 1997); furthermore, Digman (1997) has suggested that communion corresponds to agreeableness, conscientiousness, and emotional stability.The construct definition of these two components also supported our decision: Individuals high in socialization are likely to be conscientious and easy to conform to others, whereas individuals low in socialization are likely to be rebellious and to have unconventional attitudes; individuals high in respons ibility are responsible and ethically perceptive, whereas individuals low in responsibility are likely to be self-indulgent and careless (Gough & Bradley, 1996).In summary, the Agency scale is composed of the CPI scales of Dominance, Social Presence, Capacity for Status, and Independence; the Communion scale is composed of the CPI scales of Communality, Socialization, and Responsibility. 2 Given the typical conceptualization of agency and communion as broad traits, we consider the broad operationalization in our primary analyses and conduct additional analyses for the narrow, one variable conceptualization. The reliability scores of multidimensional Agency and Communion scales were . 87 and . 84, respectively (see Cronbach, 1951; W. M. Rogers, Schmitt, & Mullins, 2002).We conducted confirmatory factor analysis to assess whether the CPI scales load on the higher order common latent constructs of agency and communion using LISREL 8 (Joreskog & Sorbom, 1996). The results for the ? Agen cy and Communion scales reveal that a two-factor model— 2 (12) 19. 43; incremental fit index (IFI) . 98; comparative fit index (CFI) . 98; standardized root mean square residual (SRMR) . 06; root mean square error of approximation (RMSEA) . 07—fits the data quite well and fits significantly better than a one-factor model— 2(13) 49. 96; IFI . 91; CFI . 90; SRMR . 10; RMSEA . 5—providing evidence that subscales load on the higher order measures of agency and communion. In addition, agency and communion correlate . 16 (ns) in our study, which is comparable with correlations reported in previous studies (e. g. , Abele & Wojciszke, 2007 [r –. 03, –. 05]; Bruch, 2002 [r . 05, . 11]; Conway, Pizzamiglio, & Mount, 1996 [r . 27, . 32]). We also assessed the criterion-related validity of the Agency and Communion scales by examining whether they are significantly related to variables shown to be related to agency and communion measures in the broader p ersonality psychology literature.Specifically, we assessed life satisfaction and burnout in our study but did not examine these variables in our substantive hypotheses. Correlations in our data are similar to those in prior literature using alternative operationalizations of communion and agency. Specifically, results show that our Communion scale is significantly related to well-being outcomes, such as life satisfaction (r . 24, p . 01, compared with r . 26 for women and . 28 for men in Saragovi et al. , 1997), and that our Agency scale is significantly related to psychological health outcomes, such as emotional exhaustion (r –. 21, p . 01, compared with r –. 5 in Roos & Cohen, 1987). Control variables. On the basis of previous workplace victimization research (e. g. , Aquino et al. , 1999; Aquino & Thau, 2009; Bowling & Beehr, 2006; Hentig, 1948; Schafer, 1968), we controlled for several variables to reduce the potential impact of unmeasured variables on victimizatio n. Empirical evidence on the relationship between employee demographics and victimization shows mixed findings (Bowling & Beehr, 2006); we control for an employee’s age, gender, and tenure in the organization. There is a compelling theoretical link between organizational hierarchy and victimization (see Aquino et al. 1999); we control for supervisory versus nonsupervisory status. Individual differences, such as positive and negative affectivity, show mixed relationships with victimization (see Bowling & Beehr, 2006); we use the Positive Affect Negative Affect Schedule (Watson, Clark, & Tellegen, 1988) to control for positive affectivity ( . 86) and negative affectivity ( . 86). Stress may generate negative affective and behavioral responses that spark victimization (Bowling & Beehr, 2006); we use the Stress Diagnostic Survey (Matteson & Ivancevich, 1982) to control for job, work group, and organizational stress ( . 9 for job, . 89 for work group, and . 87 for organizational s tress). Interpersonal aggression engagement has been proposed as an antecedent of victimization on the basis of social exchange theory (Andersson & Pearson, 1999; Bandura, 1973), and Glomb and her colleagues (e. g. , Glomb, 2002; Glomb & Liao, 2003) provided empirical support for the idea of reciprocal aggression. Interpersonal aggression engagement was assessed by the AES-Engaged In scale (Glomb, in press; Glomb & Liao, 2003).The AES-Target (discussed above) and AES-Engaged In scales have the same item content except that one asks about behaviors that you were the target of and the others asks about behavior that you engaged in. We removed three items from the AES-Engaged In scale ( . 80) because of zero variance. Other CPI scales were excluded for one of two reasons: (a) They did not include the core dimensions of Extroversion–Dominance for agency or Agreeableness for communion, or (b) they included these dimensions but were contaminated by others as well.These â€Å"mixed † scales were the most likely reason for exclusion. Specific mappings of CPI scales to Big Five (i. e. , A: agreeableness, C: conscientiousness, ES: emotional stability, EX: extraversion, O: openness) characteristics are as follows: Self-Acceptance (ES EX), Empathy (EX O C), Well-Being (ES EX), Tolerance (O A), Achievement With Conformation (O C), Achievement With Independence (ES EX O C), Psychological-Mindedness (ES O), Flexibility (O C), Sociability (EX-Sociability), Intellectual Efficiency (O), Self-Control (ES C), and Good Impression (C). COGNITIVE ABILITY AND VICTIMIZATION 895 Results Descriptive statistics and zero-order correlations are presented in Table 1. Cognitive ability is significantly correlated with victimization (r . 18, p . 05). Agency and communion are not significantly correlated with victimization. Several control variables—including age (r . 21, p . 01); job, workgroup, organizational stress (r . 41, . 24, . 41, respectively, p . 01); and aggressi on engagement (r . 54, p . 01)—are significantly correlated with victimization.The control variables of positive and negative affectivity and hierarchical status suggest nonsignificant associations with victimization. Table 2 presents the regression results using the broad operationalization of agency and communion (see Digman, 1997). Because individuals in the same work group are not independent, the independent assumption of traditional ordinary least squares regression is violated, causing biased estimators. Therefore, we used a clustered regression with a White-correction in STATA that allows covariance between individuals within groups and corrects for heteroscedasticity across groups (see W.H. Rogers, 1993). We report unstandardized regression coefficients and regular R2 because standardized coefficients and adjusted R2 are not valid with the cluster option (see Glomb & Liao, 2003; W. H. Rogers, 1993). We tested the degree of multicollinearity with the variance inflatio n factor; values ranged from 1. 05 to 1. 94, with an average variance inflation factor of 1. 37, suggesting it was not a critical problem. Control variables explain 42% of the variance in victimization (Model 1). Model 2 includes cognitive ability, agency, and communion.Results suggest a significant relationship between cognitive ability and victimization (b 0. 17, p . 01), supporting Hypothesis 1. Agency and victimization were also significantly associated (b 0. 08, p . 05), supporting Hypothesis 2. This association is different from the nonsignificant zero-order correlation, suggesting the association exists after controlling for other variables. Consistent with the zero-order correlations, communion was not significantly associated with victimization; Hypothesis 3 was not supported. These variables explain an additional 4% of the variance in victimization.Table 1 Descriptive Statistics and Correlations Variable 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. Gender Tenure (years) Age (years) Hierarchical status Negative affectivity Positive affectivity Job stress Workgroup stress Organizational stress Aggression engagement Agency (index) Communion (index) Agency (CPI–Dominance) Communion (CPI–Communality) Cognitive ability Victimization M SD 1 . 15 . 09 . 05 . 00 . 11 . 02 . 12 . 21 . 11 . 01 . 09 . 03 . 09 . 18 . 02 2 3 4 To test the moderating effects of personality traits, we used hierarchical moderated regression with centered interaction terms.Interaction terms explain an additional 4% of the variance in victimization (Model 3). Hypothesis 4, which predicts the moderating role of agency personality traits on the association between cognitive ability and victimization, was supported (b 0. 02, p . 