Payroll Register

Wayland custom woodworking is a firm that manufactures custom cabinets and woodwork for business and residential customers. students will have the opportunity to establish payroll records and to complete a month of payroll information for wayland. wayland custom woodworking is located at 1716 nichol street, logan, utah, 84321, phone number 435-555-9877. the owner is mark wayland. wayland’s ein is 91-7444533, and the utah employer account number is 999-9290-1. wayland has determined it will pay their employees on a semimonthly basis. federal income tax should be computed using the percentage method. For part 2 of this project you will complete payroll for the last month. The suta (ui) rate for wayland custom woodworking is 2.6 percent on the first $33,400. the state withholding rate is 4.95 percent for all income levels and marital statuses.. for part 2 of this project, you will use the fourth quarter payroll information that you calculated in part 1 to complete the following tax forms for wayland custom woodworking: s. form 940 utah form tc-941 utah form 33h form w-2s for all 6 employees form w-3 for wcw employer amounts for health coverage should be reported as 1.5 times the employee’s premium in box 12, using code dd. specific instructions on how to complete each form can be found within the individual forms themselves.

Required information

[The following information applies to the questions displayed below.]

 

Wayland Custom Woodworking is a firm that manufactures custom cabinets and woodwork for business and residential customers. Students will have the opportunity to establish payroll records and to complete a month of payroll information for Wayland. Wayland Custom Woodworking is located at 1716 Nichol Street, Logan, Utah, 84321, phone number 435-555-9877. The owner is Mark Wayland. Wayland’s EIN is 91-7444533, and the Utah Employer Account Number is 999-9290-1. Wayland has determined it will pay their employees on a semimonthly basis. Federal income tax should be computed using the  percentage  method.

 

For Part 2 of this project, you will complete payroll for the last month (December) of the fourth quarter (Q4) of 2018, which consists of the final two pay periods of the year. Then file the annual tax forms for Wayland as well as prepare each employee’s Form W-2 in Part 2.

 

The SUTA (UI) rate for Wayland Custom Woodworking is 2.6 percent on the first $34,300. The state withholding rate is 4.95 percent for all income levels and marital statuses.

 

For Part 2 of this project, you will use the fourth quarter payroll information that you calculated in Part 1 to complete the following tax forms for Wayland Custom Woodworking:

¡ U.S. Form 941

¡ U.S. Form 940

¡ Utah Form TC-941

¡ Utah Form 33H

¡ Form W-2s for all 6 employees

¡ Form W-3 for WCW

 

Employer amounts for health coverage should be reported as 1.5 times the employee’s premium in Box 12, using Code DD. Specific instructions on how to complete each form can be found within the individual forms themselves. The employee information for Wayland has been presented again below, for convenience.

 

Employee Number Name and Address Payroll information
00-Chins Anthony Chinson Married, 1 Withholding allowance
  530 Sylvann Avenue Exempt
  Logan, UT 84321 $24,000/year + commission
  435-555-1212 Start Date: 10/1/2018
  Job title: Account Executive SSN: 511-22-3333
     
00-Wayla Mark Wayland Married, 5 withholding allowances
  1570 Lovett Street Exempt
  Logan, UT 84321 $75,000/year
  435-555-1110 Start Date: 10/1/2018
  Job title: President/Owner SSN: 505-33-1775
     
01-Peppi Sylvia Peppinico Married, 7 withholding allowances
  291 Antioch Road Exempt
  Logan, UT 84321 $43,500/year
  435-555-2244 Start Date: 10/1/2018
  Job title: Craftsman SSN: 047-55-9951
     
01-Varde Stevon Varden Married, 2 withholding allowances
  333 Justin Drive Nonexempt
  Logan, UT 84321 $42,000/year
  435-555-9981 Start Date: 10/1/2018
  Job title: Craftsman SSN: 022-66-1131
     
02-Hisso Leonard Hissop Single, 4 withholding allowances
  531 5th Street Nonexempt
  Logan, UT 84321 $49,500/year
  435-555-5858 Start Date: 10/1/2018
  Job title: Purchasing/Shipping SSN: 311-22-6698
     
00-Succe Student Success Single, 1 withholding allowance
  1650 South Street Nonexempt
  Logan, UT 84321 $36,000/year
  435-556-1211 Start Date: 10/1/2018
  Job title: Accounting Clerk SSN: 555-55-5555
     

 

Total deposits made for the quarter is $11,042.58. Monthly tax liability:

   
October $ 5,569.10  
November   5,473.48  
December   0.00  
 

FUTA tax deposited for the year, including any overpayment applied from a prior year is $247.45.

If you have submitted Part 1 already, it is recommended that you access your submission while attempting Part 2, as you will need the information from Part 1 in order to complete all applicable tax forms.

 

For additional instructions on how to navigate and work through through Part 2 of this project, please download the student project guide here.

Required:

2. Complete Form 940 for Wayland Custom Woodworking.

 

Required information

[The following information applies to the questions displayed below.]

 

Wayland Custom Woodworking is a firm that manufactures custom cabinets and woodwork for business and residential customers. Students will have the opportunity to establish payroll records and to complete a month of payroll information for Wayland. Wayland Custom Woodworking is located at 1716 Nichol Street, Logan, Utah, 84321, phone number 435-555-9877. The owner is Mark Wayland. Wayland’s EIN is 91-7444533, and the Utah Employer Account Number is 999-9290-1. Wayland has determined it will pay their employees on a semimonthly basis. Federal income tax should be computed using the  percentage  method.

 

For Part 1 of this project, you will complete payroll for the entire fourth quarter (Q4) of 2018, which consists of the final six pay periods of the year. Once payroll has been completed for the fourth quarter, you will then file the annual tax forms for Wayland as well as prepare each employee’s Form W-2 in Part 2.

 

The SUTA (UI) rate for Wayland Custom Woodworking is 2.6 percent on the first $34,300. The state withholding rate is 4.95 percent for all income levels and marital statuses, a table has been included to assist with calculations.

 

Rounding can create a challenge. For this project, the hourly rate for the individuals should be rounded to five decimal places. So take their salary and divide by 2,080 (52 weeks at 40 hours per week) for full-time, nonexempt employees. For nonexempt employees, such as Stevon Varden, Varden’s salary is $42,000 and is a nonexempt employee, so the calculation will be $42,000/2,080, which would give you $20.19231 per hour, and use this to compute the employee’s gross pay based on the number of hours worked. When a nonexempt employee has worked overtime hours for a given pay period, take their regular hourly rate and multiply it by 1.5, round the result to 5 decimal places, and multiply the new rate by their number of overtime hours.

 

For exempt employees’, such as Anthony Chinson, an hourly rate rounded to five decimal places should be determined using the same method shown above, but gross pay should be determined by taking the exempt employee’s yearly salary and dividing it by 24, which is the number of payroll periods with a semimonthly frequency. For example, Chinson’s salary is $24,000 and is a full time employee. Chinson’s hourly rate is $11.53846 (determined by taking $24,000/2,080), but as he is an exempt employee, the calculation for his gross pay will be $24,000/24, which would give you $1,000. For pay periods that include paid holidays, ensure to distribute an exempt employee’s regular pay accordingly to holiday pay based on the number of hours that consist of the holidays for that period.

 

After the gross pay has been calculated, round the result to only two decimal points prior to calculating taxes or other withholdings.

 

Employees are paid for the following holidays occurring during the final quarter:

¡ Thanksgiving day and the day after, Thursday and Friday November 22-23.

¡ Christmas, which is a Tuesday. Employees receive holiday pay for  Monday, December 24, and Tuesday, December 25.

 

For the completion of this project, refer to the tax-related information in the table below. For federal withholding calculations, use the percentage method tables in Appendix C, which is provided below. For Utah state withholding calculations, use the Utah Schedule 3 tax tables linked below (ensure to use the appropriate Utah table based on each employee’s marital status). Both 401(k) and insurance are pretax for federal income tax and Utah income tax.

 

   
Federal Withholding Allowance (less 401(k), Section 125) $172.90 per allowance claimed
Federal Unemployment Rate (employer only) (less Section 125) 0.6% on the first $7,000 of wages
Semimonthly Federal Percentage Method Tax Table Appendix C Page 393 Table #3
State Unemployment Rate (employer only) (less Section 125) 2.6% on the first $34,300 of wages
State Withholding Rate (less 401(k), Section 125) See Utah Schedule 3, Table 1 or use the Excel Version of Schedule 3
 

 

October 1:

Wayland Custom Woodworking (WCW) pays its employees according to their job classification. The following employees comprise Wayland’s staff:

 

Employee Number Name and Address Payroll information
00-Chins Anthony Chinson Married, 1 Withholding allowance
  530 Sylvann Avenue Exempt
  Logan, UT 84321 $24,000/year + commission
  435-555-1212 Start Date: 10/1/2018
  Job title: Account Executive SSN: 511-22-3333
     
00-Wayla Mark Wayland Married, 5 withholding allowances
  1570 Lovett Street Exempt
  Logan, UT 84321 $75,000/year
  435-555-1110 Start Date: 10/1/2018
  Job title: President/Owner SSN: 505-33-1775
     
01-Peppi Sylvia Peppinico Married, 7 withholding allowances
  291 Antioch Road Exempt
  Logan, UT 84321 $43,500/year
  435-555-2244 Start Date: 10/1/2018
  Job title: Craftsman SSN: 047-55-9951
     
01-Varde Stevon Varden Married, 2 withholding allowances
  333 Justin Drive Nonexempt
  Logan, UT 84321 $42,000/year
  435-555-9981 Start Date: 10/1/2018
  Job title: Craftsman SSN: 022-66-1131
     
02-Hisso Leonard Hissop Single, 4 withholding allowances
  531 5th Street Nonexempt
  Logan, UT 84321 $49,500/year
  435-555-5858 Start Date: 10/1/2018
  Job title: Purchasing/Shipping SSN: 311-22-6698
     
00-Succe Student Success Single, 1 withholding allowance
  1650 South Street Nonexempt
  Logan, UT 84321 $36,000/year
  435-556-1211 Start Date: 10/1/2018
  Job title: Accounting Clerk SSN: 555-55-5555
     

 

The departments are as follows:

Department 00: Sales and Administration

Department 01: Factory workers

Department 02: Delivery and Customer service

 

You have been hired as of October 1 as the new accounting clerk. Your employee number is 00-SUCCE. Your name is Student Success. Your address is 1650 South Street, Logan, UT 84321. Your phone number is 435-556-1211, you were born July 16, 1985, your Utah driver’s license number is 887743 expiring in 7/16/2019, and your Social Security number is 555-55-5555. You are considered a nonexempt employee, have one withholding allowance, and paid a rate of $36,000 per year.

The balance sheet for WCW as of September 30, 2018, is as follows:

Wayland Custom Woodworking Balance Sheet September 30, 2018  
Assets   Liabilities & Equity  
Cash $ 1,125,000.00   Accounts Payable $ 112,490.00  
Supplies   27,240.00   Salaries and Wages Payable      
Office Equipment   87,250.00   Federal Unemployment Tax Payable      
Inventory   123,000.00   Social Security Tax Payable      
Vehicle   25,000.00   Medicare Tax Payable      
Accumulated Depreciation, Vehicle       State Unemployment Tax Payable      
Building   164,000.00   Employee Federal Income Tax Payable      
Accumulated Depreciation, Building       Employee State Income Tax Payable      
Land   35,750.00   401(k) Contributions Payable      
Total Assets   1,587,240.00   Employee Medical Premiums Payable      
        Notes Payable   224,750.00  
        Utilities Payable      
        Total Liabilities   337,240.00  
        Owners’ Equity   1,250,000.00  
        Retained Earnings    
        Total Equity   1,250,000.00  
        Total Liabilities and Equity   1,587,240.00  
   

 

Voluntary deductions for each employee are as follows:

 

Name Deduction
Chinson Insurance: $50/paycheck
  401(k): 3% of gross pay
Wayland Insurance: $75/paycheck
  401(k): 6% of gross pay
Peppinico Insurance: $75/paycheck
  401(k): $50 per paycheck
Varden Insurance: $50/paycheck
  401(k): 4% of gross pay
Hissop Insurance: $75/paycheck
  401(k): 3% of gross pay
Student Insurance: $50/paycheck
  401(k): 3% of gross pay
 

 

For additional instructions on how to navigate and work through through Part 1 of this project, please download the student project guide here.

Required:

2. Complete the payroll process for Wayland Custom Woodworking’s fourth quarter pay periods. Please note that for pay periods after October 15, you  must  carry the current ending year to date (YTD) amounts as they appear from the prior pay period from each employee’s Employee Earnings Records form (EERF) to the rows titled “Prior Period YTD”. Amounts from the current pay period will be auto-populated to the employee EERFs once you complete the payroll register, and will be combined with the prior period YTD amounts to determine the new current ending YTD amounts.

 

For example, if the year to date gross pay for Anthony Chinson is $5,000 after the October 31 pay period, you would take this amount and add it to the appropriate input box for gross pay on the “Prior Period YTD” row for their November 15 EERF.

 

Additionally, you must carry the ending balance from each account in the prior period General Ledger to the following period’s General Ledger to the input boxes titled “Ending account balance from the prior period” before posting the payroll journal entries from the current period to the Ledger.

 

For additional instructions on how to carry information from one pay period to another, along with a guided walkthrough example of this process, refer to the project user guide in the project information section above.

 

October 15

 

October 15 is the end of the first pay period for the month of October. Employee pay will be disbursed on October 20, 2018. Any time worked in excess of 88 hours during this pay period is considered overtime for nonexempt employees. Remember that the employees are paid on a semimonthly basis.

 

¡ Complete the Employee Gross Pay tab.

¡ Complete the Payroll Register for October 15.

¡ Refer to the Employee Earnings Record Forms for each employee for the current YTD amounts after you have completed the October 15 Payroll Register. Amounts from the current period are auto-populated from the Payroll Register.

¡ Complete the General Journal entries for the October 15 payroll.

¡ Post the journal entries to the General Ledger.

 

omplete the question by filling in all answers in the tabs below.

¡ Employee Grosspay

¡ Payroll Register

¡ Chinson EERF

¡ Wayland EERF

¡ Peppinico EERF

¡ Varden EERF

¡ Hissop EERF

¡ Success EERF

¡ General Journal

¡ General Ledger

Compute the hourly rates as well as the gross earnings for regular and overtime pay for each employee for the October 15 pay period. Remember that while you are computing an hourly rate for all employees, the regular pay for exempt employees should be calculated by taking their yearly salary and dividing it by the number of semimonthly pay periods in a year. (Round answers for hourly rate to 5 decimal places and all other answers to 2 decimals.)

Show less

 
 
 
 
Last Name Hourly Rate (Rounded to 5 Decimals) Pay Period Hours 10/1-10/15 Regular Overtime Commission
Chinson $11.53846selected answer correct 88 hours (exempt) $1,015.52selected answer incorrect $0.00not attempted $1,500.00
Wayland $36.05769selected answer correct 88 hours (exempt) $3,173.08selected answer incorrect $0.00not attempted  
Peppinico $20.91346selected answer correct 88 hours (exempt) $1,840.38selected answer incorrect $0.00not attempted  
Varden $20.19231selected answer correct 88 hours $1,615.38selected answer incorrect $242.29not attempted  
Hissop $23.79808selected answer correct 93.25 hours $1,903.85selected answer incorrect $472.99selected answer incorrect  
Success $17.30769selected answer correct 90 hours $1,384.62selected answer incorrect $259.62selected answer incorrect  

 

¡ Employee Grosspay

¡ Payroll Register

*Red text indicates no response was expected in a cell or a formula-based calculation is incorrect; no points deducted.

October 31

October 31 is the end of the final pay period for the month. Employee pay will be disbursed on November 5, 2018. Compute the employee pay below. Update the Employees’ Earnings Records for the period’s pay and update the YTD amount. Any time worked in excess of 96 hours during this pay period is considered overtime for nonexempt employees. Remember that the employees are paid semi-monthly.

 

¡ Complete the Employee Gross Pay tab.

¡ Complete the Payroll Register for October 31.

¡ You must update the Employee Earnings Record Forms for each employee with the ending YTD amounts from October 15 (the prior pay period) in the “Prior Period YTD” rows. Amounts from the current period are auto-populated from the Payroll Register on the row for October 31.

¡ Complete the General Journal entries for the October 31 payroll.

¡ Update the General Ledger with the ending ledger balances from the October 15 pay period ledger accounts first, and then post the journal entries from the current period to the General Ledger.

 

Complete the question by filling in all answers in the tabs below.

¡ Employee Grosspay

¡ Payroll Register

¡ Chinson EERF

¡ Wayland EERF

¡ Peppinico EERF

¡ Varden EERF

¡ Hissop EERF

¡ Success EERF

¡ General Journal

¡ General Ledger

Compute the gross earnings for regular and overtime pay for each employee for the October 31 pay period. Remember that while an hourly rate is shown for all employees, the regular pay for exempt employees should be calculated by taking their yearly salary and dividing it by the number of semimonthly pay periods in a year. The pay rates for each employee have been given from the prior period. (Round your answers to 2 decimals.)

Show less

 
 
 
 
Last Name Hourly Rate (Rounded to 5 Decimals) Pay Period Hours 10/16-10/31 Regular Overtime Commission
Chinson $11.53846selected answer correct 96 hours (exempt) $1,000.00selected answer correct $0.00not attempted $1,750.00
Wayland $36.05769selected answer correct 96 hours (exempt) $2,884.62selected answer incorrect $0.00not attempted  
Peppinico $20.91346selected answer correct 96 hours (exempt) $1,672.98selected answer incorrect $0.00not attempted  
Varden $20.19231selected answer correct 100 hours $1,615.38selected answer incorrect $605.77selected answer incorrect  
Hissop $23.79808selected answer correct 103 hours $1,903.85selected answer incorrect $821.03selected answer incorrect  
Success $17.30769selected answer correct 98 hours $1,384.62selected answer incorrect $467.31selected answer incorrect  

 

Complete the question by filling in all answers in the tabs below.

¡ Employee Grosspay

¡ Payroll Register

¡ Chinson EERF

¡ Wayland EERF

¡ Peppinico EERF

¡ Varden EERF

¡ Hissop EERF

¡ Success EERF

¡ General Journal

¡ General Ledger

Compute the gross earnings for regular and overtime pay for each employee for the November 15 pay period. Remember that while an hourly rate is shown for all employees, the regular pay for exempt employees should be calculated by taking their yearly salary and dividing it by the number of semimonthly pay periods in a year. The pay rates for each employee have been given from the prior period. (Round your answers to 2 decimals.)

Show less

 
 
 
 
Last Name Hourly Rate (Rounded to 5 Decimals) Pay Period Hours 11/01-11/15 Regular Overtime Commission
Chinson $11.53846selected answer correct 88 hours (exempt) $1,000.00selected answer correct $0.00not attempted $1,050.00
Wayland $36.05769selected answer correct 88 hours (exempt) $3,173.08selected answer incorrect $0.00not attempted  
Peppinico $20.91346selected answer correct 88 hours (exempt) $1,840.38selected answer incorrect $0.00not attempted  
Varden $20.19231selected answer correct 96 hours $1,615.38selected answer incorrect $484.62selected answer incorrect  
Hissop $23.79808selected answer correct 91 hours $1,903.85selected answer incorrect $392.67selected answer incorrect  
Success $17.30769selected answer correct 93 hours $1,384.62selected answer incorrect $337.50selected answer incorrect  

 

November 30

 

Compute the Net Pay for each employee. Employee pay will be disbursed on December 5, 2018. Update the Employees’ Earnings Record with the November 30 pay and the new YTD amount.

 

The company is closed and pays for the Friday following Thanksgiving. The employees will receive holiday pay for Thanksgiving and the Friday following. All the hours over 88 are eligible for overtime for nonexempt employees as they were worked during the non-holiday week.

 

 

 

Complete the Employee Gross Pay tab.

Complete the Payroll Register for November 30.

You must update the Employee Earnings Record Forms for each employee with the ending YTD amounts from November 15 (the prior pay period) in the “Prior Period YTD” rows. Amounts from the current period are auto-populated from the Payroll Register on the row for November 30.

Complete the General Journal entries for the November 30 payroll.

Update the General Ledger with the ending ledger balances from the November 15 pay period ledger accounts first, and then post the journal entries from the current period to the General Ledger.

 

Complete the question by filling in all answers in the tabs below.

¡ Employee Grosspay

¡ Payroll Register

¡ Chinson EERF

¡ Wayland EERF

¡ Peppinico EERF

¡ Varden EERF

¡ Hissop EERF

¡ Success EERF

¡ General Journal

¡ General Ledger

Compute the gross earnings for regular, overtime, and holiday pay for each employee for the November 30 pay period. Remember that while an hourly rate is shown for all employees, the period pay for exempt employees should be calculated by taking their yearly salary and dividing it by the number of semimonthly pay periods in a year, which should then be split between the number of hours considered regular time and holiday time.  The pay rates for each employee have been given from the prior period. (Round your answers to 2 decimals.)

Show less

 
 
 
 
Last Name Hourly Rate (Rounded to 5 Decimals) Pay Period Hours 11/16-11/30 Regular Overtime Holiday Commission
Chinson $11.53846selected answer correct 88 hours (exempt – 16 hours Holiday) $1,000.00selected answer incorrect $276.92not attempted $276.92selected answer incorrect $2,325.00
Wayland $36.05769selected answer correct 88 hours (exempt – 16 hours Holiday) $3,173.08selected answer incorrect $865.08not attempted $865.08selected answer incorrect  
Peppinico $20.91346selected answer correct 88 hours (exempt – 16 hours Holiday) $1,840.38selected answer incorrect $501.92not attempted $501.92selected answer incorrect  
Varden $20.19231selected answer correct 90 hours (exempt – 16 hours Holiday) $1,615.38selected answer incorrect $484.62selected answer incorrect $484.62selected answer incorrect  
Hissop $23.79808selected answer correct 91 hours (exempt – 16 hours Holiday) $1,903.85selected answer incorrect $571.15selected answer incorrect $571.15selected answer incorrect  
Success $17.30769selected answer correct 89 hours (exempt – 16 hours Holiday) $1,384.62selected answer incorrect $415.38selected answer incorrect $415.38selected answer incorrect  

 

 

 

 

 

¡ Employee Grosspay

 

¡ General Ledger

Compute the gross earnings for regular and overtime pay for each employee for the December 15 pay period. Remember that while an hourly rate is shown for all employees, the regular pay for exempt employees should be calculated by taking their yearly salary and dividing it by the number of semimonthly pay periods in a year. The pay rates for each employee have been given from the prior period. (Round your answers to 2 decimals.)

Show less

 
 
 
 
Last Name Hourly Rate (Rounded to 5 Decimals) Pay Period Hours 12/01-12/15 Regular Overtime Holiday Commission
Chinson $11.53846selected answer correct 80 hours (exempt) $1,000.00selected answer correct $0.00not attempted $0.00not attempted $1,680.00
Wayland $36.05769selected answer correct 80 hours (exempt) $3,125.00selected answer correct $0.00not attempted $0.00not attempted  
Peppinico $20.91346selected answer correct 80 hours (exempt) $1,812.50selected answer correct $0.00not attempted $0.00not attempted  
Varden $20.19231selected answer correct 84 hours $1,615.38selected answer correct $121.15selected answer correct $121.15not attempted  
Hissop $23.79808selected answer correct 80 hours $1,903.85selected answer correct $0.00not attempted $0.00not attempted  
Success $17.30769selected answer correct 83 hours $1,384.62selected answer correct $77.88selected answer correct $77.88not attempted  

 

¡ Employee Grosspay

¡ Payroll Register

¡ *Re

¡

¡

Complete the question by filling in all answers in the tabs below.

¡ Employee Grosspay

¡ Payroll Register

¡ Chinson EERF

¡ Wayland EERF

¡ Peppinico EERF

¡ Varden EERF

¡ Hissop EERF

¡ Success EERF

¡ General Journal

¡ General Ledger

¡ m

¡

¡

¡

¡ d text indicates no response was expected in a cell or a formula-based calculation is incorrect; no points deducted. Register

*Red text indicates no response was expected in a cell or a formu

¡ Employee Grosspay

¡ Payroll Register

¡ General Journal

¡ General Ledger

Compute the gross earnings for regular, overtime, and holiday pay for each employee for the December 31 pay period. Remember that while an hourly rate is shown for all employees, the period pay for exempt employees should be calculated by taking their yearly salary and dividing it by the number of semimonthly pay periods in a year, which should then be split between the number of hours considered regular time and holiday time.  The pay rates for each employee have been given from the prior period. (Round your answers to 2 decimals.)

Show less

 
 
 
 
Last Name Hourly Rate (Rounded to 5 Decimals) Pay Period Hours 12/16-12/31 Regular Overtime Holiday Commission
Chinson $11.53846selected answer correct 88 hours (exempt – 16 hours Holiday) $1,000.00selected answer incorrect $0.00not attempted not attempted $1,015.00
Wayland $36.05769selected answer correct 88 hours (exempt – 16 hours Holiday) $3,125.00selected answer incorrect $0.00not attempted not attempted  
Peppinico $20.91346selected answer correct 88 hours (exempt – 16 hours Holiday) $1,812.50selected answer incorrect $0.00not attempted not attempted  
Varden $20.19231selected answer correct 92 hours (16 Holiday) $1,615.38selected answer incorrect $363.46not attempted $363.46selected answer incorrect  
Hissop $23.79808selected answer correct 90 hours (16 Holiday) $1,903.85selected answer incorrect $356.97not attempted not attempted  
Success $17.30769selected answer correct 91 hours (16 Holiday) $1,384.62selected answer incorrect $285.58not attempted not attempted  

 

 

 

 

 

 

Payroll Register

 

Complete the payroll register for the November 15 pay period. (Round your answers to 2 decimal places.)

 
 

 

   
 
 
                               
    Run Date 11/15/2018   Company Name: Wayland Custom Woodworking        
    P/R Date 11/21/2018              
                               
  Name M/S # of W/H Hourly Rate No of Regular Hours No of Overtime Hours No of Holiday Hours Commissions Gross Earnings 401(k) Insurance Taxable Wages for Federal W/H Taxable Wages for FICA  
  Anthony Chinson M 1                 $0.00 $0.00  
  Mark Wayland M 5                 0.00 0.00  
  Sylvia Peppinico M 7                 0.00 0.00  
  Stevon Varden M 2                 0.00 0.00  
  Leonard Hissop S 4                 0.00 0.00  
  Student F Success S 1                 0.00 0.00  
  Totals   $0.00 $0.00 $0.00 $0.00 $0.00  
                               
  Name Gross Earning Taxable Wages for Federal W/H Taxable Wages for FICA Federal W/H Social Security Tax Medicare W/H State W/H Tax Net Pay Check No.      
  Anthony Chinson   $0.00 $0.00           174568      
  Mark Wayland   0.00 0.00           174569      
  Sylvia Peppinico   0.00 0.00           174570      
  Stevon Varden   0.00 0.00           174571      
  Leonard Hissop   0.00 0.00           174572      
  Student F Success   0.00 0.00           174573      
  Totals $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00        
                               

 

 

 

 

 

 

 

¡ Employee Grosspay

¡ The following is the Employee Earnings Record Form for Anthony Chinson for the November 15 pay period. Amounts shown for the current pay period are from the Payroll Register. Using the Year to Date (YTD) information for this employee from the previous pay period, input YTD figures in the appropriate rows for both sections of the EERF. The amounts shown in the “Current YTD” rows will be used to complete the Employee Earnings Record Forms for the following pay period. (Enter your answers rounded to 2 decimal places.)

 
 

¡

   
 
 
        EMPLOYEE EARNINGS RECORD      
                           
    Name Anthony Chinson   Hire Date October 01, 2018  
    Address 530 Sylvann Avenue   Date of Birth    
    City/State/Zip Logan, UT 84321   Exempt/Nonexempt Exempt  
    Telephone 435-555-1212   Married/Single Married  
    Social Security Number 511-22-3333   No. of exemptions 1  
    Position Account Executive   Pay Rate (Hourly, Yearly, Yearly + Commission) $24,000/year + Commission  
                           
    Period Ended Hours Worked Regular Pay O.T. Pay Holiday Pay Commi- ssions Gross Pay Insurance 401(k) Taxable Pay (Federal) Taxable Pay (FICA)  
  Prior Period YTD As of 10/31/2018                 $0.00 $0.00  
    11/15/2018 0.00 1,000.00 0.00           0.00 0.00  
                           
                           
                           
                           
  Current YTD   0.00 $1,000.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           
    Taxable Pay for Federal Taxable Pay for FICA Federal Income Tax Social Security Tax Medicare State Income Tax Total Deductions Net pay YTD Net Pay YTD Gross Pay YTD FUTA  
  Prior Period YTD $0.00 $0.00         $0.00          
    0.00 0.00         0.00          
                           
                           
                           
                           
  Current YTD $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           

 

 

The following is the Employee Earnings Record Form for Mark Wayland for the November 15 pay period. Amounts shown for the current pay period are from the Payroll Register. Using the Year to Date (YTD) information for this employee from the previous pay period, input YTD figures in the appropriate rows for both sections of the EERF. The amounts shown in the “Current YTD” rows will be used to complete the Employee Earnings Record Forms for the following pay period. (Enter your answers rounded to 2 decimal places.)

