Employee Attrition and Retention Strategies i n Amara Raja Batteries Limited: An Empirical Investigation
Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 6
Abstract
Effective human resource management must be practiced at both strategic and functional levels because the HR strategy should evolve from a transactional support role to partnering in the organizations business stra tegy. The HR managers need to apply monetary retention strategies tools such as - performance linked incentives, rewards, increment in salary. The non - monetary retention strategies tools are to be designed as per the requirements such as - job enrichment, pa st track career program (lower level), training/coaching, work hours’ flexibility, quarterly contest, hi - potential program, fun at work, one on one connect, regular round table discussions between employees and their respective Managers
Authors and Affiliations
K. SreenivasMahesh
Enhanced Scalability In Social Network Application Using Presence Service
Social network applications have become more and more in style on mobile devices. A mobile presence service is an important element of a social network application as a result of it maintains every mobile...
Inventory Model (M, R, T,) Continnuos Lead Times, Exponential Backorder Costs And Random Supply Series 3
We derived the inventory costs in series 1 (Omorodion 2014) costs for the inventory model (M.R.T) in which the model has constant lead times, quadratic and exponential back order costs and random supply. In series 2 we...
Impact of Public Expenditure on Economic Growth in Nigeria
This study investigated the impact of public expenditure on the Nigerian economy. This was done by utilising economic data available in statistical tables. The data used for this study are G...
Empowerment of Women through Self - Help Groups in Tiruvannamalai
Micro - finance through Self Help Groups (SHG) has been recognized internationally as the modern tool to combat poverty and for rural development. When micro - finance is extended t o people, e...
Computer Security and Intrusion detection System - A Data Mining Based Approach
With an increased understanding of how systems work, intruders have become skilled at determining weaknesses in systems and exploiting them to obtain such increased privileges that they can do anything on the system. Int...