05). Hypothesis 5, which predicts the moderating role of communal personality traits on the association between cognitive ability and victimization, was also supported (b – 0. 05, p . 05). The interactions were plotted using Aiken an d West’s (1991) method and are shown in Figures 1 and 2.Figure 1 illustrates that as cognitive ability increases, for those high in agency, victimization increases compared with those low in agency. Figure 2 illustrates that as cognitive ability increases, for those low in communion, victimization increases, and for those high in communion, victimization decreases. These results suggest that agency traits exacerbate and that communion traits buffer the relationship of cognitive ability to victimization. We tested the same regression model using specific measures of agency and communion, which is consistent with Wiggins’s (1991) operationalization (i. e. CPI-Dominance for agency and CPI-Communality for communion). These results suggest similar empirical findings, which confirm the role of cognitive ability, agency, and communion on victimization at work. Table 3 presents the regression results. In Model 4, results suggest a significant relationship between cognitive abi lity and victimization (b 0. 15, p . 05), supporting Hypothesis 1. Dominance and victimization were significantly associated (b 0. 11, p . 05), supporting Hypothesis 2. Communality was also significantly associated with victimization (b – 0. 18, p . 05), supporting Hypothesis 3.This finding is different than the broad communion index, in which the association was not significant. These variables explain an additional 6% of the variance in victimization. In Model 5, interaction terms explain an additional 2% of the variance in victimization. Hypothesis 4, which predicts the moderating role of agency personality traits on the association between cognitive ability and victimization, 5 6 7 8 9 10 11 12 13 14 15 0. 74 0. 44 1. 85 2. 21 23. 77 7. 41 0. 73 0. 45 19. 24 5. 22 37. 61 5. 63 11. 94 3. 81 9. 63 3. 63 14. 94 5. 02 21. 33 5. 06 55. 55 7. 98 55. 21 4. 25 58. 85 10. 3 54. 43 5. 34 25. 41 5. 40 23. 74 6. 41 .28 . 20 . 04 . 12 . 22 . 18 . 39 . 28 . 16 . 03 . 12 . 05 . 18 . 16 .19 . 10 . 06 . 33 . 31 . 28 . 05 . 03 . 06 . 09 . 01 . 08 . 21 .14 . 05 . 37 . 05 . 21 . 09 . 15 . 07 . 09 . 07 . 05 . 14 .19 . 06 . 15 . 02 . 19 . 10 . 23 . 07 . 18 . 05 . 00 .06 . 29 . 13 . 10 . 27 . 25 . 29 . 09 . 12 . 03 .45 . 55 . 25 . 03 . 01 . 01 . 05 . 03 . 41 .43 . 21 . 01 . 15 . 01 . 12 . 12 . 24 .31 . 22 . 04 . 21 . 01 . 07 . 41 .07 . 05 . 07 . 03 . 08 . 54 .16 . 87 . 11 . 13 . 04 .24 . 54 . 14 . 11 . 11 . 10 . 09 .05 . 09 . 18 1, male Note. N 133. Correlations greater than . 7 are significant at p . 05; those greater than . 21 are significant at p 0; Hierarchical status: subordinate 1, supervisor 0; CPI California Psychological Inventory. .01. Gender: female 896 KIM AND GLOMB Table 2 Results of Hierarchical Regression Analysis for Victimization Victimization Variable Gender Tenure (years) Age (years) Hierarchical status Negative affectivity Positive affectivity Job stress Workgroup stress Organizational stress Aggression engagement Cognitive ability Agency (index) Commu nion (index) Cognitive Ability Agency Cognitive Ability Communion R2 R2 Model 1 0. 2 . 03 . 09 . 55 . 11 . 03 . 35 . 03 . 24 . 62 Model 2 1. 16 . 01 . 09 . 81 . 12 . 05 . 37 . 10 . 25 . 60 . 17 . 08 . 21 . 46 . 04 Model 3 1. 06 . 02 . 09 1. 09 . 15 . 04 . 43 . 18 . 27 . 60 . 15 . 06 . 26 . 02 . 05 . 50 . 04 .42 Note. N 133. Regression coefficients are unstandardized because standard regression coefficients are invalid with the cluster option (see Glomb & Liao, 2003; W. H. Rogers, 1993). Gender: female 1, male 0; Hierarchical status: subordinate 1, supervisor 0. p . 05. p . 01 (two-tailed test).Figure 2. The moderating role of communion personality traits on the relationship between cognitive ability and victimization. was marginally supported (b 0. 01, p . 10). Hypothesis 5, which predicts the moderating role of communion personality traits on the association between cognitive ability and victimization, was supported (b – 0. 03, p . 05). Discussion The primary purpose of this study was to examine the role of cognitive ability in workplace victimization, a topic that has received scant research attention.Cognitive ability predicts many job and real-life outcomes (see Brand, 1987), and thus, it is important to include in the portfolio of variables associated with victimization, such as personality, demographics, behaviors, and organizational characteristics (see Aquino & Thau, 2009; Bowling & Beehr, 2006). Consistent with a victim precipitation model, our results suggest that cognitive ability is associated with workplace victimization. We also tested the relationship between agency and communion—two interpersonally oriented personality dimensions—and victimization.Consistent with a negative reciprocity cycle and a provocative victim typology, our results suggest that individuals high in agency personality traits experience victimization at work. Counter to expectations, we did not find a significant relationship between communion and lower victimization in our primary analyses. This nonsignificant finding may be explained by the positive–negative asymmetry effect (see Baumeister, Bratslavsky, Fickenauer, & Vohs, 2001; Taylor, 1991), which would suggest that positive interpersonal interactions carry less weight than negative social interactions, and therefore, it may cause a nonsignificant finding.The nonsignificant findings may also be caused by the broad communion measure, the components of which might evidence differential relationships with victimization. A previous study found that victimization is significantly associated with agreeableness ( – . 21, p . 05) but is not significantly associated with conscientiousness and emotional stability ( – . 02 and . 10, respectively; Figure 1. The moderating role of agency personality traits on the relationship between cognitive ability and victimization. COGNITIVE ABILITY AND VICTIMIZATION 897Table 3 Supplemental Analysis Results of Hierarchical Regress ion Analysis for Victimization Victimization Variable Gender Tenure (years) Age (years) Hierarchical status Negative affectivity Positive affectivity Job stress Workgroup stress Organizational stress Aggression engagement Cognitive ability Agency (CPI Dominance) Communion (CPI Communality) Cognitive Ability Agency Cognitive Ability Communion R2 R2 Model 4 1. 33 . 01 . 11 . 46 . 11 . 00 . 34 . 14 . 28 . 61 . 15 . 11 . 18 . 48 . 06 Model 5 1. 24 . 02 . 08 . 36 . 14 . 00 . 35 . 18 . 30 . 61 . 12 . 10 . 18 . 1†  . 03 . 50 . 02†  outcomes, rather than the more distal individual difference of cognitive ability, that are mediating explanatory variables. Future work might explore whether high performance, ability, and achievement in other domains adhere to similar processes (cf. Feather, 1994, on tall poppies). Theoretical Implications This study contributes to the cognitive ability, personality, and workplace victimization literatures in a variety of ways. First, we extend the sc ope of the victim precipitation model by proposing and testing the possibility of smart victims.Second, contrary to the existing cognitive ability literature, our finding indicates a potential downside to high cognitive ability (e. g. , for another possible exception, such as clever concealer effects, see Wilson & Herrnstein, 1985). This study moves cognitive ability research in a new direction by positing and testing a potential downside to high cognitive ability in the workplace. Third, in our study we examined two broad interpersonally oriented personality dimensions— agency and communion—and their association with workplace victimization.Although personality researchers have confirmed that the agency and communion model is useful in terms of investigating interpersonally oriented outcomes (see Abele & Wojciszke, 2007; Bruch, 2002; Digman, 1997; Helgeson, 1994; Wiggins, 1991), this model is currently less popular than the Big Five model in organizational scholarship , perhaps because of the absence of an agreed upon operationalization of these multidimensional traits (see Helgeson, 1994; Saragovi et al. , 1997).Although the Big Five is certainly a useful taxonomy, because we are interested in workplace victimization and the interpersonal relationships between victims and perpetrators, the agency and communion framework may be useful for future victimization research. Fourth, the interplay of two key individual differences— cognitive ability and personality traits— on victimization provides an integration of two complementary theories, which adhere to the social and personality psychological models of social interactions. Although previous workplace victimization literature integrated the victim precipitation model with structural theory (e. g. Aquino, 2000; Aquino et al. , 1999), and reciprocity theory with structural theory (e. g. , Aquino & Bommer, 2003), the integration of the victim precipitation model and reciprocity theory h as not received research attention. In this study, we take the first step by integrating victim precipitation with reciprocity theory to demonstrate the interactive effects of cognitive ability and agency– communion personality traits on workplace victimization. This approach is consistent with social psychological literature suggesting the multiplicative effect of competence and likeability on social interactions (see Casciaro & Lobo, 2008; Fiske et al. 2006). Note. N 133. Regression coefficients are unstandardized because standard regression coefficients are invalid with the cluster option (see Glomb & Liao, 2003; W. H. Rogers, 1993). Gender: female 1, male 0; Hierarchical status: subordinate 1, supervisor 0; CPI California Psychological Inventory. †  p . 