 
 

 

   
 
 
        EMPLOYEE EARNINGS RECORD      
                           
    Name Mark Wayland   Hire Date October 01, 2018  
    Address 1570 Lovett Street   Date of Birth    
    City/State/Zip Logan, UT 84321   Exempt/Nonexempt Exempt  
    Telephone 435-555-1110   Married/Single Married  
    Social Security Number 505-33-1775   No. of exemptions 5  
    Position President/Owner   Pay Rate (Hourly, Yearly, Yearly + Commission) $75,000/year  
                           
    Period Ended Hours Worked Regular Pay O.T. Pay Holiday Pay Commi- ssions Gross Pay Insurance 401(k) Taxable Pay (Federal) Taxable Pay (FICA)  
  Prior Period YTD As of 10/31/2018                 $0.00 $0.00  
    11/15/2018 0.00 3,173.08 0.00           0.00 0.00  
                           
                           
                           
                           
  Current YTD   0.00 $3,173.08 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           
    Taxable Pay for Federal Taxable Pay for FICA Federal Income Tax Social Security Tax Medicare State Income Tax Total Deductions Net pay YTD Net Pay YTD Gross Pay YTD FUTA  
  Prior Period YTD $0.00 $0.00         $0.00          
    0.00 0.00         0.00          
                           
                           
                           
                           
  Current YTD $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           

 

 

The following is the Employee Earnings Record Form for Mark Wayland for the November 15 pay period. Amounts shown for the current pay period are from the Payroll Register. Using the Year to Date (YTD) information for this employee from the previous pay period, input YTD figures in the appropriate rows for both sections of the EERF. The amounts shown in the “Current YTD” rows will be used to complete the Employee Earnings Record Forms for the following pay period. (Enter your answers rounded to 2 decimal places.)

 
 

loyee from the previous pay period, input YTD figures in the appropriate rows for both sections of the EERF. The amounts shown in the “Current YTD” rows will be used to complete the Employee Earnings Record Forms for the following pay period. (Enter your answers rounded to 2 decimal places.)

 
 

 

   
 
 
        EMPLOYEE EARNINGS RECORD      
                           
    Name Sylvia Peppinico   Hire Date October 01, 2018  
    Address 291 Antioch Road   Date of Birth    
    City/State/Zip Logan, UT 84321   Exempt/Nonexempt Exempt  
    Telephone 435-555-2244   Married/Single Married  
    Social Security Number 047-55-9951   No. of exemptions 7  
    Position Craftsman   Pay Rate (Hourly, Yearly, Yearly + Commission) $43,500/year  
                           
    Period Ended Hours Worked Regular Pay O.T. Pay Holiday Pay Commi- ssions Gross Pay Insurance 401(k) Taxable Pay (Federal) Taxable Pay (FICA)  
  Prior Period YTD As of 10/31/2018                 $0.00 $0.00  
    11/15/2018 0.00 1,840.38 0.00           0.00 0.00  
                           
                           
                           
                           
  Current YTD   0.00 $1,840.38 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           
    Taxable Pay for Federal Taxable Pay for FICA Federal Income Tax Social Security Tax Medicare State Income Tax Total Deductions Net pay YTD Net Pay YTD Gross Pay YTD FUTA  
  Prior Period YTD $0.00 $0.00         $0.00          
    0.00 0.00         0.00          
                           
                           
                           
                           
  Current YTD $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           

 

 

¡ Wayland EERF

The following is the Employee Earnings Record Form for Stevon Varden for the November 15 pay period. Amounts shown for the current pay period are from the Payroll Register. Using the Year to Date (YTD) information for this employee from the previous pay period, input YTD figures in the appropriate rows for both sections of the EERF. The amounts shown in the “Current YTD” rows will be used to complete the Employee Earnings Record Forms for the following pay period. (Enter your answers rounded to 2 decimal places.)

 
 

 

   
 
 
        EMPLOYEE EARNINGS RECORD      
                           
    Name Stevon Varden   Hire Date October 01, 2018  
    Address 333 Justin Drive   Date of Birth    
    City/State/Zip Logan, UT 84321   Exempt/Nonexempt Nonexempt  
    Telephone 435-555-9981   Married/Single Married  
    Social Security Number 022-66-1131   No. of exemptions 2  
    Position Craftsman   Pay Rate (Hourly, Yearly, Yearly + Commission) $42,000/year  
                           
    Period Ended Hours Worked Regular Pay O.T. Pay Holiday Pay Commi- ssions Gross Pay Insurance 401(k) Taxable Pay (Federal) Taxable Pay (FICA)  
  Prior Period YTD As of 10/31/2018                 $0.00 $0.00  
    11/15/2018 0.00 1,615.38 484.62           0.00 0.00  
                           
                           
                           
                           
  Current YTD   0.00 $1,615.38 $484.62 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           
    Taxable Pay for Federal Taxable Pay for FICA Federal Income Tax Social Security Tax Medicare State Income Tax Total Deductions Net pay YTD Net Pay YTD Gross Pay YTD FUTA  
  Prior Period YTD $0.00 $0.00         $0.00          
    0.00 0.00         0.00          
                           
                           
                           
                           
  Current YTD $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           

 

 

¡ Peppinico EERF

The following is the Employee Earnings Record Form for Leonard Hissop for the November 15 pay period.  Amounts shown for the current pay period are from the Payroll Register.  Using the Year to Date (YTD) information for this employee from the previous pay period, input YTD figures in the appropriate rows for both sections of the EERF.  The amounts shown in the “Current YTD” rows will be used to complete the Employee Earnings Record Forms for the following pay period. (Enter your answers rounded to 2 decimal places.)

 
 

 

   
 
 
        EMPLOYEE EARNINGS RECORD      
                           
    Name Leonard Hissop   Hire Date October 01, 2018  
    Address 531 5th Street   Date of Birth    
    City/State/Zip Logan, UT 84321   Exempt/Nonexempt Nonexempt  
    Telephone 435-555-5858   Married/Single Single  
    Social Security Number 311-22-6698   No. of exemptions 4  
    Position Purchasing/Shipping   Pay Rate (Hourly, Yearly, Yearly + Commission) $49,500/year  
                           
    Period Ended Hours Worked Regular Pay O.T. Pay Holiday Pay Commi- ssions Gross Pay Insurance 401(k) Taxable Pay (Federal) Taxable Pay (FICA)  
  Prior Period YTD As of 10/31/2018                 $0.00 $0.00  
    11/15/2018 0.00 1,903.85 392.67           0.00 0.00  
                           
                           
                           
                           
  Current YTD   0.00 $1,903.85 $392.67 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           
    Taxable Pay for Federal Taxable Pay for FICA Federal Income Tax Social Security Tax Medicare State Income Tax Total Deductions Net pay YTD Net Pay YTD Gross Pay YTD FUTA  
  Prior Period YTD $0.00 $0.00         $0.00          
    0.00 0.00         0.00          
                           
                           
                           
                           
  Current YTD $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           

 

 

¡ Varden EERF

 

 

 by filling in all answers in the tabs below.

¡ Employee Grosspay

¡ Payroll Register

¡ Chinson EERF

¡ Wayland EERF

¡ Peppinico EERF

¡ Varden EERF

¡ Hissop EERF

¡ Success EERF

¡ General Journal

¡ General Ledger

The following is the Employee Earnings Record Form for Student Success for the November 30 pay period. Amounts shown for the current pay period are from the Payroll Register. Using the Year to Date (YTD) information for this employee from the previous pay period, input YTD figures in the appropriate rows for both sections of the EERF. The amounts shown in the “Current YTD” rows will be used to complete the Employee Earnings Record Forms for the following pay period. (Enter your answers rounded to 2 decimal places.)

 
 

 

   
 
 
        EMPLOYEE EARNINGS RECORD      
                           
    Name Student Success   Hire Date October 01, 2018  
    Address 1650 South Street   Date of Birth    
    City/State/Zip Logan, UT 84321   Exempt/Nonexempt Nonexempt  
    Telephone 435-556-1211   Married/Single Single  
    Social Security Number 555-55-5555   No. of exemptions 1  
    Position Accounting Clerk   Pay Rate (Hourly, Yearly, Yearly + Commission) $36,000/year  
                           
    Period Ended Hours Worked Regular Pay O.T. Pay Holiday Pay Commi- ssions Gross Pay Insurance 401(k) Taxable Pay (Federal) Taxable Pay (FICA)  
  Prior Period YTD As of 11/15/2018                 $0.00 $0.00  
    11/30/2018 0.00 1,384.62 415.38 415.38         0.00 0.00  
                           
                           
                           
                           
  Current YTD   0.00 $1,384.62 $415.38 $415.38 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           
    Taxable Pay for Federal Taxable Pay for FICA Federal Income Tax Social Security Tax Medicare State Income Tax Total Deductions Net pay YTD Net Pay YTD Gross Pay YTD FUTA  
  Prior Period YTD $0.00 $0.00         $0.00          
    0.00 0.00         0.00          
                           
                           
                           
                           
  Current YTD $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00 $0.00  
                           

 

 

¡ Hissop EERF

Journal

Enter debits before credits.

 
 

 

   
 
 
Date General Journal Debit Credit
Nov 30      
       
       
       
       
       
       
       
       
       

 

 

ote: Enter debits before credits.

 
 

 

   
 
 
Date General Journal Debit Credit
Nov 30      
       
       
       
       
       
       

 

 

 

¡ ecord the entry for payment of semimonthly employee wages for the period ending on November 30.

Note: Enter debits before credits.

 
 

 

   
 
 
Date General Journal Debit Credit
Dec 05      
       
       
       
       
       

 

 

¡ Record the entry for remittance of 401(k) contribution and employee medical premiums for the month of November.

Note: Enter debits before credits.

 
 

 

   
 
 
Date General Journal Debit Credit
Dec 05      
       
       
       
       
       

 

 

¡ Record the entry for remittance of 401(k) contribution and employee medical premiums for the month of November.

Note: Enter debits before credits.

 
 

¡ Record the entry for remittance of employment taxes for the month of November.

Note: Enter debits before credits.

 
 

 

   
 
 
Date General Journal Debit Credit
Dec 05      
       
       
       
       
       
       

 

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

30 Powerpoint Slides About IPM Operations

Prepare a 25 Slide Power Point Presentation that summarizes how the award winning company performed its operations by focusing on: The Organizational Profile, Strategy, Customers, Operations and the Main Results. 

Prepare a 5 Slide Power Point Presentation that shows how what you have learned thus far (in Chapters 1, 2, 3, 4, 5,15 & 19) was used by your award winning company to conduct its operations

requirements in attachment.

IPM application in attachment.

text book is operations management 12th edition, also in attachment

The main objective is to accomplish the main goals of the course by providing the opportunity to learn from what best practice organizations do to achieve best practice business operations that are aligned to the mission/vision and organizational operational strategy:

1. Select a Malcolm Baldrige Award Winning Application that has not been selected by anyone else and post it on the general Discussion Board on Blackboard. (2 points)

2. Prepare a 25 Slide Power Point Presentation that summarizes how the award winning company performed its operations by focusing on: The Organizational Profile, Strategy, Customers, Operations and the Main Results. (70 points)

3. Prepare a 5 Slide Power Point Presentation that shows how what you have learned thus far (in Chapters 1, 2, 3, 4, 5,15 & 19) was used by your award winning company to conduct its operations (15 points)

4. Present your Power Point to the class in our next meeting (10 minutes) (13 points)

Make sure you score all the available points.

Conrad

P/S Do not choose an Application Summary that has been selected by someone else. It will not be accepted.

2018 Malcolm Baldrige National Quality Award Application

INTEGRATED PROJECT MANAGEMENT COMPANY, INC. Inspiring Success through Ethical Leadership Since 1988

 

 

www.ipmcinc.com

(630) 789-8600

 

 

 

TABLE OF CONTENTS Glossary of Terms and Abbreviations ……………………………….. ORGANIZATIONAL PROFILE …………………………………… i

P.1 Organizational Description ……………………………………… i P.1a Organizational Environment ………………………………. i

P.1a(1) Product Offerings ……………………………………… i P.1a(2) Mission, Vision, and Values ………………………. ii P.1a(3) Workforce Profile …………………………………….. ii P.1a(4) Assets …………………………………………………… iii P.1a(5) Regulatory Requirements ………………………… iii

P.1b Organizational Relationships …………………………… iii P.1b(1) Organizational Structure …………………………. iii P.1b(2) Customers and Stakeholders ……………………. iii P.1b(3) Suppliers and Partners …………………………….. iii

P.2 Organizational Situation ……………………………………….. iv P.2a Competitive Environment ………………………………… iv

P.2a(1) Competitive Position ……………………………….. iv P.2a(2) Competitive Changes ………………………………. iv P.2a(3) Comparative Data ……………………………………. iv

P.2b Strategic Context …………………………………………….. v P.2c Performance Improvement System …………………….. v

CATEGORY 1: LEADERSHIP …………………………………… 1 1.1 Senior Leadership …………………………………………………. 1

1.1a Vision and Values ……………………………………………. 1 1.1a(1) Setting Vision and Values …………………………. 1 1.1a(2) Promoting Legal and Ethical Behavior ………… 1

1.1b Communication ……………………………………………….. 1 1.1c Mission and Organizational Performance ……………. 2

1.1c(1) Creating an Environment for Success ………….. 2 1.1c(2) Creating a Focus on Action ……………………….. 3

1.2 Governance and Societal Responsibilities ………………… 4 1.2a Organizational Governance ……………………………….. 4

1.2a(1) Governance System ………………………………….. 4 1.2a(2) Performance Evaluation ……………………………. 4

1.2b Legal and Ethical Behavior ……………………………….. 4 1.2b(1) Legal and Regulatory Compliance ……………… 4 1.2b(2) Ethical Behavior ………………………………………. 5

1.2c Societal Responsibilities …………………………………… 5 1.2c(1) Societal Well-Being ………………………………….. 5 1.2c(2) Community Support …………………………………. 5

CATEGORY 2: STRATEGY ……………………………………….. 6 2.1 Strategy Development ……………………………………………. 6

2.1a Strategy Development Process …………………………… 6

2.1a(1) Strategic Planning Process ………………………… 6 2.1a(2) Innovation……………………………………………….. 7 2.1a(3) Strategy Considerations …………………………….. 7 2.1a(4) Work Systems and Core Competencies ……….. 8

2.1b Strategic Objectives …………………………………………. 8 2.1b(1) Key Strategic Objectives …………………………… 8 2.1b(2) Strategic Objective Considerations …………….. 8

2.2 Strategy Implementation ………………………………………… 9 2.2a Action Plan Development and Deployment …………. 9

2.2a(1) Action Plans ……………………………………………. 9 2.2a(2) Action Plan Implementation ………………………. 9 2.2a(3) Resource Allocation …………………………………. 9 2.2a(4) Workforce Plans …………………………………….. 10 2.2a(5) Performance Measures ……………………………. 10 2.2a(6) Performance Projections ………………………….. 10

2.2b Action Plan Modification………………………………… 10 CATEGORY 3: CUSTOMERS …………………………………… 10

3.1 Voice of the Customer …………………………………………. 10 3.1a Customer Listening ………………………………………… 10

3.1a(1) Current Customers ………………………………….. 10 3.1a(2) Potential Customers ………………………………… 11

3.1b Determination of Customer Satisfaction and Engagement …………………………………………………… 11

3.1b(1) Satisfaction, Dissatisfaction, and Engagement ……………………………………………………… 11 3.1b(2) Satisfaction Relative to Competitors …………. 12

3.2 Customer Engagement …………………………………………. 12 3.2a Product Offerings and Customer Support ………….. 12

3.2a(1) Product Offering …………………………………….. 12 3.2a(2) Customer Support …………………………………… 13 3.2a(3) Customer Segmentation ………………………….. 13

3.2b Customer Relationships ………………………………….. 13 3.2b(1) Relationship Management ……………………….. 13 3.2b(2) Complaint Management ………………………….. 14

CATEGORY 4: MEASUREMENT, ANALYSIS, AND KNOWLEDGE MANAGEMENT ……………………… 14

4.1 Measurement, Analysis, and Improvement of Organizational Performance ………………………………………. 14

4.1a Performance Measurement ……………………………… 14 4.1a(1) Performance Measures ……………………………. 14 4.1a(2) Comparative Data …………………………………… 15 4.1a(3) Customer Data ……………………………………….. 15 4.1a(4) Measurement Agility ………………………………. 16

4.1b Performance Analysis and Review …………………… 17 4.1c Performance Improvement ………………………………. 17

 

 

4.1c(1) Future Performance ………………………………… 17 4.1c(2) Continuous Improvement and Innovation ………………………………………………………… 17

4.2 Information and Knowledge Management ……………… 18 4.2a Data and Information ……………………………………… 18

4.2a(1) Quality ………………………………………………….. 18 4.2a(2) Availability ……………………………………………. 18

4.2b Organizational Knowledge ……………………………… 18 4.2b(1) Knowledge Management …………………………. 18 4.2b(2) Best Practices ………………………………………… 19 4.2b(3) Organizational Learning ………………………….. 19

CATEGORY 5: WORKFORCE …………………………………. 20 5.1 Workforce Environment ………………………………………. 20

5.1a Workforce Capability and Capacity ………………….. 20 5.1a(1) Capability and Capacity ………………………….. 20 5.1a(2) New Workforce Members ……………………….. 20 5.1a(3) Workforce Change Management ………………. 21 5.1a(4) Work Accomplishment ……………………………. 21

5.1b Workforce Climate ………………………………………… 22 5.1b(1) Workplace Environment………………………….. 22 5.1b(2) Workforce Benefits and Policies ………………. 22

5.2 Workforce Engagement ……………………………………….. 23 5.2a Workforce Engagement and Performance …………. 23

5.2a(1) Organizational Culture ……………………………. 23 5.2a(2) Drivers of Engagement ……………………………. 23 5.2a(3) Assessment of Engagement ……………………… 23 5.2a(4) Performance Management ……………………….. 24

5.2b Workforce and Leader Development ………………… 24 5.2b(1) Learning and Development System…………… 24 5.2b(2) Learning and Development Effectiveness …………………………………………………….. 25 5.2b(3) Career Progression …………………………………. 25

CATEGORY 6: OPERATIONS ………………………………….. 25 6.1 Work Processes …………………………………………………… 25

6.1a Product and Process Design …………………………….. 25 6.1a(1) Determination of Product & Process Requirements ……………………………………………………. 25 6.1a(2) Key Work Processes ……………………………….. 26 6.1a(3) Design Concepts …………………………………….. 26

6.1b Process Management and Improvement ……………. 26 6.1b(1) Process Implementation ………………………….. 26 6.1b(2) Support Processes …………………………………… 26 6.1b(3) Product and Process Improvement ……………. 26

6.1c Supply-Chain Management ……………………………… 27

6.1d Innovation Management …………………………………. 27 6.2 Operational Effectiveness …………………………………….. 27

6.2a Process Efficiency and Effectiveness ………………… 27 6.2b Management of Information Systems ……………….. 29

6.2b(1) Reliability ……………………………………………… 29 6.2b(2) Security and Cybersecurity ……………………… 29

6.2c Safety and Emergency Preparedness ………………… 30 6.2c(1) Safety ……………………………………………………. 30 6.2c(2) Business Continuity ………………………………… 30

CATEGORY 7: RESULTS …………………………………………. 31 7.1 Product and Process Results …………………………………. 31

7.1a Customer-Focused Product & Service Results ………………………………………………………………… 31 7.1b Work Process Effectiveness Results …………………. 31

7.1b(1) Process Effectiveness and Efficiency ………… 31 7.1b(2) Safety and Emergency Preparedness …………. 34

7.1c Supply-Chain Management Results ………………….. 35 7.2 Customer Results ………………………………………………… 35

7.2a Customer-Focused Results ………………………………. 35 7.2a(1) Customer Satisfaction ……………………………… 35 7.2a(2) Customer Engagement …………………………….. 36

7.3 Workforce Results ………………………………………………. 37 7.3a Workforce-Focused Results …………………………….. 37

7.3a(1) Workforce Capability and Capacity ………….. 37 7.3a(2) Workforce Climate …………………………………. 39 7.3a(3) Workforce Engagement …………………………… 40 7.3a(4) Workforce Development …………………………. 41

7.4 Leadership and Governance Results ………………………. 42 7.4a Leadership, Governance, and Societal Responsibility Results …………………………………………… 42

7.4a(1) Leadership …………………………………………….. 42 7.4a(2) Governance ……………………………………………. 44 7.4a(3) Law and Regulation ………………………………… 44 7.4a(4) Ethics ……………………………………………………. 44 7.4a(5) Society ………………………………………………….. 45

7.4b Strategy Implementation Results ……………………… 47 7.5 Financial and Market Results ……………………………….. 47

7.5a Financial and Market Results …………………………… 47 7.5a(1) Financial Performance …………………………….. 47 7.5a(2) Marketplace Performance ………………………… 48

 

 

 

 

GLOSSARY OF TERMS AND ABBREVIATIONS

AARP After Action Review of Projects ADA Americans with Disabilities Act AM Account Manager AMCF Association of Management Consulting Firms AOS Available on Site AP Annual Plan BD Business Development BPP Business Planning Process CCS Creative & Communication Services Dept. CEO Chief Executive Officer CFO Chief Financial Officer CISSP Certified Information Systems Security Professional CoE Center of Excellence COO Chief Operating Officer CoP Community of Practice CR Central Region CRM Customer Relationship Management C-SPOTY Customer Service Person(s) of the Year D&D Discovery & Development Deltek Deltek Vision, IPM’s CRM & ERP system DRP Disaster Recovery Plan DRT Disaster Recovery Team DSO Days Sales Outstanding EAP Employee Assistance Program EBITDA Earnings Before Interest, Taxes, Depreciation,

and Amortization EEOC Equal Employment Opportunity Commission ER East Region ERP Enterprise Resource Planning ET Executive Team FAS Functional Assessment Summary FMLA Family and Medical Leave Act FTE Full-Time Equivalent FV Fundamental Values FY Fiscal Year GPTW Great Place to Work Greenhouse IPM’s innovation program HIPPA Health Insurance Portability and

Accountability Act HR Human Resources HRA Health Reimbursement Account The Hub IPM’s SharePoint site IAS Industry Assessment Summary ILPEx Illinois Performance Excellence Recognition

Program, the state-level Baldrige program Initiatives Strategic Initiatives, IPM’s action plans IPM Integrated Project Management Company, Inc. IPM Prep IPM’s consultant onboarding process IPPM Internal Project Portfolio Management IS Information Security IT Information Technology KPI Key Performance Indicator KPM Knowledge & Process Management Dept. LMS Learning Management System LRG Long Range Goal(s) M&B Mission & Beliefs

MAIOP Management, Analysis, and Improvement of Organizational Performance

Managed Right IPM’s promotional e-newsletter MD Managing Director NBD New Business Development NPS Net Promoter Score Objectives Strategic Objectives; internally called Strategic

Imperatives OFI Opportunity for Improvement OODA Observe–Orient–Decide–Act Ops Operations OSHA Occupational Safety and Health

Administration O&T Observations & Trends PC Principal Consultant PDCA Plan–Do–Check–Act PLA Project Launch Analysis PM Project Management PMA Project Management Associate PMC Project Management Consultant; also used

generically for PMA/PMC/SPMC/PC PMI Project Management Institute PMO Project Management Office PMP Project Management Professional PMT Portfolio Management Team PPE Project Performance Evaluation PPM Project Portfolio Management PQP Project Quality Plan PS&DP Performance Summary & Development Plan The Pulse IPM’s employee newsletter RAS Regional Assessment Summary RISP Risk Information Security Program ROVP Return on Values Project SA Strategic Advantage(s) SC Strategic Challenge(s) SII Societal Impact Index SLIM Service Line–Industry Matrix SME Subject Matter Expert SPA Single Point Accountable SO Strategic Opportunities SPI Service Performance Insight SPMC Senior Project Management Consultant SRM Strategic Realization Model SRPM Strategy Realization Program Manager SWOT Strengths–Weaknesses–Opportunities–Threats VOC Voice of the Customer VOICE Voice of Consultant VP Vision Priorities VPN Virtual Private Network VRO Vision Realization Officer WR West Region YOY Year over year Cycle of Improvement

 

 

 

Page | i

ORGANIZATIONAL PROFILE P.1 Organizational Description Recognizing a pressing need across industries for excellence in project execution, C. Richard (Rich) Panico founded Integrated Project Management Company, Inc. (IPM) in 1988, making it the first company in the U.S. dedicated to professional Project Management (PM). During his tenure as an executive of a Fortune 500 consumer products company, Rich realized that many companies struggled to execute their strategies reliably and efficiently. While most business consultancies helped organizations develop solutions and strategies, few focused on ensuring execution, and without the ability to execute, even the most well-crafted strategy produces no value. Rich believed that a values-based, ethical company dedicated to reliable planning and execution would be a sought-after resource, which proved to be correct. Rich’s overriding goal was to build a company with an extraordinarily motivating culture based on a foundation of honesty, integrity, and ethical precepts. The Company has consistently adhered to these principles throughout our history. IPM is a privately held business consulting company, providing exceptional leadership to transform strategies and solutions to sustainable results. IPM has offices in Chicago, Boston, Los Angeles, Minneapolis, San Francisco, St. Louis, and Parsippany, NJ, and provides services to a wide range of industries, including the Life Sciences, Healthcare, Consumer Products, and Industrial sectors. IPM tailors our well- established and continually evolving practices to address each client’s unique requirements. Over the past 30 years, IPM has served over 400 clients, led more than 4,000 projects, and continues to experience growth, financial success, and an impeccable professional reputation. IPM’s longevity depends on our ability to provide solutions and reliably plan and execute critical initiatives for our clients while continually evolving our business model, capabilities, and position in the market. IPM applies process, discipline, and leadership to ensure delivery of our high-quality services. Through diligent fiscal planning and management, the Company retains a very strong cash position and reserves. IPM has maintained negligible debt and has been completely debt free since 2009. This approach has underwritten our aggressive strategy for organic growth. IPM’s most impactful competitive advantages are our culture, consistently high-quality services, and our family members (employees). A thriving and sustaining values-based culture is a significant competitive advantage, as it cannot be purchased and takes years to establish. Since day one, our culture has received constant attention − it is protected, promoted, and repeatedly validated. We are obsessed with consistently operating in accordance with Our Fundamental Values (FV) and Our Mission & Beliefs (M&B). The principles and responsibilities identified within these documents govern our relationships and interactions both internally and externally. Consistent high quality is the bedrock of our individual and collective performance. In IPM’s world, quality is a passion

that defies complacency and forever seeks improvement. As Rich states: “Culture and quality have been, are, and will remain our highest priorities.” P.1a Organizational Environment P.1a(1) Product Offerings To better describe the Company’s capabilities to our markets, IPM has established service lines (Figure P.1-1). Focusing on selected service areas has enabled the Company to establish and grow strong foundations of knowledge in disciplines highly valued within the industries we serve. While a significant part of our business is within the Life Sciences sector, our strategy includes a priority to further diversify by creating inroads into our other markets and evolving new capabilities.

 

Figure P.1-1 IPM Service Line Overview

In support of the Company’s growth and diversification objectives, IPM has developed Centers of Excellence (CoEs) focused on various service lines. The CoEs were created to establish deeper subject matter expertise in specific areas representing significant market needs and opportunities. The CoE model provides structure, centralized knowledge, and dedicated employees within a specialty area, imparting resources, information, tools, examples, templates, and training materials to prepare our project management consultants (PMCs) for those engagements. The CoEs are continuously enhanced through lessons learned from project experiences and research.

