.

Monday, February 25, 2019

Conflient

In the textbook, the authors state, secret approval occurs when deuce or more than passel agree subconsciously to drop or deny virtu exclusivelyy existing state of aff radiates or situation (p. 44). This is somewhat contrasting than an early(a) description of collusion from the investments application (where collusion signifies insider trading between parties, which is illegal and immoral). In our encroach definition of collusion, we be signifying a state of affairs where people do non recognize a reality that is readily app arnt to other people.This erect take an unlimited amount of forms. For example, in a family setting, the larger family may subconsciously agree to avoid discussing or helping another family phallus with a substance abuse problem. In a lockplace setting, a top-performing employee may commence an infectiously interdict attitude and regularly repose co-workers through verbal aggressiveness. In these scenarios, the reality that is obvious is ov erlooked because it is both perceived as easier to ignore the real problem or because of military unit or status income tax returns.When collusion occurs, a conflict (which may return begun as a relatively minor paying back) evoke grow into a life of its own. The conflict hence becomes part of a persons identity and is continued subconsciously to benefit that identity. So for instance, the negative and verbally aggressive co-worker may develop some role of accepted identity. For example, people may say, oh, that is Pat just organism Pat. This fictional character of identity is then employ to hide step upside(a) the problem that is subconsciously avoided. point 2 Staw, Sandelands, and Duttons threat-rigidity cycle is explored in the text on pp. 6-70. The cycle works in this order. First, when individuals feel threatened, they experience and annex in stress and anxiety. Second, this increased stress and anxiety fosters emotional reactions exchange adequate to(p) fear, anger, and physiological arousal. Third, these emotional reactions result in restricted information treat (i. e. , an inability to view the situation at roll in a composed manner) and constriction of behavior (i. e. , we ar unable to answer a full range of appropriate behaviors mentally due to our emotions taking over).As we discussed in Chapter 2, we be essentially flooded with emotion, a good deal leading to some type of knee-jerk reaction that in turn leads us to rely on our in haste made (and much in lay give away) ascriptions. Now, the threat-rigidity cycle can take cardinal different routes. First, if habitual responses (e. g. , verbally attacking the other person, avoiding the situation, stonewalling in silence, etcetera ) do happen to be appropriate, the results will be incontrovertible and we argon more prone to rely on this habitual response in the future.Conversely, if the habitual response is inappropriate, the situation will consequently worsen and the perc eptual experience of threat, stress, and anxiety cycles back all over again (i. e. , we return to the early stage, thus the cycle). Because the threat-rigidity cycle underscores our tendency to fall back on habitual responses and ascriptions when confronted with a threatening situation we do consider these as trained incapacities ( put one across pp. 68-69). Trained incapacities atomic number 18 important because we become so intumesce trained (subconsciously) in our knee-jerk reactions that we hope we understand what is coming next in the conflict.Human beings famously believe that we can predict others behavior, but in reality, we are actually bad at it. So what happens is that we become blind to the nuances of a particular conflict situation (often due to the emotional flooding cited above) and then rely on our standard reaction (i. e. , our trained incapacity) that we apply it whenever we are upset. This makes trained incapacities hard to detect, and in turn makes trained incapacities a real important aspect of behavior to understand, both for ourselves and for others. head word 3The confrontation episodes supposition outlined on pp. 29-31 is a good guide in galore(postnominal) situations for us to go through a sense making process regarding conflicts. Of course, if it was fail-proof, we wouldnt need the rest of this course. The theory, in general, explores co-created rules of conduct that are implied in relationships (i. e. , our generally agreed upon rules of engagement). My hope here is that you are able to frame a conflict that you have had in a meaning(prenominal) way with this guide. Naturally, it will be enlightening for umpteen of you or fertilize you a new perspective.Conversely, it may already inform some of you as to what you already know or may serve as sustenance that you did topics right in a conflict. I wont rehash the terms that were in the guide in each step, but I do want to acknowledge the critical importance of underst anding the options we are left with at the end. First, reaffirmation is a good outcome because the parties reaffirm importance of rule being interrogativeed (but as a side note, may simply do this to avoid conflicts. On the other hand, an outcome with no answer leads us toward a path where conflict is continued and may brandish.Legislation and