10. p . 05. p . 01 (two-tailed test). Jensen-Campbell et al. , 2002), which are captured in our index. These results are consistent with our supplemental analysis; when we adopted the specific scale of Communion (i. e . CPICommunality for agreeableness; see Wiggins, 1991), we found a significant relationship between communion and victimization (b – 0. 18, . 15, p . 05). More studies are necessary to have greater confidence in the relationship between communion personality traits and victimization at work. Finally, our results demonstrate the moderating effects of agency and communion on the relationship between cognitive ability and victimization. Results suggest that the relationship between cognitive ability and victimization is exacerbated by agency personality traits, which is manifested in self-oriented behaviors (i. . , independence, dominance, capacity for status, and social presence) in a work group. Conversely, results suggest that the increased propensity to be victimized because of one’s high cognitive ability can be mitigated by communion personality traits, which is manifested in other-oriented or â€Å"team player† behavior (i. e. , communality, responsibility, and socialization) in a work group. We acknowledge that we do not study possible mediating mechanisms and that cognitive ability may be operating as a proxy for other variables relevant to workplace success.For example, it may be that high-performing individuals, rather than high-cognitiveability individuals, are those who are most likely to be the targets of interpersonal aggression. Similar theoretical processes of social comparison would also apply to high performance, but in this case, cognitive ability operates as a proxy for performance. As noted, cognitive ability is related to myriad positive outcomes on the job, and we acknowledge that it may be those proximal favorable job Organizational ImplicationsIn the 1950 movie Harvey, Jimmy Stewart’s character Elwood Dowd says, â€Å"Years ago my mother used to say to me . . . She’d say ‘In this world Elwood, you must be oh-so smart or oh-so pleasant. ’ Well, for years I was smart . . . I recommend pleasa nt. † On the basis of our findings, we recommend that if you are going to be â€Å"oh-so smart† then you should also be â€Å"oh-so pleasant† to avoid workplace victimization. Beyond individual advice, the results also have important practical implications for managers. First, 898 KIM AND GLOMB managers need to be aware of this potential dark side of high cognitive ability at work.Managers are familiar with the positive side of high cognitive ability, but initial evidence of smart victims suggests managers may need to be on the lookout for and take precautions to deter the workplace victimization of smart employees. The strong and consistent relationship between cognitive ability and many elements of performance suggests that these individuals may be among the most important to keep satisfied, productive, and retained. Tactics helpful in preventing the victimization of high-cognitive-ability employees may reduce both the proximal and distal costs of workplace vic timization.Second, our results suggest that high cognitive ability does not predestine employees to be victimized—their personality also plays a role. Although managers attend to personality during the selection process because it predicts job performance (see Dunn, Mount, Barrick, & Ones, 1995), our results suggest that personality can also have either a protective (i. e. , communion) or intensifying (i. e. , agency) role in victimization. We do not suggest that organizations should not select applicants who are high in agency traits because they are more vulnerable to victimization at work.Personality traits have their own bright and dark sides (see Judge & LePine, 2007). For example, although our results show that employees who are high in agency traits are more likely to be victims at work, research also shows that traits under the agency umbrella are associated with being a leader (e. g. , extraversion; Judge, Bono, Ilies, & Gerhardt, 2002). Further, although high-abilit y employees who are also high in communion are less likely to be victims at work, research also suggests that traits under the communion umbrella are associated with the use of more lenient standards to evaluate coworker performance (e. . , agreeableness; Bernardin, Cooke, & Villanova, 2000). Thus, organizations need to consider both the benefits and costs of the communion and agency personality traits of employees and to be aware of their correlates, both favorable and unfavorable. Regardless of the composition of agency and communion in the workforce, organizations can attempt to modify individual behaviors by creating strong situations (e. g. , human resource practices, organization culture) that minimize the link between personality and behaviors and that enhance positive reciprocity norms between employees.Limitations and Future Directions This study is not without limitation. First, range restriction in cognitive ability may cause reduced sample correlations. However, given th at range restriction reduces the strength of relationships because of limited variance (Sackett & Yang, 2000), this seems to be a minor issue. Further, the degree of variability of cognitive ability is similar to that in other studies (e. g. , Chan, 1997; Mumford, Van Iddekinge, Morgeson, & Campion, 2008; Sackett & Ostgaard, 1994). Second, the external validity of these findings is limited.This data set is small and is from a predominantly Caucasian sample of health care workers. The sample is also predominantly female, which may have influenced effects; women high in cognitive ability and agency may be particularly prone to victimization because of gender stereotypes (see Broverman, Vogel, Broverman, Clarkson, & Rosenkrantz, 1972). The context of a health care home is interesting because employees may be more empathetic and less competitive given self-selection into this caring profession.They are also more likely to be exposed to victimization; the health care industry continually reports some of the highest levels of workplace aggression and victimization (see Rippon, 2000), though victimization is often perpetrated by patients, and in our study we examined victimization from coworkers and supervisors. Examining our relationships in other business contexts and groups is necessary. Third, the construct validity of our agency and communion measures may be questioned.Given that there is not a generally accepted method of transforming the CPI scales into the broad indices of agency and communion, we created our own measures guided by previous literature and linkages of the content of the scales (e. g. , Digman, 1997; Gough & Bradley, 1996; Hough & Ones, 2001). In the field of personality psychology, there have been calls for the development and study of agency and communion scales (see Helgeson, 1994); we concur and believe the development of valid and concise measures of agency and communion traits might promulgate the use of these interpersonally oriented per sonality constructs.Fourth, measures were self-report from a single source, and thus, common method bias is a potential problem. However, cognitive ability and personality traits were measured for personnel selection, and perceived victimization was measured 22 months later, on average (i. e. , average tenure is 22 months). Because there are large temporal and psychological distances between cognitive ability and perceived victimization measures, the impact of common method bias is not a major concern (see Podsakoff, MacKenzie, Lee, & Podsakoff, 2003).We also controlled for positive affectivity and negative affectivity, which also impact the cognitive perception and reporting processes (Bowling & Beehr, 2006; Isen, 1987; Podsakoff & Organ, 1986; Schmitt, 1994; Spector, 1994; Watson & Clark, 1984). As Schmitt (1994) suggested, the appropriateness of methods should be based on the stage of development of the research; given the lack of research in this area, self-report data would be deemed acceptable. Further, as noted by others (e. . , Aquino & Lamertz, 2004; Spector, 1994), it is difficult to envision circumstances in which non-self-report data w