The CoEs were created in 2014, and since 2016, oversight of them has been provided by a director and a governance structure. As part of the 2018–19 Strategic Plan, the CoEs were integrated into the newly established Discovery & Development Department, providing greater structure to evolving new capabilities and services. Each CoE is staffed by employees with a keen interest and career passion in that subject matter area. IPM currently has five CoEs: Project Portfolio Management (PPM), Mergers and Acquisitions (M&A), Business Technology (BT), Regulatory & Quality, and Change Management.

 

 

Page | ii

To ensure optimal outcomes, services delivered by the IPM project team may include a PMC, manager, CoE subject matter expert (SME), and/or more experienced colleagues. P.1a(2) Mission, Vision, and Values IPM’s Mission & Beliefs (M&B) IPM has documented Our Mission & Beliefs (M&B), with our mission summarized in the opening sentence: Our essential purpose is to provide exceptional leadership to transform strategies and solutions to sustainable results. Some other crucial passages from our M&B include: IPM’s obsession with excellence, honesty, ethical conduct, and uncompromising integrity assures an impeccable reputation as the leader within our profession. … IPM’s values-driven, self-motivated, and highly skilled “family members” are our most important assets and the source of our differentiation. … It is the Company’s intent to maximize job security and to involve all employees in achieving this goal. … IPM’s Mission is honored each time a client’s expectations are exceeded, each time an employee achieves his or her dreams, each time IPM earns an employee’s loyalty, each time a worthy cause benefits from our efforts, and each time the Company positively influences our society and the world in which we live. The full M&B is available on site (AOS). IPM’s Vision IPM will be recognized as one of the most prestigious consulting firms in North America and renowned for providing exceptional leadership to transform strategies and solutions to sustainable results. IPM will realize profitable growth…to our centennial and beyond. IPM will be synonymous with “the best,” exemplified by excellence, ethical leadership, community involvement, and the highest commitment to our family members.

IPM Mission, Vision, Values, & Character Elements Mission: Our essential purpose is to provide exceptional

leadership to transform strategies and solutions to sustainable results.

Vision: IPM will be recognized as one of the most prestigious consulting firms in North America and renowned for providing exceptional leadership to transform strategies and solutions to sustainable results.

Fundamental Values:

Honesty, integrity, caring, respect, humility, responsibility, excellence, and spirituality.

Character Elements:

Diligence, enthusiasm, fairness, honesty, integrity, loyalty, resilience, sense of humor, trust, and work ethic.

Figure P.1-2 IPM Mission, Vision, Values, & Character Elements

IPM believes that if the Company focuses on sustaining an impeccable reputation, growth will inevitably follow. The Company defines Vision Priorities (VP) to ensure a deeper understanding of the Vision’s key components: Forever Relevant, Reputation & Recognition, Financial Strength, Affinity, Aspiration, and Societal Impact, which were refined and clarified as part of the most recent Business Planning Process (BPP). IPM’s Core Competencies IPM’s area of greatest expertise is project leadership, which requires the core competencies of applying process, planning, and execution, and it takes discipline to deliver all three.

IPM’s Fundamental Values (FV) The foundation of IPM’s FV is spirituality – our belief in a higher power and purpose. It is the genesis of our FV, which exert strong influence on decisions and behaviors, and guide our ethical “compass.” IPM’s Standards of Behavior In addition to the FV, the Company has established key attributes essential to each employee’s conduct for the sustainability of IPM’s culture. These Character Elements (see Figure P.1-2) are integral components of required behavior to be displayed in serving professional responsibilities and are assessed as part of each employee’s Performance Summary and Development Plan (PS&DP). The absolute elements of honesty and integrity must always be displayed. In 2018, IPM defined a Code of Conduct that further emphasizes the behavioral expectations for all employees. P.1a(3) Workforce Profile IPM employs 180 individuals in a non-union environment. The Company is primarily divided into two groups: Operations (Ops) and Corporate Services (Corporate). Meanwhile, the management team is segmented into the Executive Team (ET), Senior Management (SM), and Management (M). PMCs are the individual contributors on the Ops side, typically work on site at client locations, and are segmented into four levels based upon experience and expertise. The role of Principal Consultant (PC) was added to the existing consultant levels – Project Management Associate (PMA), PMC, and Senior PMC (SPMC) – to provide deep subject matter expertise, when required. PCs are expected to continually broaden their subject matter knowledge, thereby increasing IPM’s ability to provide better and more insightful solutions and generate more value for our clients. The workforce profile, which includes information regarding education, gender, and diversity, is shown in Figure P.1-3.

Workforce Profile

Segments Ops (78%); Corporate (22%) [ET (3%), SM (5%) M (13%), PMC (64%), Non- management Corporate (15%)]

Gender Male (63%), Female (37%)

Education Bachelor’s – 98%, Master’s – 51%, PhD – 9%

Ethnicity White (78%), Asian (12%), African American (6%), Hispanic (2%), Native Hawaiian or other Pacific Islander (2%)

Employment Status

1% part-time and 99% full-time

Figure P.1-3 Workforce Profile

While IPM has employed PMCs since our inception, the composition of our workforce has evolved over time due to the continued assessment of market needs, the consulting industry, and opportunities. All client-facing employees have minimally completed an undergraduate curriculum. Corporate Services, which includes Human Resources (HR), Finance, Communication and Creative Services (CCS), Knowledge and Process Management (KPM), Information Technology (IT),

 

 

Page | iii

Business Development (BD), and Marketing, is almost entirely staffed with individuals who have their bachelor’s; overall, 98 percent of our employees have acquired at least an undergraduate degree. In addition to the need for higher education to serve our markets appropriately, there is often specific subject matter knowledge necessary to deliver value as a consultant. As an example, within the Life Sciences industry, the need for PMCs with knowledge and expertise within the Regulatory environment has increased over the past few years. To accommodate these market needs, specific experience and skill requirements are identified in seeking new candidates (job requisition). In all hiring decisions, the Company uniformly seeks individuals who align with our culture and exhibit strong leadership potential. To capitalize on the significant potential of our employees, KPM has increased in both strength and numbers, providing our PMCs with a robust repository of project protocols, information, and continuing education. Additionally, our document and creative services have evolved through the addition of employees in CCS. In 2014, Company growth also dictated acquiring in-house legal expertise to ensure comprehensive review of all contracts and increased scrutiny of all corporate legal matters. The factors that engage our employees in achieving our M&B and Vision – as validated by employee surveys – include: • Leadership behavior consistent with our M&B and FV

(Figures 7.4-1, 7.4-11) • Communication and transparency (Figures 7.4-5, 7.4-6) • Professional development (Figure 7.3-21) • Organizational support (Figures 7.3-13, 7.3-14) The nature of IPM’s consulting services does not necessitate special health and safety requirements, although when our PMCs require specific safety equipment for their protection at the client site, the Company provides it. P.1a(4) Assets While not “hard” assets laden, IPM’s assets include both the IRS-defined assets and valuable Company holdings considered key to our success, differentiation, and competitive advantage. IPM deems our people, culture, and reputation as critically important “assets.” Ultimately, the strategy, planning, execution, and delivery of our services are dependent on the commitment, knowledge, and conduct of our people. Key information and intellectual capital are also important assets of the business. To drive efficiency and performance, employees are supported with other assets, including laptops and multiple communication tools. This equipment, combined with IPM’s repository of information, training, and supervisory guidance, enables employees to perform to, and expand, their capabilities. Depreciable organizational assets include furniture, fixtures, IT hardware and software, and leasehold improvements (to the Company’s multiple leased offices). IPM maintains an asset listing to properly manage depreciation schedules and

conforms to Generally Accepted Accounting Principles in capturing assets on our Balance Sheet. P.1a(5) Regulatory Requirements IPM is incorporated in the State of Illinois and complies with regulatory requirements that apply in the states in which IPM operates and maintains offices. These regulations include: occupancy licenses, Equal Employment Opportunity Commission (EEOC), Occupational Safety and Health Administration (OSHA), Americans with Disabilities Act (ADA), Health Insurance Portability and Accountability Act (HIPAA), Internal Revenue Service, and state regulations (IL, MA, MO, CA, NJ, and MN). IPM’s business does not make it subject to special OSHA regulations or environmental, product, or financial requirements. P.1b Organizational Relationships P.1b(1) Organizational Structure The Company is a privately held C Corporation with a single director, the Chief Executive Officer (CEO). Voting shares are held by the ET – the CEO, Chief Financial Officer (CFO), Chief Operating Officer (COO), and Vision Realization Officer (VRO) – which serves as the Company’s operating board. In lieu of an Annual Board meeting, there is a yearly Corporate Resolution signed by the full ET, which identifies major decisions and expenditures. The ET meets on a weekly basis and is the governance body that monitors organizational performance. The ET also approves the business strategy and holds dedicated quarterly meetings to discuss topics of strategic importance. The ET members lead the organizational structure that includes Ops Managing Directors, Directors, multiple levels of PMCs, and the Corporate Services functions. P.1b(2) Customers and Stakeholders Customers primarily fall within four key market segments: Life Sciences, Healthcare, Consumer Products, and Industrial, although expectations and high-level requirements do not vary significantly between these segments. Within BD, customers are further segmented as new and existing. Regardless of market segment or BD category, a unique proposal is prepared specifically for each engagement. The primary deliverable is the achievement of a project objective, which is delineated in the proposal along with the key requirements of leadership, managing scope, schedule, budget, and risk, developing effective solutions, and meeting commitments. The customer’s project sponsor is the primary stakeholder, but the complex nature of our engagements means there are typically many other stakeholders representing our client’s multiple functional groups and company divisions. P.1b(3) Suppliers and Partners IPM does not rely on suppliers or partners to perform our consulting services. All services provided to clients are delivered through our full-time staff, who therefore make up our supply chain. IPM’s growth is dependent on our ability to staff an increasing volume of work, which requires strong employee retention and an aggressive recruiting program focused on meeting that demand.

 

 

Page | iv

P.2 Organizational Situation P.2a Competitive Environment P.2a(1) Competitive Position IPM was established well before PM was recognized as a distinct profession and before the Project Management Institute (PMI) had published The Guide to the Project Management Body of Knowledge (PMBOK) or the Project Management Professional (PMP) certification was widely acknowledged. Throughout our history, IPM has planned and executed critical initiatives for some of the biggest companies in the world, reliably delivering project results and creating a positive legacy experience for project participants and stakeholders. This has been accomplished through both the project achievements and the environment created to ensure success (the IPM Experience), one comprised of caring, collaboration, cooperation, and professionalism. IPM’s reputation has been built on our ability to execute consistently and perform in an honest and ethical manner. A conduct statement based on IPM’s values is included within every proposal to establish a relational framework for each engagement. IPM has evolved the Company’s capabilities and our market positioning to obtain critically important strategic projects. Execution competency, subject matter expertise, problem- solving dexterity, and conduct aligned with our FV have allowed IPM to compete with “big” consulting firms, and further distance ourselves from project scheduling and coordination and other more tactical applications of PM consulting. The progression of KPM is another factor in IPM’s marketplace differentiation, as it has had a tremendous impact on quality, continuous improvement, and most of all, employee development. A significant body of knowledge – accessible via The Hub, IPM’s SharePoint site – has been developed and is a valuable resource to our PMCs, each of whom is on-boarded through a rigorous process. All employees are provided training on an ongoing basis. KPM has additionally developed a broad range of processes and tools to enhance efficiency of operations and expose clients to PM best practices. Unlike many other small and mid-sized consulting firms, IPM’s model employs full-time, direct employees rather than augmenting staff with independent consultants during high- demand times (flexible staffing model), thus preserving IPM’s quality standards and reputation. Instead of assigning someone who has not been thoroughly vetted to a client, IPM chooses to turn down business rather than risk poor performance or employee behavior inconsistent with our FV. To determine IPM’s relative size and growth, we have used data from IBISWorld, a business intelligence leader specializing in industry market research. The consulting industry as a whole was projected to generate $223 billion in revenue in 2017. Three of the largest firms – Accenture PLC, McKinsey & Company, and Deloitte Touche Tohmatsu –

currently capture 8% of the total market; more than 700,000 organizations combine to capture the remaining 92%, representing approximately $205 billion. IPM’s projected 2018 revenue represents a very small percentage of this market. In 2017, year-over-year industry growth was 4% while IPM’s was 11% (2016 – 2017); in the four-year span from 2013 to 2017, it was 62%, compared to 16% industry- wide. IPM’s competitors include sole proprietors, small boutique firms, medium-to-large consulting firms, and client PM groups. As PM has gained recognition, large consulting firms have placed a greater focus on selling it. Conversely, IPM has broadened our focus, emphasizing providing business solutions and leading more complex strategic projects. P.2a(2) Competitiveness Changes IPM’s leadership maintains awareness of competitive trends in PM services to drive strategic planning and action. Some notable recent trends: 1. The commoditization of PM is increasing as the PM

process is well understood. More project managers are being commissioned through educational institutions, internal company training programs, and through PMP certification preparation.

2. The number of competitors has increased.

3. The widespread failure of internal efforts to establish high-performing Project Management Offices (PMOs) is leading companies to outsource part or all of this function.

4. The outsourcing of procurement to managed services providers – third parties that handle negotiations of all contracted agreements – is increasing among large companies as a means of reducing consulting costs.

5. Organizations are struggling to evolve their strategy and keep up with rapidly changing market conditions affecting their businesses.

There is an increasing need to rapidly transform high-level strategies to discernable, sustainable results. IPM’s strategic initiatives (our internal term for action plans) are intended to counteract the trends that represent threats and capitalize on those that represent opportunities. The ability to develop solutions, execute them reliably, and embed change management to achieve and sustain the desired results and performance is a significant differentiator. This service feature, along with the quality of our people, Company longevity and reputation, and the overall added value of IPM’s composite capabilities, positions IPM between the very large consulting firms with their very high price points and the small and boutique firms that lack the support infrastructure and broad consulting capabilities. We “look big and can play big” and have a substantial value-to-price-point advantage. P.2a(3) Comparative Data Since our primary direct competitors are privately held consultancies, they do not publicize information pertaining to their performance, HR data, or customer satisfaction. Some

 

 

Page | v

professional organizations such as Service Performance Insight (SPI) and IBISWorld – and the now-defunct Association of Management Consulting Firms (AMCF) – provide limited data on the consulting industry, which is used when applicable. We have also used data from Baldrige Award recipients that provide similar services. For data outside of our industry, we use Great Place to Work (GPTW) and CompData, among others. P.2b Strategic Context IPM’s foremost strategic challenges are:

SC1) continuing to scale the business while maintaining a priority for culture and high quality SC2) developing higher-value consultative services to compete with larger firms while better differentiating the Company from the independent, small, and medium firms SC3) recruiting and retaining talented employees SC4) continuing to diversify our industry and base SC5) expanding brand recognition.

IPM’s strategic advantages are: SA1) our values-based culture (work environment) SA2) low to no debt and high cash reserves financial position SA3) clear and continually evolving PM processes SA4) a disciplined approach to strategic planning SA5) flexibility of our business model to pursue a large variety of consultative engagements SA6) sophisticated and scalable infrastructure SA7) longevity, reputation, long-term perspective, and track record of strong, organic growth.

P.2c Performance Improvement System IPM’s well-defined and ever-evolving BPP acts as a yearly cycle of improvement and has a specific component focused on identifying Opportunities for Improvement (OFIs). While this is a crucial component of our process, it is no more important than the day-to-day tactical focus on quality assurance and continuous improvement. In addition to the annual cycle of improvement that is the BPP, since 2014, we have had six additional cycles of fact-based improvement related to our Baldrige journey: 1. Our initial self-assessment before our first Illinois

Performance Excellence (ILPEx) Recognition Program application (2014)

2. The completion of our first ILPEx application (2015) 3. The feedback report from the 2015 ILPEx application

(2016) 4. Our second ILPEx application (2017) 5. The feedback report from our second application (2018) 6. Our 2018 Baldrige application (which you are now

reading)

Throughout the application that follows, the results of these cycles of improvement will be tagged with this icon: . It is critical to IPM’s culture and business success to foster continuous improvement, learning, and innovation, and to be more competitive; the identification of OFIs is central to that endeavor. Sources of OFIs are outlined in Figure P.2-1.

Performance Improvement, Innovation, and Learning: Sources of OFIs

Baldrige improvements Employee survey

ET meetings Greenhouse (innovation)

Ideation sessions Individual employee ideas

Lessons learned Managers meetings

Observations & Trends One-on-One meetings

Strategic Initiatives Team meetings

Technology planning Figure P.2-1 Performance Improvement, Innovation, and Learning

Once an OFI has been identified and defined, it is assigned a priority as well as a champion, and high-level metrics are then determined along with an execution team. IPM utilizes the PDCA process outlined in Figure P.2-2.

Figure P.2-2 PDCA Process

While in the execution (Do) phase, each OFI is tracked to ensure progress and confirm that it addresses the identified need. While OFIs address specific performance gaps, IPM’s BPP assures that the Company’s strategy, model, organizational structure, and capabilities remain relevant as market conditions and competitive influences change and new opportunities are discovered.

IPM is proud of our organization and we are excited to share more about our business. The following application represents our commitment to continue our journey, one that aligns with IPM’s passion to defy complacency through continuous improvement.

 

 

Page | 1

CATEGORY 1: LEADERSHIP 1.1 Senior Leadership 1.1a Vision and Values 1.1a(1) Setting Vision and Values As the basis for establishing an exceptional values-based culture, IPM’s founder and CEO, C. Richard (Rich) Panico, set IPM’s values by creating Our Mission & Beliefs (M&B). This document is a proclamation of IPM’s business purpose, ethical philosophies, commitments to employees, and societal responsibilities. Our M&B is a culturally embedded influence that governs conduct, decisions, and strategy. At the same time, IPM’s Vision details the destination we are pursuing and sets the Company’s strategic direction beyond the next decade. To further advance employees’ understanding and affiliation with the Vision, senior leadership has identified Vision Priorities (VP), which were refined as part of the 2018–19 Strategic Plan. During this planning cycle, both the Vision and M&B were also updated to better align with IPM’s evolution to providing the higher-value service of planning and leading strategically critical initiatives for our clients.

While IPM’s key values have always been embedded in the M&B, in 2014 senior leadership established our Fundamental Values (FV), to emphasize IPM’s primary beliefs and core governing principles to our workforce and customers. We share our FV, Vision, and M&B with both current and prospective customers through our website and other communication channels like our e-newsletter, Managed Right, and the proposals we customize for each potential engagement. In these we highlight our values and culture as keys to our value proposition. Internally, our FV are reinforced as part of new employee onboarding and on an ongoing basis through the Performance Summary & Development Plan (PS&DP) process, where conformance to our FV is evaluated along with on-the-job performance.

In 2010, the Company established measurable, long-term goals along a 10-year horizon, known as Vision 2020 Long Range Goals (LRG). These objectives and benchmarks chronicle IPM’s progress toward our greater Vision, and results are reviewed annually with the entire organization. With the year 2020 looming closer, senior leadership established further-reaching 2025 LRG as part of the 2018–19 Strategic Plan.

Together, our FV, M&B, Vision, and the 2020/25 LRG provide the strategic framework to ensure that the Company’s leadership is choosing the most effective path to engage our family members (employees), sustain growth, and preserve our supportive, values-based culture—a significant competitive advantage that cannot be readily replicated (Figure 1.1-1).

Senior leaders show their commitment to the Company’s values by being a part of the interview process. At least two members of the senior team interview every late-stage candidate using the M&B and FV as part of the evaluation process to determine cultural fit. The CFO (since 2015) and Vision Realization Officer (VRO) (in prior years) have demonstrated their commitment to ethical business practices

by serving on the board of the Chicago chapter of the Better Business Bureau.

IPM also was the subject of a 2013 study published by Benedictine University’s Center for Values-Driven Leadership that correlates a values-driven culture with financial success.

1.1a(2) Promoting Legal and Ethical Behavior Because ethical behavior is so entwined in IPM’s core, much of senior leadership’s commitment to it can be found in 1.1a(1). IPM’s senior leaders have a passion for excellence, honesty, ethical conduct, and uncompromising integrity, as stated in our M&B. In words and actions, they promote and reinforce our commitment to our FV and M&B. Through our history, IPM leadership has validated its commitment to our values and philosophies when tested. One example was a client “poaching” one of our PMCs in violation of the reciprocal recruiting restraint in our contracts. The client ultimately agreed to a financial penalty, but to IPM leadership, the restitution was an ill-gotten gain. Rather than recognize the penalty as profit, the proceeds were divided among five charities. Profit never carries a higher priority than principles.

Senior leaders promote an organizational environment that requires a commitment to legal and ethical behavior by defining IPM’s Character Elements (Figure P.1-2) and including them as part of the PS&DP process. Honesty and integrity, which are foundational to legal and ethical behavior, are absolute, zero-tolerance conduct requirements.

1.1b Communication Since IPM’s inception, senior leadership has functioned with transparency. Key decisions and major changes are announced at the Annual Plan (AP) or quarterly Staff meetings that are attended by all employees. In the spirit of frank, two-way communication, senior leadership presents financial results, as well as the outlook, even though, as a privately held company,

Figure 1.1-1 Leadership System

 

 

Page | 2

we are under no obligation to do so. This forum allows the background and reasons for decisions to be discussed with the entire staff and for their questions to be addressed. IPM’s twice-quarterly newsletter (The Pulse) is another communication tool to keep employees abreast of Company progress, financial status, and other important information during the months between quarterly Staff meetings. Each newsletter includes a message from Rich, which since 2018 has also been delivered as a podcast, an improvement based on staff feedback and implemented to increase the message’s consumption. While face-to-face communication is preferred, company-wide emails are sent to relay important news, such as promotions, new hires, and birth announcements.

IPM’s open-door policy invites employees to provide input at any time. Figure 1.1-2 highlights some of the frequent communication channels. There is no hierarchy restriction—if an employee believes that the best recipient of an idea is someone other than the immediate supervisor, he or she can absolutely approach the appropriate person. Members of senior leadership routinely hear from employees who want to discuss ideas, decisions, work environment, and/or the direction of the Company. As excerpted from M&B, “The Company’s culture must, in a disciplined, yet motivating fashion, forever embrace continuous improvement and teamwork, and defy complacency in any form.”

Figure 1.1-2 IPM Leadership Communication System

Each year, the Company’s Business Planning Process (BPP) begins by sending the AP survey to employees to gather their input on aids and hindrances to outstanding performance, trends observed in the marketplace, and feedback on IPM’s culture, as well as other qualitative and quantitative questions. The results are compiled and reviewed by the Executive Team (ET). Each quarter, the ET also reviews the most germane inputs on the Observations and Trends (O&T) Hub site, which was created to collect various insights all year round, instead of relying primarily on the annual AP survey.

To continually promote high performance and customer focus, senior leadership recognizes employee achievements in The Pulse, at quarterly Staff meetings, through social media (such

as a post on LinkedIn), and through the Customer Service Person(s) of the Year (C-SPOTY) awards. Senior leadership solicits C-SPOTY nominations and determines the winners, with statuettes distributed as part of a ceremony at the November Staff meeting. Finally, senior leadership uses personal contact—conversations, emails, or handwritten notes—as a means of genuinely recognizing performance.

The e-newsletter Managed Right is IPM’s vehicle for communicating with customers at the aggregate level. But to build engagement, IPM relies on the personal touch, with everyone in Operations (Ops) management, from the CEO down, maintaining and nurturing relationships with key customer contacts, through phone conversations, business lunches, and other in-person interactions. IPM also celebrates a Customer Appreciation Week, during which senior leadership sends emails thanking our clients for their continued business. PMCs and Directors are tasked with doing something special (typically lunch or supplying sweets) at the client sites to express our appreciation and further strengthen the relationships.

The Project Performance Evaluation (PPE) provides another vital communication channel for our clients. Upon project completion, IPM’s Chief Operations Officer (COO) initiates the PPE to our clients to gather their feedback on how well IPM has delivered during the engagement. These performance results are shared by senior leadership during each quarterly Staff meeting, and instances of high performance and complimentary quotes from clients are formally recognized.

1.1c Mission and Organizational Performance 1.1c(1) Creating an Environment for Success To create an environment for success, senior leadership uses our M&B and FV to guide the BPP. While strategies change to address dynamic market conditions, our M&B and FV establish a foundation of consistency to drive ethical deliberation, consistency of conduct, and a “true north” when making all decisions. Additionally, all those accepting promotions to managerial positions are required to sign a “Management Employment Agreement.” The Agreement defines leadership conduct that must be consistently exhibited and promoted. While financial and other performance metrics are important, these do not take precedence over alignment with our FV and M&B.

With rapidly changing market conditions presenting opportunities and threats, it is crucial that IPM is informed and prepared to evolve the business. The BPP is designed to obtain information about conditions and trends so that we can be organizationally agile and respond appropriately. Nearly every aspect of IPM is put under the proverbial microscope, and the insights yielded may influence or effect changes to our processes and/or model; therefore, each BPP cycle is a cultivation of organizational learning and serves as a cycle of improvement. Detailed components of IPM’s planning process are described in 2.1a(1). The Strategic Objectives (Objectives to conform to Baldrige vernacular, but referred to internally as Strategic Imperatives) related to establishing a Discovery & Development (D&D) function and Brand Refinement 2.0 are

 

 

Page | 3

examples of the output of the 2018 BPP process, capturing our need to continually innovate and develop high-value services as well as expand brand distribution and knowledge.

In 2015, as part of the BPP, IPM’s organizational structure was modified to provide greater focus on areas of strategic importance. Recognizing the investment as an intelligent risk, the ET assigned Managing Directors (MD) to lead Healthcare and Consumer Products sectors and develop specific strategies to be implemented following ET approval. Around the same time, Business Development and Marketing, which had previously been a single entity, were separated to allow its MD to focus on the BD side, strengthening our ability to organically grow business development capabilities and capacity. Marketing was reassigned to report directly to the CEO, which led to a brand refinement initiative and the establishment of a Marketing portfolio management process, where the CEO and COO review the portfolio of marketing projects monthly to determine their prioritization, ensuring maximum value of the work being executed.

Senior leadership cultivates a supportive environment of learning for IPM’s workforce. Although our consultants primarily work at their respective client sites to foster customer engagement, they are the beneficiaries of significant organizational support. Our employees receive coaching from their managers, assistance from colleagues, support from the CoEs, plus training from Knowledge & Process Management (KPM). Job shadowing and collaboration on projects are used to teach new consulting skills. This supportive environment provides consultants with the necessary foundation for consistently providing outstanding customer experiences. Continuous improvement and organizational learning are essential components of sustainability, therefore IPM’s consultants collect post-project lessons learned from each client engagement, which are then disseminated through staff meetings, roundtables, and the After Action Review of Projects (AARP), so that the entire organization may benefit.

To create a workforce culture that fosters customer engagement, senior leadership requires weekly touchpoints between the client sponsor and the project manager, with additional meetings between the sponsor and the account manager to bolster the relationship. Each project team requests customer feedback through a PPE, the results of which are highlighted and emphasized at Staff meetings.

Through twice annual Organizational Planning sessions (5.1a(1)), the Company assesses our organizational strengths and depth of role succession. This succession planning is done to ensure the continued availability of proper resources for key roles. After our first Illinois Performance Excellence (ILPEx) application in 2015, it was recognized that the PS&DP process applied to all positions in the Company was not designed to specifically develop leaders for the highest levels. To address this need, Senior Leader Characteristics have been identified, and performance criteria for MDs defined, including specific pictures of success. The ongoing feedback mechanisms for MDs were revised in early 2017 and are now focused on four

key leadership competencies: Strategic, Execution, People, and Personal.

Additionally, the VRO, an ET role developed as a result of the 2015 BPP, was explicitly created to focus on succession planning. The VRO has been tasked with determining how the Company can continue to remain independent beyond the retirement of our founder and CEO, to achieve our goal of celebrating our 100th Anniversary and protect the interests of IPM’s primary stakeholders, our employees.

1.1c(2) Creating a Focus on Action Senior leadership generates Objectives as part of the BPP, and identifies the actions needed to achieve them in the form of Strategic Initiatives (Initiatives)—projects with a defined end state and timeframe for completion. Every strategic goal has a direct link to at least one Initiative. Each Initiative has an identified ET sponsor and a Single Point Accountable (SPA), the individual that owns the outcome of the Initiative. Through routine one-on-ones, employees and their supervisors discuss how to engage in activities to support IPM’s Initiatives, whether leading or providing execution support. While execution of internal Initiatives is vital to continuous improvement and Company evolution, employee participation must be balanced with focus on providing value to customers.

