Promoting the best as an incentive : reply to Pluchino et al . on the Peter Principle

نویسندگان

  • Erik J. Olsson
  • Carlo Proietti
چکیده

The Peter Principle states that employees tend to be promoted until they reach their level of incompetence. In a sophisticated simulation study, Pluchino et al (2010) confirmed a version of the principle. However, they also noted that their model has the counterintuitive consequence that “the best ways for improving the efficiency of a given organization are either to promote each time an agent at random or to promote randomly the best and the worst members”. We argue that what promotion rule is used can in general influence employee productivity (which is here seen as part of competence). Accommodating this psychological aspect of promotion is noted as an open problem by Pluchino et al. Using an amended simulation model we verify that if the incentive induced by promoting the best is strong enough, then that strategy will be optimal. In a final simulation experiment we consider the effect on the efficiency of an organization of using “double standard” promotion strategies, i.e., strategies that depend on the official promotion rule being different from the de facto promotion rule. We show that double standard promotion strategies can be highly efficient, although we also note that in using such strategies the employer may take an unacceptable medium to long term risk.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Radically Questioning the Principle of the Least Restrictive Alternative: A Reply to Nir Eyal; Comment on “Nudging by Shaming, Shaming by Nudging”

In his insightful editorial, Nir Eyal explores the connections between nudging and shaming. One upshot of his argument is that we should question the principle of the least restrictive alternative in public health and health policy. In this commentary, I maintain that Eyal’s argument undermines only a rather implausible version of the principle of the least restrictive alternative and I sketch ...

متن کامل

Environmental gamma radiation: a comment (Letter to the Editor)

Editor, I read the recent publication by Toossi et al. with a great interest (1). Toossi et al. concluded that “Average gonad and bone marrow doses for North Khorasan, Boshehr and Hormozgan provinces were less than the corresponding values for normal area (2).” There are some facts on this report to be concerned. I agree that the detected levels might be high in the mentioned area, but th...

متن کامل

The Role of Cyberspace Use on Lifestyle Promoting Health and Coronary Anxiety in Young People

Objective: Today, one of the most important issues facing the young generation is cyberspace and the extent of its use, which unfortunately has increased irrationally with the coronavirus epidemic and has caused lifestyle disorders that need to be properly identified. Therefore, the present study aimed to identify the role of cyberspace use on lifestyle promoting health and coronary anxiety in ...

متن کامل

How Can a Global Social Support System Hope to Achieve Fairer Competiveness?; Comment on “A Global Social Support System: What the International Community Could Learn From the United States’ National Basketball Association”

Ooms et al sets out some good general principles for a global social support system to improve fairer global competitiveness as a result of redistribution. This commentary sets out to summarize some of the conditions that would need to be satisfied for it to level up gradients in inequality through such a social support system, using the National Basketball Association (NBA) example as a point ...

متن کامل

Some observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)

Over the last years‎, ‎the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. ‎Security and efficiency could be the main challenges of that communication‎‎. ‎‎On the other hand, ‎ authenticity and confidentiality are two important goals to provide desired security in an information system‎, including IoT-based applications. An Authentication an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017