Tuesday, July 30, 2019

Crim Justice

Multiple Choice: Chose the most appropriate answer to the following questions: 1. Which of the following had a profound effect on individual rights by the 1980s? a. The Civil Rights movement. b. The Vietnam War. c. Terrorism. d. The increased use of drugs. 2. Which model below best assumes that the system’s components work together harmoniously to achieve justice. a. Due Process Model b. Conflict Model c. Individual Rights Model d. Consensus Model 3. Which step in the pretrial activities does a judicial officer determine if a crime has been committed? . Indictment b. Information c. Preliminary Hearing d. Information 4. According to the author Race and Ethnicity are buzz words that people use when discussing: a. Religion b. Fourth Amendment c. Multiculturalism d. Terrorism 5. Which of the following describes the scientific study of the causes and prevention of crime and the rehabilitation and punishment of offenders? a. Incarceration b. Criminology c. Indictment d. multicultura lism 6. Which Amendment to the U. S. Constitution is concerned with the defendant’s right to a jury trial? a. Fourth b. Fifth c. Sixth d. Eighth 7.A(n)________ is defined as criminal proceedings, the examination in court of the issues of fact and relevant law in a case for the purpose of convicting or acquitting the defendant. a. Trial b. Indictment c. Arraignment d. Probable Cause 8. Which of the following refers to crime fighting strategies that have been scientifically tested and are based on social science research? a. Crime Control Model b. Evidence Based Practice c. Social Control Model d. Criminology 9. Which stage in the criminal justice process involves taking pictures and fingerprints of a suspect? a. Arraignment b.Indictment c. Preliminary Hearing d. Booking 10. The first step in the Criminal Justice process begins with the: a. Arrest b. Investigation c. Booking d. Warrant 11. The preliminary hearing is used to decide whether: a. there are reasonable grounds to bel ieve the defendant committed the crime. b. the crime that occurred is a felony. c. the defendant is fit to stand trial. d. the defendant is guilty beyond a reasonable doubt. 12. An ideal that embraces all aspects of civilized life and that is linked to fundamental notions of fairness and to cultural beliefs about right and wrong is known as: . Equal rights b. Social Justice c. Multiculturalism d. Civil Justice 13. Who returns an indictment? a. the prosecutor b. the judge c. the arresting police officer d. the grand jury 14. Multiculturalism is often used in conjunction with what other term? a. traditionalist b. diversity c. homogeneous d. ethnocentric 15. A criminal justice perspective model that emphasizes the efficient arrest and conviction of criminal offenders is known as: a. Social Control Model b. Due Process Model c. Crime Control Model d. Omnibus Bill Model Chapter 1- True-FalseCircle the most appropriate answer to the following questions. 1. The Conflict Model assumes that the criminal justice system’s components function primarily to serve their own interests a. True b. False 2. The Corrections stage begins once a defendant has been convicted, but before sentencing. a. True b. False 3. Due Process is a right guaranteed only found in the Fifth Amendment to the U. S. Constitution. a. True b. False 4. The Crime-controlled model is defined as a criminal justice perspective that emphasizes the efficient arrest and conviction of criminal offenders. a. True . False 5. Gideon v. Wainwright is a landmark U. S. Supreme Court case ensuring the defendant’s right to a jury trial. a. True b. False Chapter 1 – Fill in the Blank Fill in the blank with the word or phrase that best completes or answers the question. 1. Not guilty, guilty, and no contest are all acceptable pleas at the______________. 2. The _________ model of criminal justice assumes that the system’s components function primarily serve their own interests. 3. The __________ model of criminal justice assumes that each of the component parts strive towards a common goal. 4. __________ based practice is crime fighting strategies that have been scientifically tested and are based on social science research. 5. ___________ occurs when there is conduct in violation of the criminal laws of a state, the federal government, or a local jurisdiction for which there is no legally acceptable justification or excuse. Chapter 1 – Matching Match the term in the numbered column with the answer in the lettered column. 1. Preliminary Hearing| a. A formal written accusation submitted to the court by a grand jury alleging that a specified person has committed a specified offense, usually a felony. 2. Indictment| b. A formal written accusation submitted to a court by a prosecutor alleging that a specified person has committed a specified offense. | 3. Probable Cause| c. A proceeding before a judicial officer in which it must be shown that: a crime was committed, the crime occurred within the jurisdiction of the court, and there are reasonable grounds to believe that the defendant did the crime. | 4. Information| d. A set of facts and circumstances that would induce a reasonably intelligent and prudent person to believe that a specified person has committed a specified crime. Chapter 1 Essay Provide detailed and comprehensive information to support your answer. Where applicable use examples to support your answers. 1. What is meant by due process of law? 2. Define multiculturalism, and highlight the importance of multiculturalism to the criminal justice process. 3. Compare and contrast the three main components of the criminal justice system. 4. Discuss the crime fighting strategies that have been scientifically tested and are based on social science research. 5.Define and discuss the term Administration of Justice. Chapter 1 – Critical Thinking Answer each part of the following questions with succinct and comprehensive information by ci ting examples of various models, laws, and justice theories in your answer. 1. Do you see a trend in our society in favor of individual rights or public interests? Cite recent examples to support your position. 2. What does justice mean to you? Discuss the three types of justice and their effect on individual rights to support your answer.