reaffirmation may serve as the two most positive outcomes, in my estimation. I say this because in legislation, parties rework or re-explain the rule in interview, coming to a shared, agreed upon meaning for the rule. Also, in reaffirmation the parties reaffirm importance of rule that is being challenged. This then provides a clear understanding (hopefully) of what that rule entails. This is a classic example of why conflict is often good, as it serves as an opportunity to clear the air about simple misunderstandings that can fester into giant problems rapidly. QUESTION 4Central to this question are attribution processes my overall goal w ith this question was to influence how intimately you could explain the interactions of these processes as they relate to conflict. Overall, these processes included how dispositional or situational factors are utilize by people to draw conclusions about their own behaviors and the behaviors of others, the of import attribution error, and the self-serving bias ( ancestry on p. 61 through the middle of p. 62). Then, beginning at the bottom of p. 62, Sillars notes that attributions influence conflict in at to the lowest degree three major ways.First, due to the self-serving bias, people are more likely to attribute negative effects of conflict to partners rather than to themselves. This heightens impudence of others as negative effects increase, leading to distributive strategies that are alter to conflicts. Second, again because of the use of a self-serving bias, people often value they use integrative strategies man others use distributive or escape evasive actions. This leads people to believe they are doing more to resolve the conflict than others are, while this may not actually be true in reality.Third, the fundamental attribution error heightens conflict by encouraging people to see others behavior as planned and intentional (negative attribute) and their own behavior as driven by the situation at hand (positive attribute). In bypass, we believe act socially desirable in conflict and others act in more negative ways, ground on these attribution concepts. It is also vital to note that the self-serving bias and fundamental attribution error are impacted by perceptions of other peoples gender, ethnicity, or other demographic traits and that these two elements are also evident in our relationships with people we already know well (i. . , like the adage that suggests people are often well informed and well biased). Lastly, on p. 64, the authors ingeminate three propositions in this arena of research regarding conflict (1) people conduct conflic t strategies establish on the attributions they make regarding the cause of the conflict, (2) biases in attribution processes tend to lead to noncooperative modes of conflict, and (3) the choice of conflict strategies influences the likelihood of conflict resolution and the degree of satisfaction with the overall relationship.The correct answer here is really more of a judgment of how well I felt you depict the associated concepts and findings above more so than a judgment of whether or not each and e really piece of information above was provided in your response. QUESTION 5 This response is fairly cut-and-dried, if you will. The procedure I was look at here is in Exhibit 4. 1 (pp. 128-131). In your response, I was hoping to see a full discussion each of the 5 questions as they associate to your example than a quick rundown of the selections you made.The answer to each question then guides you a pine the model, ultimately leading to a recommended or cocksure conflict style. So in reality, this response had dozens of correct responses based on where the style selection tree led you to. Lastly, I was looking for you to evaluate the quality of the style (or styles for some of you) that you were guided to in your example. Would it have worked out in your estimation? Did you try that style (without knowing this information, of course)? QUESTION 6After a fairly thorough discussion of conflict styles in Chapter 4 of the text, the authors describe pairings of conflict styles and how they interact with one another (section 4. 5 on pp. 123-124). They mention, that some conflict style pairings are asymmetrical mannikins that did not fulfill each other, such as a demand (compete) / withdraw (avoidance) pattern, a supervisor / subordinate pattern at work, or a competing / collaborating pattern (which interestingly has great potential to work well to fetchher).While at freshman many of these styles seem unhealthy, leading us to believe they are unstable, some are actually quite stable in the short term (e. g. , one dominant role/one submissive role). Although it is noted that these roles may not always be stable in long run due to unhappiness among the submissive individual. Likewise, examples of asymmetrical patterns were also noted, which we often believe are stable because of agreement among the individuals.For instance, a relationship often has two avoiders that facilitate conflict denial/collusion, two collaborators that are more productive, but are not perfect, or two competers that often beef up a cycle of escalating conflict or reach a stalemate. What we can see from both symmetrical and asymmetrical patterns is that both types of