Wednesday, January 29, 2020

Business Communication Trends Essay Example for Free

Business Communication Trends Essay Business communication plays a big role in our daily work activities as individuals we must manage our daily activities depending on the trends and needs of our current workplace. There are ten Business communication trends the one that I will be discussing is on Quality and customer needs. Business Communication Trends Business communication is very important in my daily work environment. It is so important because we use this to communicate efficiently with our Managers to our customers. I work for The City of Indio in water department. My duties vary from customer service to Engineering administrative assistant. Business communication does play a big role in my day-to-day duties, because we have to be able to have great communication skills orally, and also we must use other communication technology efficiently like emails, letters, memos and phone or teleconferencing. In order to be a good representative we must be able to communicate effectively with our customers. The reason I say this is because we are responsible in making sure that we listen to what the customers needs are and that we are able to satisfactory resolve any issue that the customer might have. Many times when customers have a valid complain we must inform our supervisor via E-mail, depending on the level of urgency regarding the customers complains. I generally prefer to communicate this way because it creates a paper trail and it also protects me. Through these emails we must be able to communicate to our supervisor, what the issue is and what are the solutions that we can offer the customer. Then my supervisors will respond with either an approval or rejection. Then we can communicate with the customer and inform them what the end result is of their complaint. I have found that communicating with my supervisors via e-mail helps keep track of records, and if that same issue were to ever come up again we would have an e-mail that would be proof that particular issue was addressed and brought to our supervisors attention. If the issue is not resolved to the customer satisfaction it would be because there wasn’t a follow-up with the customer and we did not communicate in a professional manner. Business Communication Trends Working in a utility division comes with many challenges. When creating utility statement, wording has be to address in a manner where we are targeting an audience that can read and understand exactly what is being said in a normal monthly water utility bill . For example, what amount is due and when is it due. Many of our customers misinterpret or don’t understand the wording on the utility bills. This causes confusion, and can even cause customers to have the utility services interrupted, because they misinterpret their bill and did not know how to read it correctly. We all have spent countless hours rewording our statements and every time there is that one customer that is looking for a loop in the system to get away out of paying a payment or late fees. Our role as representatives is to ensure that are customer satisfaction is meet, and if there is an error where it might misguide our customers, we want to make sure that we correct the problem before it becomes a problem.

Tuesday, January 21, 2020

Essay --

Overview Upon entering the field of medicine, physicians agree to practice according to the Hippocratic Oath which states, â€Å"first, do no harm.† Although it seems like this task would be straight forward, it is not always clear on how to carry out this oath. One example of where conflicting viewpoints are often argued is how to resolve child abuse cases such as Munchausen Syndrome by Proxy (MSbP). MSbP is a relatively new form of child abuse in which a parent deliberately fabricates illnesses in their child to receive medical attention. Over the past 30 years, the recognition and prevalence of MSbP has increased, however, it is still difficult to identify and is highly under diagnosed (Maldonado, 2002). It has stirred much controversy and even the name itself is a topic of debate because MSbP is hard to define. Other terms to describe the condition include factitious disorder by proxy, pediatric condition falsification, and medical child abuse (Lowen & Reece, 2008). In treating a child that may be a victim of MSbP, using covert video surveillance (CVS) is controversial because blurred lines exist between using for it for diagnostic reasons versus legal reasons. When conducting CVS, typically two hidden cameras, placed in objects such as a wall clock or a ceiling light, monitor a parent’s activity without their knowledge (Shabde & Craft, 1999). A member of the care team, such as a nurse, and a police officer observe the video footage from a remote site to look for suspicious activity and intervene if the parent begins to harm the child. Some activity that is typically seen on footage include a parent poisoning their child with cleaning solution or salt, removing medical devices such as tubes, and smothering the child. Clinical Per... ...rs of the care team is communicating effectively with each other. Personal Perspective After researching the various viewpoints regarding CVS, I still maintain that it is ethical when used in good faith in order to protect the child. Many case studies have shown that not only is the child more likely to be put in a safer environment when child protective services has the evidence to intervene but it also saves siblings from potential harm. I believe that the physician’s role is to act in the best interest of the patient, especially when outside factors pose a threat to the child’s well-being. Although many view CVS as unethical because it infringes on privacy rights, it can also provide a great benefit. Studies such as the one conducted by David Southall make it difficult to dispute that there is not a value from using CVS as a form of diagnosis and intervention. Essay -- Overview Upon entering the field of medicine, physicians agree to practice according to the Hippocratic Oath which states, â€Å"first, do no harm.† Although it seems like this task would be straight forward, it is not always clear on how to carry out this oath. One example of where conflicting viewpoints are often argued is how to resolve child abuse cases such as Munchausen Syndrome by Proxy (MSbP). MSbP is a relatively new form of child abuse in which a parent deliberately fabricates illnesses in their child to receive medical attention. Over the past 30 years, the recognition and prevalence of MSbP has increased, however, it is still difficult to identify and is highly under diagnosed (Maldonado, 2002). It has stirred much controversy and even the name itself is a topic of debate because MSbP is hard to define. Other terms to describe the condition include factitious disorder by proxy, pediatric condition falsification, and medical child abuse (Lowen & Reece, 2008). In treating a child that may be a victim of MSbP, using covert video surveillance (CVS) is controversial because blurred lines exist between using for it for diagnostic reasons versus legal reasons. When conducting CVS, typically two hidden cameras, placed in objects such as a wall clock or a ceiling light, monitor a parent’s activity without their knowledge (Shabde & Craft, 1999). A member of the care team, such as a nurse, and a police officer observe the video footage from a remote site to look for suspicious activity and intervene if the parent begins to harm the child. Some activity that is typically seen on footage include a parent poisoning their child with cleaning solution or salt, removing medical devices such as tubes, and smothering the child. Clinical Per... ...rs of the care team is communicating effectively with each other. Personal Perspective After researching the various viewpoints regarding CVS, I still maintain that it is ethical when used in good faith in order to protect the child. Many case studies have shown that not only is the child more likely to be put in a safer environment when child protective services has the evidence to intervene but it also saves siblings from potential harm. I believe that the physician’s role is to act in the best interest of the patient, especially when outside factors pose a threat to the child’s well-being. Although many view CVS as unethical because it infringes on privacy rights, it can also provide a great benefit. Studies such as the one conducted by David Southall make it difficult to dispute that there is not a value from using CVS as a form of diagnosis and intervention.

Monday, January 13, 2020

How Should Social Networks Be Utilized in the Workplace?

How could these social networking sites be a threat to a company’s security? In today’s world it seems the human race could not live without information technology in the workplace. More importantly, social networks like Facebook and Twitter are becoming very popular tools for business development in today’s world. There are dozens of social network sites and more popping up every day. It is astounding the number of hours that people waste on such sites.Updating, checking in and sending out bits and blurbs about every little aspect of one's life seems cheap. More astounding than individuals wasting time on these things is that businesses are also wasting time on them. Actual megabuck businesses are in on the whole social networking shtick. The challenge for the business world is how to utilize these social networks effectively and safely. The value of social networks and how they can benefit businesses has been in question recently.Also in question is do these so cial networks create a security risk with employees conveying possibly privileged information to a friend or relative through Facebook or Twitter. How does a company prevent potential security risks? They have to block social networking sites or grant limited access to specific departments. Metro Business College prevents students from accessing social networking sites on school computers but allows faculty and staff to access from their desk computers.Metro’s reasoning is students should be at school to learn, not stare at Facebook all class period. The question then is not are these sights a security risk but rather are these sites a huge time suck for employees which creates a reduction in productivity? The biggest risk a company a company faces is how employees that utilize these sights can make their company look and what effects it could possibly have on their reputation. How social networking can tarnish the reputation of a company or enhance it. Unfortunately, there i s a downside to social networking.It is essentially an open forum and anyone can say and post anything on a company’s page. For the most part, it is potentially dangerous to a company’s reputation. Due to this fact, a company’s networking site should have limited access when it pertains to posting information. Take, for instance, a recent report on The Springfield Brewery in Springfield, Missouri. The social media specialist posted a humorous joke to its Facebook page and unfortunately it was met with several disgruntled comments. Several customers stated they would never â€Å"step foot n the restaurant again†. [ (Pettit, 2013) ] It is bad press such as that over such a small comment that could potentially destroy a company. On the other hand there are companies like Tupperware that use social networking internally to boost the pride employees have for the company, the attachment an employee feels and fun an employee has while at work. [ (Huy, 2012) ] Af ter adopting these social media concepts the turnover rate fell by fifteen percent and a webcast created new sales of $700,000 in just three days. (Huy, 2012) ] Sometimes social media can create opportunities for companies that they normally would not have and it is the companies that are willing to evolve and understand the importance of social networking that will survive. Another company that utilizes social networking site is Metro Business College they found that websites such as Facebook and Twitter can be excellent recruiting tools and also they are useful to keep track of their student body and possibly help them if they have issues with homework or even personal problems.Social networking can be an invaluable tool to an organization if utilized properly and monitored by administrators to prevent potentially damaging posts or comments. How to make social networking work for the greater good of the company LinkedIn can be a valuable tool. Resumes can be posted there which can be utilized by human resources departments for recruiting purposes. Potential employees post their profiles there, which also can be utilized by the human resources department to check the character of a potential recruit. Slovensky, 2012) Some companies are requiring potential employees to provide human resources access to their Facebook pages so they can see the character of the candidate. Companies post jobs on networking sites like LinkedIn and Facebook which can benefit other companies to view how their competition is doing, if they are posting new positions then that company is most likely in a state of growth. People looking for jobs are on these sights and they provide all the information a potential employer needs to make an informed hiring decision.When it comes to professional social networking, LinkedIn is the most successful site of its kind. It is better than Facebook or Twitter because it eliminates the everyday social aspect, including the posting of how one’ s morning breakfast made them feel and the LOLs. Another benefit of LinkedIn is that all discussions and groups are moderated. Nonsense is kept to a minimum. Rarely does one have to deal with spam or irritation there. It is a safe haven for serious social networking, for serious business connection building and for serious relationship building.However, there are benefits to using networking sites like Facebook as well. After all, Facebook does have 175 million members according to an article called Inside Facebook written in 2009. Maintaining the strategic advantage through e-business and social networking The questions a company must ask are:  To how many social networks do you belong? How valuable are they to you? If they went away tomorrow, would you feel any impact to your business? A simple answer is that individuals should choose one or two professional networks and farm those like any other social networking situation.Leave the shot gunning to the amateurs. Make connection s that count. 10,000 â€Å"Likes† do not mean anything if they are not buying, reading, recommending or influencing. Companies should not waste your time with such pursuits. The return on investment is not high enough. Mass mailings do not work. Certain types of advertising just do not work for some businesses. Building relationships with clients is the most important aspect of any business and that is best done through human contact not a mass email.Do not rely on flash-in-the-pan online social networks to build your business. Clients and potential clients like to know that there's a 98. 6 degree hand on the other end of those messages and not a piece of software. It might sound old-fashioned and outdated but there is nothing like true social networking to build a business. A company builds a business through building relationships. Studies have shown that relying on social networks to create strong ties actually has the opposite effect and instead weakens them.Facebook is a good example of a social networking site that creates weak ties (Jennifer, 2010). Instead of creating direct networks among its participants, the social networking site creates sub-networks. With no direct link to the company or the issue at hand it can create weaker ties and a customer that does not show as much company loyalty. (Slovensky, 2012) In the end it does not matter how the company views social networking but how the customer base views that company’s use of these social networking sites.If they are well monitored and provide password protected use for a limited amount of employees then it can be beneficial. However, the biggest issue most companies face is that one instance when something is posted that causes a security breach or something is posted that hurts the company’s reputation. They then have to answer the question, what do we do next? Social networking is not going anywhere in fact it is growing everyday with new sites popping up all of the time and companies that want to survive will need to get on board.References Huy, Q. &. (2012). The key to social media success within organizations. MIT SLoan Management Review , 54 (1), 73-81. Jennifer, S. (2010). Planning in the age of facebook: the role of social networking in planning processes. GeoJournal , 75 (5), 407-420. Slovensky, R. &. (2012). Should human resource managers use social media to screen job applicants? managerial and legal issues in the USA. Ifno: The Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media , 14 (1), 55-69.

Sunday, January 5, 2020

The Principles Of Software Engineering - 1269 Words

ITECH3501-6501 – Individual Assignment. Student ID : 30131158 Principles of Software Engineering School of Science, Information Technology and Engineering (SITE) Objective: The purpose of this assignment is to enable students to demonstrate their ability to interpret a set of laws that are part of the principles of software engineering, to evaluate principles of software engineering aspects within an industry in relation to the various elements covered, to apply them to a cases drawn from technical and academic literature and to communicate the key issues through a written academic report. Individual Assignment Weighting and Due Date: Refer to Course Description on Moodle Description of assignment: The Laws of Software Engineering. Consider the following four laws given in the prescribed text: Curtis Good design requires deep application domain knowledge. (L5) Simon Hierarchical structures reduce complexity. (L6) Denert Separation of concerns leads to standard architectures. (L9) DeRemer What applies to small systems does not apply to large ones. (LI6) 1. Describe each law in your own words. Define the terms in each law and explain the law clearly and thoroughly. Illustrate your explanation with practical examples – with at least one example for each law from software engineering. Curtis : For make S For Build Successfully Large and Complex system, The Deep Application specific knowledge is must required,The deep integration of variousShow MoreRelatedPrinciples of Software Engineering2346 Words   |  10 Pagesdevelopment of a project. In fact, it is the first step for any project The main problem in a project failure is the lack of requirements. The common requirement error is due to human (i.e lack of Communication between customer and the analyst), software, etc. Example: Denver International Airport Reason: Underestimation of complexity, Complex architecture, Changes in requirements, Underestimation of schedule and budget, Dismissal of advice from experts, Failure to build in backupRead MorePrinciples of Software Engineering Essays1521 Words   |  7 Pagesdeveloper does not know the actual domain then the project will fail. The cost of the error depends on when it is removed. The earlier it is removed the lower the cost. He also provided evidences by analysing many case studies; he made research on software errors developed before 1974. Boehm’s paper refers to a study done at TRW in 1974 where 224 errors were analysed. They find 100 KLOC, which consists of errors. The most important conclusion was that the design errors are higher than the code errorRead MoreKey Principles And Problems Of Software Engineering1782 Words   |  8 PagesAcademic Skills CentreUNIVERSITY OF BATH PSG5 PROJECT: Describe the main principles and problems of software engineering. Choose one specific problem and evaluate current solutions to this problem. NAME: Bingjie YU DATE: 03/09/2015 Word Count: 1487 words Declaration This essay/assignment is all my own work, except where acknowledged. Ideas, words or passages taken from other sources are indicated using the appropriate referencing system. The material in this assignment has not been submittedRead MoreQuestions On Technical Design Decisions1010 Words   |  5 Pages1. Which decisions are those taken by the software engineer about the best ways (processes, techniques, and technologies) to achieve the requirements? Answer: Technical design decisions are often made by the software engineers. These decisions incorporate choosing the development process to use in light of the requirements and timeline. If requirements are stable, then traditional life cycle can be used but if the requirements change often then iterative development would be valuable. If the timelineRead MoreAgile vs. Prescriptive Processes758 Words   |  4 Pagesjaideej@hotmail.com Agile Software Development Agile Development is one of the methodologies use in software engineering to help develops software. Today, there are a lot of different approach to Agile method. However, they all share the same value and principals. This method is value interactions over team and customer, workable software, and adaptable to change. Over the processes, documentation, contract, and plan. Agile developer also following 12 principle. 1, Their first priority isRead MoreSoftware Development : The Spiral Model Essay1039 Words   |  5 Pages Software Development Software development is a discipline that all relate directly to the progress, improvements in productivity, and a lot of smart people working hard and generating significant benefits for businesses and society. But at the same time we note that projects often suffer delays and the expected results despite the talent and effort put into action by analysts, programmers and users so that the new system to function properly and on time are obtained. Spiral model In the spiralRead MoreSoftware1632 Words   |  7 PagesPrinciple of Software Engineering Table of Contents Abstract 3 Introduction 4 Boehms First Law 4 Boehms Second law 5 Conways law 5 Parnas Law 6 Corbatà ³ Law 7 Observation 8 Theory 9 Law 9 Question 3 10 Law 11 References 12 Abstract The purpose of the study is to show the capability to understand the set of laws that are the part of principles of the software engineering. In this paper, it is discussed that there are manyRead MoreBest Practices For Software Engineers1241 Words   |  5 PagesBest Practices for Software Engineers: An Analysis and Assessment of the Healthcare.gov and DIA Baggage System Projects (Draft) I. INTRODUCTION â€Å"Software engineering is the establishment and use of sound engineering principles in order to economically obtain software that is reliable and works efficiently on real machines.†[1]It’s an important discipline that came to light back in the 1960s when many projects regarding software systems’ design and implementation turned out to be disastrous due toRead MoreEssay on New Fantasyland in Walt Disney World Florida1290 Words   |  6 Pagesdisciplines of engineering, including mechanical, structural, and software engineering. Mechanical engineering is the discipline of engineering which involves design and building devices and machines using the principles of energy, materials and mechanics. It is one of the largest disciplines, one of the oldest, having been around before it was formally recognised in the 1840s, and one of the broadest. There are many sub-disciplines of mechanical engineering, such as mechatronical engineering (a mix ofRead MoreCode Of Ethics Of Ieee. Computer Society1597 Words   |  7 PagesCode of Ethics of IEEE Computer Society for software engineers, as well as the description of this ethical framework. Additionally, it is collated with those presented by other tutorial group members. 2 Investigated ethical framework The latest version of {The Software Engineering Code of Ethics and Professional Practice} was developed by the {IEEE Computer Society} in 1999. It consist of eight fundamental principles and everyone who works in software development field is obligated to admit them