Monday, July 29, 2019

Action Taking during Military Operations Essay Example | Topics and Well Written Essays - 3250 words

Action Taking during Military Operations - Essay Example Young bloods enrolling in any country’s defense services are put through extensive physical and psychological training to toughen them up, so that the security of the nation is in tough hands. The various defense institutes try vigorously to transform these men and women into robots, but although physically almost transformed, psychologically they still are superior to robots, because they think and differentiate. A very important decision to be taken during any combat operation, is to decide whether to open fire or not and when to open? Mostly people in the commanding positions encounter this question as an integral part of their job. Prior to giving orders of firing to control hostile situations the commander as a human being faces and answers some moral questions to himself. This is the time when he considers some issues like Moral reasoning, Proper leadership, Personal ethics, Constitutional ethics, Moral virtues, Utilitarianism, Justice. In this paper the basic discussion is about as how do these issues govern the decision taken and its consequences? The Beslan school hostage crisis (also referred to as the Beslan school siege or Beslan massacre) began when a group of Islamic terrorists demanding an end to the Second Chechen War took more than 1,100 schoolchildren and adults hostage on September 1, 2004, at School Number One (SNO) in the town of Beslan, North Ossetia-Alania, an autonomous republic in the North Caucasus region of the Russian Federation. On the third day of the standoff, a series of explosions shook the school, followed by a fire which engulfed the building and a chaotic gun battle between the hostage-takers and Russian security forces. Ultimately, at least 334 hostages were killed, including 186 children. Hundreds more were wounded or missing in what was called "the worst terrorist attack since September 11, (Wikipedia). The handling of the siege by Vladimir Putin's administration was criticized by a number of observers and grassroots organizations, Criticism, including by Beslan residents (the survivors and the r elatives of the victims), centered on the allegations that the storming of the school was ruthless, citing the confirmed use of heavy weapons, such as RPO flamethrowers and tank guns. Human Rights activists say that at least 80 percent of the hostages were killed by indiscriminate Russian fire. The military of any country often face such incidents of hostile situations. While facing such situations the first and foremost question that comes to ones mind is: when to fire and when to not. "It is the job of thinking people not to be on the side of the executioners". Albert Camus. This was rightly said by a great man. As civilized human beings we always have a tendency of avoiding unnecessary firing and unwanted bloodshed, but circumstances always compel man to do what he loathes. As a person in the commanding post of the military or a force, his chief objective while controlling any hostile situation is to curb the hostility with minimum violence, bloodshed and loss of life and property. Even though a commanding officer desires to establish control over the situation by non-violence, the hostility displayed by the counterpart invites violence. Now the most important decision is entrusted in the hands of the man giving orders, the question to be decided on is: "if fire is to be opened, what should be the deciding and compelling need to do so", and there should be enough reasons to support the decision and its cause alike. When a commanding officer gives order to fire or use any arms and ammunition to subdue a hostile

Sunday, July 28, 2019

Description of Accounting Industry Essay Example | Topics and Well Written Essays - 1250 words

Description of Accounting Industry - Essay Example The accounting Industry is a very important service industry and has a strong growth potential. The Accounting Industry has grown steadily in the past five to ten years and is "expected to grow faster than average for all occupations through the year 2014 (U.S. Department of Labor Bureau of Labor Statistics)." The growth of the economy will increase new businesses will increase the need for accountants to handle the financial affairs of those businesses. Employees in the accounting industry set to retirees or changing careers will also increase jobs in this industry. One major trend that will increase jobs in the Accounting Industry is due to accounting scandals. Accounting scandals have lead to changes in laws and regulations, which in turn will increase the number of jobs in the industry. "In response to accounting scandals, new federal legislation restricts the non-auditing services that public accountants can provide to clients. If an accounting firm audits clients' financial statements, that same firm cannot provide advice in other accounting areas such as legal matters, investment banking, and human resources (U.S. Department of Labor Bureau of Labor Statistics)." These regulations are to help prevent scandals and fraud in the accounting industry. ... Department of Labor Bureau of Labor Statistics). A large cause of the growth of this industry is the services provided by the industry. The Accounting Industry provides a variety of services to individuals and companies who retain monetary gains either from sale of goods and services or from receipt of wages. Almost everyone in the country has finances and monetary gain. The increase in individual and even business wealth causes an increased need for financial advisors, insurance providers, tax preparation and advice services, and other accounting services. There are four major fields of the accounting industry in which the provided services can be broken down. The first field is the Public Accountants, which include the Certified Public Accountants. Public Accountants provide auditing, accounting, tax, and consulting services for corporations, governments, nonprofit organizations, and individuals (U.S. Department of Labor Bureau of Labor Statistics). Public Accountants concentrate in one specific field of accounting for example, Tax Accounting or Financial Analysis. Another major field of accountants are the Manag ement accountants, which include cost, managerial, industrial, corporate, and private (U.S. Department of Labor Bureau of Labor Statistics). These accountants record and analyze financial information for corporations in order to provide accurate information in which the company can make accurate business decisions based on financial data (U.S. Department of Labor Bureau of Labor Statistics). A major responsibility in this field is to "prepare financial reports for the stockholders, creditors, tax authorities, and regulatory agencies (U.S. Department of Labor Bureau of Labor Statistics)." The third field is the Government Accountants and Auditors and