Senior leaders roll out the Initiatives during the AP meeting, the same meeting where the forecast for the upcoming year’s revenue and profit is unveiled. Initiatives and business results must share the spotlight. IPM develops AP themes, based upon reinforcing and promoting the Objectives and creating ongoing excitement and energy associated with the Strategic Plan. The themes—from Improve & Impress (1992) to Velocity to Vision (2018)—create a focus on action. Throughout the year, the theme is referenced in the newsletter and other communications, and each employee gets a theme button and framed picture with the associated artwork.

Additionally, IPM management has various regularly scheduled meetings (full roster AOS). Sessions like monthly senior leadership meetings, where the current state of the business is discussed along with issues critical to ongoing operation and growth, and weekly ET reviews, which ensure organizational alignment with our strategic goals, create a focus on action to improve the Company’s performance.

Throughout the year, senior leadership emphasizes the Company’s accomplishments and details our progress through the newsletter and at quarterly Staff meetings, while holding themselves accountable for results that need improvement. At regularly scheduled ET Strategy Meetings—which are often offsite and occur quarterly, at minimum—senior leaders look beyond the current state, to anticipate new market opportunities, and harness the talents of the organization to discover ways to further differentiate ourselves. The ET has a clearly defined vision for the Company, and they consistently take responsibility—one of our FV—for the organization’s actions.

 

 

 

Page | 4

1.2 Governance and Societal Responsibilities 1.2a Organizational Governance 1.2a(1) Governance System The Company is privately held and structured as a “C” corporation; the CEO is the sole director. The ET (CEO, CFO, COO, and VRO) serve as the Company Board. In lieu of an annual Board meeting, the ET signs an annual Corporate Resolution, which identifies major decisions and expenditures agreed upon by voting shareholders (ET). Given IPM’s corporate legal structure, selection and disclosure policies for board members are not relevant. The ET also approves the business strategy and meets on a weekly basis as part of a formal business review.

While privately held companies are not subject to the regulations protecting investors in publicly traded firms, IPM holds the protection of our family members as a high priority. Therefore, to more formally identify the ET’s responsibilities relative to governance, the VRO outlined a Corporate Governance document, which was adopted in 2016. This document specifies corporate responsibilities by role/group, none of which are legally required, and some of which are not yet applicable, but their very existence keeps the ET focused on high standards of care. The Governance document was established with an annual review requirement, and the first review occurred at an ET meeting in the fourth quarter of 2017. All aspects of corporate governance were reviewed, and the first cycle of improvement occurred. Changes included clarifications of responsibilities and the addition of a biennial review of corporate financial statements. It was also determined that the annual examination of Corporate Governance would occur as part of the BPP cycle. All members of the ET signed off on the findings.

Senior leadership is held accountable to the rest of the Company through quarterly Staff meetings, which include communication of all goals and Initiatives—and their respective justifications—as well as the progress toward achieving them. In a display of further transparency, the Company’s financial results are also shared. In the months when there is no Staff meeting, financial results and other key company highlights are disseminated via The Pulse.

Company-wide feedback on the ET’s actions and decisions is received through the AP survey and independent external sources such as the Great Place to Work (GPTW) survey. The ET benefits from this feedback by reviewing ratings in such critical areas as credibility, communication, and ethical behavior. To amplify the importance management places on employee feedback, the LRG of Affinity will be tracked via scores on specific questions of the GPTW survey.

Due to our privately held status, IPM is not required to submit to external audits. Nonetheless, in conjunction with our Corporate Governance review, and due to the Company’s increasing size and complexity, the criticality of ownership succession planning was highlighted. Following a formal valuation of IPM as part of considering an employee stock ownership plan (ESOP), the ET decided in 2017 to authorize a formal review of our financial statements by an external

accounting firm. The biennial reviews will commence in 2019; previously, our accounting practices have been confirmed compliant with Regulatory requirements by two IRS audits. Internal audits of financial matters are conducted, starting with clear delineation of duties and appropriate reconciliation structures. Various other processes, such as our performance management system, are audited as well.

Continual vigilance of market conditions, the business development pipeline, resource capabilities and capacity, quality, service performance, and cash position enable IPM to be proactive. The Company utilizes a fiscally conservative approach by maintaining high cash reserves. This has allowed organic growth without incurring debt while protecting the interests of IPM’s stakeholders, comprised of both our ownership and employees.

The Company has an ownership succession plan to ensure Company continuity, should the CEO or other ET members become incapacitated or pass away. The ownership succession plan is directed and funded through a Shareholder Agreement, and our employees are aware of its existence.

1.2a(2) Performance Evaluation Consistent with IPM’s culture, senior leadership participates in and benefits from the PS&DP process. As part of their PS&DP, senior leaders (and all of management) receive 360º feedback, incorporating feedback from their direct reports and other members of management each year, which influences the overall rating. Along with market data, tenure, and contributions to the Company, these performance evaluations are also used to determine compensation. Bonus criteria for senior leaders are currently undergoing examination, a responsibility highlighted in the Corporate Governance review.

As with all employees, Character Elements, aligned with but more measurable than FV, are also discussed semi-annually as part of the scorecard/PS&DP process. A cycle of improvement occurred in 2017 with the rollout of distinct Performance Criteria for all senior leaders, along with a unique set of leadership traits that fall under the leadership competencies (1.1c(1)). These have been incorporated into all senior leader semi-annual scorecard and annual review documents, including Development and Training Plans, providing a roadmap to drive individual improvements (5.2a(4)).

1.2b Legal and Ethical Behavior 1.2b(1) Legal and Regulatory Compliance While many of our clients operate in highly regulated environments, the most significant legal and ethical concerns with our operations involve fulfilling contractual requirements. IPM’s proposals are written to clearly define the engagement’s objective, deliverables, assumptions, and terms and conditions. Project management processes and leadership provided by IPM’s PMCs combined with oversight by directors and support from functional groups, as required, position us to reliably meet our contractual obligations.

As we are a business-to-business service and have no physical products, we do not deal with community or public concerns

 

 

Page | 5

and do not address any adverse societal impacts of our operations. However, the PPE and the PQP are used to monitor performance and stay on top of any risks associated with our offerings. Significant concerns are elevated to senior leaders for review and resolution. In 2014, an in-house attorney was hired to review all contracts, further ensuring proper scrutiny of contractual language and terms and minimizing variable interpretation of obligations. All significant or unique points of engagement, interpretations of obligations, or subjective judgments that may impact IPM’s liability, legal, or ethical position are discussed with and approved by senior leadership. IPM also evaluated and purchased professional liability insurance as a risk mitigation vehicle. The simple fact that we can and do carry $5 MM in coverage assures our clients of our legitimacy and their protection.

IPM complies with legal requirements, such as ADA, EEOC, HIPAA, OSHA, and others. These items are monitored by the ET. IPM’s goals for these are to be 100% compliant and have zero violations. See Figure 7.4-11 for measures and results.

1.2b(2) Ethical Behavior To promote and ensure ethical behavior in all interactions, ethical conduct and decision-making are referenced in proposal language as well as the PS&DP. The Character Elements are a crucial component of the PS&DP process and are closely monitored, as those values which underpin ethical conduct are essential considerations when assessing performance. In other words, adherence to our behavioral norms and values is an integral component of employee performance evaluation. The Company’s position on ethical conduct is discussed during employee orientation, quarterly Staff meetings, and newsletter articles. Candidates for employment are informed that there is zero tolerance for dishonesty or any other breaches of ethical behavior.

Like our Vision and M&B, the Management Employment Agreement heavily emphasizes ethics. To ensure all management personnel recall their obligations and to further reinforce its importance, the agreement has been reviewed annually at a management meeting since 2016. Ethical behavior of the ET is assessed through the AP and GPTW surveys (7.4.a(4)). IPM client contracts also include statements that promote bilateral compliance to ethical practices, such as confidentiality and reciprocal recruiting restraint agreements.

1.2c Societal Responsibilities 1.2c(1) Societal Well-Being The results of many IPM projects have a remarkable impact on the well-being of society. The greatest impact is seen in the launches of new products in the Life Sciences sector, where most of our business lies. IPM has helped develop life- saving/changing treatments for conditions such as major depressive disorder, vascular disease, chronic lymphocytic leukemia, moderate to severe rheumatoid arthritis, diabetes, and pulmonary arterial hypertension.

As part of the Baldrige journey, senior leadership realized we had no way to quantify the extent of our societal impact, and so a decision was made as part of the 2016 Strategic Plan to launch an internal Societal Impact Project. The project created the following dimensions for rating the societal impact through the creation of a Societal Impact Index (SII) for each client engagement. The SII (Figure 7.4-18) is tracked as a business metric and its continued growth is part of the 2025 LRG. It includes:

• Economic Impact: The economic impact the project has or is projected to have on the client, society, a local economy, etc.

• Environmental Impact: Reducing the client’s impact to the environment in its manufacture and sale of products or delivery of service.

• Social Impact: Strengthening of health, education, safety, or other form of community well-being.

• IPM’s Contribution: The degree to which IPM’s consultants will impact the project

Each dimension is rated on a High-Medium-Low (3-2-1) scale. A SII is then calculated using the formula: [(Economic Impact + Environmental Impact + Social Impact) * IPM Contribution / 27] * 100.

With our focus on leadership, IPM also emphasizes the importance of developing leaders for future generations. Rich is active at a local high school, serving on the strategy development committee and spearheading efforts to increase enrollment and advance the school’s mission. Additionally, IPM has hosted multiple leadership workshops for the school’s faculty over the last four years.

All retired laptop computers are donated to various organizations, including more than 100 to the above- mentioned school and over 50 to other charities as indicated in Figure 7.4-19. IPM also participates in a Letters to Santa program, fulfilling holiday gift requests for underprivileged youth (Figure 7.4-20).

IPM leadership also serves on various boards (Figure 7.4-17), from privately held companies to organizations like the Aspire and Chicago Finance Exchange, giving back to the community either directly or via economic development. IPM also develops future leaders by offering summer intern positions to college students (Figure 7.4-21).

To better contribute to the well-being of the environment, the 2013 remodeling of our home office included the installation of motion-detection lighting to conserve electricity, and the ballasts were changed to be energy efficient. Our paper consumption is significantly reduced by accessing documents electronically via The Hub, and each IPM function goes paperless whenever possible—the most recent BPP was a paperless process—and participates in recycling efforts.

1.2c(2) Community Support IPM’s primary philanthropic effort is Integrated Project Mercy (Project Mercy). In harmony with our M&B, Project Mercy demonstrates our commitment to be a good neighbor and civic

 

 

Page | 6

leader by influencing the quality of education, contributing to economic vitality, and exhibiting and promoting good citizenship. Giving back is a core principle of our M&B, and Project Mercy aligns with IPM’s FV of caring and responsibility.

Formally established in 2007, the program focuses on providing support to children, education, disease research, and the homeless within the areas where IPM employees work and live. We identified our office locations as our key communities because of our objective to contribute more than just money—through Project Mercy, our employees dedicate their time and talents, and to maximize their impact (and minimize burdensome travel), that needs to be done in person in their communities. Each quarter, the designated IPM office selects a cause that all offices will support, and specific charities are identified by IPM employees and approved by senior leadership, ensuring that our charitable giving aligns with our M&B. Through these efforts, IPM employees have raised thousands of dollars and contributed hundreds of hours of volunteer time, with endeavors ranging from providing manual labor to capitalizing on our core competency by leading projects and helping develop strategies for our beneficiaries. Given the low overhead that most charities strive for, having properly run projects can have a great impact on the work they do, so we have not only led projects but also provided PM training pro bono for organizations such as the Make-A-Wish Foundation. In this way, IPM’s philanthropic reach goes well beyond our key communities.

Over the course of the past 10 years, improvements have been made to Project Mercy to facilitate maximum participation by IPM’s employees. When originally implemented, planning occurred on a quarter-by-quarter basis. Over time, it was realized that more advanced planning and more project leadership was necessary for volunteer activities to occur within the appropriate timeframe. As activity and volunteer participation increased over time, it was necessary to establish a procedure of scheduling biweekly conference calls with the Project Mercy leads to ensure proper planning. Since 2015, efforts have been planned two quarters in advance, which has resulted in a greater ability to execute our activities within each designated quarter and enabled maximum participation.

CATEGORY 2: STRATEGY 2.1 Strategy Development 2.1a Strategy Development Process 2.1a(1) Strategic Planning Process IPM conducts annual strategic planning using the Business Planning Process (BPP) illustrated in Figure 2.1-1. Our approach is divided into four key process steps: Step  Observe, Step  Orient, Step  Decide, Step  Act, collectively referred to as OODA. The BPP planning cycle begins each year in September and follows a series of planning meetings that culminate at the Annual Plan (AP) meeting in February with the rollout of the Strategic Plan to all employees.

The BPP supports the growth and profitability of our business. IPM’s long-term Vision and Vision 2020 and 2025 Long- Range Goals (LRG) are translated into action through the BPP. During Step 1 Observe, IPM collects and analyzes strategic insights about our markets and business conditions. In the Orient step, using the strategic insights identified in Step 1, we conduct a SWOT analysis (Strengths-Weaknesses- Opportunities-Threats) to identify strategic advantages, challenges, opportunities, and threats. The SWOT helps the Executive Team (ET) converge their thinking in the Decide Step, resulting in a Strategic Plan consisting of Strategic Objectives (Objectives, internally Imperatives), Strategic Goals (Goals), and Strategic Initiatives (Initiatives, our action plans). The Initiatives are prioritized to help determine timing and resource needs, and senior leadership conducts a gap analysis to identify the specific resource and capability requirements to implement the Strategic Plan. This workforce plan drives inputs to the annual budget. In Step 4 Act, the Strategic Plan is deployed to the workforce, as described in 2.2a(1). Execution of the Strategic Plan and achievement of action plans is tracked and improved throughout the year using the Internal Project Portfolio Management (IPPM) process.

IPM’s BPP incorporates both a top-down and bottom-up perspective, with the ET engaging all employees in the planning process through AP employee and management surveys. Senior leadership—the ET plus industry, functional, and regional managing directors (MDs)—are the key participants in our strategic planning. The Knowledge & Process Management (KPM) MD owns the OODA/BPP process and facilitates the BPP meetings.

Going into the BPP each year, the ET evaluates the effectiveness and efficiency of the BPP cycle during the previous year and makes any needed improvements. The process has gone through several cycles of improvement throughout IPM’s history, as evidenced by the process maps associated with past Strategic and Annual Plans (AOS). Based on previous Strategic Plan results and AP survey feedback, the most recent BPP evaluation cycles spawned two significant improvements. First, MDs were tasked with developing an

Figure 2.1-1 Business Planning Process – OODA

 

 

Page | 7

Assessment Summary (Regional (RAS), Functional (FAS), or Industry (IAS), depending on their role) in the Observe step to provide strategic insights and identify the potential need for transformational change. Second, tiering of Initiatives was added in the Decide step to improve organizational alignment and the prioritization of effort.

As part of the Decide step, the ET articulates the strategic intent to guide IPM’s long-term growth and confirm the 2020/25 LRG, developing both short-term (one-year) and longer-term (two-year) plans to address these LRG targets. The two-year Strategic Plan is developed in each odd calendar year, also known as a Deep Dive year. The BPP in an even calendar year, called a Validation Year, uses the same BPP process but is focused on validating the existing plan given the current market and business conditions. This annual examination of the Strategic Plan gives the organization agility and operational flexibility to adapt to an evolving business environment. Additionally, brainstorming and divergent thinking are key aspects of the Observe step to ensure open consideration of organizational needs for transformational change.

As part of the BPP, Objectives, Goals, and Initiatives are created or validated annually. Objectives are “must do” actions that are essential to achieving the Vision and 2020/25 LRG. Goals are specific two-year targets that track success for each Objective and drive progress to 2020/25 LRG. Initiatives are projects or programs designed to accomplish the Objectives or otherwise improve performance. During the Decide step, the Initiatives are prioritized using a three-tier system. Tier 1 includes projects that are essential to achievement of Goals and are targeted to be completed in Year 1 of the Strategic Plan. Tier 2 Initiatives are strategic enhancers assigned a lower priority, which might not be completed until Year 2 of the Strategic Plan. Tier 3 Initiatives are functional continuous improvement projects not critical to the achievement of specific strategic goals.

Each BPP cycle contains an AP planning process that develops the preliminary action plan to implement the Strategic Plan for the upcoming fiscal year. The AP process includes resource planning, revenue budgeting, and expense and capital budget development, all aligned with the Strategic Plan. During the AP process, the LRG are linked to and directly supported by short-term strategic goals and tactics (Initiatives), and since 2014 this linkage has been depicted in a one-page roadmap of the Strategic Plan (AOS). This strategic roadmap is presented and explained to all employees at the AP meeting.

Internal Project Portfolio Management (IPPM) is accomplished through a dashboard on The Hub, launched in 2016, and curated by the Strategic Realization Program Manager (SRPM), a role created in 2014 to ensure ongoing management of the Strategic Plan. The SRPM monitors progress of action plans, changes to the Strategic Plan, and BPP process improvements identified with lessons learned and survey feedback. The SRPM reports quarterly to the ET on the IPPM and Initiatives results.

2.1a(2) Innovation IPM’s strategy development process stimulates innovation by involving all employees in the BPP throughout the planning cycle. Potential strategic opportunities and ideas are identified and collected from employees through multiple channels, including the Observation and Trends (O&T) Hub site, which feed the BPP during the Observe step of the OODA process, along with Greenhouse. Created in 2016 in response to AP survey feedback highlighting the need to foster more innovation, Greenhouse is IPM’s innovation support team that employs a formal process to generate and substantiate ideas for referral to the BPP. Through regular communication emphasizing the importance of innovation, the ET cultivates employee interest and generates participation in Greenhouse and O&T activities.

By combining the strategic insights from the Assessment Summaries with inputs from the O&T site and senior leadership brainstorming, strategic opportunities are identified during the Opportunities portion of the organizational SWOT analysis from the Orient step of the BPP. Our key strategic opportunities are the deployment of the Strategic Realization Office (SRO) and the collaborative and alliance Project Management Offices (cPMO and aPMO) as service offerings.

To determine which strategic opportunities are intelligent risks to pursue, IPM assigns an exploratory team to perform an assessment of the opportunity and its associated risks. The team then advises the BPP, which also considers if it is a good fit with aspects of our business, including our Mission & Beliefs (M&B), Vision, and core competencies. If greater depth is required to get a full accounting of the opportunity, an Initiative is developed.

2.1a(3) Strategy Considerations IPM collects relevant data and develops information for consideration during the Observe step of each strategic planning cycle, as depicted in the BPP Planning Funnel (Figure 2.1-2). As mentioned in 2.1a(2), the O&T Hub site— which gives employees a real-time collection venue for their insight on a broad spectrum of relevant topics such as competitive intelligence, technology, consulting, and PM trends—is crucial in accumulating this data and information.

Employee and management surveys are also key inputs to the ET and provide good situational awareness of the state of the business. MDs gather and analyze key information in their assigned areas and present their findings and recommendations to the ET in the form of Assessment Summaries. Beginning in 2018, the Discovery & Development (D&D) function will collect and analyze key service and market information to inform the BPP and advise the ET on strategic considerations and business risks for key strategic opportunities.

From the SWOT analysis in the Orient step, the ET identifies Strategic Challenges (SC) and Strategic Advantages (SA) (P.2b), Strategic Opportunities (SO), and potential blind spots, which help shape the overall Strategic Plan.

 

 

Page | 8

Figure 2.1-2: BPP Planning Funnel

While the consulting industry has few regulatory requirements, our clients often operate under significant regulatory scrutiny. The IAS identify any risks associated with potential changes to our external business environment, which are then accounted for in the BPP.

In the Decide step, the ET holds a series of meetings to establish Objectives, Goals, and the tiered Initiatives. The ET assesses our ability to execute the Strategic Plan by analyzing the feasibility, acceptability, and suitability of the elements of the Strategic Plan. They also conduct a gap analysis to uncover any critical resource needs for successful completion of the Strategic Plan. Prior to finalization, the preliminary plan is shared with the entire management staff at the Directors’ Meeting to uncover any unidentified blind spots and further assess our ability to execute the plan.

2.1a(4) Work Systems and Core Competencies IPM’s area of greatest expertise is project leadership, which requires the core competencies of applying process, planning, and execution; it takes discipline to deliver all three. IPM’s Customer Value work system (Figure 6.1-1) is designed to provide exceptional project leadership consulting services. This involves delivery of all aspects of PM in 10 service lines to our four targeted industries. IPM employees perform all the activities of this work system and key work processes.

The ET determines which key processes will be accomplished by IPM’s workforce or external suppliers during the BPP Decide step. This approach leverages our core competencies and ensures that high-quality standards are consistently met for all clients, so that IPM maintains a clear advantage over competitors. The challenges of providing superior consulting services require adherence to proven processes by a highly trained staff. Use of contracted consultants makes consistent service delivery very difficult and risky for IPM; therefore, we eschew this approach.

During the ET’s review of the Customer Value work system, IPM’s business model and organizational structure are

assessed and validated as part of a gap analysis, with the ET making any appropriate revisions at that time. If organizational structure and support are insufficient to accomplish the initiatives, a key work process (or support process) is added. For example, in 2016, the IT function was expanded to include the additional unique support processes of information security (IS).

During the BPP, the ET examines current and potential future client needs to determine whether our core competencies are meeting the needs of our target clients and to identify any future organizational core competencies. If the ET determines a future core competency need, they evaluate how best to develop the competency—that is, through training or recruiting. IPM’s core competencies and work system are completely driven by our M&B, Vision, and Fundamental Values (FV), and they do not often shift significantly. Core competencies have evolved slightly over time to better enable IPM to exceed our clients’ expectations.

2.1b Strategic Objectives 2.1b(1) Key Strategic Objectives We currently have three key Strategic Objectives: Diversify, Grow, and Engage Talent. These are described in Figure 2.1-3 (Figure 2.1-3 contains business sensitive data and has been redacted.), including the timetable of their short- and long-term action plans and key goals and projected targets.

Key changes to products/services, customers, and markets are driven by the IAS and RAS and may be addressed by the Centers of Excellence built around various service lines. While no changes are currently in the works, the D&D function is itself a change and is being formed to drive these changes in the future. IPM has no partners and is not currently planning any changes to our suppliers or operations.

2.1b(2) Strategic Objective Considerations We develop our Strategic Objectives during the Decide step of the BPP after completing the SWOT analysis and examining our external and internal environments. To balance the Objectives among varying and potentially competing organizational needs, the Objectives are designed to help address strategic challenges and leverage core competencies, strategic advantages, and strategic opportunities. Specifically, the Objectives indicate how we will address weaknesses and threats and capitalize on strengths and opportunities identified in the SWOT. Figure 2.1-3 (Figure 2.1-3 contains business sensitive data and has been redacted.) shows the relationship between IPM’s Objectives and SC, SA, and core competencies identified in the BPP and described in the Org Profile.

IPM balances short-term and long-term planning horizons via prioritizing Initiatives, which specify how IPM will achieve each Objective and will be resourced in a short (Tier 1) versus long-term (Tier 2) timeframe. This ensures the most essential Initiatives (Tier 1) are completed in the coming year.

The ET considers and balances the needs of our key stakeholders—clients and employees—in the establishment of our Strategic Objectives during the Decide step of the BPP. At

 

 

Page | 9

a high level, Engage Talent is focused on our employees and Diversify is client-focused, with Grow being a combination of both. The development of Strategic Goals and tiered Initiatives further supports the critical needs of each stakeholder group. Figure 2.1-3 IPM 2018/2019 Strategic Objectives and Goals (Figure 2.1-3 contains business sensitive data and has been redacted.)

2.2 Strategy Implementation 2.2a Action Plan Development and Deployment 2.2a(1) Action Plans Our short-term and longer-term action plans—our Tier 1 and 2 Initiatives—can be found in Figure 2.1-3. (Figure 2.1-3 contains business sensitive data and has been redacted.) (The roster of Tier 3 action plans is AOS.) Initiatives are developed during the Decide step to address our Strategic Goals and Objectives using the PDCA process depicted in Figure 2.2-1.

A lesson learned from the previous BPP was that all action plans were treated with equal priority resulting in longer-than- necessary durations for the most crucial Initiatives. To address this issue, tiering was incorporated into the 2018–2019 BPP with the highest priority Initiatives assigned to Tier 1. The new process focuses both resources and oversight on the key action plans—those that will have the greatest impact on the Objectives and are the most critical to the business—to generate shorter timelines and better outcomes.

2.2a(2) Action Plan Implementation Once the action plans are identified and prioritized, the ET begins their deployment by assigning Single Point Accountable (SPA) owners for each Initiative. The SPAs are ultimately responsible for identifying the necessary elements (scope, schedule, resources, success criteria, and metrics) to achieve successful completion of the Initiatives.

Initiatives are presented to the entire workforce during the Annual Plan meeting, after which SPAs recruit team members from across the organization based on needs and skills. Participation on an Initiative is a factor in each employee’s bonus determination as part of the “Building the Foundation” criterion.

Once the SPAs have identified the important elements of the action plans, IPM then utilizes our core competency of project leadership to execute them as projects and ensure our Objectives are achieved. To ensure sustainment of action plan results, upon completion the SPA completes a Final Project Summary, a document that includes a summary of the work completed, a list of deliverables created, conclusions from the SPA, and recommendations for the business.

All projects adhere to the stage gate process summarized in Figure 2.2-2. The more detailed stage gate process is available AOS.

Figure 2.2-1 Action Plan Development Process

Figure 2.2-2 Stage Gate Process

Following a 2016 cycle of improvement, the stage gate process was updated to include more stringent requirements for defining, executing, monitoring, and reporting progress as well as a set of standardized tools and templates.

2.2a(3) Resource Allocation Resources are allocated during the annual budgeting process conducted in the Decide step of the BPP to ensure the necessary financial and workforce resources are available to support the achievement of our action plans while meeting current operational obligations. The budget is developed by senior leadership and based on revenue and expense projections that incorporate the results of their bottom-up gap analysis. Beginning in 2017 and based on a cycle of improvement, functional departments now complete a workload analysis worksheet to complete their gap assessments and advise the ET. This gap analysis identifies both the capabilities and cross-functional resources needed to implement the new Strategic Plan and associated tiered Initiatives (Tiers 1, 2, and 3). The tiering drives the resourcing decisions by the ET regarding whether to add Operations or Corporate positions. Once the budget is approved by the ET, the resources are allocated based on functional needs with Tier 1 Initiatives receiving priority. This ensures the assignment and commitment of critical resources necessary to complete key action plans.

IPM manages risks associated with the Initiatives to ensure financial viability by conducting a risk assessment on the budget during the budget planning process. A computerized risk tool using Monte Carlo analysis is used to determine the confidence level of the pending budget. Approved budgets have a 95% confidence factor for meeting the budget based on the simulations conducted.

Additionally, the SRPM monitors resourcing risks associated with each action plan and elevates concerns to the ET at quarterly review meetings. Other measures to mitigate risk

In iti

at e Approve and

prioritize Identify team members

Pl an Finalize

charter Create plan E

xe cu

te Develop deliverables Report status La

un ch Implement

solution Measure success

 

 

Page | 10

include the preparation of detailed schedules as well as formal risk management plans for each Initiatives.

2.2a(4) Workforce Plans IPM develops a key workforce plan to support short-term and longer-term strategic objectives and action plans during the Decide step of the OODA cycle by conducting a gap analysis. The key workforce plan for 2018 calls for increasing the capacity of our workforce from 176 to 196, with an additional 12 people in Operations and eight in Corporate, including two in KPM and two in D&D. The additional capacity will allow us to achieve our Strategic Goals by having the resources necessary to build the Life Sciences curriculum to Engage Talent. Increasing our capability in Life Sciences will also enable us to Grow (another goal) through greater revenue in that sector.

The 2018–19 Strategic Plan includes several Tier 1, 2, and 3 Initiatives dedicated to improving the capabilities of workforce. The required changes in capabilities were identified during the Orient step of the OODA and then addressed in the Decide step by adding Initiatives such as: Tier 1—Life Sciences curriculum Tier 2—Management training program 2.0 and Product Development CoE Tier 3—Learning & Development program 2.0

2.2a(5) Performance Measures The SRPM facilitates and monitors action plan progress and communicates monthly status to the ET via the IPPM dashboard. The dashboard tracks the achievement and effectiveness of our Initiatives by monitoring overall portfolio health (phase, state, and status) and the progress of each Initiative. In depth action plan reviews are conducted quarterly to monitor status against key measures identified in Figure 2.1-3. (Figure 2.1-3 contains business sensitive data and has been redacted.)

