Monday, September 30, 2019
An Analysis of George Orwellââ¬â¢s Essay Why I Write Essay
George Orwell and Joan Didion, in their essay, ââ¬Å"Why I Write,â⬠imply that writing has affected each author to abdicate adversity and to accept failure. Orwell and Didion support their implications by explaining how each author attempted to embrace the abstract ideas in writing, but learned to view themselves as mediocre writers, neither good nor bad, whose self-reflection in writing produced a solemn atmosphere. Their purpose is to educate the reader on relevant motives and authenticity associated with writing to help them conceive a profound piece of work through self-reflection. Both authors establish a formal but moderately depressing tone, appealing to young Americans who hope to become writers. George Orwell, in the essay, ââ¬Å"Why I Writeâ⬠utilizes the rhetorical strategy of explanation in order to effectively deliver his message to the attending audience. Orwell, at first, introduces a statement about his childhood and his ambitious goals to become an inspiring writer. Suffering from depression and solitude during his adolescent years, Orwell often constructed solemn pieces of literature in order to reflect upon his current lifestyle. This idea of self-reflection assisted Orwell in becoming an exalt writer. Through exemplification, Orwell introduced the ââ¬Å"four great motives for writing.â⬠Orwell reflects upon the subject of sheer egotism, arguing that writers often write to be remembered. The author further elaborates on this idea, stating that serious writers care more about personal self-reflection than making money. In the motive of aesthetic enthusiasm, Orwell views himself as a moderate writer, illustrating how writers make their writing sound and look good by appreciating the aesthetics. The author eventually provides anà example for these motives, by appealing to the pathos in his Spanish-civil war poem, often concentrating on emotion and expressing remorse. Through explanation, George Orwell was able to effectively deliver his message to the attending audience. Joan didion, in the essay ââ¬Å"Why I write,â⬠utilizes the rhetorical strategy of explanation to appeal to her audience. Joan introduces her essay with the topic of self-reflection, by illustrating the act of saying I. In addition, Joan elaborates on this idea of self-reflection, explaining how writing allowed her to create a mind of abstract ideas. Similar to Orwell, Joan experienced several obstacles that impeded her writing. The author focuses on a particular issue, in which Didion became distracted while writing. The author reflects upon this idea, by providing an example of how her attention diverted simply to a ââ¬Å"flowering pear outside her windowâ⬠or the ââ¬Å"lights on in the Bevatronâ⬠while writing at Berkley. Didion additionally conveys her attitude towards these distractions, often wondering why such events occur. As a result, Joan often ponders upon the abstract ideas in order to enhance her writing. Through the use of explanation, Joan didion was able to effectively deliver her message to the attending audience. George Orwell and Joan didion, in their why I write, employ the rhetorical strategy of explanation in order effectively attend to their audience. Though each author provided examples in order to support their implication, their appeals to pathos and emphasis on pondering the abstract ideas in writing further attracted their audience.
Sunday, September 29, 2019
Texting vs. Calling
ââ¬Å"Texting vs. Callingâ⬠The evolution of cell phones has changed the world socially. The creation of cell phones began in the 1840s, but the first phone did not come out publically until 1977 (ââ¬Å"Cell Phonesâ⬠). Majority of people today could not go a day without their phones. Now that phones are more portable, lighter, smaller, and easier to use, more and more people are upgrading and getting newer phones. Since the 1990s, cell phones have added new features to expand the way we communicate with others.With the new cell phones today, a person can do more than just make phone calls, he or she can text, instant message, and send emails. The two most common forms of communication through a cell phone are making a phone call and texting. Despite the fact that texting and calling have many similarities, they have many differences. Texting is when a person types a short message on a cell phone and sends it to another person with a cell phone. Texting allows more conveni ence because it is a faster way to get in touch with someone.There are a lot of people who will not even call on their phones, but will respond to a text immediately. Texting is more private. When a person is in a public place, he or she will not disturb others and no one would know what his or her conversation is about. An individual can also send a picture through a text. For example, instead of describing an item over the phone, a person can send a picture. We can see many useful things that texting bring to us. While texting, we can think clearly before we intend to say something.Once a person says something while on the phone, it is out in the open and he or she cannot take it back. While texting give us some time to consider carefully before saying what we think. This can cause less drama and fights. It is also more difficult to start a conversation by calling every time. Sometimes, texting will be good for explaining or saying sorry. Having conversations can either push peopl e apart or bring people together. Depending on how a person says it and what kind of tone he or she uses, results in the way others may react.As if cell phones werenââ¬â¢t already pricey enough, the cost to have text messaging and calling features can put a dent in his or her pocket. That brings up another difference between texting and calling. Texting on the mobile phone is less costly than calling. Students and younger teenagers prefer paying for text messages rather than phone calls, especially when theyââ¬â¢re low on money and do not have a job. Unless a person has unlimited texting, it can range from ten cents up to about twenty-five cents a message. Calling can be between one dollar to a dollar and twenty-five cents.It all depends on the phone plan he or she chooses, but the cost of calling is still more than the cost of text messaging. Even when researching the statistics of calling and texting, people can come to the conclusion that more cell phone users choose textin g over calling. More and more people agree that texting is more fun and easier than calling. All of this texting activity has come at the expense of voice. Last year, teens texted instead of calling because it was fun. Now, more teens consider texting faster and easier than calling.Voice activity has decreased fourteen percent among teens, who average 646 minutes talking on the phone per month. Many adults over the age of fifty-five, on the other hand, prefer to talk instead of text. It is said that they communicate by calling more than teens do. If it seems like American teens are texting all the time, itââ¬â¢s probably because on average theyââ¬â¢re sending or receiving 3,339 texts a month. Itââ¬â¢s amazing at how many people use texting more than calling, but sometimes calling can do more than texting can. Texting can be short and sweet; however, most people think calling is more meaningful.Someone can pick up the phone, and say, ââ¬Å"I love you, momâ⬠or ââ¬Å"I will have dinner at home, Dad. â⬠Just by hearing his or her voice, the parent will feel more satisfied compared to reading a text message. By calling, cell phone users can talk with their friends comfortably and transfer their emotions to their friends naturally. Although both have their own value, I believe that calling makes people closer than texting. Besides, people just call for 911. If they try texting a message to 911, it wonââ¬â¢t quite work out like they thought. I will say that some messages you shouldnââ¬â¢t reply to.Some messages are sent just to deliver information that the receiver needs to complete a task or something simple as a greeting or a farewell. Also think about the elderly, they are not used to the new technology that the new mobile devices offer, so most likely text messaging will be out of the question for them. A lot of elderly people have bad vision and wonââ¬â¢t quite understand the different options and menus that a new mobile device has to offer. The simple task of texting could take them up to thirty or more minutes, and Iââ¬â¢m sure this will become very aggravating.Cell phones can be very distracting. Both texting and calling while driving are dangerous, but texting is absolutely unacceptable and more likely to cause accidents. Cell phone users have to look down at the phone to text and call. While making a phone call, it takes less time to dial a number than it does to type out a sentence. Texting causes drivers to focus more on what a text message says rather than worrying about driving. Phone calls require drivers to focus on the phone to dial a number, but itââ¬â¢s not nearly as distracting as texting.Overall, there are different aspects to look at when choosing whether to call or text, but both are great ways to communicate through a cell phone. A text or call can let people know they are being thought about and send out a bit of emotion. They both have many similarities and differences, but I believ e the differences overcome the similarities and are more important. Works Cited ââ¬Å"Cell Phones. â⬠Cell Phone History. N. p. , 2008. Web. 03 Oct. 2012. <http://cellphones. org/cell-phone-history. html>. Texting vs. Calling ââ¬Å"Texting vs. Callingâ⬠The evolution of cell phones has changed the world socially. The creation of cell phones began in the 1840s, but the first phone did not come out publically until 1977 (ââ¬Å"Cell Phonesâ⬠). Majority of people today could not go a day without their phones. Now that phones are more portable, lighter, smaller, and easier to use, more and more people are upgrading and getting newer phones. Since the 1990s, cell phones have added new features to expand the way we communicate with others.With the new cell phones today, a person can do more than just make phone calls, he or she can text, instant message, and send emails. The two most common forms of communication through a cell phone are making a phone call and texting. Despite the fact that texting and calling have many similarities, they have many differences. Texting is when a person types a short message on a cell phone and sends it to another person with a cell phone. Texting allows more conveni ence because it is a faster way to get in touch with someone.There are a lot of people who will not even call on their phones, but will respond to a text immediately. Texting is more private. When a person is in a public place, he or she will not disturb others and no one would know what his or her conversation is about. An individual can also send a picture through a text. For example, instead of describing an item over the phone, a person can send a picture. We can see many useful things that texting bring to us. While texting, we can think clearly before we intend to say something.Once a person says something while on the phone, it is out in the open and he or she cannot take it back. While texting give us some time to consider carefully before saying what we think. This can cause less drama and fights. It is also more difficult to start a conversation by calling every time. Sometimes, texting will be good for explaining or saying sorry. Having conversations can either push peopl e apart or bring people together. Depending on how a person says it and what kind of tone he or she uses, results in the way others may react.As if cell phones werenââ¬â¢t already pricey enough, the cost to have text messaging and calling features can put a dent in his or her pocket. That brings up another difference between texting and calling. Texting on the mobile phone is less costly than calling. Students and younger teenagers prefer paying for text messages rather than phone calls, especially when theyââ¬â¢re low on money and do not have a job. Unless a person has unlimited texting, it can range from ten cents up to about twenty-five cents a message. Calling can be between one dollar to a dollar and twenty-five cents.It all depends on the phone plan he or she chooses, but the cost of calling is still more than the cost of text messaging. Even when researching the statistics of calling and texting, people can come to the conclusion that more cell phone users choose textin g over calling. More and more people agree that texting is more fun and easier than calling. All of this texting activity has come at the expense of voice. Last year, teens texted instead of calling because it was fun. Now, more teens consider texting faster and easier than calling.Voice activity has decreased fourteen percent among teens, who average 646 minutes talking on the phone per month. Many adults over the age of fifty-five, on the other hand, prefer to talk instead of text. It is said that they communicate by calling more than teens do. If it seems like American teens are texting all the time, itââ¬â¢s probably because on average theyââ¬â¢re sending or receiving 3,339 texts a month. Itââ¬â¢s amazing at how many people use texting more than calling, but sometimes calling can do more than texting can. Texting can be short and sweet; however, most people think calling is more meaningful.Someone can pick up the phone, and say, ââ¬Å"I love you, momâ⬠or ââ¬Å"I will have dinner at home, Dad. â⬠Just by hearing his or her voice, the parent will feel more satisfied compared to reading a text message. By calling, cell phone users can talk with their friends comfortably and transfer their emotions to their friends naturally. Although both have their own value, I believe that calling makes people closer than texting. Besides, people just call for 911. If they try texting a message to 911, it wonââ¬â¢t quite work out like they thought. I will say that some messages you shouldnââ¬â¢t reply to.Some messages are sent just to deliver information that the receiver needs to complete a task or something simple as a greeting or a farewell. Also think about the elderly, they are not used to the new technology that the new mobile devices offer, so most likely text messaging will be out of the question for them. A lot of elderly people have bad vision and wonââ¬â¢t quite understand the different options and menus that a new mobile device has to offer. The simple task of texting could take them up to thirty or more minutes, and Iââ¬â¢m sure this will become very aggravating.Cell phones can be very distracting. Both texting and calling while driving are dangerous, but texting is absolutely unacceptable and more likely to cause accidents. Cell phone users have to look down at the phone to text and call. While making a phone call, it takes less time to dial a number than it does to type out a sentence. Texting causes drivers to focus more on what a text message says rather than worrying about driving. Phone calls require drivers to focus on the phone to dial a number, but itââ¬â¢s not nearly as distracting as texting.Overall, there are different aspects to look at when choosing whether to call or text, but both are great ways to communicate through a cell phone. A text or call can let people know they are being thought about and send out a bit of emotion. They both have many similarities and differences, but I believ e the differences overcome the similarities and are more important. Works Cited ââ¬Å"Cell Phones. â⬠Cell Phone History. N. p. , 2008. Web. 03 Oct. 2012. <http://cellphones. org/cell-phone-history. html>.
Saturday, September 28, 2019
Wgu Nut1
Introduction to the Electronic Medical Record (EMR) Introduction to the Electronic Medical Record (EMR) Gary L Williams Western Governors University Introduction to the Electronic Medical Record (EMR) The new millennium has produced many changes in the world as we know it. Our national security which seemed to be impermeable has revealed its vulnerability to being breached. Remember September 11, 2001 when the hi-jacking of planes lead to the destruction of the Twin Towers in New York City, and severe damage the Pentagon in Washington DC.Now our Healthcare System has now moved into the information highway. How you may ask, through the introduction of the EMR. So will the EMR be safe and secure? Let us investigate. So just what is the EMR? There are many formal definitions but the one that stands out and will be used today is from the Healthcare Information and Management Systems Society (HIMSS). It states: The Electronic Health Record (EHR) is a longitudinal electronic record of pati ent health information generated by one or more encounters in any care delivery setting.Included in this information are patient demographics, progress notes, problems, medications, vital signs, past medical history, immunizations, laboratory data and radiology reports. The EHR automates and streamlines the clinician's workflow. The EHR has the ability to generate a complete record of a clinical patient encounter ââ¬â as well as supporting other care-related activities directly or indirectly via interface ââ¬â including evidence-based decision support, quality management, and outcomes reporting. (HIMSS) Within this definition there is a multitude of system components.Think of it like the multiple Introduction to the Electronic Medical Record (EMR) dividers that were found in the paper medical record. For instance, you may see headers like, medication record, order entry, nursing assessments, the plan of care, education, radiology, cardiology, etc. Under the medication tab la ys the eMAR, medication history, and reconciliation. Each band with the click of the mouse will open a new file within this record. The design is formatted to follow a systematic flow with check boxes, drop down lists, or free text space to document the patient findings, activities, and assessments.The EMR will have many benefits for the entire healthcare team and the patient. By development and design with the assistance of key personnel, the EMR should flow and make documentation easier. By having a standardized flow and options to document the standards of care, documenting should become easier and provide more consistency. Take for example a urine description. You may see for color description amber, yellow, red, clear, or tea. Then cloudy, turbid, clots, or mucous followed by malodorous, sweet, or pungent. This will provide a means of potential measurement for Evidence-Based Medicine (EBM).How many patients with UTI receiving Bactrim DS have amber mucous pungent urine on a GU u nit? Can you see the pattern? The EMR will assist in critical thinking as well. Your physical assessment for instance may be by body system or a complete head to toe assessment. These screens will assist the nurse in reminders of required documentation. The nurse may receive a task list for a certain procedure or required documentation of a high risk factor, such as fall precautions, to alert the bedside nurse or technician that the document is due or past due.Introduction to the Electronic Medical Record (EMR) The EMR will provide real time data and reports from various disciplines within the healthcare facility. For instance, a Vancomycin trough was ordered at 0700 and its 0900 and the IV medication is due. By selecting the laboratory tab your result will be there in front of you before the dose is administered. The same can be expected of radiology imagining results, EKG, stress test reports, a bedside capillary glucose test done by the technician. No more searching through multi ple computer systems or piles of lab results to find the data you need.The information is there and readily available. Healthcare providers have the penmanship of a deranged mad scientist. How often do you have multiple nurses trying to determine what Dr. Hyde just wrote? What if you guess wrong? Now you place that call to Dr. Hyde for clarification when you have a multitude of things to be doing. With Computerized Provider Order Entry (CPOE), no longer will guessing what was written be an issue. Standard order sets will be available with the opportunity to be individualized or modified from a pre-determined list of ommon orders for routine admission or for specific disease processes like the Acute Myocardial Infarction. Included may be diet, activity, vital signs, IV fluids, labs, EKG, PCXR, or consults. As touched upon earlier with the urine sample report, there is a myriad of potential data that can be extrapolated to form reports for research and to assist with the EBM. What is the average number of days for patients on the ventilator for June, 2011? How many patients in the rehabilitation unit have pressure ulcers? Maybe a nurse says to the unit manager that it seems like a large number of the patients on the unit have C- Difficile?A report can be run to show Introduction to the Electronic Medical Record (EMR) trends of the patients with this condition. Maybe itââ¬â¢s a hand washing issue or cross contamination from multi-use bathroom facilities. There are many opportunities that would at best have been difficult to track from the old paper medical record. Identity theft is rampant in this world of technology. How will the EMR be secured? How can the nurse access the EMR? Today home computers are almost essential. The same virus and malware that affect your home computer can infect the EMR if security is lacking.The Information Technology team will provide the overall security for the system by continuous upgrades to software like antivirus and firewal l protection. Each team member will be issued a unique log-in and password to access the EMR. This must be kept strictly confidential for the nurseââ¬â¢s protection. This secure log-in is like a finger print of the assigned user. When the EMR is accessed, there is a time stamp of what records were accessed, for what length of time, and by whom. A secure trail of entry into the EMR can be traced. What is the Personal Health Record (PHR) and how does it differ from the EMR?The PHR is essentially the same document that you would produce in the Physicianââ¬â¢s Office. The PHR can be completed online either through a Physicianââ¬â¢s Office or through an outside resource. Things that would be included in the PHR might be your name, address, telephone number, date of birth, and possibly the social security number. This record could also contain your Physicians name and phone number, the list of your current medications and dosages, a list of current and Introduction to the Electro nic Medical Record (EMR) past medical conditions, and passed surgical history.This type of a record is usually maintained by the patient themselves. The PHR will differ from the Electronic Medical Record in that the Electronic Medical Record is property of the Health Care facility and not the consumer. The personal health record becomes more vulnerable to breaches in security since it is maintained by the consumer. For example, I might give my sign on and password to my family or friend to input data for me. This obviously breaches ones security. This allows access to these individuals to alter ones personal health record at will.The website that maintains the personal health record may not be as secure as that of the Health Care facility. The Electronic Medical record is usually maintained by the healthcare facility, outpatient clinic, or Physicianââ¬â¢s Office. These healthcare facilities must maintain high security to protect the information within that medical record. In 1996 , Congress passed a law entitled The Health Insurance Portability & Accountability Act (HIPAA). This law was designed: -To improve portability and continuity of health insurance coverage in the group and individual markets. To combat waste, fraud, and abuse in health insurance and health care delivery. -To reduce costs and the administrative burdens of health care by improving efficiency and effectiveness of the health care system by standardizing the interchange of Introduction to the Electronic Medical Record (EMR) electronic data for specified administrative and financial transactions. -To ensure protecting the privacy of Americansââ¬â¢ personal health records by protecting the security and confidentiality of health care information. (James) The security and confidentiality are paramount. Fines are levied as a result of a breech to the HPPA law.There must be alerts to vulnerabilities, safeguards to help protect the EMR and the Information Technology team must be able to identi fy possible threats. Using an EMR (electronic medical record) has no absolute right and wrongs in either computer equipment or software for HIPAA compliance. Usually there are four areas to examine: -Physical Security ââ¬â can your computers with patient data be stolen? -User Security ââ¬â can anybody log on to the patient database? -System Security ââ¬â what happens on a hard drive crash? -Network Security ââ¬â can unauthorized persons outside your facility access patient data? Milne, 2006) Security is never easy to maintain; it requires continuous safeguarding. As a team we are all responsible to assist in the security of the EMR. Always log on and off when you are no longer Introduction to the Electronic Medical Record (EMR) using the bedside computer. Always check before charting that it is indeed you that is longed into the system and that only one patient record at a time is open for use. The EMR can be a valuable tool for Quality Improvement (QI). Through the design phase, a number of measurable data can be built into the EMR for report generation.If the team wanted to look at the number of times vital signs were not documented as dictated per Policy & Procedure. This data can be built into the system and reports run daily, weekly, or monthly. The same thing can be built to monitor for overdue or omitted medications. This can be further expanded to identify which team member is involved and to check for trends. Data may also be collected to support EBM. For example, tracking the effectiveness of two different antibiotic treatment regimens of a selected disease process may be used to support a change in the disease treatment (e. . antibiotic A showed improvement in five days where as antibiotic B showed improvement in ten days. ) Here again the possibilities seem endless. Think of the time savings for all the key people that would be required to look through endless paper medical records for this type of data collection in the paper medic al record. So how does the EMR come to fruition? It takes a large team of various specialties and specialists to develop the EMR. It starts with the Healthcare system researching and then purchasing the best system to fit the companyââ¬â¢s needs and requirements.Once purchased, the owner of the software will deploy a team of specialists that will assist the Healthcare systems team to design and develop the contents and flow of the EMR. The team includes senior management which will assist in the purchase and be the governing authority of the proposed Introduction to the Electronic Medical Record (EMR) work flow before implementation. There are many subdivided teams. Nursing will have Subject Material Experts (SME) that will be the voice to assist in the flow, wordage, and design of the nursing components of the EMR. The SMEââ¬â¢s will be from every department of nursing.From this group will be the Super User. The Super User will act as the cheerleader for the project developme nt and will be the main source for assisting with the Go Live of the EMR. The Information Technology (IT) will be a multi-tiered group ranging from System Support Analyst or the front line of communication, the Computer Programmers and System Analyst or the builders and troubleshooters, to the Project Managers or the supervisors of the IT team. Nursing will also have the Clinical Informatics Application Analyst who will be the voice between nursing and the technical side of issues, concerns, and development.The End User which is the front lines of nursing and everyone that will be using the system for documentation. And last but not least will be the Educators that will teach the system to the entire team. This is a rather large of individuals working as the voice of the EMR development and implementation. In conclusion, change will be rough at times but change is necessary for progression. Be positive and listen to the teams and the tips that are offered. Assist each other as suppo rt with the continued learning and development of the EMR. The Technology age is here and we should all reap the benefits of this endeavor.Remember how Florence Nightingale was the frontier to nursing as we know it. Well each of you deserves a pat on the back as you are the pioneers that have lead nursing into the technology phase of the Electronic Medical Record. You too are a part of nursing history. References HIMSS. (n. d. ) EHR Electronic Health Record. Retrieved from http://www. himss. org/asp/topics_ehr. asp James, R. (n. d. ) What is HIPPA? Retrieved from http://www. dhmh. state. md. us/hipaa/whatishipaa. html Milne, M. (2006, March 6). HIPAA in a ââ¬Å"Nutshellâ⬠ââ¬â Guidelines for EMR and Paper Medical Records Compliance.Retrieved from http://ezinearticles. com/? HIPAA-in-a-Nutshellââ¬âGuidelines-for-EMR-and-Paper- Medical-Records-Compliance&id=156737 Ten open ended questions. 1. When the EMR is first implemented on your unit, how can you assure the patient that you are competent in your profession? You will explain that you are a seasoned nurse and an expert in the nursing field. Today our facility is introducing the new EMR which will benefit you in the future. This will take a little more time for me to learn and I do not want you to feel like you are being ignored. I may have to ask you a lot of questions as I go through each section.Please feel free to ask me any questions or concerns that you may have. Our goal is your comfort and safety though the high quality of care. 2. On the day of Go-Live, how can your unit best assist you in providing support as you learn this new technology? My unit manager should over staff initially as we learn the new system. I can foresee the nurse being so buried in the computer that the delivery of care might be too slow initially. Having the extra staff will decrease the patient load and allow extra hands to assist with the delivery of care. 3. As you learn the new system there will be some anticip ated frustration.How can you divert this frustration so that your patient doesnââ¬â¢t sense that something is wrong? We will need to have the Super-User and Analyst available to assist us as problems or concerns occur. It is imperative that the bed side nurse remain positive an up beat as we learn. I suggest maybe huddles through out the day away from the bed side to discuss our concerns. We donââ¬â¢t want the patient to feel uncomfortable. 4. Your patient asks you why it is important to have the computer charting. Briefly tell me what you might say and why? The EMR is being implemented throughout the area as well as world wide.As you record develops, we will only need to verify some of your past medical history, allergies, medications, etc. These types of data will flow from one visit to another making you care easier as the data is readily available. No more waiting for old charts to arrive and thumbing through page after page of data to look for pertinent information. 5. Ho w do you perceive future benefits of an interoperable EMR? It will be possible in the future as the EMR progresses, that your hospital record, physician office record, out patient records, and pharmacy to communicate with each other.By doing so, some potential errors may be thwarted. For instance, maybe you are not able to recall all of your home medications and your consulting physician decides you need a new blood pressure medication. If the records could speak to each other then this physician would be able to see that you were already prescribed an antihypertensive medication or the pharmacy might catch the possible error. 6. Futuristically, letââ¬â¢s say you take a dream vacation to a foreign country. While on your visit you become ill and collapse unconsciously.How can the interoperable EMR potentially be a benefit in this case? If the system develops into a world wide communication link, then with limited data perhaps the hospital in the foreign country would be able to ac cess and utilize my EMR to provide answers in how to deliver the best possible care for me. So if I went in with a suspected ruptured appendix, by accessing my EMR surgical history it would be noted that I have had an appendectomy ten years prior so the focus could be directed at another possible cause. 7.Your patient states to you that she hates the computer and that it is the devils advocate. She is tearful and appears anxious. How might you handle this as you are in the middle of documenting in the EMR? You should stop what you are doing and maybe sit beside the patient and gently hold her hand and ask what seems to be troubling her? She might say she feels the nurses spend more time touching the computer and no time touching her, as you just did, and that we come across as cold and not caring. We need to realize that patient interaction is still paramount to the overall delivery of care.Take time to interact with the patient. Then step back and document; perhaps explaining what you are documenting and why it is important to her care. 8. What do you anticipate will be your plan of action when the computer system is down? What will be your back up plan? If the computer is down for a set amount of time, as determined by the hospitals administration, then the paper chart will be utilized. If the downtime is for an extended period of time, then this data would be scanned into the EMR as soon as possible after the computer system is back on line.If the duration was short, say an hour or so, then this data should be manually documented back into the EMR with the assessment time documented. 9. How do you anticipate computer physician order entry being a benefit? For one legibility! No more trying to decode what you think may have been written. It will be clear and concise. Also the physician may be able to look at documentation form somewhere other than the patients unit and decide orders need to be given. He can simply do computer order entry and a task will appe ar for new orders.If the order is anything other than routine, a call should be placed to alert the nurse of the priority. 10. What do see as a benefit to Quality Improvement by the institution of the EMR on a unit basis? We will be able to track data at a faster and higher accuracy a opposed to thumbing through paper record after record searching for data collection. The data collected can be as concise as to a particular nurse or a specific health issue. The data collected helps to support EBM change.
Friday, September 27, 2019
Raw Food Diet Essay Example | Topics and Well Written Essays - 1000 words
Raw Food Diet - Essay Example The 20th century brought huge industrial and economic development to the world, and since its second half, a system of industrial nutrition has been cultivated widely in economically developed countries. As growing urban population needs large food supplies, the crops are often canned, refined and frozen. Such processing methods lead to elimination of useful vitamins and trace nutrients, let alone the fact that many companies add ââ¬Å"undesirableâ⬠and not quite useful ingredients for better preservation of the product. Furthermore, lack of balance in diet led to development of obesity and numerous diseases caused by it. Thus, in 1960ââ¬â¢s ââ¬â 1970ââ¬â¢s numerous healthy eating movements emerged, including raw foodism. Yet, it should be mentioned that the key principles of raw food eating were developed in the 19th century by the Presbyterian Sylvester Graham who described advantages of eating fresh food and drinking fresh water in prevention of cholera (Graham, 18 49). First raw food restaurant in America opened in 1917 in California was named Euthropheon and didnââ¬â¢t only serve clients, but also carried out informative activity. A very remarkable contribution to raw foodism development was made by Ann Wigmore who studied effects of eating raw food on ill people. Wigmore and Viktor Kulvinskas began treating ââ¬Å"incurableâ⬠diseases and thus proved usefulness of raw products for health. Still, raw food like sprouts, salads and wheatgrass juice is very health-friendly, but it isnââ¬â¢t the most delicious option.