Saturday, July 27, 2019

Summary Essay Example | Topics and Well Written Essays - 250 words - 116

Summary - Essay Example Along period indeed, Inna come face to face with the brother, but fails to recognize him at first; his hair had gone grey and seemed shorter. Above all else, the life that the brother lives back home is but a complete contrast of what she expected from a working family, as evident from the brother’s dressing code; ‘a brown raincoat fit only for picking mushrooms, worn out shoes and a small suitcase.† From a warm, hearty welcome, Inna goes ahead to show her love for the brother and his entire family, walking his brother from one place to the next in Americas. The brother’s visit would soon turn into a shopping expedition, with the brother â€Å"pushing shopping carts the size of an airplane hangar.† Grisha obsession with shopping soon became unbearable, leaving her lonelier and drying her little resources capped on a five year contract than she had expected; a sharp contrast of the childhood experience she had longed to rekindle. A visit that was highly awaited turned into an exploitative nightmare, with the sister wishing that the brother would leave as soon as time would permit. Inna is indeed relived as he leaves for home, but is sad and feels like crying for the ordeal that his own sibling did put her

Policing and mistrust in black community Research Paper

Policing and mistrust in black community - Research Paper Example gh evidence, most black families in the United States are too reluctant and more cautious in advising their children to be careful when dealing with police officers. While making a flashback, there is often a disturbing experience of either black men or women having suffered under mysterious circumstances in the hands of police. Therefore, how does the level of mistrust hinder the relationship between police and the black society in the United States? As illustrated by Smith and Malcolm (1036), there is a growing concern that the majority of the black community has always been the target of police brutality. Besides, several questions of mistrust between police and black community within the United States have been left unanswered. Consequently, it is not possible to re-examine the relationship between black Americans within the context of policing depending on how the offenders would be awarded judgments from the crime committed. It is very important to understand that there is very minimal American police education concerning cultural and historical injustices. As such, the above has contributed into poor handling of the black community by the police. It is also vital for the police officers to embrace a proper communicative style that is meant to harmonize relationship between members of the community in regard to restoration of law and order. According to Smith and Malcolm (1036), embracing accountability among police officers while dealing with the black minority is considered to be a very important subject. Moreover, it would lead to the incorporation of the spirit of competency and harmonization of trustworthiness between the law enforcers and the community. As a result, it would lead into corporation while ensuring that there is presence of security organs at all levels of the society (Smith and Malcolm 1036) Tipton (54), a chief security analyst from Texas argues that, it is important for the black community to understand `elements of policing and

Friday, July 26, 2019

Idea of Landscape and American Dreams Essay Example | Topics and Well Written Essays - 1500 words

Idea of Landscape and American Dreams - Essay Example Since Adams’ used the term, it evolved to be part of Americans’ life. It connotes the Americans’ desire for equality2, independence and togetherness. They envisioned a lifestyle that would be affordable to Americans, enhance unity and freedom of expression. Americans experienced other challenges apart from the great depressions. The great migration from south to north was a serious challenge to Americans. Several other authors such as Isabel Wilkerson envisioned the American dream in their works. Wilkerson’s the warmth of other suns is an account of the Great Migration in America. It reveals the historic development in America that transformed the American society is a tremendous manner. The Great Migration was an exodus of nearly six million people in America. Wilkerson’s provides an analysis of the migration from 1915 to 1970. The story provides an analysis of the trips made by Americans during the Great Migration. Black Americans migrated from th e south to the north. Their relocation and migration had great impacts on the North. The migration involved the abandonment of the old confederacy states in beginning of 1915. Black Americans were poor and with had low levels of education. In the book, Wilkerson provides an account of three blacks immigrants from the south. Wilkerson provides a background of the immigration story as a progressive occurrence. Ida Mae, a central character in the book, had several challenges in life with her husband George. George had meager earnings and lived with Mae and her three children. George solely depended on earnings from the feudal southern agriculture. This is a depiction of the American dream of the southern blacks hoping for proper employment. Employment in the feudal southern agriculture had insignificant earnings. Mr. Edd, George’s employer, did not provide good employment terms like other southern white masters. Underpayment for the works of the employees was a vital characteris tic of the southern white masters. This is a depiction of the American dream of proper and appropriate employment conditions. George lacked basic education to advocate for his employment rights. The American dream is to elevate the education level of all to enhance empowerment. The American dream ideology envisions a society that embraces unity and inclusiveness. It envisions a society that is free from discrimination. The society that Americans deserve and hopes to live in is free from exploitation of individuals based on class or race. All these, however, are evident in Wilkerson’s book. In 1937, George’s cousin underwent torture by a white posse. The white posse erroneously suspected Mr. Edd’s cousin for stealing turkeys. The inhuman act is a sign of discrimination based on class. Southern whites had evident discrimination against African Americans, based on class and race. Wilkerson’s masterpiece work documenting the migration of black Americans provi des a true picture of their plight. Critics point at the plight of the blacks during the decade-long migration of the blacks as a depiction of a failed society. They show the extent to which the society neglected part of the population. Whites regarded blacks as poor and illiterate. Isolation among the society members was real and evident in diverse forms. Joblessness among the black Americans and dependency on the white plantation owners from the southern was a sign of unfulfilled dreams. As connoted by the