An update on the progress of Initiatives is given to the entire organization during quarterly Staff meetings, reinforcing organizational alignment, which the use of the IPPM dashboard does as well. Stored on The Hub, the dashboard has also increased the transparency of action plan execution.

2.2a(6) Performance Projections Performance projections for the 2018–19 Strategic Plan, our short-term planning horizon, are listed by Strategic Goal in Figure 2.1-3. (Figure 2.1-3 contains business sensitive data and has been redacted.) The goals support IPM’s Objectives to Diversify, Grow, and Engage Talent. These include employee satisfaction measured externally (GPTW survey) as well as internally (voluntary turnover rate).

Projections for our long-term planning horizon, the attainment of our Vision 2020 LRG (established in 2010), are listed in Figures 2.2-3 (Figure 2.2-3 contains business sensitive data and has been redacted.) and 7.4-23 (Figure 7.4-23 contains business sensitive data and has been redacted.),while the recently established projections for our 2025 LRG are seen in Figure 2.2-4 (Figure 2.2-4 contains business sensitive data and has been redacted.).

IPM utilizes available and appropriate benchmarks to measure the outcomes of action plans against competitor performance whenever possible. Where gaps are identified between internal and competitor performance, IPM adjusts current—or creates new—action plans to address the disparity. Examples include using the GPTW survey to measure employee satisfaction against Best in Class, which resulted in the implementation of comprehensive performance management and learning and development programs to address the identified gaps. Figure 2.2-3 Progress on Vision 2020 Long Range Goals (Figure 2.2-3 contains business sensitive data and has been redacted.)

2.2b Action Plan Modification If circumstances require a shift in action plans, the SPAs and associated teams are empowered to do so when rapid execution is necessary. The SPAs have the authority to make the changes as circumstances arise, using the same process defined in 2.2a(2), then communicate them to the SRPM via monthly status reports.

More substantial modifications of action plans requiring higher-level approval are adjudicated and approved during the quarterly reviews with the ET per Figure 2.2-1. Examples of changes that require high-level approval include reprioritization, additional resource needs, discontinuation of work, or the inclusion of new Initiatives. Critical changes are elevated and addressed at weekly ET meetings for rapid action. All modifications to action plans are subject to the same stage gate process as the original (Figure 2.2-2), thus ensuring their viability. Figure 2.2-4 2025 Long Range Goals (Figure 2.2-4 contains business sensitive data and has been redacted.)

CATEGORY 3: CUSTOMERS 3.1 Voice of the Customer 3.1a Customer Listening 3.1a(1) Current Customers IPM employs several key communication methods to listen to, interact with, and observe customers to obtain actionable information, as seen in Figure 3.1-1. These methods, which were evaluated and improved upon in 2016, allow for the collection of information to help senior leadership identify client requirements and potential upgrades to IPM services and processes. This cycle of improvement identified a gap that was closed with the addition of Post-sales insights, which allows for the collection of Voice of the Customer (VOC) data as it relates to opportunities that are won or lost. This—like other insights, new connections, or potential opportunities—is documented in the Customer Relationship Management system, Deltek Vision (Deltek), which also functions as our Enterprise Resource Planning (ERP) software.

 

 

Lead Generation & Qualification

• Target potential leads • Nurture relationships through interaction • Identify & develop business opportunities

Pre-Project

Project Kick-off

• Scope meeting with client • Project Launch Analysis (PLA)

• Stakeholder meetings • Scope alignment • Develop and confirm high level schedule and plan

Execute Project • Develop detailed plans • Complete deliverables • Stakeholder meetings

IPM Learning

• Upload documents/files • Confirm customer satisfaction • Lessons learned • Project Performance Evaluation (PPE)

Page | 11

Figure 3.1-1 Listening and Communication Methods

In terms of marketing segments, a small variation in listening methods exists. For instance, IPM holds summits for Life Sciences and Healthcare but not for Consumer or Industrial, as our client base and targets are smaller in the latter two segments.

IPM utilizes Deltek, a web-based technology, as a repository for the information gathered through listening to current and potential customers. The main objectives in gathering feedback include the following:

• Understand the client’s perspective regarding interaction with IPM.

• Determine what the IPM experience means to the client, including the value added and sustainability of results.

• Identify improvement opportunities for our service offerings, service delivery, and client support.

• Create opportunities to stay connected, build relationships, and cultivate loyalty.

• Understand client service needs and how clients solve their business problems.

Additionally, IPM uses social media—primarily Twitter, LinkedIn, and Glassdoor—to listen to customers through both their interaction with our profiles and the various information they disseminate.

IPM listens to customers during the entirety of the customer life cycle (Figure 3.1-2), allowing us to customize the client experience and maximize their satisfaction. Having regular one-on-ones with sponsors (our key stakeholders) provides immediate feedback from customers regarding the quality of our support. It also builds lasting customer relationships that are key to the business, as highlighted by high customer retention (Figures 7.2-1) and satisfaction. Actionable feedback for individual projects is recorded in the Project

Quality Plan (PQP) and influences the quality of future products.

Figure 3.1-2 Listening through the Customer Life Cycle

3.1a(2) Potential Customers We document our interactions with potential clients at each stage of the Business Development (BD) Life Cycle (AOS) to determine client needs and tailor our service offerings to address them.

Individual employees are assigned ownership of prospective clients to contact and create a dialogue; these communications events keep us abreast of the needs of potential customers.

In addition to using social media to listen to all categories of customers, in 2015 IPM initiated the first of several Google AdWords campaigns to improve our listening to potential customers. From search terms and user engagement, we obtain actionable information on the services and solutions our prospective buyers are seeking. The data from AdWords are reviewed at the end of each campaign and on a quarterly and annual basis as part of our marketing analytics roll-up. The roll-up was introduced in 2014 to provide additional insight into some of the needs and problems of our prospective clients. It was updated in 2016 and again in 2017 and now includes a free-text field on the Opportunities page in Deltek to capture why potential engagements were won or lost, as described in 3.1a(1).

3.1b Determination of Customer Satisfaction & Engagement 3.1b(1) Satisfaction, Dissatisfaction, and Engagement Because our product offerings are the same regardless of market segment, IPM’s processes to determine customer satisfaction, dissatisfaction, and engagement are conducted consistently across IPM’s customer groups, as their needs in terms of our service are not markedly different. This standardized approach is validated by the consistently positive feedback we receive across all our market segments through the post-engagement Project Performance Evaluation (PPE). During an engagement, the PQP ensures that client requirements are known and can be met and exceeded. Additionally, the Account Manager (AM) and assigned PMC

Method Client Segment* Frequency

Conference participation CC, FC, PC Ongoing

Event attendance CC, FC, PC Ongoing

Webinars CC, FC, PC Ongoing

Face to face meetings CC, FC, PC Ongoing

Email CC, FC, PC Ongoing

Phone calls CC, FC, PC Ongoing

Mailings CC, FC, PC Ongoing

Website CC, FC, PC Ongoing

IPM industry summits CC, FC, PC Annual

PPE CC End of Project

Published articles & books CC, FC, PC Ongoing

Post-sales insights CC, PC Ongoing

Pardot CC, FC, PC, CoC Ongoing

Social media CC, FC, PC, CoC Ongoing

Kellogg project CC, FC One-time

*CC-Current Client, FC-Former Client, PC-Potential Client, CoC- Competitor Client

 

 

Page | 12

conduct one-on-one discussions with the client sponsor and other key client stakeholders to solicit real-time performance feedback, gauge customer satisfaction, and identify opportunities to increase the value delivered. Any dissatisfaction is also quickly identified and addressed. IPM seeks to delight our customers and to exceed their expectations. New approaches and/or deliverables that achieve this level of response are incorporated into future offerings (e.g., a graphically oriented Final Project Summary has become commonplace following rave reviews to the creativity of one of our PMCs working with our Creative & Communication Services (CCS) department).

Within two weeks of completing an engagement, the PPE is administered to key client stakeholders to solicit feedback on IPM performance. The PPE includes numerical rating, pick- list, and qualitative response questions. Following our 2015 ILPEx application, the survey was revised. To drive increased client responsiveness, the entire survey was shortened by eliminating some questions and tightening others. A free-text field now allows survey takers to indicate how IPM exceeded their expectations or how they were left dissatisfied, providing a way to capture the ratio of satisfaction to dissatisfaction (Figure 7.2-5). While the PPE had always asked about a client’s likelihood to recommend IPM, the switch to a 10- point scale for all questions allows us to present the query in a format that mimics Net Promoter Score (NPS).

The change to the 10-point scale from the previous 5-point scale was motivated by a desire to gain additional granularity. Another revision in our survey process occurred to enhance data integrity. AMs can now eliminate questions to ensure all queries are germane to an engagement, as irrelevant questions had previously resulted in some confounding data.

PPE results are reviewed by the AM and the PMC to identify performance that exceeds client expectations and builds loyalty. These examples serve as models for service improvement. When unfavorable feedback is received, an investigation is started, which may include direct follow-up with the client to fully understand their concerns. Actions are then taken to mediate customer issues. If appropriate, lessons learned from unfavorable feedback are shared among Ops management to minimize the risk for recurrence.

Customer engagement is determined through the NPS question. IPM also uses our client retention metric to measure engagement (Figure 7.2-10). New business opportunities that are derived from repeat customers and customer referrals are recorded accordingly in Deltek to enable analysis of trends. Aggregated PPE data have been captured on The Hub since 2016, creating a central database for all results and improving the functionality and ease of retrieving and analyzing them. From this data, senior leadership gleans insights into our performance, service offerings, and strategy, which are then shared at quarterly Staff and Directors’ Meetings.

3.1b(2) Satisfaction Relative to Competitors A primary motivation for adding the NPS question to the PPE was to use it as a benchmark for comparing our customer

satisfaction with the NPS of other organizations. The 2015 PPE revision also added a relative satisfaction question, asking clients to rate our performance relative to their satisfaction when hiring various categories of competitors (Figure 7.2-4).

On the qualitative side, information relative to competitors is obtained through discussions with current and potential customers.

3.2 Customer Engagement 3.2a Product Offerings and Customer Support 3.2a(1) Product Offering To determine what services to offer, senior leadership evaluates opportunities and trends, the business environment (internal and external), and IPM’s Strategic Advantages (SAs). The results of the Industry and Regional Assessment Summaries (IAS and RAS) are taken into consideration to better determine customer and market needs and requirements for our services.

Utilizing IPM’s listening methods (Figure 3.1-1), BD, Marketing, and Ops identify unmet customer opportunities and industry trends, which are logged in the Observations & Trends (O&T) site on The Hub. All entries are then analyzed by senior leadership. During the Business Planning Process (BPP), Strategic Initiatives (Initiatives) are then developed, as appropriate, to adapt product offerings to better exceed customer expectations. Additional input to the development of Initiatives comes from interactions during the sales process and client feedback via the PPE and are reviewed at quarterly Directors’ Meetings.

In 2014, the BPP yielded the creation of Centers of Excellence (CoEs) for four of our service lines—Project Portfolio Management (PPM), Change Management, Business Technology, and Life Sciences Quality and Regulatory—to identify and adapt offerings to meet and better serve current customers and thereby expand the relationships. This is accomplished through the development of processes, tools, resources, training, and support structures. The CoEs are additionally showcased by Marketing and BD to facilitate entering new markets and attracting new customers.

Adaptation to our CoE service lines occurred in response to market conditions, when two factors influenced the addition of a CoE for Mergers & Acquisitions in 2015. First, for years we had been assisting customers struggling with integrations and had seen the value we could provide in this area. Second, consolidation and acquisition had increased in our industry segments. And again in 2016, we realized that the need for regulatory and quality support extended beyond the Life Sciences. The Food Safety Modernization Act was among the most prominent examples of the increased regulatory oversight that many of our industry segments were experiencing, and knowing that our expertise would cross over effectively, the Life Sciences–specific CoE was adapted and re-cast as the industry agnostic Regulatory & Quality CoE. This change allowed us to attract new, non–Life Sciences customers.

 

 

Page | 13

Our newest market segment, Healthcare, was established following extensive research into opportunities to provide value in that arena. A key method for refining our offering in this market was the establishment of a Healthcare Advisory Board, which included external industry executives to advise the Executive Team (ET) and help formulate our strategy for successfully penetrating this market. Having served its purpose, the Board was disbanded in 2014.

To attract new customers and expand our relationship with existing ones, IPM uses the IAS and RAS to identify unfulfilled needs to expand our offerings. Since our customer base does not view PM as a core competency—and we had observed the trend of outsourcing other functions—in 2016 IPM endeavored to offer an entirely outsourced Project Management Office (PMO) as a service. Early in 2017, IPM landed our first outsourced-PMO engagement.

Moving forward, new product offerings will be the domain of the newly formed Discovery & Development (D&D) function.

3.2a(2) Customer Support IPM integrates customer support in the service delivery for each engagement; our entire service model revolves around providing support and information to customers. Our key means of customer support are the assigned PMC and AM, who are bolstered by other IPM staff such as the CoEs, KPM, CCS, Principal Consultants (PCs), and other Subject Matter Experts (SMEs). Customers easily seek information and support through the access afforded by on-site presence of the PMC. Frequent interactions with the customer are thus actually unavoidable. The PMC also has formal—typically weekly—one-on-one meetings with the primary customer, the project sponsor. Standard PM tools such as a schedule and risk register also serve as key communication mechanisms, conveying the details of the approach that IPM will use to provide support. Each engagement is customized to specific client needs, so the particular mechanisms used can vary between different customers regardless of market segment.

To further enable our customers’ ability to conduct business with us, the AM also remains in close contact with and is readily accessible to the sponsor throughout the engagement. Clients also know to visit our website, where they access educational information about project management and IPM’s service lines, along with white papers and case studies from other IPM engagements.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

BMGT 380 Business Law 1

Submit to Assignment Folder.

Purpose: The purpose of this project is to reflect on, analyze and apply tort law, product liability law, agency and contract law, and their potential risks and liabilities in a business. The project requires you to identify and analyze legal issues and to make recommendations.

You will also develop skills in critical thinking to create an in-depth comprehensive analysis.

The project relates to the concepts covered in weeks 1-7.  You should refer to assigned materials in earlier weeks of the course, including Instructor Notes.

This project relates to the following course outcomes:

¡ recommend appropriate actions in the business environment based on an understanding of sources of law, substantive legal concepts, legal process and procedure, and available remedies

¡ analyze contractual rights, obligations, liabilities, and remedies in the business environment

¡ analyze tort rights, obligations, liabilities, and remedies in the business environment

Background:  The GC owners are meeting with TLG in final consultations before GC opens business operations.  The purpose of these final meetings is to identify the:

¡ areas of business law presenting the greatest potential risk and liabilities for GC; and

¡ areas of business operations vulnerable to potential risks and liabilities for which GC should seek legal counsel.

Winnie and Ralph have asked you to provide a report that presents your reflections and recommendations based on your research and analysis during the past seven weeks of TLG’s consultation with the GC owners.

Instructions

The report will have two (2) parts.

Part I.  Risks and Liabilities

A.  Analyze and discuss two (2) areas of business law that present the greatest potential risks and liabilities for the GC business, from among these areas:

¡ Negligence related to any business operations

¡ Negligence related specifically to premises liability

¡ Strict product liability related to the use of EPI products for GC services

¡ Strict product liability related specifically to the resale of EPI products

¡ Contracts with employees

¡ Contracts for the sale of goods with clients

¡ Agency law and contracts with any GC agents

For EACH of the two (2) areas of the law selected from the above list, you must:

(1).  Provide a background explanation of the area of law, e.g., negligence, contracts for the sale of goods, etc. (be detailed and specific so any reader can understand the meaning of the specific area of law)

(2).  Analyze and explain the specific potential risks and liabilities presented by the area of law and why and how each area of law creates vulnerability for GC

(3).  Provide a specific example of why and how the potential risks and liabilities could arise for each area of law for the GC business

Minimum of 3 paragraphs for EACH of the two areas of risks and liabilities you choose to discuss (total of 6 paragraphs, minimum)

Citations required

Part II.  Legal Counsel

During the past eight weeks, we have discussed and emphasized the importance of the GC owners seeking business advice from TLG and the importance of GC –  and every business –  seeking legal counsel from an attorney for various aspects of business operations.

In Part II, you are to reflect on your experience in consulting with the GC owners, your research and analysis, and make the following recommendations.

A.  Evaluate and explain why you recommend that the GC owners seek legal counsel with an attorney for any  – or all – aspects of its business operations, i.e., contract writing, procedures to protect against negligence risks, recruitment policies, etc. 

¡ Explain and support the rationale for your recommendation specifically, in detail and comprehensively, using examples, personal experience(s), etc.

¡ Consider specific areas of business operations for which it is particularly important to seek legal counsel

Note:  There is no single correct answer; the detailed, specific rationale and support for your recommendation is most important.

It is not necessary to cite to resources in Part II for your personal opinion, but you must include a citation each time you do use information from a specific resource (i.e., from assigned course materials) to support your conclusions.

Minimum of 3 paragraphs

Format

Report

TO:  Winnie James, Ralph Anders

FROM: (your name)

RE:      GC risks and liabilities

Part I. Risks and Liabilities

A.  Business risk #1

(1)

(2)

(3)

A.  Business risk #2

(1)

(2)

(3)

Part II.  Legal Counsel

______________________

Tips for Formatting and Structuring Analysis:

¡ Write in complete sentences in paragraph format.

¡ Use in-text citations citing to relevant assignment materials.

¡ Double space; 12-point Arial or Times Roman font.

¡ Introductory Sentence:  Begin with an introductory sentence or very brief paragraph that states your conclusion to the questions asked.

¡ Concluding Sentence:  End the discussion with a concluding sentence or a very brief paragraph that summarizes your conclusion/what you discussed.

¡ Support Arguments and Positions:   Please refer to the module in Content, “How to Support Arguments and Positions”.

Review the Project Memorandum

Thoroughly read the project to ensure all required elements are present.

Review the grading rubric to ensure that you gain the most points possible for this assignment.

Proofread for spelling and grammatical issues.

Use the spell and grammar check in Word.

This information is back ground information: 

Background Facts You Need To Know: WEEK 1

TLG has a new client, Clean-n-Shine (Clean), a commercial cleaning company incorporated and located in Maryland, but doing business in all Mid-Atlantic states. Clean uses its own line of cleaning products and also sells its products to other businesses via the internet.

Recently, the Delaware legislature enacted a law banning all sales and importation, until further notice, of Clean’s Shine It floor cleaner in Delaware.  It was discovered that one of the ingredients in Shine It, derived from corn, is contaminated and causes a quick-growing mold to spread on surfaces to which it is applied. The mold can be toxic to humans and can cause damage to floors.

Clean wants to expand its product line to sell Shine-It in Delaware.  If Clean can sell Shine-it in Delaware, it will increase its income and profits.  Clean, therefore, wants to challenge the new law as unconstitutional, and it has consulted TLG for advice.

Determining jurisdiction in the courts can be confusing and complicated, but it is an important legal doctrine that businesses cannot ignore.  Jurisdiction can affect business operations and determine business decisions, such as where the business is located and where and how to advertise and market the business.  Where there are questions about possible jurisdiction in the courts, it is advisable for businesses to consult an attorney.

TLG’s client, Clean, is facing other litigation and needs advice.

Clean is located in Maryland, but it advertises aggressively in all Mid-Atlantic States of Maryland, Delaware, Pennsylvania, West Virginia, and Virginia via the internet, social media, television, and mailings.

Recently Clean contracted with ABC Corporation (ABC), incorporated in Virginia, to clean ABC’s offices in Richmond, Virginia. ABC paid for the cleaning, but later was dissatisfied with the service and sued Clean in Virginia to recover the costs of the cleaning.  The Virginia state court ruled that it had personal jurisdiction to hear the case.

Background:  WEEK 2

With some understanding of the legal system, the GC owners can now shift their focus to examining specific areas of law that create potential risks and liabilities for their business.   The group knows from their business experience, that businesses face serious and costly risks and legal liabilities stemming from tort law.

Unintentional harm resulting from accidents, such as negligence, can result in costly litigation.  For example, Madison’s roofing business was sued by a client who was injured when one of Madison’s roofing employees accidentally dropped a ladder on the client’s leg.

The GC owners are concerned about the possibility of accidents resulting in injuries to their employees that could occur during the cleaning of GC clients’ property.

Winnie and Ralph have given you the responsibility of analyzing and summarizing potential negligence claims and liability that GC might face in its business operations. You decide to analyze a hypothetical fact scenario to present to the GC owners to help explain GC’s potential negligence liability for accidents occurring on clients’ property during cleaning.  The analysis will be presented at the next meeting with GC owners and TLG.  Your analysis will address only the tort of negligence. 

Background Facts You Need To Know:  Jack, a GC cleaning employee, was assigned to clean Client A’s office building.  Jack’s first task was to vacuum the floors in a wide hallway.  Jack plugged GC’s commercial vacuum cleaner into the hallway outlet with an extra-long electrical cord and began vacuuming.  Before beginning vacuuming, Jack checked to ensure that the hallway was clear of obstacles and people walking.  After checking the hallway, he placed the cord to the side of the hallway out of the path of his pushing the vacuum.  After vacuuming for a few minutes, Jack stepped to the side to turn the vacuum and tripped over two boxes that had been placed in the hallway by Client A’s employee since Jack began vacuuming.  Jack did not know the boxes had been placed in the hallway.

Jack fell and broke his ankle and was taken to the hospital ER via ambulance.  A cast was applied after it was determined the ankle did not need surgery.  Jack missed three weeks of work because of the injury.

Background Facts You Need To Know: WEEK 3

TLG has scheduled another meeting with the GC owners to further discuss the risks and liabilities of tort law.  This meeting will focus specifically and only on strict product liability.

Winnie and Ralph asked you to participate in the GC meeting and to be prepared to discuss specific strict product liability risks related to GC’s use and resale of EPI cleaning products.

Instructions

Report You Need To Prepare: Write a summary report addressing the following questions to use as a basis for discussion in the GC meeting with TLG and to educate GC owners about potential risks and liabilities under product liability law.  Your report must focus only on product liability law.

A.  Identify and explain the possible liabilities claims (EXCEPT omit warranty liabilities) GC could face under product liability law for reselling EPI cleaning products directly to customers from its public place of business.  

B.  Recommend specific actions that GC could take to reduce its liabilities under product liability law for reselling EPI cleaning products

Background:  Week 4

Contracts are essential for business, and will be an integral part of GC operations, so the owners now want to focus on contract law.   Each of the owners has experience with contracts in their own businesses, and appreciate the probable risks and liabilities associated with contracts.   They also know that to avoid possible disputes with employees and clients, contracts should be comprehensive, clear, and specific.

The GC owners know that there are various types of contract agreements relevant to their business.  GC will have individual contracts with employees, independent contractors, and other agents who will represent the company.  Also, GC will engage in sales contracts with other businesses, consumers, and clients.

To reduce disputes and risks and liabilities associated with contracts, the owners want all contracts to be written, with specific, complete, and clear terms.  Contracts must define the rights and responsibilities of the parties.  Also, since employees and/or independent contractors will be performing cleaning services on clients’ properties, these contracts should require bonding for all employees.

You, Winnie, and Ralph presented draft contracts for GC employees, including different contracts for cleaners, office managers, marketing specialists, sales representatives, and IT employees.

The GC owners reviewed the drafts and have some questions about the contracts.

Background Facts You Need to Know:  At Winnie’s and Ralph’s request, it is your responsibility to research an provide answers to the GC owners’ questions. As an example, Winnie, Ralph, the GC owners, and you have determined that GC’s contract with its cleaner- employees will include the following terms and conditions:

¡ specific duties to be performed by cleaner-employee

¡ salary for cleaner-employee

¡ work hours

¡ terms of payment for overtime or holiday work, if any

¡ sick leave

¡ vacation leave 

¡ training requirements for cleaner-employee

¡ length of contract

¡ bonding for cleaner-employee 

¡ periodic performance evaluation and how it will be conducted

¡ termination of the contract, i.e., a notice of termination, etc. 

Background:  Week 5

The GC owners have questions and need clarification about several contract concepts and issues related to their new business.  Specifically, they have questions about:

· the Statute of Frauds “writing requirement” and

¡ electronic contracts

Generally, contracts for the sale of goods must be in writing, and the writing must be signed by the parties to the agreement, and the parties must be sufficiently identified.  GC will be selling goods via the internet, and the owners are wondering whether these electronic contracts are valid and enforceable.

Background Facts You Need To Know:  Company X, a company in Illinois, contracted via the internet with Windows Bright, a small window washing business in Missouri to purchase 4 cases of Shiny Lite window cleaning solution at $200 per case.  Company X paid via the internet with a company credit card.  The contract stated that the 4 cases of Shiny Lite would be shipped to Company X’s place of business in Illinois via UPS.  Once UPS delivered the Shiny Lite, the contract required Windows Bright to clean Company X’s windows.

Background:   Week 6

The GC owners are aware of the importance of contracts to both buy and sell goods and services.  They are reviewing the Uniform Commercial Code (UCC), Article 2, that covers contracts for sales of goods.

The GC owners understand that the terms in their purchase contracts (i.e., contracts to purchase products from EPI) will require very different terms from their sales contracts reselling these cleaning products purchased from EPI.

First, the owners want to focus on understanding their rights and obligations associated with reselling EPI cleaning products.

Winnie and Ralph ask you to prepare information to help the GC understand risks and possible liabilities related to the resale of EPI cleaning goods to customers.

You developed a hypothetical scenario for analysis and explanation for discussion with the GC owners.

Background Facts You Need To Know:  Office Cleaning Pros (Pros), a local company, emailed GC that it wanted to purchase some cleaning products.

The email stated the following sales details:

¡ Pros wanted to purchase 6 cases of Carpet Re-New cleaning solution from GC

¡ the price is $200 per case of Carpet Re-New

¡ Delivery was to be on or before April 1, 2019

¡ Delivery was to be made to Pros storage warehouse facility

GC did not respond to the email, but on April 1, GC delivered 6 cases of cleaning solution products to Pros office headquarters, located next door to Pros’ storage warehouse facility.  Pros moved the cleaning solution products from its headquarters to its storage warehouse facility

Three days later, Pros inspected the 6 cases GC had delivered and discovered all 6 cases contained Floor Re-New cleaning solution, not Carpet Re-New as specified in the sales contract.

Background Facts You Need To Know:  Week 7

GC owners recognize the importance of effective recruitment and hiring.  They feel competent about recruiting and hiring new GC management but want to hire an expert to recruit and hire employees to develop and manage their website, internal computer systems, and IT support.

They agree to hire a recognized expert in this area, George Tacy, to act as GC’s agent in hiring website/computer/IT employees.  The owners want to give full authority to Tacy to direct every aspect of recruitment and hiring of these employees, from the initial recruitment of applicants to the final hiring process.

The GC owners want to ensure that their agreement with Tacy will be valid and include all important terms.  They have requested a meeting with TLG to discuss agency agreements.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

What Strategies Can You Use To Ensure Ease Of Reading In Your Emails And Other Digital Communications?

Please use this as textbook reference. Cardon, P. (2013). Business communication: Developing leaders for a networked world. New York: McGraw-Hill/Irwin

 

3 apa references.

 

 

1.A. What strategies can you use to ensure ease of reading in your emails and other digital communications?

B. What strategies can you use to show respect for the time of others?
C. Explain the neutrality effect and negativity effect in digital communications.

 

2.Compare the less-effective and more-effective emails in Figures 7.1 and 7.2 in the following ways:

A. Analyze the writing for each email based on tone, style, or design.
B. Evaluate them based on three principles for effective emails from this chapter.

3.Assume you lost your temper when discussing a group project with one of your classmates. You left the meeting early because you were frustrated that your classmate insisted on doing everything his way. You still feel that he is dominating the project, but your behavior was inappropriate. Write an apology to your classmate in a way that repairs some of the damage between the two of you and allows the group to work more effectively together.

 

4.Analyze the Better Horizons flyer ( Figure 9.6 ) in the following ways:

A. Which psychological tools of influence (consistency, reciprocation, social proof, authority, liking, scarcity) does it use? Provide examples.
B. What emotional appeals are used? What about logical appeals? Would you consider this messages as catering more to emotion or logic? Explain.
C. Do you consider this message warm and inviting?
D. Do you consider this sales message plausible?
E. Do you consider this sales message respectful?
F. Do you trust this message?
G. What are two changes you think could be made to improve its effectiveness?