patterns can be either healthy or unhealthy based on the setting in which they occur or the type of pattern being used in other words, the pairing of styles is not a way to look out the health of a relationship.Symmetrical patterns of two competers may be great as workout partners, but bad as romantic p artners. As many of us know, a competer and an avoider often work poorly because of the attack/ climb-down pattern, but a competer and a collaborator may work out wonderfully because the book notes how competers (that distributely air out concerns) give collaborators tools to work with to find a win/win solution in many cases. QUESTION 7 This final question provided an applied conflict concern scenario that revolved around the use of re underframe/ phone number inning plays in the textbook (p. 9 through p. 92). Just to be clear, the discussion of close in in Ch. 2 (pp. 57-59) is secondary for this question and was not the intended area of focus. In other words, I am seeking explicit reframing/issue framing tactical manoeuvres that would help to resolve the issue at hand (pp. 91-92). That is not to say the definition and discussion of framing in Ch. 2 is not important in fact it is vital to acknowledge that conflict frames are a cognitive structure based on anterior experience, which guides our interpretation of an interaction or event (p. 57).So in other words, framing provides the perceptual framework for how we view the conflict itself and the people involved. This is precisely why I created two groups of people in this fictional question that are affiliated with truly different organizational in-groups so it is expected that the control and gross revenue person will have very (or use) different frames, based on what is happening. So this creates a scenario where we must reframe to be able to earn anywhere in a conflict setting, otherwise we will forever run into the issue of two people working in two different frames.Reframing/issue framing tactics are then a part of a dance (p. 90 top). Because each reframing/issue framing tactic will likely produce a different outcome, in that respect is more than one right answer here. To be clearer, a correct answer here is one that explains a reframing/issue framing tactic and reasonably explains why that ta ctic would make sense to use to struggle the conflict in the hypothetical scenario. With that being said, here a a couple of(prenominal) thoughts that I had regarding each reframing approach.Umbrellas This approach would seem to work poorly here, as the gross sales supply member already believes the accountant is using this tactic (i. e. , sales person believes the accountant is jealous and is using this petty thing to air jealousy) Issue Expansion This is an interesting approach overall it is high-risk, high-reward in nature. Given the status of the growing in-group nature of the conflict, I would think the issue expansion approach may actually serve to drive a deeper wedge between the sales staff and the score department.I am open to different interpretations, but this appears to be the most likely outcome. Negative interrogation This may provide some traction toward conflict resolution. For example, if the sales staff member is convinced the accountant is jealous of their s uccess, perhaps they need to expand on that thought as it is very vague. Also, it could be asked why the sales staff avoided phone and email communication. It may have simply been a case of having a viable excuse for not replying rapidly, instead of the accounting departments perception of ignorance/avoidance.Likewise, the sales staff could ask why did you call out someone in a face-damaging way? The answers here may get the two groups and the two main conflict parties on the right path. Fogging On one hand, fogging may be dysfunctional as it opens up the room access for avoidance issues. However, it also may create a situation where the two parties and the two in-groups can simply work towards the issues that relate to company policy here. Conflict is rarely forgotten, but if the accounting department and sales staff find a way to change the protocol to take for a smooth work environment, time may heal some of the wounds.Fractionation Although more than one approach can be right here, as I care more about the way you apply a solution to the problem, fractionation jumps out as the most helpful tactic at first glance. Here, both the accountant and the sales person (or their consummate departments) may be able to break down the larger issues into fractioned pieces to overlay individually. So this means instead of looking at the big issue (inter-group conflict between sales staff and accounting department), the parties would look at each component.One thing the book does not mention, and this is generally true of all textbook conflict resolution tactics, is that fractionation would probably be very time consuming (especially if you are talking about long-standing, deeply inhering conflicts). However, this is sometimes the only way to put conflicts to rest which is something that should be very appealing for two departments in an organization that really need to befriend with each other. The long term gains would seem to outweigh the short-term productivene ss losses.

No comments:

Post a Comment