Question

In: Economics

How might you try to detect if your employee is gaming the incentive system? Try to...

How might you try to detect if your employee is gaming the incentive system? Try to think of concrete examples.

Solutions

Expert Solution

No incentive program is perfect and, over time, certain employees figure out few ways around the system to “earn” the incentive. For example:

1) The employees ring up single items as multiples trick. At a grocery store checkout, the cashier entered a fresh bagel purchase as 12 separate items instead of 1 item (a dozen). By doing so the cashiers received an incentive based on average transaction ring times. With changing of transactions the cashier improves their average. In such a scenario you have to think like an insider and play “what if” with your program, thus if you were the cashier at the grocery store who was provided incentives for average items rung up per minute, what you would do for improving the average. Although gaming cannot be 100% avoided however can be planned for and managed to detect the gaming of the incentive system. Moreover play fair and keep the rules simple

2) When the owner had noticed that complaints of the customer about long wait times were increasing but internal reports were improving of service time, this inconsistency must trigger further investigation. These should be monitored and, with the trigger in place, the owner know when things need recalibrating


Related Solutions

How does an incentive system work in an organization? Please explain how incentives can influence employee...
How does an incentive system work in an organization? Please explain how incentives can influence employee performance. The Return on Investment (ROI) is a key metric that's used to measure performance. How does it help company leaders make decisions?
1. How might an organizational try to change its organizational culture?
1. How might an organizational try to change its organizational culture?
1. How might the incentive fee of a hedge fund affect the manger's proclivity to take...
1. How might the incentive fee of a hedge fund affect the manger's proclivity to take on high-risk assets in the portfolio? 2. A hedge fund with $1billion of assets charges a management fee of 2% and an incentive fee of 20% of returns over a money market rate, which currently is 5%. Calculate the total fees, both in dollars and as a percent of assets under management for the following portfolio returns -5% 0% 5% 10% 3. A hedge...
How might a company try to weigh fairly the opportunities and risks of investing in South...
How might a company try to weigh fairly the opportunities and risks of investing in South Africa?
How do you detect billing scheme fraud
How do you detect billing scheme fraud
What is Social Engineering and how can you detect it.
What is Social Engineering and how can you detect it.
If you were presenting the strategic benefits of an ERP system and how it might improve...
If you were presenting the strategic benefits of an ERP system and how it might improve supply chain and working capital efficiency, what 3 features would you point to (and provide examples) in order to get your project approved?
How might Starbucks try to target those most likely to purchase a $5 coffee? How about...
How might Starbucks try to target those most likely to purchase a $5 coffee? How about a $2 coffee? How about an $8 coffee?
What is principle-agent problem? What is incentive system and how did that play a role in...
What is principle-agent problem? What is incentive system and how did that play a role in the Wells Fargo scandal of fake accounts?
In this assignment you are developing a fraud detection system to detect fraudulent activities based on...
In this assignment you are developing a fraud detection system to detect fraudulent activities based on this Decision Three. Your program receives a comma separated transaction log with the below format as its input: [amount],[# of transactions in last day],[area code],[transaction time] Your program should use string operations to decompose the transaction log and store its elements in variables of appropriate types. Then, based on the values of those attributes and the decision three, it attaches either a ",fraud" or...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT