Writer’s Checklist


When writing a technical report ask yourself following questions:

  • What is reader’s name and job title?
  • What are reader’s chief responsibilities on the job?
  • What is reader’s educational background?
  • What is your reader’s professional background (previous positions or work experience)?
  • What is reader’s attitude toward the subject of the document?
  • What will the reader do with the document: file it, skim it, read only a portion of it, study it carefully, modify it and submit it to another reader, attempt to implement recommendations?
  • What are the reader’s likes and dislikes that might affect his/her reaction to the document?
  • How will your reader’s physical environment affect how you write and package the document?
  • What is your purpose in writing?
  • What is the document intended to accomplish?
  • Is your purpose consistent with your audience’s needs?
  • How does your understanding of your audience and of your purpose determine your strategy: the scope, structure, organization, tone, and vocabulary of the document?
  • Are there any organizational constraints that you have to accommodate?
  • Are there any informational constraints that you have to accommodate?
  • Are there any time constraints?
  • Have you checked with your primary reader to see if he or she approves of your strategy for the document?

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Advertisements

Synthesis of Two Sciences


Biometrics is a field that integrates biological science and computer science. One application of this new field of knowledge involves identification procedures. Scientists know that no two persons have the same fingerprint. This makes fingerprints a nearly foolproof method of identification. In the past, an individual’s fingers were coated with ink, and impressions were made on paper, then compared with impressions made by others. Laboratories kept files containing thousands of fingerprints. In time, computers enabled researchers to digitalize fingerprints and reduce them on computer screens. This enabled searches to occur much faster once fingerprints were on the file. Biometrics has now made possible the next step in this evolution of identification science. New scanners enable a person to place his or her finger on an imaging surface and instantaneously receive confirmation that the fingerprint matched that of the owner of an identification card. This technology of identification has been used to speed healthcare identification, eligibility for welfare benefits, and credit-card approvals.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Good Human Relations’ Spin-off


Most organizations and their managers realize the importance of maintaining good human relations. A climate of openness and trust can stimulate performance and foster loyalty. This kind of atmosphere can only have a positive effect on human relations.

Although many managers get a lift from knowing that they’re treating their workers right, there are practical benefits as well. When workers are satisfied with the interpersonal component of their jobs, they are usually more productive. They are also less likely to resign or to file a complaint with the personnel office, the union, or some other agency—both actions that could create additional expense and effort for the company.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Principals for Defining Privacy Policy


Companies wishing to enact an internal privacy policy or code should consider as a starting point the three concepts that help define information privacy: data collection, data accuracy, and data confidentiality.

Data Collection: the following principles should be adhered to:

  • Data should be collected on individuals only to accomplish a legitimate business objective.
  • Data should be adequate, relevant, and not excessive in relation to the business objective.
  • Data should be obtained in a lawful manner.
  • Individuals must give their consent before data pertaining to them can be gathered. Such consent may be implied from the individual’s actions (e.g., when they apply for credit, insurance, or employment).

Data accuracy: to ensure that misleading information will not be distributed, the following principles apply:

  • Sensitive data gathered on individuals should be verified before it is entered in database.
  • Data should be accurate and, when necessary, kept up to date.
  • The file should be made available so the individual can ensure that the data is correct.
  • If there is disagreement about the accuracy of the data, the individual’s version should be noted and included in any disclosures of the file.

Data Confidentiality: the privacy policy should ensure confidentiality as follows:

  • Computer security procedures should be implemented to provide reasonable assurance against the unauthorized disclosure of data. These procedures should include physical, technical, and administrative security measures.
  • Third parties should not be given access to data without the individual’s knowledge or permission, except as required by law.
  • Disclosures of data, other than the most routine, should be noted and maintained for as long as the data is maintained.
  • Data should not be disclosed for reasons incompatible with the business objective for which it was collected.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Statistical Analyses


The role of database is to help select names for modeling, implement the results of the modeling process by scoring names and assigning them to the appropriate decile, and selecting names by decile and other criteria for marketing programs. Most companies use statistical analysis for two principal reasons: a) segmentation, and b) predictive modeling.

Segmentation techniques are used to identify and profile groups of customers whose characteristics are similar. If the objective is to segment customers based on their performance, then the procedure is to group people according to their performance characteristics and then develop profiles of each performance group. Typical segmentation variables are performance measures such as recency, frequency, and monetary value of purchases; types of products purchased; or types of promotions responded to.

By linking this data with customer performance data, marketers can analyze who buys what and use the profiles of customers in each segment as a means of finding other customers like them.

Once the segments have been created, individual customers will be assigned to segments and these assignments will be recorded in the database. This makes subsequent selection of individuals for promotion based on the segmentation criteria relatively simple.

Predictive Modeling, based on previous purchase history, based on recency, frequency, and monetary value, models can be developed to predict who is most likely and least likely to purchase at the next opportunity. This scoring model would be used to determine who should be promoted and what they should be promoted with.

Once scoring models have been executed and customers assigned to deciles, this information is recorded in the database so that subsequent selection of customers who have the highest probability of responding to a promotion is easily accomplished.

End users would use a selection menu in which they would indicate which scoring model they wish to use and either a specific cutoff score or a desired number of names to select. The database would then perform the selection and produce an output file to the specific medium. This would either be a file, a magnetic tape, or mailing labels. A file could either be used for further analysis, or in many cases, the file could be combined with a patterned letter file to produce personalized mailings.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Primary Research Data


Primary data consists of data that is obtained directly from the source. It is generally captured through surveys, interviews, focus groups, or other direct interactions with individuals. The use of primary data has increased dramatically over the past few years, and with the advent of bar code scanners, home shopping, interactive television, and other electronic media, the number of channels through which primary data can be collected will increase exponentially.

Primary data consists of two major types:

  • Individual level demographic data such as age, income, and home value.
  • Attitudinal and behavioral data.

In the past, primary data was often the province of market research, and was used primarily to provide direction for marketing programs that addressed large groups of customers and prospects. Demographic data was used to get a better “fix” on the characteristics of the larger market, and attitudinal data was used to provide a sense of which issues were important to various groups of customers, and therefore should be emphasized in promotional materials.

Market researchers use primarily data to identify new product opportunities or new segments within the customer file. This is usually done by sending surveys to a representative sample of customers or prospects to determine what products and services they are interested in but do not currently purchase from the firm sending the questionnaire. In this way, primary data gathered through market research surveys can lead to the development of products that are either new to the firm or, in some cases, new to the industry.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Previous Older Entries