Thursday, September 26, 2019
Critical Issues Essay Example | Topics and Well Written Essays - 500 words
Critical Issues - Essay Example This sorting out procedure will require following of five stipulated principles some of which include provision of funds to states with lowest capacity to raise their own revenue, consider the effects of fiscal responsibility and provision of clear separation of responsibility between the state and local government (Foundation Fiscal Partners, 1999). I was not aware that there is controversy of finances. I always assumed each state received its funding of basic projects such as education and health from the federal government and then they dealt exclusively with the delivery of the services. I also had no idea of the fat that these duties and responsibilities even though they intertwine have separation through the constitution. Smith, Greenblatt and Mariani, (2007) sheds more light by use of the constitution of the roles which should be performed by the two in regards to finances. The tenth amendment for example explains that the state carries out the most mandates in regards to the running of the state and federal government only comes in when it is mandated by the constitution. The main themes include the relationship between state and federal government and how the tenth amendment and the commerce act and even the constitution itself have tried to differentiate the duties and responsibility to no avail. There is also separation of duties of the state and local government which are slightly intertwined. The other theme discussed in the reading by Smith, Greenblatt and Mariani, (2007) is the division of labor in the state and the roles of some of the people such as governor. This also leads to the theme about the responsibilities that the state has towards the towns and counties. The controversy between the powers and laws of federal and state government have left me opting for the federal government to leave the states to run their own affairs as best as they can without interference from the federal
American religion Essay Example | Topics and Well Written Essays - 1000 words
American religion - Essay Example While the Asian Americans came with astonishingly diverse cultures and religions, it is notable that Christianity, amongst all the different creeds, has significantly permeated their varied forms of religious experiences of the Asian Americans as differentiated from that of the other minority groups in America. In the last century, with a huge number of Asians migrating to America, each of them brought their respective kind of religion akin to their culture and their respective ways of life. Hence to the West came Christianity, Buddhism, Hinduism, Islam and other forms of religious faith. While the Asian Americans came with astonishingly diverse cultures and religions, it is notable that Christianity, amongst all the different creeds, has significantly permeated their varied forms of religious experiences. Christianity was predominant as it seemed to have provided answers to the seeming need for a sense of community or belongingness, ultimately leading to the fulfillment of an ethnic desire for their identity development in America. In attributing the Christian faith to be the popular choice of the Asian American immigrants, it is likewise important to recognize the fact that through this newly acquiesced form of religious fellowship, they have been given opportunities for leadership, a feeling of oneness and unity, a remarkable sense of renewed hope in existing in a foreign environment. All told, the Christian congregations have given in effect the much needed resources to enable them to overcome whatever deficiencies they may have in their social status. In an era that is marked by a myriad passion of faith, the religious role has become an integral part in the process of acculturation. The influence of Christianity in this aspect cannot be ignored. The sharing of common socio-cultural traditions and national history among Asians has led them to this closely-knitted socio-religious networking and has given them comfort in their day to day experiences. To say the least, religion has not only given them a most intimate experience, but more so, a widely shared community sharing that bestows on each one the provision of comfort and solace of life's uncertainties and even that of death, in effect inspiring them to achieve their dreams and aspire for renewed hopes to face the realities of everyday life. To a large extent, it can be said that, this religious orientation has in truth and in fact become very crucial to the adjustments in the way of life of the immigrant populace to their new homes in America. The new immigrants, together with their future generation and their Christian faith that holds them together, will undoubtedly continue to strive and also to survive, perhaps even beyond the boundaries of culture or religious transformations. One interesting aspect though in this thought is to ponder on whether indeed being Americanized is simply undergoing the process of being Christianized. If so, what then becomes of the other minority groups in America sans such religious experiences relating to those of the Asian Americans Is it an issue of mere belongingness, the fear of survival or the need for ethnic identity Does this necessitate the need for the minority groups to find the same commonality in their way of life or in their spirituality for that matter From this, it may b e gleamed that religious orientation has basically been crucial in structuring a different way of life for the Asian immigrants to adapt themselves into the stream of American society. Religion has essentially become a part in understanding the disparity that lie between the Asian Americans and the minority groups. Ultimately, the influence of Christianity on the Asian Americans cannot be ignored. The freedom of religion is embodied both in The Universal Declaration of Human Rights and the Constitution of the United States of America. While the Universal Decla
Wednesday, September 25, 2019
Not using plastic grocery bags Research Paper Example | Topics and Well Written Essays - 1000 words
Not using plastic grocery bags - Research Paper Example Such matter is non-biodegradable when disposed in the environment because it does not break down, dissolve, or rust at any timeframe. The bags could also be made from biodegradable polymer, polylactic acid derived from Lactic acid. The amount of plastic that the world consumes has steadily risen through the past years due to increased industrialization (Freinkel, 2011, p.7). Attribute to success Due to the excessive environmental degradation through the constant use of plastic grocery bags, other alternative measures were incorporated in order to reduce environmental pollution. Use of paper bags made from synthetic natural paper for carrying of goods from one point to the other. Such papers are biodegradable, can easily dissolve, and they are destroyed by water hence causing no harm to the environment and the living organisms. The governmental legislation policies on plastics ensured that there was a reduced production of plastic bags until there was a total ban on plastics, this led to decrease in the demand, and use of the plastics, and hence the adoption of alternative means for carrying goods. Increased production and introduction of biodegradable bags into the market at a manageable cost in the first place promoted a quick adoption of such carriage materials, which were convenient to carry and use. The national environmental management authority (NEMA) giving out stern policies with respect to using plastic bags and the hazards caused by carrying goods in them promoted a change of heart to reduce the health hazards and risks coming with the constant use of plastics. Challenges The other bags used for carrying goods are expensive compared to the price of plastics, because they are made of expensive synthetic materials. Such bags are not as durable and tough as plastic bags, which are made of combination of tougher material. These other synthetic bags cannot be used to cover and safely store certain contents unlike plastics, which could be used to cover cert ain contents. It takes a lengthy period to adapt using other paper bags after the drastic decline of using plastics. The plastics were available in a variety of sizes to accommodate numerous goods, but the introduction of other paper bags in limited sizes has impacted the way a variety of goods are carried and sometimes extra costs are incurred purchasing more than one paper bag for carrying goods that would fit within one plastic bag. Such biodegradable bags are not readily available in the rural settings because of poor communication channels that would enable effective transportation and shipment of such consignments to be available to the consumers. Environmental impact Following the decline of using plastic grocery bags, there has been a variety of impacts to the environment. Since plastics litter the environment, there has been reduced distribution of plastic litter (misplaced solid waste) within the environmental surrounding; soil profile and aeration have been improved due t o limited non-biodegradable plastic material. There has been reduced water pollution and infections to animals and human beings caused by the consumption of unpalatable plastic material, and air pollution caused by the burning of plastics, which eventually produce chlorofluorocarbon elements that contaminate the air, and causes global
Tuesday, September 24, 2019
DATA ANALYSIS PORTFOLIO OF WORK - Working Party Forum Questionnaire Essay
DATA ANALYSIS PORTFOLIO OF WORK - Working Party Forum Questionnaire Canteen and Staff shop - Essay Example It is at this forum where members approve the report and dividend, scrutinize the budget and make suggestion on how to improve services offered by the canteen. As part of social welfare arrangement, the canteen strives to provide a cheap alternative feeding programme to employees on duty. However, profitability is a key requirement as it a collective investment. People engage in business ventures to make profit although it is not important that you realize profit yearly (Stephen 2011). To boost sales and increase profits, the committee proposed to members to allow it starts selling hot food and open a staff shop during a working party forum held on 23rd December, 2011. As a tradition, such new venture is subjected to research after which the members deliberate and acts on findings and recommendations of the report. To this end, the committee sought my services in conducting a survey on the proposal with core intention of finding out the opinion of workforce regarding the proposals. B esides, the study had the following objectives: To gauge the support for or against hot food and staff shop To determine appropriate time for serving hot food To determine the cost likely to be incurred by staff buying hot food To find out the preferred type of hot food and other categories To establish the time to open the shop and commodities to sell COLLECTION OF DATA The random sampling technique was used to select a representative population. In random sampling individuals are picked from study population based on chance (Leonard and Leonard 2009). This technique ensured that each employee has an equal chance of taking part in the survey and therefore not biased. The sample was deemed to be a true representative of the population because in this method the process of coming up with a sample was based on probability and not predetermined. The employees were assigned numbers 1 to 510 according to the way the names appear in the payroll. The numbers were keyed in online sampling s oftware called randomizer (randomizer.org), which generated 142 unique numbers. The numbers were matched with payroll numbers to select employees who represented the other workers in the survey. The following numbers were generated by randomizer: 290, 133, 42, 201, 181, 175, 369, 431, 39, 239, 445, 2, 150, 296, 67, 8, 6, 387, 308, 167, 25, 90, 444, 408, 266, 203, 208, 292, 1, 122, 97, 284, 101, 477, 34, 92, 93, 85, 155, 457, 193, 301, 306, 396, 79, 191, 270, 246, 38, 162, 134, 354, 96, 437, 390, 264, 281, 27, 447, 209, 169, 412, 501, 194, 312, 21, 280, 195, 158, 176, 83, 46, 33, 388, 438, 410, 110, 368, 321, 50, 329, 365, 115, 434, 339, 318, 479, 17, 88, 508, 229, 61, 361, 440, 95, 156, 343, 311, 424, 382, 331, 421, 327, 124, 154, 373, 453, 187, 330, 493, 397, 200, 293, 372, 336, 119, 126, 407, 159, 47, 143, 87, 254, 89, 4, 459, 64, 15, 358, 392, 252, 225, 65, 400, 352, 462, 433, 500, 232, 30, 40, 230. The employees corresponding to a selected number were given questionnaire to fill and then return it to Forum Representative within 7 days. Out of 142 questionnaires issued, 123 were returned to the committee. As the researcher, I scrutinized the filled questionnaires and accepted 114 to be used for analytical purpose. This number translates to 22.4% response rate corresponding to 8.1% error margin at 95% confidence level. This figure was calculated using online application (surveysystem.com) by feeding the sample size and required confidence
Monday, September 23, 2019
Corporate Acceptable Use Policy Case Study Example | Topics and Well Written Essays - 1250 words