 

5.

Assume you own a computer retail store located near your campus (give the store any name you want). You have sold fewer PCs in recent years due to the strong demand for Macs among university students. You will write a sales letter to reach all student housing units. Your goal is to encourage students to purchase PCs at your store. You can do online research to help you contrast PCs with Macs and identify pricing levels. In the sales letter, attempt to show students the advantages of PCs compared to Macs and get them to take specific steps to learn more about or even purchase a PC at your store.

      

After studying this chapter, you should be able to do the following:

LO7.1 Apply principles for writing effective emails.

LO7.2 Explain how to handle emotion effectively in online communications.

LO7.3 Describe strategies for managing digital message overload.

LO7.4 Explain characteristics of the emerging Social Age.

LO7.5 Apply principles of effective social media use in professional settings.

LO7.6 Build a credible online reputation.

LO7.7 Describe the ethical use of social media for work.

Learning Objectives

Email and Social Media for Business Communication

C h

a p

t er

S ev

en

car03199_ch07_176-210.indd 176 23/11/12 7:56 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

WHY DOES T HIS MATTER?

 

For nearly two decades, email has been the primary written business communication tool. In Table 7.1 , you can see that in a recent study, it ranked second in effectiveness among communication channels for coordinating work. 1 Even with so many emerging communication tools, email remains the channel of choice . 2 Writing emails will likely consume much of your time early in your career. One study showed that corporate employees spend 25 percent of their days on email- related tasks. By comparison, they spend 14 percent of their time in personal meet- ings and 9 percent of their time in phone conversations. 3 Another study found that corporate workers average 14.5 hours per week reading and responding to email. 4 The number of emails that business profes- sionals deal with is astound- ing; the average business professional receives 58 le- gitimate (non-spam) emails per day and writes 33. By 2015, business profession- als are projected to receive 71 emails per day and write 41. 5 Emails, however, are not efficient for all types of writ- ten communication. Typically, email is most appropriate for private communication. For team and networked commu- nication, social media tools such as blogs and wikis are generally more efficient (see Chapter 2 for distinctions between private, team, and net- worked communication). Many businesses are now adopting social media (often used nearly synonymously with terms such as Web 2.0 , Enterprise 2.0, social networking , social software , and a variety of other terms) for internal use; however, these tools still account for a small percentage of business communication. This will change rapidly over the next decade. Some analysts project that social media tools will dominate busi- ness communication by the year 2020. 6 In this chapter we first focus on email in the workplace. Then, we discuss the evolv- ing adoption of social media tools, which is transforming work culture into the Social Age. Next, we describe how blogs, wikis, and other social media tools are being used. We conclude with sections about managing your online reputation and using social media ethically. Examples throughout the chapter come from the chapter case about the Prestigio Hotel. Take a few minutes to familiarize yourself with this case prior to reading the remainder of the chapter.

? TABLE 7.1

Most Effective Communication Channels for Coordinating Work

Skills Percentage of Business

Professionals

1. Scheduled meetings

2. Email

3. Landline phone

4. Cell phone

5. File sharing

6. Informal conversations

7. Texting

8. Instant messaging

9. Private messages on social networking platforms

10. Group messages on social networking platforms

89

84

75

72

57

45

41

29

15

12

Source: Peter W. Cardon, Melvin Washington, Ephraim A. Okoro, Bryan Marshall, and Nipul Patel, “Cross-Generational Perspectives on How Mobile Phone Use for Texting and Calling Infl uences Work Outcomes and Work Relationships,” pre- sented at the Association for Business Communication Southeast Conference, Charleston, South Carolina, April 1, 2011. Note: Percentages based on the number of business professionals who rated communication channel as effective or extremely effective in their current jobs.

Hear Pete Cardon explain why this

matters.

bit.ly.com/CardonWhy7

car03199_ch07_176-210.indd 177 23/11/12 7:56 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

178 Part Three Principles for Business Messages

Chapter Case: Communicating with Emails and Social Media at the Prestigio Hotel

Who’s Involved

Andrea Garcia, general manager

Nancy Jeffreys, director of marketing

Jeff Anderton, marketing assistant

Kip Yamada, marketing associate

Barbara Brookshire, director of conventions

Marketing Team

Situation 1

Situation 2

Situation 3

Barbara Uses Emails with Clients to Establish Terms Barbara leads efforts to negotiate contract terms for conferences. Generally, representatives of busi- nesses and other organizations contact Barbara by phone or email. After an initial phone consulta- tion and an on-site visit with potential clients, Barbara handles most of the marketing and negotiation by email. Before a deal is done, she typically sends and receives 20 emails with any given client to respond to questions and concerns and to finalize terms of the agreement.

Nancy and Kip Handle a Delicate Situation by Email Nancy, the director of marketing, and Kip, a marketing associate, recently had a conflict that gener- ated hard feelings. Nancy harshly criticized Kip for making what she believed were unauthorized

refunds to some business travelers. Kip thought Nancy was unjustified. After several months of not working well together, they aired their grievances to one another. Nevertheless, Kip still had some unresolved issues and decided to send a quick email to Nancy expressing his feelings about the conversation.

The Marketing Team Adopts Social Media for Team Communication The entire marketing team has recently started using enterprise social software (which functions in many ways like Facebook but is customized for use within an organization). The team is using blogs, wikis, and other tools to follow up with one another related to action items agreed on in meetings, discuss ongoing projects and campaigns, and update one another about their accomplishments.

Task 1 How will Barbara

manage emails to show professionalism and

increase her likelihood of success with prospects?

(See the section on creating effective emails.)

Task 3 How will the marketing

team use social media to work more efficiently together?

(See “Internal Communication Tools for the Social Age.”)

Task 2 How will Kip compose an email in an emotionally charged situation? How

will Nancy respond? (See the “Manage Emotion and Maintain Civility”

section.)

car03199_ch07_176-210.indd 178 23/11/12 7:56 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 179

Creating Effective Emails Email communication is the primary form of written business communication. Most analysts expect it to be the primary tool for at least the next five to ten years in most companies. 7 Some forward-thinking companies are increasingly adopting social net- working platforms (SNPs) for employee communication (discussed later); however, even in companies that adopt these SNPs, employees will continue to use private elec- tronic messages within these platforms, which function nearly identically to emails. Furthermore, many of your colleagues, clients, and other contacts will likely prefer to use email systems for many years to come.

Writing effective emails involves applying the principles of writing style that we discussed in Chapters 5 and 6. It also involves adapting to the unique characteristics of email. In this section, we explain basic principles for using emails effectively, includ- ing the basic components that ensure ease of reading. Then, we focus on managing emotion and maintaining civility in electronic communications.

Use Email for the Right Purposes Email is easy and convenient. Before quickly sending out an email, however, consider whether it is the best communication channel for your work purposes.

Since emails are not rich—meaning lacking in virtually all verbal and nonverbal cues associated with face-to-face communication and lacking immediate feedback— they are best suited for routine, task-oriented, fact-based, and nonsensitive messages. 8 Communication specialist Alan Murray, in a Wall Street Journal article called “Should I Use Email?” explained:

To avoid miscommunication, we suggest a simple rule: Email can be used effectively as a means to pass on straight facts, or to provide praise and encouragement. But it shouldn’t be used to chastise, scold, or deliver bad news. If the message you are delivering is a discouraging one, it’s best to deliver it in person. 9

Email communication has few constraints (low cost, little coordination) and high control (the writer can think them out carefully, and they provide a permanent record). Yet because it is not a rich form of communication, it is rarely appropriate for sensitive or emotional communication tasks. It is also inefficient for facilitating discussions.

Ensure Ease of Reading In all written communication, ensuring ease of reading is critical. It is even more criti- cal in emails and other digital messages. Simply put, your readers are unlikely to read your message unless you make it easy for them. Compare the ease of reading in the less-effective and more-effective examples of emails in Figures 7.1 and 7.2 . Think about how quickly a reader can process the information. Also, use the following tips to ensure ease of reading in your emails.

Provide a Short, Descriptive Subject Line Message recipients make im- mediate judgments about the importance of a message based on the subject line. If it is not clear and compelling, recipients may not open the message right away. Further- more, when business professionals search for prior email messages, they often scan the subject lines in their in-boxes. Without a descriptive subject line, they may miss the message. Good subject lines are generally five to ten words long. By contrast, poor sub- jects are either too short (1 or 2 words) and thus nondescriptive or too long (12 words or longer) and thus difficult to process. Fundamentally, subject lines frame your entire message; they serve the same role that headlines do in newspapers and magazines.

Keep Your Message Brief Yet Complete Get to the point within three or four sentences, and keep your paragraphs about half the size of those in business

LO7.1 Apply principles for writing effective emails.

Principles of Effective Emails

• Use for the right purposes.

• Ensure ease of reading.

• Show respect for time.

• Protect privacy and confidentiality.

• Respond promptly. • Maintain

professionalism and appropriate formality.

• Manage emotion effectively.

• Avoid distractions.

Components of Effective Emails

• Subject line • Greeting* • Message • Closing* • Signature block* • Attachments* * optional

car03199_ch07_176-210.indd 179 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

180 Part Three Principles for Business Messages

documents—ideally 30 to 50 words long. Consider placing the most critical informa- tion at the beginning so readers gather the most relevant information immediately. This is an important strategy, since most people are so inundated with messages that they often pay more attention to the beginning, skimming or skipping latter portions. This is especially important as business professionals increasingly use mobile devices.

Clearly Identify Expected Actions Most emails are intended to spur ac- tion. Effective emails contain specific and clear requests so that recipients know ex- actly how to respond. In many cases, you can place these directions in the subject line for greatest clarity.

Provide a Descriptive Signature Block Signature blocks should provide clear contact information. This allows recipients to easily contact you through richer communication channels if needed. It also enhances your professional image.

Use Attachments Wisely Attachments allow business professionals to share files that do not display effectively in an email window. Messages that are more than several paragraphs long are typically appropriate as attachments. Also, pictures and other graphics, spreadsheets, databases, and many other types of files are nearly al- ways more appropriate as attachments. However, be careful about sending attachments that are too large, since they may fill others’ email boxes.

Show Respect for Others’ Time Since email communication is so convenient, some people overuse and even abuse it. With business professionals sending and receiving hundreds of emails each week, they often experience information overload and email fatigue. Every time you write an email, you might want to envision your colleagues and clients who are receiving them. Imagine their time pressures and the line of emails awaiting their response. Assume they will likely have low tolerance for poorly written, sloppy, unclear emails.

Nondescriptive subject line

Nondescriptive document name

Poorly spaced, cluttered text

Unhelpful signature block

Unprofessional tagline

FIGURE 7.1

Less-Effective Email

car03199_ch07_176-210.indd 180 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 181

Clear, detailed subject line

Clearly labeled document

Pleasant opening

Complete, professional signature line

Pleasant closing

Numbered format leads to rapid processing of information

References to details and specific locations in the attachment lead to rapid and complete processing

FIGURE 7.2

More-Effective Email

In the business world, where time pressures can be overwhelming, you can engen- der goodwill by writing emails that are professional, relevant, easy to read, and other- oriented. To show your respect for others when sending email, consider the following advice.

Select Message Recipients Carefully Before sending an email, think about the workload you are creating for your colleagues or other message recipients. Not only do they commit time to reading your email, but they also often interrupt an- other work task to do so. If you are requesting information or action, your colleagues are further committed in terms of time. So, make sure the email is necessary and rel- evant for each of your message recipients.

Provide Timelines and Options If you use email to coordinate tasks with deadlines, provide detailed information about time frames and your availabilities. If you are setting up appointments, make sure you have provided several options. By

car03199_ch07_176-210.indd 181 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

182 Part Three Principles for Business Messages

clearly providing timelines and schedules, you minimize the number of emails needed to coordinate your efforts, thus saving time. By providing options, you show respect for your colleagues’ schedules.

Be Careful about Using the Priority Flag You will routinely make re- quests of others that are time-sensitive. If you too often set the priority flag on such emails, your colleagues may become annoyed, perceiving you as pushy. In fact, some business professionals are more likely to ignore emails when the priority flag is set. If you need something urgently, mention it politely in the subject line or use a rich com- munication channel such as a phone call to gain buy-in.

Let Others Know When You Will Take Longer Than Anticipated to Respond or Take Action If you can’t respond to a request made in an email, reply immediately and explain how soon you can respond in full. You might use phrases such as “I will respond to your email by next Tuesday,” or “I can take care of this by the end of next week.”

Avoid Contributing to Confusing and Repetitive Email Chains Email chains are groups of emails that are sent back and forth among a group of people. As the number of messages and people involved in an email chain increases, confusion can build. Consider the following complaint of a business professional:

One of my biggest pet peeves has to do with forwards. My company will often send out a corporate email to the all-hands list, then a program manager will forward that email to the same all-hands list “in case you didn’t get this,” then the department head will forward the same email back to the same all-hands list “in case you didn’t get this.” Often another layer or two of management feels compelled to forward the same email down to their organizational levels for the same reason. I’m not exaggerating when I say that I often have to delete the same email five or six times! Please, if you’re in the habit of forwarding announcements for “FYI” reasons, pay attention to which lists you’re forwarding to and which people are already on those lists. 10

Three features contribute to email chains: forward, copy, and reply to all . The for- ward feature allows you to send any message you receive to others with the click of the mouse. As always, make sure that those you are forwarding the message to need to see the email. Also, consider whether the original sender would consider it appropriate for you to forward the email to others; after all, he or she did not place those people on the original email. Similarly, many business professionals consider use of the blind carbon copy feature a breach of privacy. Furthermore, the ease of forwarding and copying can create other problems. Once you send an email, you have no control over whether oth- ers will forward it, and to whom, which leads to a good standard articulated by Tony DiRomualdo, strategy and IT researcher: “Don’t say anything you would not want the entire planet to read at some point.” 11

Many business professionals use the copy feature liberally to let everyone in a de- partment or work unit in on the conversation. Of course, one of your goals is transpar- ency, allowing others in your relevant work group to know how decisions are being made. But copying too many people can lead to information overload. Furthermore, copying too many people on an email can dilute responsibility. When five or six people receive an email about accomplishing a specific task, uncertainty may arise about ex- actly who is supposed to do what. The more people you copy, the less likely you will get a response. Also, some people perceive copying a direct supervisor or boss on emails between peers as a subtle power play. 12

The reply to all feature can contribute to confusing email chains in many of the same ways as the forward and copy features. In an email conversation of more than four or five people, various message recipients can lose track of the sequence of messages or miss some messages altogether. Reply email chains become especially confusing when

car03199_ch07_176-210.indd 182 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 183

some colleagues are using just the reply feature whereas others are using the reply to all feature. One advantage of team blogs and wikis in the workplaces is that they remove some of the inefficiencies and confusion of email chains by placing messages and shared content in a central location rather than in various, separate email boxes.

Protect Privacy and Confidentiality Be careful about not spreading—purposely or inadvertently—sensitive or confidential information. Since emails are so convenient to send, even the rare mistake in an ad- dress line can result in damaging professional consequences. Consider, for example, that eight out of ten marketing and advertising executives say they have made mistakes via email, such as sending job offers to the wrong people or revealing confidential salary information to the entire company. 13 Double-checking that you have placed the correct people in the address line before you hit the send button is a worthwhile habit that requires just a few extra moments.

Respond Promptly Most business professionals expect fast responses to emails. Of course, what seems like a quick response to one person seems like a delayed response to another. One re- cent study of business professionals found that nearly all business professionals expect an email response within one day (see Figure 7.3 ). 14 Younger professionals are more likely to expect a response immediately. The majority of business professionals in all age groups expect a response within one to two hours. If you choose not to check your email more than a few times a day (a strategy recommended later in the chapter), let others know how soon to expect replies.

Maintain Professionalism and Appropriate Formality Email communication is typically considered fairly formal. Many business profes- sionals are particularly sensitive to “sloppy” email. Management consultant Beverly Langford reported what thousands of business leaders have observed about an overly casual attitude toward email use:

Many people seem to forget that email is, in fact, written communication, and, consequently, treat it much less carefully. Workplace email messages often contain terse and offhand remarks and project a flippant attitude that is sometimes excessive, even bordering on the unprofessional. Those who write the emails often seem to be overlooking how their

FIGURE 7.3

Appropriate Response Time to Emails Source: Peter W. Cardon, Melvin Washington, Ephraim A. Okoro, Bryan Marshall, and Nipul Patel, “Cross-Generational Perspectives on How Mobile Phone Use for Texting and Calling Influences Work Outcomes and Work Relationships,” presented at the Association for Business Com- munication Southeast Conference , Charleston, South Carolina, April 1, 2011.

31–40

21–30

41–50A g

e G

ro up

51–65

0 25 50 75 100

Percentage of Business Professionals

Immediately Within 1 hour Within 2 hours Within a day

car03199_ch07_176-210.indd 183 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

184 Part Three Principles for Business Messages

message is coming across to the receiver. Further, when composing emails, many people don’t seem to be nearly as concerned with structure and correctness as they would be when putting something on paper. This . . . is ironic because often many more people see an email than would ever see a hard copy of a memo or letter because it’s so easy for the recipient to forward an email to anyone he or she chooses. 15

Unfortunately, since so many more people can potentially see an email than would ever see a hard copy of a message, having high standards is even more important. In the past few years, a preference has emerged for less formal, stuffy writing. Still, you’ll want to achieve a balance between formality and the friendliness associated with casual writing. Generally, you are better off erring on the side of too much formality as opposed to too much casualness. Consider the following recommendations.

Avoid Indications That You View Email as Casual Communication Certain casual ways of writing and formatting appear unprofessional—for example, using all lowercase letters or nonstandard spelling (i.e., hey barbara, how r u ), using excessive formatting (i.e., flashy background colors, unusual fonts), providing extra- neous information in the signature line (i.e., favorite quotations), and typing in all caps (IMPLIES ANGER). Humor and sarcasm, too, can be misinterpreted in digital com- munications, even among close colleagues. Furthermore, even when considered funny, it can draw attention away from your central message.

Apply the Same Standards of Spelling, Punctuation, and For- matting You Would for Other Written Documents Carefully review your message for typos, spelling, punctuation, or grammatical problems before send- ing it. For important messages, consider first composing with word processing soft- ware. This will help you apply a higher level of seriousness. In addition, you’ll be able to use spell-check and grammar-check features that are more reliable than those within email systems. Finally, you can ensure that you do not inadvertently send the message without making sure it is polished and complete.

Use Greetings and Names Although not technically required, consider using short greetings and the names of your message recipients. As one of Dale Carnegie’s most famous pieces of networking advice goes, “A person’s name is to that person the sweetest most important sound in any language.” 16 This advice applies to most communication situations, including emails. People leave out names in emails for several reasons. Some professionals view the use of greetings and names as exces- sively formal, resembling letters. Other professionals view emails as the equivalent of memos. In fact, the layout of most emails—with a recipient line, sender line, and subject line—resembles memos. Traditionally, the format for memos calls for omitting a personal greeting and name.

In a recent study, a communication researcher was given access to the emails in two organizations. One was a low-morale organization and one was a high-morale organization. She found that the presence or absence of greetings and names at the beginning of emails was a strong indicator of company climate (see Figure 7.4 ). 17 In the low-morale organization, just 20 percent of the emails contained greetings, and just 36 percent contained names. By contrast, in the high-morale organization, 58 percent contained greetings, and 78 percent contained names. The same trend was shown in closings. In the low-morale organization, just 23 percent of the emails contained a po- lite closing and a name compared to 73 percent in the high-morale organization.

The conventions of using greetings and names are sometimes dropped as an email chain emerges and functions much like a conversation. Typically, feelers (those with the strongest people-orientation) show a stronger preference for greetings and names. If you’re having an ongoing email exchange with a feeler and you notice that he or she is using a formal greeting in each email, consider reciprocating. On the other hand, if you’re a feeler and like to see greetings and names in every email but your colleagues

car03199_ch07_176-210.indd 184 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 185

are not doing so, avoid getting hung up on it. Assume that they view emails much like memos or that they view excessive use of greetings and names in back-and-forth email chains as repetitive and unnecessary.

Manage Emotion and Maintain Civility Many managers cite the lack of emotion in emails as positive. They see email as a channel that allows the exchange of messages in minimal form—objective, task-based, and straightforward. As one manager explained, “With email I find myself answering without all the kindness necessary to keep people happy with their job.” 18

Yet, avoiding emotion entirely, even for task-based messages, is nearly impossible. Business professionals often want to invoke some emotion—perhaps enthusiasm or a sense of urgency. Even when senders intend to convey a relatively nonemotional mes- sage, recipients may experience an emotional reaction.

In the absence of face-to-face communications, emails tend to elicit either the neu- trality effect or the negativity effect. The neutrality effect means that recipients are more likely to perceive messages with an intended positive emotion as neutral. That is, the sender may wish to express enthusiasm about an event, but the receiver decodes the information without “hearing” the enthusiasm. 19 The negativity effect means that recipients are more likely to perceive messages that are intended as neutral as nega- tive. 20 The effects of emotional inaccuracy due to the neutrality and negativity effects can lead to conflict escalation, confusion, and anxiety. 21 Expert business communica- tors remain aware of these tendencies.

Two characteristics of asynchronous electronic communications can lead to feel- ings of anger and frustration more so than in face-to-face communications. First, peo- ple often feel comfortable writing things they would not say in person. In some cases, this sense of online freedom leads to flames, which are emails or other digital commu- nications with “hostile intentions characterized by words of profanity, obscenity, and insults that inflict harm to a person or an organization.” 22

The second aspect of asynchronous electronic communications that can lead to anger and frustration is cyber silence, which is nonresponse to emails and other com- munications. During the nonresponse stage, message senders often misattribute expla- nations for the silence. They sometimes wonder if message recipients are purposely avoiding or even ignoring them. 23 As the length of time between messages increases, they often experience more frustration and anger. 24

As a message sender, grant the benefit of the doubt to your recipients when re- sponses take longer than you expected. Instead of getting frustrated, consider giving them a phone call. Keep in mind that they may have different expectations about a

LO7.2 Explain how to handle emotion effectively in online communications.

FIGURE 7.4

Use of Email Greetings and Names in a Low-Morale and a High-Morale Organization Source: Data from Joan Waldvogel, “Greetings and Closings in Workplace Email,” Journal of Computer-Mediated Communication 12, no. 2 (2007).

75

50

25

0 No

Greeting Greeting

Word Only

59

17

5 5

21 25

15

53

Name Only

Greeting Word + Name

P er

ce nt

ag e

of E

m ai

ls

Low-morale organization High-morale organization

car03199_ch07_176-210.indd 185 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

186 Part Three Principles for Business Messages

reasonable time frame to respond to your email. If they routinely take longer than you expect, politely mention that you would appreciate quicker responses.

In Chapter 2, we discussed the importance of civility. Civility is likewise important in electronic communication. Cyber incivility is the violation of respect and consid- eration in an online environment based on workplace norms. Research has shown that “fast-paced, high-tech interactions may add to incivility, as people believe that they do not have time to be ‘nice’ and that impersonal contacts [such as electronic communica- tions] do not require courteous interaction.” 25

Shockingly, recent research shows that 91 percent of employees reported experienc- ing either active or passive cyber incivility from supervisors in the workplace. 26 Active incivility involves direct forms of disrespect (i.e., being condescending, demeaning, saying something hurtful). Passive incivility involves indirect forms of disrespect (i.e., using emails for time-sensitive messages, not acknowledging receipt of emails, not re- plying to emails). Cyber incivility has been shown to lead to lower job satisfaction and organizational commitment. Active incivility was the most damaging. In Figure 7.5 , you can see a summary of this research. One interesting finding was that male and female supervisors engaged in different types of incivility. Male supervisors were far more likely to engage in active incivility, whereas female supervisors were far more likely to engage in passive incivility.

FIGURE 7.5

Active and Passive Incivility from Supervisors Source: Vivien K.G. Lim and Thompson S.H. Teo, “Mind Your E-manners: Impact of Cyber Incivility on Employees’ Work Attitude and Behavior,” Information & Management 46 (2009): 419–425. Copyright © 2009, with permission from Elsevier.

1009080706050403020100

Active and Passive Incivility through Emails of Supervisors (Percentage of Employees Who Stated Their Current Supervisor Had Engaged in

Email Incivility)

Put you down or was condescending to you in some way through emails.

Active Email Incivility

Passive Email Incivility

Said something hurtful to you through emails.

Made demeaning or derogatory remarks about you.

Used emails to say negative things about you that he/she wouldn’t say to you face-to-face.

Used emails for time-sensitive messages.

Not replying to your emails at all.

Did not acknowledge receipt of your emails.

Used emails for discussions that would require face-to-face dialogue.

Female supervisors Male supervisors

22% 60%

23% 59%

26% 58%

28% 62%

80% 40%

40% 84%

85%

86%

1009080706050403020100

42%

44%

car03199_ch07_176-210.indd 186 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 187

Inevitably, you will be the target of what you consider uncivil electronic commu- nications. In nearly all situations, your goal should be to avoid escalation. You can take several steps to constructively address uncivil emails: reinterpretation, relaxation, and defusing. Reinterpretation involves adjusting your initial perceptions by making more objective, more fact-based, and less personal judgments and evaluations. When people are distressed, they often make extreme, subjective, and overly personal judg- ments. By reinterpreting the event, you allow yourself to take the communication less personally. This is easier said than done. Many people engage in relaxation techniques to help constructively reinterpret the event. Relaxation involves releasing and over- coming anger and frustration so that you can make a more rational and less emotional response. People use a variety of methods to alleviate the physiological impact of anger, including counting to ten, taking time-outs, engaging in deep breathing, and looking for the humor in the situation. 27

In the opening case, you learned that Kip was frustrated with his direct supervisor, Nancy. Kip, perhaps unwisely, fired off an angry email (see the bottom message in Figure 7.6 ), and Nancy responded (the top message in Figure 7.6 ). Whether he was correct or not about Nancy’s approach to guest service is somewhat beside the point. Email is rarely an effective communication channel to air complaints or to discuss emotionally charged issues. Figure 7.7 presents a more-effective response from Nancy to this exchange.

Defusing involves avoiding escalation and removing tension to focus on work ob- jectives. You can take several steps to defuse the situation when you receive an uncivil email. First, focus on task-related facts and issues in your reply. Second, focus on shared objectives and agreements. Third, express interest in arranging a time to meet in person. If this is not possible, attempt a richer channel of communication such as a phone call or web meeting with video. Defusing the situation with an immediate email is only part of the process in restoring or perhaps even strengthening a working relationship. A follow-up meeting is nearly always essential to renew cooperation on shared work efforts.

You will often need to respond to electronic messages that you feel are unfair or inappropriate. Notice how Nancy escalates the problem in the less-effective re- sponse by writing in an impersonal, defensive, and confrontational manner. By con- trast, notice how she defuses the situation in the more-effective response by avoiding defensiveness, focusing on shared interests, and arranging for a time to meet face- to-face. Your ability to defuse uncivil electronic communications during your career will pay off in many ways: It will help your colleagues and teams stay on task and perform better; it will help you develop a reputation for constructively resolving dif- ferences; and it will lead to more satisfying work experiences. The ability to defuse such situations requires high emotional intelligence, especially in self-awareness and self-management.

Manage Your Emails to Avoid Distractions Constantly checking incoming messages—emails, texts, IMs, and various messages through social networking platforms—or simply hearing message alerts distracts busi- ness professionals from concentrating on the tasks at hand. As you are bombarded with incoming messages, your productivity decreases for two reasons: You are distracted from your immediate tasks and you try to multitask.

Interruptions from digital messages, or e-interruptions, are extremely costly to your performance. One recent study found that the average worker loses 2.1 hours per day due to interruptions. Many of these distractions are email and other incom- ing messages. Many business professionals check their email every five minutes, which amounts to 96 e-interruptions in an eight-hour day. Distractions impact your performance for much longer than the few moments you take to acknowledge and respond to incoming messages. A Microsoft study found that it takes 15 minutes

LO7.3 Describe strategies for managing digital message overload.

car03199_ch07_176-210.indd 187 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

188 Part Three Principles for Business Messages

on average to refocus after an interruption. Furthermore, these disruptions have been shown to reduce attention spans, increase stress, and even reduce creativity. The cost to companies is enormous. Intel estimates that large companies lose about $1 billion per year because of email overload. Not surprisingly, many major compa- nies such as Google, Microsoft, IBM, and Intel have joined the Information Over- load Research Group (iorgforum.org), which is devoted to finding solutions to such problems. 28

Many business professionals erroneously assume they can respond immediately to all incoming messages and focus sufficiently on work tasks. This is simply not the case. A University of Michigan study found that productivity drops by up to 40 percent when people try to do two or more things at once. A variety of research about the brain shows that it is not hardwired to multitask effectively. 29

In most business positions, however, you need to respond to others as soon as pos- sible. This places you in a delicate balancing act; how can you stay responsive to others

FIGURE 7.6

Less-Effective Response to an Angry Email

Impersonal. Leaves out greeting and name.