Thursday, July 25, 2019

Algebra Math Problem Example | Topics and Well Written Essays - 1500 words

Algebra - Math Problem Example Solution: Let x = the quantity of Arabica(M) (in kg) and y = quantity of Robusta(H) (in kg) Based on the given information, equations may be set up as: 10.50(x) + 9.25(y) = (9.74)(2500) ---? equation (1) x + y = 2500 ---? equation (2) Graphing each equation on the same xy-plane: By applying substitution method (equation (2) into equation (1)): 10.50(x) + 9.25*(2500 – x) = (9.74)(2500) 10.50(x) + 23125 - 9.25(x) = 24350 1.25(x) = 1225 Then dividing each side by 0.8, x = 980 kgs Arabica(M) And 980 + y = 2500 ---? y = 1520 kgs Robusta(H) Thus, the point of intersection is at (980, 1520) and this pertains to the quantities each of the Arabica(M) and the Robusta(H) that must be present in the bean-mixture so that Matthew is able to satisfy the condition of selling a total of 2500-kg mixture where each kilogram is sold for $9.74. Summary of Learning Besides its flexible range of applications, I have learned that there can be alternative methods in solving a system of equations once each equation has been properly set up with correct algebraic expressions in which variables are made to represent unknown amounts of objects either count or non-count by nature. I appreciate the fact that in Algebra, one is able to verify the existence of a solution by using methods of elimination and substitution wherein one method can be a means to countercheck the other which ought to show the same results. It is quite interesting that equations may be graphed to determine whether real solutions exist as via intersection of lines. Having become acquainted with different function types such as linear, polynomial, rational, logarithmic, and exponential, I gain knowledge of constructing relations among dependent and independent variables as well as arbitrary constants based on useful empirical data. Summary of Topic In the model mixture problem, businessmen like Matthew can set constraints in terms of cost, quantity of material or commodity under consideration, selling price, and a dditional concerns that may possibly be incorporated in formulating labels and pertinent equations. Normally, problems of such kind possess linear relationships of variables for which the number of solutions rely on the highest degree of independent variable by which to identify the number of intersection points between the set of equations involved. Alternative Project In its existence and approach, Algebra serves as a base device to higher math such as Calculus which attempts to explore the grounds for the undefined nature of a function and designates a sensible understanding about up to which extent it would exist considering assumptions or applicable conditions. Fundamentals of algebra are essential to the foundation of courses designed to solve multivariable systems through linear programming, matrix applications, and differential equations where there is ceaseless necessity for equations and functions in interpreting problem situations. They are especially of ample advantage a s tools for working chemists and biochemists who deal with cases of radioactive decomposition or rates of reactions for instance. Hence, chemical studies under such field may include the use of exponential function A = A0*e-kt where ‘A’ stands for the element concentration or amount at any time ‘t’

Wednesday, July 24, 2019

Human Resource Management, Reflective Report Essay

Human Resource Management, Reflective Report - Essay Example Thus, this writing is both a reflection of personal experience and also a processing phase where what I have learned during the semester is linked to the situation. The definition of social responsibility has evolved over time. "Concern for business to contribute towards social prosperity has always persisted since the days of Aristotle who reckoned the need for business to reflect the interests of the society in which their operations are based" (Masaka, 2008 as cited in Solomon, 1999). As learned in the lecture, in 1953, Howard Bowen describes it as "the obligations of businessmen to pursue those policies, to make those decisions, or to follow those lines of action which are desirable in terms of the objectives and values of our society" (Bowen, 1953 as cited in Barry). I can relate this level of social responsibility to what a particular book describes as "doing at least some good" (Kotler, 2005). I can say that it has evolved over time, with an ever increasing responsibility on the part of the corporation. In the 1990's, the definition was notches higher that just doing something good for the community. Carroll says that "CSR at its core, a ddresses and captures important concerns of the public regarding business and society relationships" (1999 as cited in Barry). ... This definition, for me is a more active one. And this reflects the greater responsbility being passed on to the business industry. This definition also regards employee improvement. Thus, corporations are expected to protect and further the good of their employees. Social responsibility is always associated with the ethical standard that the company upholds. "Ethics is the discipline that examines one's moral standard or the moral standard of the society. It asks how these standards apply to our lives and whether these standards are reasonable or unreasonable, that it whether they are supported by good reasons or poor ones" (Velasquez). There are various ethical theories: the teleologial, deontological, and virtue ethics. Theological philosophy "derives duty or moral obligation from what is good or desirable as an end to be achieved" while deontological philosophy "holds that the basic standard for an action's being morally right are independent of the good or evil generated" (Encyclopdia Britannica, 2010). Working at the Dubai World Trade Centre as a Sales Manager made me experience a violation of deontological ethics. My director is very hard to work with and she only wants people to work her way. She was always rude and arguing on everything which made me feel not confident at all and as a result I decided to move to another department. With the course lesson, I just realized that I made the right decision of leaving the department as my Director does not observe either corporate responsibility or ethics. I would only be consenting to her unethical behavior if I had decided to stay. I observe many companies who are only driven my the profit motive so that they ignore corporate responsibility: both to their employees and to the society. One

Tuesday, July 23, 2019

Chinese Students Enrolled in Hospitality and Tourism-Related Essay

Chinese Students Enrolled in Hospitality and Tourism-Related Programmes in the UK - Essay Example This research will begin with the statement that there is a huge contribution of international students in the income and prestige of individual universities of U.K. and other Western countries. Despite the developments, there is little research done on the progress and achievements of international students. It has been observed that students mostly migrate from countries like China, India, and U.A.E etc. to Western countries like U.K. and U.S.A. in search of higher studies and better career objectives. Studying abroad is very challenging and exciting during college years. Students get the opportunity to learn different languages and experience the different type of cultures. Students can enhance their knowledge and clarify their career directions by studying abroad. The developing countries like China and India follow the traditional method of education, which does not emphasize on the student’s career perspective appropriately. The educational system in U.K. is distinct bec ause the universities not only emphasize on theoretical subjects, they also focus on practical implications of the theories, which helps students to enhance their future endeavors. In 2010, AGCAS received funding for several pilot projects that allowed better links with U.K. along with alumni’s and employers in order to build successful employment relationships with international students. Universities of the Western countries majorly focus on the career and entrepreneurial ambitions of students. It is essential for colleges to have a proper understanding of the existing job market and prepare students accordingly. With the help of abroad studies, students can gain international experiences and develop their career aspirations. This research interviews Chinese students, who are currently enrolled in hospitality and tourism-related programmes in the U.K. The essay discusses the future career planning of Chinese students at a higher education facility in the U.K. and the respon sibility of the institution towards the management of employability. Studying in a different country is an extremely rewarding and exciting experience. According to famous theorists Archer and Davidson, the value of international experience is not just limited to learning of foreign language; the value of the experience is mainly determined from the ability of a person to distinguish the personal issues and business between his own country and the foreign country.