Corporate Acceptable Use Policy - Case Study Example The paper intends to discuss the purpose of the Acceptable Use Policy (AUP) developed by AT&T for its employees. The Purpose of an Acceptable Use Policy An Acceptable Use Policy is a collection of particular rules and policies which are implemented by the network and websites managers in order to enact certain restrictions regarding the utilization of available websites and networks. Most of the times, AT&T is found to be committed to obeying the government rules and regulations regarding the utilization of online sources, e-mail transmission and text messaging. The company always focuses on protecting the AT&Tââ¬â¢s network and its online sources without getting interferences from the hands of the other users. In order to fulfill these overall objectives, AT&T implements AUP in every facet of its service operations. Through the utilization of Internet Protocol (IP) services, customers agree to follow the AUP of the company in order to uphold the companiesââ¬â¢ responsibility t owards the customers. AUP of AT&T offers easy internet access, hosting services and also delivers internet or wireless data network to its end-users (AT&T Intellectual Property, 2012). Confidentiality, Integrity, and Availability (CIA) are three basic attributes of Information Security. In order to maintain confidentiality, AT&T has designed its Identification (ID) process in such a way so that the users are bound to access protected internet sites within AT&T service accounts. Through ââ¬ËAT&T access IDââ¬â¢ users can create the account with their names and individually selected password that facilitate them an easy access regarding any of the internet sites. According to the terms and conditions of AT&T, if users or employees can create access ID then it is not only beneficial for the company to maintain its confidentiality but also for the users to protect their personal account from the hands of the other users. Regarding privacy, the company is fully committed that they w ill protect usersââ¬â¢ privacy and safeguard their personal information in an efficient manner (AT&T Intellectual Property, 2012). AUP of AT&T provides strong integrity by which the companyââ¬â¢s employees are liable to maintain proper utilization of network services. According to AUP, employees must uphold integrity in order to avoid hacking and misuse of product resources by which the company may secure its network system. As per the AUP rules, employees should make proper use and have limited access to the companyââ¬â¢s resources and must provide services at the right time by which AT&T can maintain integrity towards its network security. In addition, AUP directs that the companyââ¬â¢s system administrator should have a proper access to system files in order to maintain the integrity of a computer network system (AT&T Intellectual Property, 2012). With regard to AUP, employees must not disclose the private information, software and system files regarding the companyâ â¬â¢s network services to any third party. AUP provides restrictions to the employees that they should not misuse the availability of the companyââ¬â¢s essential resources. Moreover, the employees should not share the essential information regarding the companyââ¬â¢s services with their relatives and friends by which it can protect its availability of resources from the hands of the third party users (AT&T Intellectual Property, 2012). Recommendations for Improving AUP In order to improve AUP, AT&T should maintain and follow certain legal rules.Ã
Sunday, September 22, 2019
Should Teachers Be Able to Remove Disruptive Students Essay Example for Free
Should Teachers Be Able to Remove Disruptive Students Essay Within a democracy everyone has rights; however those rights end when they are used to abuse or hinder the rights of another person within that democracy. For instance everyone has the right to entertain themselves with a listening device on the train, yet they are asked by transit authorities to use headphones so that their right to entertainment does not violate the other passengers right to peaceful, quiet commute. It is a teacherââ¬â¢s duty to ensure that students understand these social skills that are required of them in this democratic society. So although removing a disruptive student from a classroom is sometimes viewed as the neglecting and the rejecting of that particular student it is very often the beginning of that studentââ¬â¢s long road to having some very complex issues resolved. As was stated in one of the previous chapter, aggression and excessively disorderly conduct is more often than not the manifestation of some very serious emotional grievances. It can also be sign that the child is suffering from an undiagnosed disorder. Although the latter is less likely to be the case it should not be ruled out. Sometimes due to a lack of knowledge about a particular disorder can cause parents to overlook certain characteristics of a condition that their children may be exhibiting. In other cases it is the parentsââ¬â¢ unwillingness to accept the facts that are presented to them concerning their child that prevents them from seeking help for their child. This unwillingness might be due to a variety of emotions including fear and denial. Whatever the case may be these children continue to battle with these disorders and completely exhaust the efforts of those that are forced to share a classroom with them since there are almost always in need of much more than the classroom setting can offer them. Sadly, identifying underlying emotional problems can be a little more complex but the cooperation of the parents is also needed in this area. In cases where the parent is not able to or is not willing to cooperate with a teacher who is trying to encourage a child to exhibit more sociable behavior the teacher is left with very few options. For if that parent is not even willing to acknowledge that the behavior of his or her child is out of control, there will be attempt to try and discover what the source of the behavior might be. Again the removal of that student from the classroom may encourage the parent to evaluate the seriousness of the situation and this resulting communication might bring both the teacher and the parent one step closer to uncovering problem which is what the main focus should always be. Those who oppose giving this authority to teachers expect them to prepare lesson plans that will create and maintain a positive learning environment for the entire class, make sure that students are prepared to take the ever increasing state mandated test, and still be able to constantly council and pacify students who have decided to constantly disrupt the class; all within the allotted six to seven hour day, which is farther broken down into forty five minute periods for each class.
Saturday, September 21, 2019
Components Of Disaster Management Management Essay
Components Of Disaster Management Management Essay The occurrence of such disasters has continued to increase in a rapid succession. More than three million lives were lost due to disasters in the last quarter of a century itself. This number does not stop as billions have been affected in some way or the other. The cost of rehabilitation from these disasters has run into thousands of billions alone. The increase in the population of the world only enhances the chance of disaster risk which could cause massive casualties and harm to the human life in large numbers. The six billion mark in world population was reached on the 16th of November in 1999. The annual growth rate was estimated at nearly 1.33 %( seventy eight million every year). There is a greater risk on account of the industrialization and vast urbanization since a lot of people are moving to urban areas which do not have sufficient health care and infrastructure in place. Energy is released after accumulation in the volcanic activity or geological faults which cause seismic waves to bring about movement of the crust which is known as an earthquake. Humans are able to only detect three thousand earthquakes from the total of five hundred thousand earthquakes that occur every year. 7 to 11 out of these 3000 earthquakes cause significant damage to property and human life though this figure has increased the past few years. The toll of death due to an earthquake can range from as less as five to higher than two hundred and forty thousand. One out of two cities in a developed country is susceptible to a natural hazard like earthquake. Seventeen of the twenty largest cities are situated in countries with low resources. Eighty percent of the population of the world will reside in developing countries by the year 2025 according to an estimate. The research on natural disasters is of a lot of significance in case of developing countries. What is a Disaster? Many definitions have been put forward regarding disaster. Samuel Henry Prince started the study related to disasters in 1971 in Canada during the worst disaster witnessed in Canada. The disaster in point is the ship explosion occurred in 1917 in the harbour of Halifax, Nova Scotia. His research and social exploration of the implications of the disaster paved way for further theoretical and empirical research that lasted through the 1930s, 1940s and 1950s. This saw a change in the way disasters were perceived. The focus shifted from the primary physical agent to the description and definition of disasters related to the social impact caused by it. Various academic disciplines were dedicated to the study of nature and disasters during the 1960s and 1970s. The definition of a disaster can be classified between the national and international level. The working definition of a disaster is designed in way to suit the professional background of the place where it is defined and is closely associated to the studies, work and research that is carried out. The World Health Organization has defined disaster on the base of the resultant health implications post the disaster. They have made use of the terminology called as Health Action in Crises. The International Red Cross has taken into account the factors that cause interference in human life. IN simple words, floods, earthquakes and hurricanes only acquire the status of a disaster when they leave behind a negative and disruptive impact on the living force. Al-Madhari et al in 1997 studied if a universal definition for the term disaster is possible and came up with a definition that takes into account both the factors of economic and health implications. The definition was as follows- an event localized in time and space with one or more of the following consequences occur: 1) Ten or more fatalities, 2) Damage exceeds $1 million, 3) 50 or more people evacuated. This is the basic essence that is found in most definitions of disaster which may carry different views. All the definitions accept disaster as a situation that is beyond the cope of control of the local community which warrants the need of external help. The disasters maybe a result of naturally occurring phenomena like extreme changes in climate or weather, technological and man made threats. Psychological stages of disaster Heroic stage The heroic stage is shown by the community and the individuals within that direct the various levels of energy in the tasks of help, rescue, shelter, clean up and repair. This behaviour is carried out in the span of a few hours to even days if required. Honeymoon stage The optimism characterized by the people in the community is the showcase of this stage in spite of the losses that occur due to the disaster. There is a wide media attention and, flow of resources inwards, and reassurances by personal visits by high profile personalities that look towards the rehabilitation process of the community. They provide the hope and belief that life will return to normalcy and no traces of the disaster will be seen. These resources though tend to exhaust by the third week of the aftermath of the crisis, there is reduced media attention and the real problems in the rehabilitation program start to develop. The energy shown by the survivors in the community gradually starts to fade away and gives way to the next stage of disillusionment. Disillusionment The hard experiences, the lack of necessities and the work needed to be done to restore normalcy creeps up on the person which leads to disillusionment among the survivors. Survivors find that the various types of financial help being offered are in the form of loans instead of grant, home insurance was not the best available option and that politics played a bigger role in the decision making. Signs of disgruntlement is how by means of complaints related to abandonment, betrayal and injustice, incompetency and bureaucracy. Stress is a negative aspect that troubles the survivors which slowly disintegrates any hope that may be left. Recovery All the work for which the base has been setup starts to show results. The applications are passed, loans are approved, and reconstruction is started. The individuals start to work at their normal capacities. People start regaining the state of normalcy with a period of six months after the disaster. Some individuals might take up to thirty six months. There is an overall sense of appreciation to aspects like life, relationship and morale towards tackling problems all owed to the lessons learnt post the disaster. Stages of Disaster Response Preparation stage The main objective of this stage is to improve the healthcare system and the general system that can be improved to the extent that future disasters can be tackled with ease and efficiency. Quick Reponses Stage The main objective of this stage is to make sure that there is a prober health response in case of a disaster strike that may create some needs. Counselling is provided during this stage which is present in the current health system. There should be help sought from external sources to boost the resources that are available in case they are not sufficient to fulfil all the necessary needs. In many cases the local supplies may not be enough to meet the requirement of the community which is why the stock has to be filled with the help of some additional commodities obtained from other external sources. Recovery Stage This stage has to be worked upon continuously and lasts more than a month after the disaster takes place. This stage could go on for years depending on the resources that are available for rehabilitation and the impact and type of the disaster. The needs of the survivors are taken care of by the local providers in this stage. Federal funds may flow in case the disaster is declared as a Presidential Declared Disaster. The funding is given to those in need of individual help. Disaster Management Definition