Defensive/attacking. Focuses on defending rather than understanding Kip’s point of view.

Confrontational. Immediately creates a me- versus-you approach with the phrase “we need to talk.”

Accusatory. Kip lays blame on Nancy in every regard. The repeated use of you- voice increases the accusatory tone.

Re: Issues

Jeffreys, Nancy

To: Kip Yamada

Cc: Barbara Brookshire

We need to talk about this email when I get back in a week after

Thanksgiving. I thought we had a productive conversation but you obviously

were not candid. How can we make any progress if you’re not honest? Also,

please empty your voice mail. I tried reaching you several times only to get

your full voice mail box.

From: Kip Yamada [[email protected]] Sent: Saturday, November 23 9:54 PM To: Nancy Jeffreys [[email protected]] Cc: Barbara Brookshire [[email protected]]

Subject: Issues

Nancy, our conversation really wasn’t fair. I appreciate you striking up the

conversation but you caught me off guard. I know your goal was good – to

get us working together more effectively. But, in the spirit of compromise, I

was not as forthright as I should have been. You are really hurting our

business because you’re not focusing on our customers. Our guests come

to me all the time and complain about your unfair treatment. Even some of

the employees mention how you are not really listening to our guests when

they make complaints. I think the big issue we need to focus on is customer

service, not whether I have authorization to make refunds. Kip

car03199_ch07_176-210.indd 188 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 189

yet focus enough to achieve peak performance in your work tasks? Consider the fol- lowing guidelines: 30

● Check digital messages just two to four times each day at designated times . Unless your job calls for it (or your boss demands it!), you should never check your mes- sages more than every 45 minutes. Consider taking interruption-free periods during the day exclusively devoted to email. For example, you might schedule 30 minutes to an hour at 11 a.m. and 3 p.m. each day to communicate via email and other online tools.

● Turn off message alerts . Over the course of a day, these alerts can distract you and reduce your focus.

● Use rich channels such as face – to-face and phone conversations to accomplish a task completely . Back-and-forth email chains and other sets of asynchronous digital messages may repeatedly draw attention away from tasks at hand. As appropriate, use rich, synchronous communication to take care of the matter immediately so that distractions do not compound themselves.

● Reply immediately only to urgent messages . When you reply immediately to non- urgent messages, you set a precedent. Others form an expectation that you can be interrupted at any time for any matter.

Cordial and personal. Uses  Kip’s name and extends  warm wishes.

Validating. Compliments  Kip on his attention to guest  satisfaction.

Inviting. Asks for Kip’s input  in terms of ideas and people  who should be included in a  decision-making process.

Nondefensive. Nancy makes it  clear that making “business  sense” is an important part of  the discussion. She does so  without sounding defensive or  intimidating (she is in the  position of a superior).

Focus on rich communication.  Nancy temporarily defuses the  situation by email but realizes  these issues require rich  communication. She identifies  a meeting as the next step in  the process.

Meeting to Improve Our Response to Guest Complaints

Jeffreys, Nancy

To: Kip Yamada

Cc: Barbara Brookshire

Hello Kip,

I’m sorry to hear that you did not think our conversation was fair. You’re

right – I didn’t give you any chance ahead of time to gather your thoughts.

I do appreciate your enthusiasm for treating our guests fairly.

When we’re both back in the office, let’s set up a time to discuss how to

manage guest complaints. Would you be willing to come up with your ideas

for managing what you consider the three most common guest complaints?

When we meet, I’d also like to discuss how we track our responses to guest

complaints and whether our responses make business sense.

Would you like to include anyone else in our meeting? Do you think the entire marketing team should participate in this discussion?

Happy Thanksgiving!

Nancy

FIGURE 7.7

More-Effective Response to Defuse an Angry Email

car03199_ch07_176-210.indd 189 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

190 Part Three Principles for Business Messages

● Avoid unnecessarily lengthening an email chain . You can shorten email chains by placing statements such as “no reply necessary” in the subject line. You can also shorten email chains by not sending messages such as “got it” or “thanks.” At the same time, make sure you don’t abruptly end an email chain when others would appreciate a reply. For example, some business professionals appreciate short notes of gratitude and confirmation.

● Use automatic messages to help people know when you’re unavailable . Set up au- tomatic messages to let people know when you are out of the office for more than one day.

Many relatively inexpensive, Internet-based communication tools used in business— social networking, blogs, wikis, discussion forums—are driving profound changes in how people connect and collaborate in the workplace. These changes are so profound that workplace culture is moving into a new era: from the Information Age to the Social Age (see Figure 7.8 ). The Social Age is an era in which people engage in net- worked communication, collaborate across boundaries, and solve problems commu- nally. 31 However, even though the communication technologies that have paved the way for the Social Age are changing rapidly (in months and years), workplace culture is relatively slow to change (in years and decades). So, as you read this section, keep in mind that cultural norms and values more significantly influence the impact of social media in the workplace than do its technical capabilities.

LO7.4 Explain characteristics of the emerging Social Age.

Communicating in the Workplace in the Social Age

FIGURE 7.8

The Evolving Workplace Industrial AgeIndustrial Age Information AgeInformation Age Social AgeSocial Age

Command-and-control (Little communication

between teams and units)

Mass two-way communication (Extensive communication between teams and units)

Networked communication (Extensive communication between

individuals with shared interests)

Respect for position Respect for expertise and

position Respect for expertise and

contributions to the network

Holding authority is power Holding knowledge is power Sharing knowledge is power

Efficiency, competitiveness, and authority are key values

Autonomy, innovation, and achievement are key values

Transparency, honesty, and camaraderie are key values

1950 2000 205020251975

Industrial Age

mid-1700s–1985

Information AgeInformation Age 1970–20251970–2025

Social Age

2005–????

Year

car03199_ch07_176-210.indd 190 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 191

Characteristics of the Social Age The evolution of the Internet during the past 15 years from Web 1.0 to Web 2.0 plat- forms is the primary driver of the Social Age. In the original Internet, referred to as Web 1.0, most web pages were read-only and static. As the Internet evolved, referred to as Web 2.0, what emerged was the read-write web, where users interact extensively with web pages—authoring content, expressing opinions, and customizing and editing web content among other things. Web 2.0 communication tools, often referred to as social media, include social networks, blogs, wikis, gaming, podcasts, and informa- tion tagging. In simple terms, Web 1.0 communication tools are primarily passive and static. By contrast, Web 2.0 communication tools are interactive, customizable, and social . 32 User 1.0 refers to an individual who primarily uses and prefers Web 1.0 tools, whereas User 2.0 refers to an individual who primarily uses and prefers Web 2.0 tools (see Table 7.2 ). 33 The emerging Social Age is adopting many workplace norms and values from users of Web 2.0 tools.

Increasingly, companies are adopting social networking platforms that contain Web 2.0 communication tools (also called enterprise social software and Enterprise 2.0 ) in the workplace. These platforms contain many of the features available on so- cial networking websites: user profiles, microblogs, blogs, wikis, and file uploading. They often include a variety of other communication and collaboration tools as well, including online audio and video calls, shared work spaces, calendars, and private messaging (or email) systems. Thus, most companies—especially medium- to large- sized businesses—are increasingly moving toward corporate intranets that contain both Web 1.0 and Web 2.0 tools. One of the earliest organization-wide adopters of social media was Lockheed Martin, an employer of more than 140,000 worldwide. Lockheed Martin created an internal social networking platform called Unity over a decade ago to meet the challenges of its complex collaborations. Unity includes blogs, wikis, file sharing, tags, discussion forums, social bookmarking, and updates through RSS. Rather than using emails, managers use blogs to provide project updates and due dates. 34

The emerging work culture associated with the Social Age presents many benefits to companies and business professionals in the context of team and networked com- munication (see Table 7.3 ). 35 When social media are used for professional purposes, teams can communicate more efficiently; companies can interface more responsively to customers, clients, and suppliers; customers and other interested individuals can be directly involved in the development of products and services; and anyone with shared professional interests can communicate easily, not needing to travel to see one another.

TABLE 7.2

Comparisons between User 1.0 and User 2.0

User 1.0 User 2.0

Passively reading and searching for content Actively creating and sharing content online

Depends on content creator; does not express own opinion

Can express opinions and even change the content presented

Getting the web as is Customizing web pages and content

Email is the main communication tool Peer-to-peer programs are the main communication tools

The computer is the main access point Connects from various devices

Connected online for time-limited sessions Connected online all the time

car03199_ch07_176-210.indd 191 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

192 Part Three Principles for Business Messages

Social media also present many challenges and risks. The primary challenges are cultural. Some of them are age-based: older employees are more accustomed to the communication tools they have used for years and decades. Typically, the Web 1.0 tools reinforce many of older employees’ work values, such as privacy and autonomy. The use of social media creates a free flow of information that, in many cases, runs counter to traditional business approaches to decision making, lines of authority, team formation, performance incentives, and so on.

One basic challenge of using social media internally is getting employees to par- ticipate. In most companies, participation in blogs and wikis is fairly low. The case of Wikipedia is instructive. Although millions of Internet users consider Wikipedia to be a reliable source of information, only a small fraction of users are also Wikipedia au- thors and contributors. Wikipedia is consistently among the ten most visited websites. Yet, less than 1 percent of users ever contribute to its entries. 36

Social media use also presents a variety of risks. For companies, social media can lead to lower productivity when employees use it for social and entertainment pur- poses, release confidential and proprietary information, post inappropriate comments that lead to reputation loss for companies, and go around lines of authority. On an individual level, social media can lead to major credibility loss (discussed further in “Manage Your Online Reputation”).

Internal Communication Tools for the Social Age In this section, we briefly touch on several of the social software tools you can expect to use in the workplace: user profiles, blogs, and wikis. We focus on these tools for a few reasons. They are among the most widely used and most effective social tools, and they involve significant written communication. In Table 7.4 , you can see results of a study by IBM about returns on investment from social media. 37 You will notice that social networking (with user profiles as the foundation for establishing connections), blogs, and wikis are among the most valuable social tools in terms of productivity gains, reduction in IT costs, and increase in revenues.

Organize Your Dashboard to Control Your Communication and Information Flow Nearly all social software systems contain a dashboard, your

LO7.5 Apply principles of effective social media use in professional settings.

TABLE 7.3

Benefits and Challenges of Social Media in the Workplace

Benefits of Social Media Challenges and Risks of Social Media

To companies: • Team communication and collaboration • Succession planning • Recruitment and on-boarding • Idea sharing/knowledge management • Skills development and training • Interfacing with customers, suppliers, and partners • Decreased time to market for new products and services • More innovative, creative, effective, and profitable

approaches to work problems • Less time and fewer resources needed for business travel

To companies: • Lack of adoption and penetration • Lack of permanence • Confusion over which communication channels to use • Distraction from work, too much socializing • Lack of control of information provided externally and

internally • Lack of systems for rewarding networked and team

communication and collaboration

To business professionals: • Build professional networks internally and externally • Access business expertise and knowledge more rapidly • Enhance camaraderie with peers

To business professionals: • Lack of boundaries between professional and private lives • Lower productivity due to multitasking • Excessive opportunism and self-promotion • Mistakes and incompetence broadcast to larger audiences

Major Components of Social Networking

Platforms

• User profiles* • Blogs/microblogs* • Wikis* • Private messaging

systems** • Discussion forums • RSS feeds • Social bookmarking • Rating and tagging • Video sharing • Podcasts • Mashups *Given more attention in this section because they are writing-intensive **Nearly identical to email in function and form

car03199_ch07_176-210.indd 192 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 193

front page when you log in to the system, which operates as your communication hub. In most cases, you can customize the dashboard to display the features that most inter- est you. For example, notice Figure 7.9 , which shows Andrea Garcia’s dashboard. She displays status updates of other team members so she can see what they are working on. She also wants to know how often other team members are using the social soft- ware (upper-right panel), and she subscribes to a business news service (lower-right panel). Think about setting up your dashboard to access messages and information that will help you work efficiently and avoid distractions.

TABLE 7.4

Return on Investment for Internal Social Media

Social Tool Improves Productivity Reduces IT Costs Increases Revenue

Wikis 29% 18% 16%

Tagging 20% 6% 6%

Blogs 12% 5% 6%

Social networking 12% 4% 6%

Syndication/RSS 12% 4% 4%

Podcast 8% 6% N/A

Mashups 8% 6% 6%

Source: From Maria Azua, The Social Factor: Innovate, Ignite, and Win Through Mass Collaboration and Social Networking, 1st Edition, Copyright Š 2010. Reprinted by permission of Pearson Education, Inc., Upper Saddle River, NJ.

FIGURE 7.9

Sample Dashboard with Enterprise Social Software

car03199_ch07_176-210.indd 193 23/11/12 7:57 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

194 Part Three Principles for Business Messages

Create a Complete and Professional Profile In your profile, you provide information about yourself, such as your position, contact information, pro- fessional interests, and current projects. You can usually provide a picture and list per- sonal interests outside of work. One key benefit of social networking platforms is that as people view profiles of others, they feel more connected to them, more so than with Web 1.0 communication tools such as email. Furthermore, profiles are an excellent way of finding people within an organization with needed expertise or shared profes- sional interests. Profiles as part of enterprise social software systems appear much like those in Facebook and LinkedIn. In Figures 7.12 and 7.13, you can see examples of less-effective and more-effective Facebook profiles for Kip Yamada. In Figure 7.14 , you’ll notice Kip’s LinkedIn profile.

In your profiles, make sure you provide complete information. This is a chance for colleagues and clients who do not know you well to learn about your professional background, abilities, and interests. People within your organization who do not know you well may be more likely to follow your blogs and collaborate on wikis and other projects based on what they learn about you on your profiles. Keep in mind that the purpose of your business profile is typically different from the one you post on social networking websites such as Facebook. Your primary goals are professional collabo- rating and networking rather than socializing or entertaining.

Use Blogs for Team Communication Blogs are posts that are arranged chronologically, similar to a journal format. Traditionally, most blogs have included entries by just one or a few individuals, although many provide the option for reader comments. Increasingly, teams and other professional groups write blogs. In the work- place, they allow business professionals to share their ideas and experiences. By fo- cusing on specific topics and areas of expertise, bloggers can attract and connect with other employees with similar professional interests. 38 A variety of blog types have emerged in the workplace, including individual expert blogs, company executive blogs, company team blogs, company update blogs, company crisis blogs, and internal company blogs. 39

Microblogs (such as Twitter), shorter blogs that contain just a few sentences, are part of most enterprise social networking platforms. Microblogs are tools for broad- casting announcements and urgent information. Members of a network can also use them to ask questions that need immediate responses.

For most business professionals, individual blogs have not caught on yet. A recent survey of corporate intranet use showed that most organizations (53 percent) have blogs on their intranets. Up to 87 percent of large companies (over 50,000 employees) make blogs available. However, senior-level executives write most blogs, and most employees view them as leadership communications. In a 2010 study at IBM, an ambi- tious adopter of enterprise social media, just 900 employees (less than .0025 percent of the company total) had blogged in the previous three months. 40 However, individual blogs are expected to grow in importance. Many business professionals have found that blogging gives them a unique forum to network inside and outside of their organi- zations (discussed further in “Manage Your Online Reputation”).

Organizations are increasingly using team blogs and project blogs (many-to-many communication). Team blogs are typically organized around formal work teams, and project blogs are organized around particular projects that generally involve tem- porary teams. Team and project blogs are excellent ways to place all of the team’s communications in a single place, such as updates, progress reports, problem-solving discussions, project timelines and goals, announcements, and a variety of other co- ordination tasks. These team and project blogs are also excellent for sharing success stories to build and shape organizational and team culture. A short example of a team blog is provided in Figure 7.10 , where the Prestigio marketing team is describing and coordinating activities.

car03199_ch07_176-210.indd 194 23/11/12 7:58 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 195

Use Wikis for Team Communication Wikis are collections of pages that anyone with approved access can edit, thus lending themselves to collaborative writ- ing. Users can add, remove, and change content. Wikis allow employees to collaborate and participate in decision making more easily, creatively, and effectively. They cre- ate a culture of transparency, simplicity, and openness. The collaborative potential of wikis is stronger than any of the other social media tools (see Table 7.4 ). Particularly progressive companies, such as Finnish mobile phone manufacturer Nokia, use inter- nal wikis for project updates and exchange of ideas. Nokia has also attempted to make wikis a primary communication channel for its teams. About 20 percent of Nokia’s 68,000 staff members use wikis regularly. 41

Wikis create an excellent knowledge management system. Since they are located on the corporate intranet or accessible online, employees can access information far more easily and efficiently than information tucked away in email boxes or on an individual user’s computer. Wikis make the organization less dependent on single employees. Many organizations allow employees to constantly update wikis devoted to projects, reports, policies, and reference materials. 42 An example of a wiki in editing mode is provided in Figure 7.11 , where Kip Yamada is directly editing a survey report that Jeff Anderton originally set up and posted.

Some organizations are exploring ways of using wikis for meetings. Wiki meet- ings can cut down on costs and accommodate people at many locations. For example, in September 2006, IBM held a global wiki meeting that lasted three days. Nearly 100,000 people in 160 countries participated in the brainstorming session. 43

Other Social Media Tools Many other communication tools exist on social networking platforms. Furthermore, Enterprise 2.0 platforms are constantly evolving and adding additional communication tools. You would be wise to experiment with all the communication tools available on these platforms so you can identify and use the channels best suited for your audiences.

FIGURE 7.10

Sample Team Blog

car03199_ch07_176-210.indd 195 23/11/12 7:58 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

196 Part Three Principles for Business Messages

Guidelines for Using Social Media in the Workplace Many communication tools fall under the social media platform. Generally, you can apply the following advice to any of them:

Be an Active Contributor and Participate Often If your company or professional group has committed to using social networking platforms, make sure you contribute regularly and respond to the comments and work of others. As an example, for individual blogs, those employees who gain the largest followings (and thus a repu- tation for thought leadership) make blog entries two to three times per week.

Also, venture out from your formal work teams to establish work relationships with other members of your company or professional network. Voluntarily joining teams built around common interests—often called communities of practice—allows you to share and learn from other professionals in your area. This helps you grow profes- sionally and increases organizational knowledge. Doing so also allows you to become involved in some of the long-term issues facing your organization, since communities of practice often focus on an organization’s long-term issues, whereas teams tend to focus on short-term projects. 44

Listen and Learn Social media offer an ideal means of continuously learning about your company, your industry, and your discipline. In Chapter 3, we focused on the importance of approaching communication from a listening-centered approach. Used wisely, social media give you many ways to listen. As you follow the blogs of

FIGURE 7.11

Sample Wiki in Edit Mode

Principles for Professional Social

Media Use

• Be an active contributor.

• Listen and learn. • Focus on content. • Make your content

accessible. • Make your

messages authentic and friendly.

• Be responsive and help others.

• Respect boundaries.

car03199_ch07_176-210.indd 196 23/11/12 7:59 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 197

others in your company or industry, you gain insights into best practices. If you write an individual blog, you can float ideas and get responses. You can set up RSS feeds to get notices whenever people you follow update their blogs.

Focus on Content Blogs and wikis are collaborative tools. In other words, they are intended to help you work more effectively with your team members, other col- leagues, and clients. The goal is not to entertain others; it is to provide value to others and increase your professional, not social, credibility (as discussed in “Manage Your Online Reputation”). 45 Blog content should focus on your work projects, meetings, shared goals, experiences, and expertise and knowledge.

Of course, social media are called social for a reason. They provide profession- als with rich and exciting communication tools. Including social content is good to a point. In high-performing teams, 60 to 70 percent of all comments are directly related to work, about 15 to 20 percent of comments are supportive, and about 10 to 15 percent are primarily social. This is also the case for business communication via social media. As a good rule of thumb to achieve your professional goals, roughly 70 percent of your social media content should be directly related to work, roughly 20 percent should be supportive, and roughly 10 percent should be social.

Make Your Content Accessible Contributing to blogs and wikis increases your organization’s knowledge. However, if other people can’t find and use your con- tributions, you have not accomplished your purpose. By naming, labeling, indexing, and tagging (applying keywords to your blogs or wikis) well, you help others find your information (see the Technology Tips about tagging on page 198). Also consider using links to your files to help others open them immediately.

Make Your Messages Authentic and Friendly Authenticity is key to effective social media messages. Social media readers expect sincerity and the raw truth. Your messages should not come off as spin and should not contradict who you really are. Be clear about your intentions. Your messages should also have a friendly tone. However, authenticity and friendliness do not mean sloppy writing or rudeness. When engaging in collaborative writing, keep a friendly tone even when you disagree with others. Avoid any urges to delete the comments of others or engage in edit wars. 46

Be Responsive and Help Others One expectation of social networks is that you are a good member of the community. As a good member, you respond posi- tively to the requests of others and help when possible. As you gain a reputation for responding and helping others, you can expect that other community members will respond and help you.

Respect Boundaries The many communication tools available in the emerging Social Age allow people to communicate with nearly anyone at nearly anytime from nearly any location about nearly anything. In other words, the division between profes- sional and private lives is becoming increasingly blurred. Stay observant about where your colleagues draw lines to preserve their lives away from work.

Manage Your Online Reputation Although nearly all business professionals are aware of social networking and the im- portance of strong online reputations, most are still learning to manage their online presences strategically. And although younger people are often expert at developing an online social persona, they are less skilled at developing an online professional pres- ence. 47 As you read this section, think about the opportunities and risks for you as you develop your online reputation.

First, think carefully about developing a personal brand in a professional sense—a unique set of professional skills and attributes that others associate with you. 48 In the

LO7.6 Build a credible online reputation.

car03199_ch07_176-210.indd 197 23/11/12 7:59 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

198 Part Three Principles for Business Messages

Technology Ti pS

USING TAGGING FOR KNOWLEDGE MANAGEMENT One of the strongest benefits of enterprise social software is the ability to tag and index documents so you and your colleagues can find information rapidly. In some organizations, the intranet may contain millions of web pages and files with the collective knowledge of the organization. By pro- viding tags and other information in your posts and files, you make it possible for any colleague in your organization to find your messages. Simi- larly, if you are writing online business messages for external audiences, your tags can lead custom- ers, clients, and other contacts to your messages with simple Internet searches. In the image at right, you can see an example of how information can be labeled and tagged for a word processing file. You can take similar actions for any type of business message in enter- prise social software platforms to allow others to quickly find your files.

final chapter of this book, when we turn to job applications, we discuss the notion of promoting your personal brand in more detail. Here, we introduce the idea of building your personal brand and using it as an asset in your career progression. Increasingly, you will express your personal brand through social media tools. One major goal, then, for your online activities is to build a reputation that showcases your credibility and personal brand.

Whether or not you have intentionally created an online presence, potential and current employers, colleagues, and clients will judge your credibility based on online information about you. Thus, you need to take as much control as you can of your online reputation. As portrayed in Table 7.5 , one helpful approach is to consider the meta messages, or overall and underlying messages that others decode from your online communications. 49 These meta messages become one basis for your online reputation.

For example, consider two students, Jenny and Regina, who create blogs about their study-abroad experiences in Spain. Jenny’s blog describes her observations of her homestay family, the people in the community, and her efforts to learn Spanish. She frequently talks about the generosity they extend to her. She posts pictures of cultural and historical sites as well as many of the people she meets. Her blog sends a meta message, “I’m grateful to the people in Spain for providing me with such a rich learning experience.” This meta message feeds into a reputation for open-mindedness, flexibility, curiosity, and appreciation of others.

Regina, on the other hand, mostly posts pictures of herself at pubs. She describes the many friends she has made who are also American study-abroad students. Her longest entry explains how glad she was to go to the Hard Rock Café and get a hamburger “just like back at home.” To many readers, the meta message Regina sends is, “I’m having a great time with my American friends in Spain.” This meta message may feed into a reputation for complacency and closed-mindedness.

Take a few minutes to think about Table 7.5 . You will notice a variety of positive meta messages and related reputations. You can see that these meta messages and reputations are grouped into four areas: personal and private; professional and pri- vate; personal and public; and professional and public. In each domain of your online communications, you should think about the meta messages you would like to send

car03199_ch07_176-210.indd 198 23/11/12 7:59 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 199

TABLE 7.5

Developing a Credible Online Reputation

Positive Meta Messages Sought-After Reputations

Personal and Private (for family and friends) Example: a family blog

I’m a good listener (competence) I can take care of you (competence) I hope the best for you (caring) You can always count on me (caring) You can trust me (character) I’m a fun person (character)

Communicative, interpersonal skills Dependable, reliable, capable Considerate, caring, concerned Loyal, committed Honest, trustworthy Fun-loving, exciting

Professional and Private (for work colleagues) Examples: a corporate blog or wiki

I will get the job done (competence) I am a good team member (competence) I want you to succeed (caring) I want to work with you (caring) I will do what I say (character) I abide by the rules (character)

Competent, skilled, dependable Bring out the best in others Supportive, caring Team-oriented, collaborative Sincere, genuine, integrity Moral, ethical, fair

Personal and Public (for society) Example: social networking website such as Facebook

I have certain abilities (competence) I have certain interests (competence) I want to share my experiences and ideas (caring) I want to learn about you (caring) I have certain social values and priorities (character) I live my life according to certain beliefs (character)

Talented, skilled, capable Determined, focused, driven Open, networked, independent Inquisitive, curious, considerate Activist, cause-driven, passionate Moral, understanding

Professional and Public (for professional peers) Example: professional social networking website such as LinkedIn

I am an expert (competent) I want to lead a professional discussion (competent) I want to share my ideas with you (caring) I want to understand your experiences (caring) I am committed to my industry (character) I think my profession should maintain high standards (character)

Thought leader, forward-thinking Initiative, leadership, open-minded Generous, giving, collaborative Learning, inquisitive, curious Professional, passionate, committed Ethical, disciplined, consistent

so that you build a credible reputation. Also, because many of your online communi- cations are accessible to personal friends as well as professional contacts, you need to consider whether you are prioritizing your professional or your social reputation.

Many business professionals have gained professional opportunities by developing personal brands online. For example, Scott Monty landed a senior-level marketing position at Ford after three years of blog writing about the convergence of marketing, advertising, and public relations. When Ford brought him in, he had 3,500 Twitter fol- lowers. Now he has 41,000. 50

Social media tools make developing a personal brand easier than ever. You can broadcast your expertise and business interests to an ever-growing network of business professionals. However, social media tools also make it easier than ever to damage your personal brand and online reputation. When you make inaccurate or unprofes- sional posts, your incompetency, unprofessionalism, and other mistakes are broadcast to a much larger network. In fact, one mistake can undermine your reputation. 51

Some business professionals damage their reputations because their social media use sends meta messages that they are self-promoters and careerists. Other employ- ees view their online communications as opportunistic and self-centered, believing the self-promoters place their personal career interests ahead of the organization’s interests. 52 Generally, the reputation as a self-promoter comes from excessively drawing attention to one’s own professional skills and interests. As you adopt other- oriented, listening-centered approaches to social media use, you can highlight your

car03199_ch07_176-210.indd 199 23/11/12 7:59 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

200 Part Three Principles for Business Messages

Nonstrategic. Does not draw attention to professional interests.

Nonflattering. Some people who do not know Kip will form their first impressions of him based on his interest in vulgar and violent movies and games.

Nonpersonal. Most business professionals are eager to see a picture in profiles.

FIGURE 7.12

Less-Effective Personal Social Networking Profile

own professional skills and interests without reaching what others consider excessive self-promotion.

Compare Kip’s online profiles for Facebook, LinkedIn, and Twitter (in Figures 7.12, 7.13, and 7.14). In particular, compare his less-effective and more-effective Facebook profiles. The evaluations of the examples are based on professional standards, not so- cial standards. Think about the meta messages these profiles may send. At the same time, think about your own online profiles and social networking activity. What meta messages are you sending? What type of reputation are you building?

Social media use is particularly well suited for networked communication. As we have discussed, working in networks is an increasingly important skill and integral to success in the emerging Social Age. As part of large professional networks, seek a reputation as a giver, not a taker. Similarly, always honor your commitments. In net- worked communication, word gets around quickly about which members are consid- ered givers, which honor commitments, and which do not.