Monday, July 22, 2019

Electronic security Essay Example for Free

Electronic security Essay Electronic security is defined as any tool or technique that is used purposely to protect systems information assets. E-security is very valuable element in e-commerce since it adds value to the computer network as it composed of both soft and hard infrastructure E-security has been a matter of debate and it has been scientifically argued to be of great importance to economic development as it aid efficient trade and commerce. E-security has enhanced safe transaction and this has enable customers needs to be taken care off. Through e-security market place has expand since on line is very vital in that it enable many customers to be access to safe markets.   Computer security systems enhance effectiveness, efficient, satisfaction of customers. E-security systems also aids proper decision making concerning security susceptible situations through user interface design (Marco, 2003) E-security has been considered to a fundamental aspect in ensuring that technology benefits an organization in bringing both social and economic development. Development of on line environment has the impact of creating trust amongst its users and this has been taken by many organizations as a priority in order to gain competitive advantage. (Marco, 2003)   Goals of the study of an academic study Security has been subjected to various studies because of the fact that it aids in organization operations. It has been viewed by government entities as an idea of great demand that should be given priorities. The academic study by the Carnegie Mellon University was conducted to ascertain the level of security that can be derived from use of e-security in any given transaction (Marco, 2003) Goals of the private organization study On the other hand, a private organization study was conducted with almost similar goals to the former i.e.   The aim of ascertaining that there is protection of attributes of information security. These attributes include confidentiality, availability and integrity (Marco, 2003). It was also conducted with the objective of factors that can lead to failure of e-security in organizations either through poor planning and design or   overall complexity of electronic security architecture that are concern with sustaining the above attributes. It is vital to comprehend that proper security process encapsulates and consolidates the various processes in an organization such as detection, prevention and recovery of information and other relevant data. .Reasons for conducting the study The academic study was conducted with the aim of ascertaining the methodological approach that can be adopted by organizations and other business institution when assessing the level of competency that it poses in implementation of e-commerce in presence of e-security. To analyze how organization can be effectively and efficiently formulate electronic security and electronic commerce strategies to enhance proper functioning of the organizations To enable the organization to understand the factors that contributes to wide spread of e-security and electronic commerce in the global economy. The study was conducted to articulate major variables that bring about extensive use of the e-security by the business organizations. To compare electronic security, electronic procurement, electronic commerce, payments systems and electronic portals. This is to ascertain the influence that these aspects have brought in terms of global growth in economy. To comprehend and articulate the strategic implications of electronic security on private, public and civil organizations have been able to reduce risk associated cost and how market transactions have been carried out efficiently. It was done to draw inference on the impact of technology and faster flow of information on business transactions. To assess the available options in which e-security can be adopted as a tool for achieving organization goals through proper management strategies To monitor and evaluate e-commerces impact upon current global business   Transactions, technologies and public policy as related to electronic commerce strategy and new technical innovations. Type of data collected The data was collected during the academic study on e-security by the University was surveys from businesses and households on the importance and use of electronic security and ICT in general. The information collected was mainly pertaining trust on IT security. Specific question were being asked concerning the way different households perceived the importance and barriers to Internet commerce. The data collected depends entirely on the traditional strengths of the already collected data which was being used as secondary form of information.   The data collected concerns trust and security of technology services which been employed currently by many organizations. The report that came out of the study was an official data and semi-official data. Both types of data feature the trust that electronic security should be vested with. The official data carries the proposed questions that should be put into consideration before implementing any type of electronic security .How was data collected The data was collected in controlled experiment set up where students who used to attend introductory level business class were the main subjects.   The University employed e-learning package when conducting the study due to the fact that Internet was available. They were randomly assigned certain conditions that were required to follow. Before the actual experiment been conducted students were asked to fill the questionnaire that carries information concerning the demographic profile and other paramount features.   The questionnaires were well validated in order to give correct measures of performance avoidance and any kind of reluctance that the students portrayed (Marco, 2003) Research Questions OF ACADEMIC STUDY The following are common questions that were asked when conducting both studies and they cover important aspects of electronic security and to manage upon its implementation in the organization. These includes policy frameworks, principles, integration with management procedures and more so the significances to total quality management in an organizations. The questions which were asked during private organization study include; What are the some of the principles that influences the transition of electronic security? In what can enterprise security framework enhance the effective administration of electronic security in an organization? In what way can electronic security management be significant aspect to total quality management and enterprise strategic management model? Research questions of the private organization study On the other hand questions which were asked during academic study on electronic security included; In your opinion, what are the significant differences between different ways of electronic payment? What are some of the organization where electronic security has been used extensively? What are safety services been offered electronic security? Instruments used when collecting the data   When conducting the study, the University used very powerful machines such as computers (Intel Pentium 4). The decision made on the use of these computers when collecting data was based on the physical accessibility barriers of the computers and their memory that could make the work of the student very easy. They collected packet traces for each of the experiment and these traces carried data that allowed the group to analyze control packets (AlAboodi, 2003). Results of the study After conducting the study, what came out clearly was the fact that e-security and other web service technologies have had a far-reaching influence on business operations in organizations. Web services and electronic securities have enable organizations to carry out the transactions without the human intervention. It has enable data and applications to flow in without being monitored by the human being. It was also noted that electronic services can be put in place in wide variety of architectures hence can co-exist with other technologies. These services can be adopted in an evolutionary manner in absence of main transformations to legacy applications. Furthermore, it was realized that challenges posed by security cannot be avoided. From the study it was discovered that there exist difficult issues that an organization should put into consideration before implementing any electronic security. These include; Lack of confidentially and integrity of data that depend upon electronic security for its transmission. Service to service transactions are not being trusted by many business organizations due to lack of confidentiality. Availability in the face of denial of service attacks that exploit vulnerabilities unique to Web service technologies, especially targeting core services, such as discovery service, on which other services rely. Functional integrity of electronic security has been subject of debate in many organizations due to the fact that it is not been trusted by many organizations (AlAboodi, 2003). Results study of private organization study The end results of private organization study conducted on electronic security was that improved security is very important to organizations since it adds value to the organization. These are achieved by use of electronic security to enhance good interaction with the potential traders across the globe. Through use of electronic security organizations have been able to gain competitive advantage over their competitors because they are able to maintain closer customer relationship. From the study conducted, it can be concluded that proper employment of electronic securities enable companies to improve their reputation which in turn helps to maintain and retain customers (AlAboodi, 2003) The results obtained from the studies conducted have a very practical value in the sense if a company put in place a well functioning electronic system; it is a position to make a lot of sales. These is as a result of good maintenance of potential customers by the virtue that safe transaction are been carried out between the customers and the organization. If information security and electronic security is well managed, it results less costs of operations been incurred. In addition, electronic security is the basis for healthy foundation for implementation of good business structures and other vital frameworks which are factors that fosters economic growth been experienced in the organization These include Total Quality Management(TQM) and Enterprise Resource Planning(ERP) (AlAboodi , 2003)