of disaster management A lot of definitions have been put forward by authors on the topic of disaster management. A lot of these definitions merely explain the meaning of the term rather than completely stating the terms of preparation for a disaster. Christopolis, Mitchell and Liljelund regarded efficient and effective abilities and result of disaster response as the main themes of preparation for a disaster (2001). Creating a local response system and providing early warnings is also a big part of preparation (Integrated Regional information Networks, 2005). The definitions by United Nations Development program, McEntire and Twigg have definitions similar in theme with their own take on the preparation for a disaster. The program by United Nations holds hazard easing as the central source for disaster preparation along with the inclusion of planning in the description (2004). Similarly, McEntire and Twigg also consider hazard easing as a crucial aspect in disaster preparation saying that it should be a p art of it (McEntire, 2003 and Twigg, 2002). McEntire talks about different factors relevant for disaster preparation as a local government function that includes vulnerability and hazard evaluation. The lesser highlighted aspects of disaster preparation are also very important. Izadkhak and Hosseni point out education to be the foremost media in the preparation of a community for disasters (2005). The emergency plans, storage of food, securing furniture to walls and creating inventories of storage commodities are a part of this level (Paton, Smith, Johnston, 2003 and Siembieda, 2001). Review of preparation literature The disaster preparedness aspect is basically dynamic in nature which keeps changing constantly. The researches find out new facts with the occurring of new disaster even with respect to the community. The disasters and crisis are consistent but the practises applied in its management still lack the capacity to provide necessary results. McEntire has worked towards some crucial points in disaster preparedness and emergency management in his study. McEntire, Fuller and Johnston and Weber (2002) published an article reviewing the emergency management and the methods related to it. The main concern in the 2002 research was vulnerability while McEntire also finished his research related to disaster preparedness. Dynes also provide his view on emergency planning. His views were based on research instead of military models. The problem solving methods of Dynes emphasizes cooperation and coordination as the key aspects. (1994). This concept has been used in developing many other models as opposed to the earlier practice of using military models and instead switching to a research based and discipline specific model. The best methods of disaster preparedness incline towards discipline specific objectives as in the case of emergency management. A valuable amount of work has been spent for the identification and evaluation of the concepts and principles that are used in disaster preparedness. Some contributions have been made to development of disaster preparedness with the aim of creating a theory based practise and practise based theory (Gillespie and Streeter, 1987). The contributions from most individuals are not aimed at the creation of a complete disaster preparedness technique but individual research has helped immensely in making contributions towards building a complete disaster preparedness plan. A case in point is the research by Kirschenbaum (2002) article based on disaster preparedness from the point of view of Israel. The inferences drawn from his study were found to be applicable in a general environment. Perry and Lindell (2003) based their study on disaster management on the principles of perspective and planning and were able to identify 10 guidelines that should be used in the process of planning. Lindell was more focused on the planning while Kirschenbaum gave more importance to localized applications and principles. Each on his own was able to contribute an important aspect that led to the creation of a comprehensive disaster preparedness plan although none of the studies focused on all the aspects on the whole. Components of disaster management Earthquake Risk The risk of earthquake is a seismic risk to the environment and its habitats. The earthquake risk is inversely proportional to the capacity of resisting it. Research based on social learning by May (1994) shows that the more knowledge that is available, the less is the worry and lesser in the rationale for prevention. Knowledge and the use of the knowledge in the best way are required to improve the safety measures today. There is a process known as Earthquake Risk Management that works towards the prevention of threat or danger from an earthquake, reducing risk or consequences of an earthquake. It also deals on topics like preparation for dealing with a disaster, responding to a threat due to natural disaster, capacity building and knowing the effects of the natural disasters. There are the basic points of evacuation, rescuing, relief, rehabilitate and reconstruct that are covered. The population in India was marked at over a billion in 2001 and is estimated to be doubled by the yea r 2050. This calculates to a population growth of 1.61% per annum. The risk of earthquake increases by leaps and bounds in such a scenario. The urban areas are been populated to the extent of being overcrowded and figure in the highest density in the world of 237 people per square kilometre. This only worsens the situation. People in thickly dense areas have no alternative but to live in conditions like low lying areas situated closely near the rivers. This makes it mandatory to keep a full time alert and be ready with a disaster preparedness plan. Gillespie and Banerjee (1993, pp.242) have proposed there is a 5 stage plan which spirals upward with more refined levels including avenues, assessment, knowledge, preparedness and practise. The central point in these levels is considered to be knowledge. As pointed by Srivastava et al (2007), the reduction in disaster risks can be brought about by the proper use of information. Disaster management planning for earthquake In the past few decades, a high level of importance has been attached to the effective and efficient management of information and its use as a key component of disaster management in the regions of Asia especially Pacific Asia. Disaster management information systems have been setup by a number of countries according to their own calculations and needs. The applications include early warnings, reduction of disaster risks and emergency planning. The information plays an important part in disaster management and it should be used wisely. The needs of the information related to disaster management can be classified in two activity categories Pre disaster activities like research and analysis, prevention, risk assessment and preparedness. Post disaster activities like rehabilitation, response and reconstruction. The data related to disaster can also be classified into two categories- Pre disaster data consisting of the risks and the country Post disaster data showing the impact of the disaster and the resources available to counter the effects. National Disaster Management Information System The main aspects of a disaster management information system is a database containing the following- Mapping of hazard assessment Vulnerability Assessment Distribution by Demography Lifelines, Infrastructure and Critical Facilities Transportation Routes and Logistics Material and Human Response Resource Communication Facility The use of Disaster Management Information System is based on three aspects- Preparedness planning Response and mitigation Recovery Earthquake activities Preparation and Planning Identifying areas prone to earthquake Identifying problems Identifying and using Resources Control and command Advance Preparatory Action Post earthquake activities The relief activities needed to be performed by the government are- Maintaining uninterrupted communication Endorsing disaster preparedness and relief measures through media like newspaper and AIR. Evacuating and movement of commodities of essence such as petroleum should be facilitated in transport. Making sure that essential commodities are available at a reasonable rate. Providing adequate supply of drugs, vaccine and medicine. Restoration and preservation of physical communication links. Providing infrastructure such as latrines, shelter, electricity, road etc. On a temporary basis by making the necessary investment. Mobilising financial resources. In addition to these aspects, there are certain secondary functions that are needed by the relief efforts of the State such as Military aid should provide relief, restoration and rehabilitation services to the civil authority. Backup plans for cattle preservation, crops and health measures should be put in place. Technological and technical inputs for providing drinking water. Providing technical assistance for water management, water budgeting and several other uses. Coordinating activities of the voluntary and state agencies. Knowledge Management The knowledge related activities are dealt taken care of by the knowledge management procedure (Wiig, 1997: Civi, 2000). These activities include organizations and creation of knowledge along with share and use of the knowledge. Knowledge management can be more appropriately defined as the strategies and processes of identifying, capturing and leveraging knowledge. This definition was provided by the American Productivity and Quality Centre. Knowledge management is a field on the rise which has been able to collect considerable attention especially from the industrial community. A large number of industrial organizations have taken to knowledge management programs which serve as proof of its widespread use. These programs are helpful in making the industries more competent and improving their organizational performance. It is only a matter of time when all the companies will adopt such a program and the only factor to be accounted for is the way in which it has to be implemented to m ake optimum use of knowledge management and managing it properly at the same time. Implementation of Knowledge Management The Knowledge Management concept has caught a lot of attention due to its importance but there are only a few industries that have been able to make optimum use of the knowledge management techniques by managing the knowledge in their respective organizations. Stoney and Barnett (2000) suggest that a major number of Knowledge Management steps are bound to fail. This is due to the fact that the implementation of Knowledge Management is not an easy task that can be carried out by an organization. Technological infrastructure needs to be in place for the implementation of Knowledge Management along with change in the culture of the organization and managing knowledge of different types. Organizations that have made use of the Knowledge Management without making certain of the necessary resources at their disposal have mainly failed due to improper infrastructure and implementation. Implementation of the Knowledge Management is a tough task for any organization as pointed out by Drucker (1993) who is known as the father of modern management theory. He stressed on the fact the biggest challenge faced by an organization is the building of a systematic framework for the management of knowledge. Hence, it is imperative to build a perfect prototype or framework which helps the organizations before the implementation of Knowledge Management. Framework definition According o the Oxford English Dictionary, (2003), the framework is defined as a structure composing of parts that are framed together especially designed for enclosing or supporting anything like a skeleton or a frame. Popper (1994) has defined framework as a set of assumptions or fundamental principles of intellectual origin that form the basis for action. In accordance with these definitions, framework can be said to be a framework or a structure formed using a set of specific instructions or principles that is required to provide a base for carrying out necessary activities and actions. Knowledge Management Frameworks According to Rubenstein-Montano et al. (2001b), Knowledge Management frameworks are categorized as a mode of providing guidance in a specific discipline. This means that it shows the way towards the building of Knowledge Management in a specific discipline completely. Dale (1999) defines framework as a tool used for the development and laying out of plans, a guide that helps an organization to carry out a certain action that works best for their business needs at their own pace. The framework most importantly acts as a link between the practical and theoretical aspects of the Knowledge Management and eases its implementation during an emergency or disaster. Various Knowledge Management frameworks The frameworks that have been described in theory are made to focus on different parts of Knowledge management and achieving its various purposes. The most popularly known framework is the framework for knowledge creation created by Nonaka (1991, 1994) that explains the evolution and conversion seen between tacit knowledge (not easy to articulate) and explicit knowledge (can be easily put into words). This is not the perfect form of a framework since it is only concerned with the creation of knowledge which is nothing more than a part of the Knowledge Management. Another type of framework that is described in theory is the one that provides information on cyclic processes of the Knowledge Management. From the studies of Rubenstein-Montano et al. (2001a), it is evident that many of these frameworks only provide activities that stress on the knowledge cycle activities. They lay importance on phases of knowledge without providing supervision in the implementation of Knowledge Management. The examples of such frameworks are plenty including the framework by Bose and Sugumaran (2003) and many of the frameworks that were studied by Rubenstein-Montano et al. (2001a). A third type of framework is the one developed by researchers that is used to explain the performance of Knowledge Management in an organization. The framework provides reference to shoe the analysis, structure and evaluation of the Knowledge Management in various organizations belonging to different fields. They were developed by Apostolou and Mentzas (1998). Framework requirements The framework helps in understanding, improving awareness and gives the conceptual definition of the Knowledge management that informs the people about the processes involved in it. Al the components can be understood with the help of a framework and puts the Knowledge Management in perspective by providing the people with a clear and concise vision which helps in its implementation. Managers find framework as a beneficial and important tool since it helps to decide whether all the aspects related to the Knowledge management have been covered that may be easily overlooked without the framework. It also helps in enabling the implementation process and helps coordinate the efforts put in by the organization in a controlled and systematic way. System Approach Framework Holsapple and Joshi (2002) laid out a three layer framework which consists of three major building blocks known as knowledge resources, activities and influences. The resources pat highlighted the pool of the knowledge of the organization that can be classified into six main forms of resources namely participants knowledge, infrastructure, culture, knowledge artefact, strategy and purpose. The activities block represents the processes to be used by the organization for manipulating the knowledge resources. Holsapple and Joshi (2002) were able to identify 4 activities related to this aspect namely acquiring, selecting, internalizing and using the knowledge which means the generation and externalization of knowledge. The manners in which these activities are performed tend to be influence by a number of factors that can be seen in the next block called as knowledge influences. The implementation is greatly influenced by this block and is classified into three categories namely resource (human, financial, material and knowledge), managerial (coordination, leadership and measurement) and environmental (customers, competitors, suppliers, markets and other conditions). The three aspects when viewed collectively act as the main components in the operation of Knowledge Management. A framework was created with the idea of four stages namely review, concept, reflect and act by Wiig et al. (1997) in order to explain a number of Knowledge Management techniques and methods. Review is the first step and relates to evaluating and monitoring the performance of the organization to find out whether the desired results have been obtained. Conceptualize has two parts namely analysis of knowledge and inventory knowledge. The former is used to identify and assess the problems, weakness, strengths threats and opportunities related to knowledge. The latter is used to find out the state of knowledge in the organization by finding out the knowledge assets. TH reflect part is used for the following- Create teams for assessing. Find out the Knowledge management requirements. Collect knowledge by identifying. Design structure to knowledge in warehouse. Maintain technology. Test the technology again. Train the knowledge workers. Show the use of Knowledge management practises. Track the usage. Get the system to start. Measure the productivity and quality, measure Knowledge Management practices. Conduct assessment review of the processes. Hygoyo Protocol Framework of Hyogo The priorities, mission and vision of the National Framework were created in synchronisation with the Hyogo Framework of Action (HFA) 1005-2015 that was agreed upon by all the nations in January 2005 in the city of Kobe, Japan during the UN-World conference held for Disaster Reduction. The expected result of the HFA after ten years is significant reduction in the lives and economic, social and environmental assets of the countries and communities. The following objectives have been adopted by HFA to attain the desired results- Better integration of disaster risk considerations and accordingly makes development policies. Planning at all the levels with focus on disaster prevention, preparedness, reduction and vulnerability reduction. The strengthening and development of institutes, capacities and mechanisms at all the levels especially at the community level that can help in building resistance to hazards. Incorporation risk mitigation approaches in the implementation of recovery programs, response and emergency preparedness that is used in rehabilitation of the affected communities. Scope This particular framework relates to provision of guidelines and direction to the national, local and provincial institutions. Aspects such as capacity building and vulnerability reduction are the crucial factors that help the communities and institutions to counter disaster risks. The strategies, policy implementation are taken care by this phase and programs for the parts of disaster are provided for. There are certain challenges that are recognized in the five major areas as follows- Governance- legal, organizational and policy frameworks. Risk identification. Monitoring, assessment and early warnings. Knowledge education and management. Reduction of risk factors. Preparedness to improve response and recovery. The Yokohama strategy concludes in its review the discussions in the World Conference on Disaster Reduction and the desired result that was decided can be described into five priorities of action as follows- Make sure disaster risk is a local and national priority with a very strong institutional base for execution. Identify, monitor and assess the disaster risks and identify early warnings. Use innovation, knowledge to build a safety culture which is strong at all the levels. Reduce the risk factors Make the disaster preparedness strong for better response. Case study of earthquake in Pakistan with respect to Knowledge Management The earthquake in Kashmir in 2005 was a massive earthquake with its epicentre in Pakistan controlled Kashmir close to the city of Muzaffarabad that affected the Khyber Pakhtunkhwa and Gilbit Baltistan province of Pakistan. It took place at 8:52:37 PST on the 8th of October. It was similar in size to the 1906 San Francisco earthquake and 2001 earthquake in Gujarat with magnitude of 7.6. Tremors of this earthquake were felt in surrounding nations like western China and Tajikistan. Four people died in Afghanistan while close to fourteen hundred people died in India controlled Kashmir according to reports. The damage caused was blamed on poor construction and major up thrust. Infrastructure Network usage- the network usage was high throughout the phases of recovery. Data and voice communication was very good in Islamabad. The landline network was brought on track within a coupe of days in town hit by the earthquake and the cell network was extended post the earthquake. The areas that were hit the worst had no assistance and relief and were left with no communication. Some parts were wiped out entirely. The skills to manage the technology were available in Pakistan but the management was not properly planned. Network Availability- At first the network was very low during recovery and later was raised to a medium level. The inconsistency of connection was the main factor rather than low bandwidth. The connection would break consistently which proved to be disruptive. The limitations were known fully in the remote areas but the staff did not pay heed to the cell coverage problem. Cell phones are not adequate in such circumstances. Interoperability- This aspect worked at all times during recovery and it worked in the favour of national staff success. Communications technology staff had prior experience working for NGO and used their contacts in organizations to full effect. Data Information The information was inaccurate throughout the recovery. The situation reports were not reliable. The data was circulated internally and contained insufficient information related to needs such as fundraising, donors and advocacy. This resulted in various queries sought from the headquarters to the staff for more information. Another shortcoming was the information distribution. There was lack of communication with the UN that put the NGOs at a los since they did not know the plans put in place by UN and the problems they faced. The cluster approach by the UN shoed positive results in the initial four weeks for common approaches, joint analysis and programming. Some participants did not take part in the cluster group (Food, Water, Sanitation, Education and Health). The coordination was improved with the establishment of the District Relief and Recovery Committee with
Friday, September 20, 2019
Role of Client Servicing in Infrastructure Company
Role of Client Servicing in Infrastructure Company PREFACE Companies with a high customer retention rate know the value of client servicing. Essentially, this is the process of creating and maintaining a strong working rapport with each customer. Often referred to as customer care, it is about understanding the needs and desires of the customer, and moving to meet those needs in a proactive manner. While there are a number of client service programs on the market today, there are a few elements that form the basis for any type that is effective. One of the most important keys is providing the client with people who know the account well and are able to be of assistance whenever needed. This means looking beyond the data that is gathered during the sale cycle. Client servicing dictates that the vendor develop a working knowledge of the goals of the customer, the conditions that the client works within, and what expectations must be met in order to keep the client. Many companies make the mistake of securing a new customer, then never allow the sales contact to introduce other support personnel to the new client. Often referred to as a handoff, this allows the customer to be incrementally migrated from relying on the sales contact and begin to develop a relationship with customer care professionals. The idea is to help the new client understand that he or she has a support team that is in place for the long haul. CONTENTS Introduction Objective of study Role of A client servicing executive Introduction to Infrastructre Company. Research methodology Conclusion Bibliography INTRODUCTION Advertising offers very interesting, lucrative and mentally satisfying career options. Over the last 5-6 years the business of adverting has increased manifolds. Before you plan to enter the field you need to know how a typical advertising agency is structured. Generally, the various departments are: * Client Servicing/Account Management * Media Planning * Creative, which includes: Copy writers Visualisers Client Servicing/Account Executive Client Service Executive: As the name explains, you will act as the bridge between the client and the agency. You will speak to the client to get a brief understanding of what he/she wants. In addition you will also study the market for the product or service for which the advertisement is being made, analyse market dynamics, target customers, their needs and behavioural patterns, the competing product, buying patterns of customers and various other market related factors. After going through the entire process the Client Service Executive then prepares the brief which will be used by the creative, account planning, and media planning department of the agency. Over cups and cups of coffee youll brainstorm about the product features, the target market and customers, strategy what the ad will speak, how it will speak and other relevant details to decide the right concept for the advertisement. It will then be taken over by the creative people, visualisers and the media-planning department who will prepare a presentation for the client. It is only after the clients approval that the ad lands at the production table. Client servicing executives are also called Account Executives. As a trainee in this department you will report to the Vice President ââ¬â Accounts or an Accounts Director. The top boss plans business expansion (bringing in more clients by approaching various companies), implements the plans with the help of Account Executives; and controls all the activities. His basic duty is to coordinate all the activities relating to development and implementation of advertising campaigns. Just under the Vice President/Director Accounts are senior and junior Account Executives. In big agencies there may be a few Account Supervisors who look after big corporate accounts. Ranking wise Account Supervisors are directly below the Vice President/ Director Accounts. A number of Account Executives report to the Account Supervisors. Youll interact daily with existing as well as new clients. Some big agencies also have a different department called Account Planning department headed by Senior Manager/Manager Account Planning. Senior Account Executives get to work here. What is a client Servicing Executive? Client servicing executive should generate new clients Advertising agency runs by getting new clients or retaining their existing clients and help in branding their services through effective advertising solutions. Hence, client servicing becomes the most vital part of an agency. Client Servicing Department The major focus of a client servicing department lies on: Generating new clients Enhancing existing customer relationship Public relationship Client servicing department is a crucial part of any advertising agency which deals with television, print, radio or Internet. Client Servicing Executive Client servicing executive acts as the bridge between the client and advertising agency. He represents what the agency is all about and what it is capable of. The client servicing executive is responsible for all the communications that happens between the client and the agency. Responsibilities of a Client Servicing Executive The client servicing executive is responsible for handling queries from the clients. Should take down briefnotes from the client and make the desired changes as per the clientââ¬â¢s needs by communicating to the creative team. Have an in depth knowledge about the clients products, brand, culture, market position and their overall needs/services. Should have exemplary communication skills, so as to increase the comfort levels of the client. The client servicing executive should ensure that the client stays with the advertising agency for a longer period of time. Responsible for generating business and billing from the client. Attributes of Client Servicing Executive Coordinates with all the departments in the agency and clients, besides staying calm under pressure Should possess good managerial, presentation and exceptional communication skills Should spend ample amount of time with the client, fulfilling their needs and requirements Attend meetings with the clients when there is a need and jot down the brief of the session Client servicing executive should be well groomed and properly attired Client servicing executive is the face of an advertising agency. Hence, recruiting an appropriate client servicing executive will enhance your business needs. How to Define a Good Client Service? Businesses function when they have customers or clients, and businesses survive and expand when they have good client service. Good client, or customer, service is a hallmark of respected businesses, to the extent that several organizations, including the Customer Service Institute of America, give annual awards to companies that provide excellent service to the people who keep their business going. Defining good client service is largely a matter of placing the customer first and making business decisions that allow the company to respond to market changes and provide customers with the best service possible. Step 1 Provide customers with the best service you can in a timely manner. Bear in mind that your clients do not want to be kept waiting. If you promise a product or service within a certain amount of time, be sure to provide it within that time, or offer the customer something to apologize for the time extension. The word will spread about a business that keeps its promise to deliver on time. Step 2 Place the customer needs first by listening to what the customer needs. Companies that listen to their customers are more likely to hear what the customer wants and thus be able to respond effectively. Listen to the clientââ¬â¢s needs, and respect anyrequestsor recommendations of the client. Doing so will show the client that his needs are your first priority. Step 3 Include a guarantee with the product or service that you sell. Show your customers that you stand by your product or service, and that you are willing to guarantee its quality. Be willing to provide corrections or replacements if the product or service is not what the customer wants. Doing so can actually bring you further business, when the word spreads that you work hard to please your customers. Step 4 Add new technology where appropriate. The latest and greatest technological advances are not necessary for every business. But some elements of technology can prove to be very useful in providing excellent client service. For instance, specialized software can help you keep track of customer orders better and locate products from your inventory that customers need. Apply technology where it will help you service your customers better. Step 5 Respond immediately to client questions and comments. Provide a stated turnaround time for all client communication; for example, promise that your business will respond within 24 hours. Although some wait time might be necessary, be sure to keep the wait time as short as possible to demonstrate to clients that you take their communication seriously. Step 6 Let your customers know that you appreciate their business. Send thank-you notes, or keep a client address list to send out cards at the holidays or birthdays. Doing so places a human face on your business and creates a family atmosphere for the company. Infrastructure and client servicing Infrastructure Client Services Infrastructure Client Services is the new amalgamation of Infrastructure Services and Client Services. One component designs and manages the campus telephone and data networks and services; operates NetID, email, and other campus accounts; administers co-located servers and virtual storage space; and runs campus administrative production jobs. The other component are the customer-facing units of UITS which provide services to students, faculty, researchers, and staff, including computer labs, online learning, multimedia services, high-performance computing, the 24/7 IT Support Center, workshops and training, departmental workstation support, web development, IT assessments and service agreements, classroom technologies and more. More detailed information: Infrastructure Client Services: Infrastructure Client Services supports the core building blocks for IT projects and services on the University of Arizona campus. Their function plays a critical role by enabling a service-centric IT delivery model. Infrastructure Client Services is the central computing infrastructure for facilities and services which support numerous computing and network system for the institution. Student, faculty and staff rely on systems and resources from Infrastructure Client Services to effectively connect, collaborate and create. This group enables applications, processes, operating models, enterprises and extended enterprises. Some of Infrastructure Client Services Offerings Include: Data Center Services: provides stewardship of both academic and administrative data as well as tools for date presentation, visualization, analysis, and collaboration. Management of all platforms including Mainframe, Open System Servers, System Programmings, High-End Cluster Solutions, Production Scheduling and Control, Enterprise Backup and Storage, System Management, Global Management Center (GMC), SAP Basis Support, Web Hosting Services, Production Integration and Change Management. Network Services: LAN/WAN Configuration/Support, Firewall Configuration/Support, Remote Access Services, Network Management and Operations Management Desktop Services: Electronic Desktop Management, Collaborative Computing (Lotus Noters, Exchange, Backbone Messaging Services, Portal Support and Middleware) and Field Services Other Services: Directory Services, Identity Management, and Productivity Applications like email and calendaring. Determines standards and Best Practices for Infrastructure Development within UITS. Promotes Compatible Standards and Best Practices across Campus IT Infrastructure Groups. Develops reusable components for use in Infrastructure Solutions, Project Management, Architecture and Design Engineering, Global Security Services and Asset Management Functions of Infrastructure Client Services: Responsive: with technology, management systems and operations built and optimized to sense and respond to the unique needs of enterprise applications unlilke traditional approaches that retrofit legacy voices or computing infrastructures Cost Effective: based on scale economies from operations and technology that can deliver secure slices of a massively scalable IT platform Managed: with both visibility and control through web-basedportals COMPANY PROFILE Kairos Infraventure is a newly launched company in Lucknow. So, working towards building it a brand was a task in its own. We had to find out new and innovative ways to promote it and make it reach a level up to the customers satisfaction and reach its goal towards reaching the audience and fulfilling the needs and wants for them and, building an empire for themselves. For the promotion of Kairos we used the local newspapers ,radio and distribution of the pamphletââ¬â¢s and generate awareness among the public . The main idea for promotion was to provide something to the public that hasnââ¬â¢t been given to them before. To carter the consumers and make their plans according to the needs and wants, so that they can provide them with want they want. Infrastructure is the largest growing industry .with many companies coming up and making this industry rise and shine ,towards a future . With the help of effective client servicing the company can gain many clients and increase their business by huge leaps and bounds. Along with good client servicing the campaign should be advertised to the maximum possible reach. because for every company the maximum amount of audience or public you reach the more chances of increasing clients . Also.as the infrastructure company is growing a great amount ,Kairos has to provide something unique in its own plan to the proposed clients for them to invest in them. RESEARCH METHODOLOGY This chapter aims to understand the research methodology establishing a framework of evaluation and revaluation of primary and secondary research. The techniques and concepts used during primary research in order to arrive at findings; which are also dealt with and lead to a logical deduction towards the analysis and results RESEARCH DESIGN The research design applied here was exploratory research and descriptive research. Exploratory Research is one in we donââ¬â¢t know about the problem, we have to find about the problem and then work on solving the problem. Whereas in case of descriptive research, we know the problem, we just have to find the solution to the problem. Generally descriptive research design is applied after exploratory research design. Here after doing the secondary research, we found the general perception about the retail baking but then in second phase we tried to figure out where the difference lies and on what basis the banks differ from each other RESEARCH TOOL Research tool The purpose is to first conduct a intensive secondary research to understand the full impact and implication of the industry, to review and critique the industry norms and reports, on which certain issues shall be selected, which remain unanswered , this shall be further taken up in the next stage of secondary research. This stage shall help to restrict and select only the important question and issue, which inhabit growth and segmentation in the industry. DATA COLLECTION: Both primary and secondary data have been collected very vigorously Secondary data: it is collected by the study of various reports. The reports studied under secondary data. THE RESEARCH REPORT The report is the result of a survey which was undertaken in Lucknow city. The objectives of the project has been fulfilled by getting response from the customer associated to these segments through a personal interview in the form of a questionnaire. The responses available through the questionnaire are used to evaluate the requirements for the upcominf infrastructure Companies and the willingness of the customer to purchase its products on future. The project also covers an analysis of the switch over of customers to competitors products in the market. THE RESEARCH PROBLEM The problem formulation is the first step to a successful Research process. Project undertaken the problem of analyzing the customer satisfaction level of the KAIROS and to find the Consumer wants and needs from the upcoming companies THE RESEARCH DESIGN The research design used in the project is exploratory design. The investigation is carried upon the customers in Lucknow city. The reason for choosing this design is to get responses from the customers so that their perception about the products of the company and their loyalty could be predicted. THE DATA SOURCE The data has been taken from two sources Primary data source The primary data source has been collected through questionnaire by personally interviewing each respondent on a number of queries structured in a questionnaire. Secondary data source Secondary data was collected from following sources Prior research reports Websites Books Newspaper Personal consultation THE AREA OF WORK The field work is conducted in the Lucknow city CONCLUSION With the past experience of working in Kairos for about one and a half month. The experience and exposure which I gained from the institution has not only helped me to broaden my knowledge about advertising, public relations and client servicing but has also given me a hands on experience on how and what to be done and through what ways can the clients be managed, and also the various things which are required to be asuccessful person in this field. The main factor that works in promoting any industry is how well is the company advertised and what is the reach of the company.how many people actually know about the company when the go in the market looking among the other companies.what is it the customer or client wants and what are they looking for. Do we have what our client wants? Are we providing our customers with something new and different or just following along the old guidelines. All these factors are meant to be kept in mind well before starting anything, because at the end of the day your success and failure only depends on your customers. REFERENCE Hiebert, R.E., Ungurait, D.F., and Bohn, T.W. (1988).Mass Media: An Introduction to Modern Communication, NY, Longman. Johnston, J. and Zawawi, C. (eds.) (2000), Public Relations: Theory and Practice, NSW, Allen Unwin. Kwansah-Aidoo, Kwamena (2001), GSC2410 Public Relations Theory and Processes, Victoria, Monash University. Lasswell, H. (1948) cited in Littlejohn, S. (1989), Theories of Human Communication Belmont, Wadsworth. Leedy, P.D. (1997), Practical Research: Planning and Design, (6th edn), NJ Prentice Hall. Mackey, S. (2000), ââ¬ËPublic Relations Theoryââ¬â¢, in J. Johnston and C. Zawawi (eds), Public Relations: Theory and Practice, Sydney, Allen Unwin.
Subscribe to:
Posts (Atom)