Use Social Media Ethically The use of social media, even for private use, complicates your relationship with your employer. Consider the following cases: 53

An employee who works in research and development updates his Facebook status, bemoaning the fact that he has to cancel his weekend golf plans due to yet another project delay. Other Facebook users connect this with a highly anticipated product launch, and the company’s stock price declines.

A salesperson posts a derogatory comment on Twitter about a prospective client’s headquarters city as he lands there the day before a critical presentation. Someone forwards the tweet to the CEO, who cancels the meeting.

LO7.7 Describe the ethical use of social media for work.

car03199_ch07_176-210.indd 200 23/11/12 7:59 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 201

FIGURE 7.14

Using Social Media for Work Purposes

FIGURE 7.13

More-Effective Personal Social Networking Profile

Strategic. Draws attention to professional interests in a variety of locations.

Nondistracting. Kip provides personal information that does not distract attention away from his professional interests.

Warm and personal. The profile picture displays Kip as a professional, friendly person.

car03199_ch07_176-210.indd 201 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

202 Part Three Principles for Business Messages

Coca-Cola’s Social Media Guidelines

The Company respects the rights of its associates and its authorized agencies’ associates to use blogs and other social media tools not only as a form of self-expression, but also as a means to further the Company’s business. It is important that all associates are aware of the implications of engaging in forms of social media and online conversations that reference the Company and/or the associate’s relationship with the Company and its brands, and that associates recognize when the Company might be held responsible for their behavior.

Our Expectations for Associates’ Personal Behavior in Online Social Media

There’s a big difference in speaking “on behalf of the Company ” and speaking “about” the Company. This set of 5 principles refers to those personal or unofficial online activities where you might refer to Coca-Cola.

1. Adhere to the Code of Business Conduct and other applicable policies. All Company associates, from the Chairman to every intern, are subject to the Company’s Code of Business Conduct in every public setting. In addition, other policies, including the Information Protection Policy and the Insider Trading Policy, govern associates’ behavior with respect to the disclosure of information; these policies are applicable to your personal activities online.

2. You are responsible for your actions. Anything you post that can potentially tarnish the Company’s image will ultimately be your responsibility. We do encourage you to participate in the online social media space, but urge you to do so properly, exercising sound judgment and common sense.

3. Be a “scout” for compliments and criticism. Even if you are not an official online spokesperson for the Company, you are one of our most vital assets for monitoring the social media landscape. If you come across positive or negative remarks about the Company or its brands online that you believe are important, consider sharing them by forwarding them to [public relations].

4. Let the subject matter experts respond to negative posts. You may come across negative or disparaging posts about the Company or its brands, or see third parties trying to spark negative conversations. Unless you are a certified online spokesperson, avoid the temptation to react yourself. Pass the post(s) along to our official in-market spokespersons who are trained to address such comments.

5. Be conscious when mixing your business and personal lives. Online, your personal and business personas are likely to intersect. The Company respects the free speech rights of all of its associates, but you must remember that customers, colleagues, and supervisors often have access to the online content you post. Keep this in mind when publishing information online that can be seen by more than friends and family, and know that information originally intended just for friends and family can be forwarded on. Remember NEVER to disclose nonpublic information of the Company (including confidential information), and be aware that taking public positions online that are counter to the Company’s interests might cause conflict.

FIGURE 7.15

Example of Social Media Guidelines

An employee is terminated for cause. A few weeks later, she asks a former colleague to recommend her on LinkedIn. The former colleague writes a glowing recommendation. The terminated employee later uses this recommendation as evidence in a discrimination suit, claiming she was terminated unfairly.

As these various examples illustrate, much more than your online reputation is at stake with social media use; the reputation and performance of your company is at stake as well. The line between what you believe is private use of social media and your role as an employee can be murky, since your private actions can damage your employer and hurt your career.

In short, constantly try to understand evolving norms for social media use in a professional context. For your own protection and that of your company, become fa- miliar with your company’s acceptable-use policies for social networking websites. 54 Coca-Cola recently compiled a set of social media guidelines (see Figure  7.15 ). Notice the principles of appropriate social media use. Then read the Communication Q&A with Catherine Norris (page 203) for her thoughts on workplace collaboration through face-to-face communication and through communication technologies.

Source: Example of Coca-Cola’s Social Media Guidelines.

car03199_ch07_176-210.indd 202 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 203

Commu nicatio

n Q&A

CONVERSATIONS WITH CURRENT BUSINESS PROFESSIONALS

Pete Cardon: What’s an example of a project you have worked on recently that involves extensive collaboration and coordination? What are the communication challenges you faced on this project? Catherine Norris: One of the major challenges of the project I am coordinating is communicat- ing the need for change and how that change can improve performance in cost and quality. If the stakeholders are convinced that they need to make changes, then they are more likely to achieve quality and cost goals. Simply put, if I do not effectively communicate why change is needed, then the project fails.

PC: How do you use communication technologies? CN: The persons I work with on a daily basis have a broad range of familiarity with communi- cation technologies such as social networking, blogs, and wikis. Some people are very com- fortable with these methods, and others have never used them. Therefore, I use the technology communication tool that best fits the situation and is easiest. After all, if the project team and stakeholders do not use a given technology, then there is no point in forcing it.

The project team relies heavily on the use of email, the corporate intranet, and the Internet to communicate. For example, we use email to send routine messages and document attachments back and forth for review and approval. The advantage of using email is that the messages can be tracked. Furthermore, email communication is precise and efficient. You can access your email when you have the time as opposed to waiting to schedule a live face-to-face meeting. Many people today carry smartphones and have email access anywhere. Work gets done efficiently without wasting time.

The project team uses the corporate intranet to schedule meetings and access intranet links to our progress documents for projects. This is a place where internal users can review shared documents, update project assignments, and view project news and webcast links online. Conference phone calls and webcasts for product training and remote meetings have been a very effective means of communicating too.

PC: How do you choose when to use various communication technologies? CN: Although I find email very effective for routine messages, face-to-face communication is crucial when the message needs emphasis. That is why our project team has conducted one-on-one, face-to-face meetings to communicate quality and cost performance data to our stakeholders. By doing so, we emphasize why we should focus on these goals now. In ad- dition, it allows for a two-way dialogue with a personal touch. If we used an impersonal communication method like email or a written report delivered to a mailbox, we would miss a valuable opportunity to develop a personal relationship and dialogue around performance improvement.

Catherine Norris, project manager, has worked in the health care industry for 25 years in a variety of capacities, including management and nursing.

car03199_ch07_176-210.indd 203 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Chapter Takeaway for Email and Social Media for Business Communication

LO 7.1. Apply principles for writing effective emails. ( pp. 179–185 )

Principles of Effective Emails Components of Effective Emails ● Use for the right purposes. ● Ensure ease of reading. ● Show respect for time. ● Protect privacy confidentiality.

● Respond promptly. ● Maintain professionalism

and appropriate formality. ● Manage emotion effectively. ● Avoid distractions.

● Subject line ● Greeting* ● Message ● Closing* ● Signature block* ● Attachments

*optional

See examples of ineffective and effective emails in Figures 7.1 and 7.2.

LO 7.2. Explain how to handle emotion effectively in online communications. ( pp. 185–187 )

Responding to Uncivil Communications ● Reinterpret ● Relax ● Defuse

See examples of ineffective and effective responses to uncivil emails in Figures 7.6 and 7.7.

LO 7.3. Describe strategies for managing digital message overload. ( pp. 187–190 )

Principles for Managing Emails to Avoid Distractions ● Check digital messages just two to four times each

day at designated times. ● Turn off message alerts. ● Use rich channels such as face-to-face and phone

conversations to accomplish a task completely.

● Reply immediately only to urgent messages. ● Avoid unnecessarily lengthening an email chain. ● Use automatic messages to help people know when

you’re unavailable.

LO 7.4. Explain characteristics of the emerging Social Age. ( pp. 190–192 )

Characteristics of the Social Age ● Networked communication ● Respect for expertise and contributions to the network ● Sharing knowledge ● Transparency, honesty, and camaraderie

LO 7.5. Apply principles of effective social media use in professional settings. ( pp. 192–197 )

Principles for Using Internal Communication Tools in the Social Age See examples of a social networking dashboard in Figure 7.9, a team blog in Figure 7.10, and a wiki in Figure 7.11.

● Organize your dashboard to control your communication and information flow.

● Create a complete and professional profile.

● Use blogs for team communication.

● Use wikis for team communication.

● Participate and contribute often.

● Listen and learn.

● Focus on content.

● Make your content accessible.

● Make your messages authentic and friendly.

● Be responsive and help others.

● Respect boundaries.

LO 7.6. Build a credible online reputation. (pp. 197–200)

See Table 7.5 for types of positive meta messages you seek to establish your online reputation. See examples of ineffective and effective social networking profiles in Figures 7.12 through 7.14.

LO 7.7. Describe the ethical use of social media for work. ( pp. 200–203 )

See an example of corporate social media guidelines in Figure 7.15.

1950 2000 205020251975

Industrial Age

mid-1700s–1985

Information AgeInformation Age 1970–20251970–2025

Social Age

2005–????

Year

car03199_ch07_176-210.indd 204 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 205

active incivility (p. 186) blogs (p. 194) cyber incivility (p. 186) cyber silence (p. 185) defusing (p. 187) flames (p. 185) microblogs (p. 194) negativity effect (p. 185)

neutrality effect (p. 185) passive incivility (p. 186) personal brand (p. 197) project blogs (p. 194) reinterpretation (p. 187) relaxation (p. 187) Social Age (p. 190) social media (p. 191)

team blogs (p. 194) User 1.0 (p. 191) User 2.0 (p. 191) Web 1.0 (p. 191) Web 2.0 (p. 191) wikis (p. 195)

Key Terms

7.1 Chapter Review Questions (LO 7.1, LO 7.2, LO 7.3, LO 7.4, LO 7.5, LO 7.6, LO 7.7)

A. What strategies can you use to ensure ease of reading in your emails and other digital communications?

B. What strategies can you use to show respect for the time of others?

C. Explain the neutrality effect and negativity effect in digital communications. What do they imply for how you write digital messages?

D. What strategies can you use to avoid email overload and, as a result, increase your productivity?

E. Explain the following components of constructively respond- ing to uncivil digital messages: reinterpretation, relaxation, and defusing.

F. What are some characteristics of the Social Age? G. What elements of tone are most important for social media

messages? H. What strategies can you use to build a credible online

reputation? I. How can you use social media ethically from the perspective

of your employer?

7.2 Questions about Communication Q&A with Catherine Norris (LO 7.1, LO 7.2, LO 7.5)

Read the Communication Q&A featuring Catherine Norris. Answer the following questions:

A. What principles does Norris use when deciding which com- munication technologies to use? In what ways do you agree and/or disagree?

B. In her view, how is the corporate intranet useful? C. According to her, what are the main benefits and

drawbacks of email? What future role does it have in business communications? In what ways do you agree and/or disagree?

D. According to her, what are the benefits and drawbacks of face-to-face communication? In what ways do you agree and/ or disagree?

E. What was the most valuable information from this interview for you?

7.3 Information Overload Due to Digital Messages (LO 7.3)

Go to the Information Overload Research Group’s website (iorgforum.org). Read a research article, blog entry, or other con- tent about a topic of interest. In three to five paragraphs, explain the following: (a) main points in the article; (b) your views of the main points; and (c) three strategies you will adopt to avoid infor- mation overload in the workplace.

7.4 Social Media, Online Expression, and Collaboration (LO 7.4, LO 7.5)

Vineet Nayar, CEO of HCL Technologies, recently commented about the use of new communication channels. He specifically mentioned the use of social networking and the growing impor- tance of Web 2.0 tools:

As my kids became teenagers, I started looking at Facebook a little more closely. It was a significant amount of collaboration. There was open understanding. They didn’t have a problem sharing their status. Nothing seemed to be secret, and they were living their lives very openly, and friends were commenting on each other and it was working. Here is my generation, which is very security-conscious and privacy-conscious, and I thought, what are the differences? This is the generation coming to work for us. It’s not my generation. So we started having people make their presentations and record them for our internal website. We open that for review to a 360-degree workshop, which means your subordinates will review it. Your managers will read it. Your peers will read it, and everybody will comment on it. I will be, or your manager will be, one of the many who read it. So, every presentation was reviewed by 300, 400 people. What happened? There were two very interesting lessons that I learned. One, because your subordinates are going to see the plan, you cannot lie. You have to be honest. Two, because your peers are going to see it, you are going to put your best work into it. Third, you didn’t learn from me. You learned by reviewing somebody else’s presentation. You learned from the comments somebody else gave you. For the 8,000 people who par- ticipated, there was a massive collaborative learning that took place. 55

Based on Nayar’s comments and your own experiences, answer the following questions:

A. What are the potential personal and group benefits from using Web 2.0 communication channels?

B. What are some of the differing attitudes between generations about online expression? What impact might these differences have on workplace communication?

Discussion Exercises ll

car03199_ch07_176-210.indd 205 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

206 Part Three Principles for Business Messages

C. In what ways do online communications lead to more honesty and higher-quality work?

D. In what ways might online communications lead to less hon- esty and lower-quality work?

7.5 Challenges to Adopting Social Media for Professional Use (LO 7.4, LO 7.5)

Andrew McAfee, one of the premier experts on Enterprise 2.0 sys- tems, commented about the challenges of adopting such systems and the shift in orientation needed by management to unleash a culture of User 2.0.

I thought these technologies [such as Facebook, Wikipedia, Flickr, and YouTube] were essentially so cool that when you dropped them in an organization, people flocked to them. That was the assumption I carried around in my research. I very quickly had that overturned. This is not an overnight phenomenon at all. And while there are pockets of energy, getting mass adoption remains a pretty serious challenge for a lot of organizations. If you’re a middle manager who essentially views your job as one of gatekeeping or refereeing information flows, you should be pretty frightened by these technologies, because they’re going to greatly reduce your ability to do that. If you’re someone who sees your job as managing people and fundamentally getting the human elements right that will lead your part of the organization to succeed, these technologies are not at all harmful to you. One of the things that we’ve learned is that there’s no technology—even these great new social technologies—that’s a substitute for face time. If you have another view of yourself, which is that you’re someone who’s responsible for output, these tools should be your best friend. Because all the evidence we have suggests that Enterprise 2.0 helps you turn out more and bet- ter products and actually is not a vehicle for time wasting or for chip- ping away at what you’re supposed to be doing throughout the day. 56

Based on McAfee’s comments, contents of the chapter, and your own experiences, respond to the following questions:

A. What are the major obstacles to adopting Web 2.0 communi- cation tools in the workplace?

B. McAfee distinguishes between information gatekeepers and managers of people. Explain what you think he means by this distinction and its relevance to the adoption of social software.

C. When are Web 2.0 communication tools more efficient than Web 1.0 communication tools such as email?

D. When are Web 1.0 communication tools such as email better choices than Web 2.0 communication tools?

E. Place yourself in the position of a middle or upper manager. Describe two ways in which the use of social media tools by your subordinates would benefit you and two ways in which they would threaten you.

7.6 Social Media Use and Interpersonal Skills (LO 7.4, LO 7.5)

Jeffrey Zaslow, in a November 5, 2009, article called “The Greatest Generation of Networkers” in The Wall Street Journal , examined attitudes about Millennials in the workplace. Consider a few of the comments:

Because so many people in their teens and early 20s are in this constant whir of socializing—accessible to each other every minute of the day via cell phone, instant messaging and social-networking websites—there are a host of new questions that need to be addressed in schools, in the workplace, and at home. Chief among them: How

much work can “hyper-socializing” students or employees really ac- complish if they are holding multiple conversations with friends via text messaging, or are obsessively checking Facebook? Some argue they can accomplish a great deal: This generation has a gift for multitasking, and because they’ve integrated technol- ogy into their lives, their ability to remain connected to each other will serve them and their employers well. Others contend that these hyper-socializers are serial time-wasters, that the bonds between them are shallow, and that their face-to-face interpersonal skills are poor. Does text messaging prepare one to interact in the workplace? “The unspoken attitude is, ‘I don’t need you. I have the Internet,’” says P.M. Forni, the 58-year-old director of the Civility Initiative at Johns Hopkins University, which studies politeness and manners. “The Net provides an opportunity to play hide-and-seek, to say and not say, to be truthful and to pretend. There is a lot of communication going on that is futile and trivial.” That’s far too harsh an assessment, says Ben Bajarin, 32, a tech- nology analyst at Creative Strategies, a consulting firm in Campbell, California. He argues that because young people are so adept at multimedia socializing, their social skills are actually strengthened. They’re good at “managing conversations” and getting to the pithy essence of an issue, he says, which will help them in the workplace. While their older colleagues waste time holding meetings or engaging in long phone conversations, young people have an ability to sum things up in one-sentence text messages, Bajarin says. “They know how to optimize and prioritize. They will call or set up a meet- ing if it’s needed. If not, they text.” And given their vast network of online acquaintances, they discover people who can become true friends or valued business colleagues—people they wouldn’t have been able to find in the pre-Internet era.

Answer the following questions related to this passage from Zaslow:

A. In what ways do communication tools enhance the effective development of interpersonal skills needed in the workplace?

B. In what ways do communication tools hamper the effective development of interpersonal skills needed in the workplace?

C. What are some of the most valuable communication skills that Millennials bring to the workplace?

D. What are communication skills that you think Millennials most need to develop?

E. It’s safe to assume that some non-Millennial workers hold a viewpoint similar to that of P. M. Forni in the passage above. What does this imply for you as you enter the workplace?

7.7 Blogs on Communication Technology (LO 7.5, LO 7.6, LO 7.7)

Select a blog entry about the impact of communication technolo- gies on corporate culture from a well-known thinker. Search for a blog that interests you or choose from the following:

● Andrew McAfee’s blog: http://andrewmcafee.org/blog/ ● Jonathan Zittrain’s blog: http://futureoftheinternet.org/

Based on the blog entry, respond to the following items:

A. Briefly summarize the topic of the blog entry. B. According to the entry, what is the impact of communication

technology on corporate culture? C. Describe your feelings and attitudes regarding the entry. Do

you agree or disagree with certain points? Are you enthusias- tic or pessimistic about various parts of the entry?

D. Explain how the topic will impact you in the workplace.

car03199_ch07_176-210.indd 206 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 207

7.8 Internet Communication Taking Over (LO 7.1, LO 7.4, LO 7.5, LO 7.6)

As researchers Simon Wright and Juraj Zdinak recently stated, “Internet communication is slowly taking over traditional phone- based voice communication and face-to-face communication. Restrictions to local or regional communities no longer apply: The Internet has enabled easy global communication.” 57 Think about your future career and answer the following questions:

A. Is the prospect of communicating primarily via the Internet liberating? Explain.

B. Do you view the possibility of less face-to-face communica- tion as disappointing? Explain.

C. What personal characteristics and skills are particularly well suited to success for predominantly Internet-based communication?

7.9 Setting Boundaries (LO 7.5, LO 7.6, LO 7.7)

In a recent survey of corporate employees, 76 percent thought it was OK to friend another employee who was a peer. Only 35 per- cent thought it was OK to friend a supervisor, and only 30 percent thought it was OK to friend a supervisee. 58 Answer the following related questions:

A. Do you think it is appropriate to friend a supervisor or su- pervisee on Facebook or another social networking website? What problems could arise by doing so? What work benefits might you achieve? What social boundaries should exist be- tween supervisors and supervisees?

B. Do you think the boundaries between private life and work life are blurred by communication technologies such as social net- working? What standards or principles do you want to use to keep parts of your private life separate from your colleagues?

C. Have you ever talked to your colleagues or classmates about your communication preferences? For example, have you discussed preferences for certain communication channels or expected response times? Describe your experiences.

7.10 Ethical Use of Social Media (LO 7.7)

Reread the three examples of personal social media use that hurt employers (p. 200). For each item, do the following:

A. Explain why the social media use was unethical. B. Describe a similar behavior you have observed. C. Recommend how employees can avoid such problems.

7.11 Corporate Social Media Guidelines (LO 7.7)

Reread Coca-Cola’s social media guidelines in Figure 7.15 . Re- spond to the following items:

A. Generally, what is the difference between speaking “on behalf of the Company” and speaking “about” the Company?

B. The policy states that employees are responsible for following the Code of Business Conduct in all public settings. Do you think your online activities on public social networking web- sites constitute a public setting? Explain.

C. The policy states that employees are responsible for any post that can “potentially tarnish the Company’s image.” Give five examples of posts that many people might consider private but that could damage a company’s image.

D. What does it mean to be a scout? E. What types of online conversations about the company are

appropriate? Inappropriate? F. What are some public positions employees might take that

would be considered “counter to the Company’s interests”?

7.12 Evaluating Email Messages (LO 7.1)

Compare the less-effective and more-effective emails in Figures 7.1 and 7.2 in the following ways:

A. Analyze the writing for each email based on tone, style, or design.

B. Evaluate them based on three principles for effective emails from this chapter.

C. Make two recommendations for improving the more-effective email.

7.13 Description of Past Work or School-Related Emails (LO 7.1)

Think of recent emails you have received related to work and school. Describe three effective email practices and three ineffective email practices you have observed. Describe each of these practices in detail (a paragraph each) and provide specific examples from emails you have received. You don’t need to reveal who sent the emails.

7.14 Self-Assessment for Email Practices (LO 7.1)

Evaluate your typical practices with regard to email for school or work by circling the appropriate number for each item below.

Evaluation Exercises

1 – Disagree 2 – Somewhat

Disagree 3 – Somewhat

Agree 4 – Agree

I almost always reread my email message in entirety before sending it.

1 2 3 4

I write emails in a professional and sufficiently formal manner.

1 2 3 4

I think carefully about what to write in the subject line. 1 2 3 4

I use a spell-checker for important email messages. 1 2 3 4 (continued )

ll

car03199_ch07_176-210.indd 207 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

208 Part Three Principles for Business Messages

1 – Disagree 2 – Somewhat

Disagree 3 – Somewhat

Agree 4 – Agree

I envision how the recipient of my email message will respond when she/he receives it.

1 2 3 4

I think about the preferred communication channel of my message recipient before writing an email.

1 2 3 4

I read emails from others carefully and in their entirety before responding.

1 2 3 4

Before sending a reply email, I make one last check to see that I have responded to everything requested.

1 2 3 4

I regularly schedule uninterrupted time to focus on reading and responding to emails.

1 2 3 4

I set up an automatic email response or in other ways let others know when I will not be responsive to emails for an extended period (e.g., during vacation time).

1 2 3 4

Add up your score and consider the following advice:

35–40: You are a strategic communicator by email. You carefully plan your emails and make sure that you send a professional communication. Notice the items you did not place a 4 next to and focus on improving in these areas.

30–34: You are a careful communicator by email. You generally plan your emails well. However, you sometimes send them without enough thought or without reviewing them sufficiently. Focus on spending slightly more time in the planning stage.

25–29: You are an above average communicator by email. Sometimes you plan your emails well. Make sure to spend more time before sending an email. Always make sure your content is com- pletely professional before sending it.

Under 25: You need to improve your approach to writing emails. You are too casual. Consider altering your orientation so that you view email as an important, formal business communication tool in which slight mistakes can damage your career.

Write three goals you have for becoming a more effective com- municator by email. Go through the items in the survey one by one to help you think of areas where you most need to improve.

7.15 Assessment of Prior Email or Other Electronic Communication (LO 7.1, LO 7.2)

Think of an important email or other electronic communication you have sent in which others misunderstood your emotions and/ or intent. How did the other person respond? Did you think the response was fair? Why did this person misunderstand? Did the lack of richness of the communication channel have an impact? How could you have written or approached your message differ- ently to avoid misunderstandings?

7.16 Choosing the Right Type of Digital Message (LO 7.1, LO 7.5)

For each of the following communication tasks, identify which communication channel you think would work best: email, blogs, or wikis. Write several sentences explaining why you would

choose that communication channel. Assume you are a manager sending these messages to your subordinates:

A. Giving updates about an ongoing project. B. Providing feedback on individual performance. C. Sending a note of appreciation to one of your subordinates for

excellent work. D. Providing meeting minutes. E. Setting up a working document about ground rules for partici-

pation in meetings. F. Extending birthday wishes. G. Sharing ideas with a few but not all of your subordinates. H. Announcing a meeting for the whole team. I. Announcing a meeting with two of the team members. J. Working on a joint marketing proposal.

7.17 Responding to Cyber Incivility (LO 7.2)

Respond to the following questions:

A. What types of cyber incivility have you observed or heard about? B. Based on your own experiences or those of your friends or

colleagues, describe a situation in which someone was the tar- get of cyber incivility. Describe the cyber incivility. How well did the target respond? How well did the target reinterpret, relax, and/or defuse the situation?

C. Compare the less-effective and more-effective responses to an angry email depicted in Figures 7.6 and 7.7. Explain three specific ways in which the more-effective response defuses the situation. Also, suggest two improvements you would make to the more-effective response in Figure 7.7 .

7.18 Responding to Digital Messages and Managing Your Time (LO 7.3)

Answer the following questions about appropriately responding to digital messages:

A. What do you think is an appropriate response time to the fol- lowing types of digital messages: texts, microblog messages (such as tweets), and emails?

car03199_ch07_176-210.indd 208 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Email and Social Media for Business Communication Chapter Seven 209

B. Have others ever found your response time surprisingly fast? Have others ever found your response time to be slow enough to be considered impolite or uncivil? How can you influence the expectations of others regarding how quickly you respond to their digital messages?

C. Explain cyber silence. Provide three examples that you have observed.

D. What is the best way to respond to cyber silence when you need a response from someone else?

E. What three strategies do you or will you use in the upcoming five years to avoid e-interruptions in the workplace?

7.19 Evaluating Business Blogs (LO 7.5, LO 7.6)

Identify three individual business blogs in an area of interest to you. Analyze each blog in the following ways:

A. How does the blog provide value to readers? B. What is the niche (unique offering) of this blog? What sets it

apart from other blogs? C. What tone does the writing convey? What are the meta

messages from the blog? D. How does the blog contribute to a personal brand for the author?

Conclude with five recommendations you have for how business professionals can create valuable blogs.

7.20 Evaluating Meta Messages (LO 7.6)

Based on the less-effective and more-effective social networking pro- files depicted in Figures 7.12 and 7.13, respond to the following items:

A. What meta messages does each profile send to professionals who do not know Kip? Choose two primary meta messages for each profile.

B. What meta messages does each profile send to colleagues who do know Kip? Choose two primary meta messages for each profile.

C. What meta messages does each profile send to family mem- bers and friends? Choose two primary meta messages for each profile.

D. What three recommendations would you make to Kip to improve his Facebook profile ( Figure 7.12 ) and his LinkedIn profile ( Figure 7.14 ) to enhance his professional credibility?

7.21 Evaluating Your Online Reputation (LO 7.6)

A. Currently, what type of online reputation do you have in a professional sense?

B. In four or five sentences, explain the personal brand you would like to develop over the next five years.

C. Explain three strategies you will employ to develop your personal brand in your online communications. Devote at least one paragraph to each strategy.

7.22 Sending the Right Meta Messages with Your Online Communications (LO 7.5, LO 7.6)

Using Table 7.5 as a guide, do the following for each domain of your online reputation: personal and private; professional and private; personal and public; and professional and public:

A. What are the online communication channels you will use for each domain?

B. Will you use the same channels for more than one domain? If you share any of the communication channels for more than one domain, how will you prioritize which audiences to choose content for?

C. What are the primary meta messages you want to send? Choose two meta messages for each domain and explain how you intend to send these meta messages.

Endnotes 1. Peter W. Cardon, Melvin Washington, Ephraim A. Okoro, Bryan Marshall, and Nipul Patel, “Cross-Generational Perspectives on How Mobile Phone Use for Texting and Calling Influences Work Outcomes and Work Relationships,” presented at the Association for Business Communi- cation Southeast Conference , Charleston, South Carolina, April 1, 2011.

2. “Corporate Intranets ‘Useless’ to Business,” Concentra website (March 2, 2010), retrieved July 6, 2010, from http:// live.lewispr.com/concentra/2010/03/02/corporate-intranets -%E2%80%98useless%E2%80%99-to-business-598.

3. Sara Radicati, ed., and Masha Khmartseva, Email Statistics Report, 2009–2013 (Palo Alto, CA: Radicati Group, April 2009).

4. “Email Has Made Slaves of Us,” The Daily Telegraph , June 16, 2008.

5. Sara Radicati and Quoc Hoang, Email Statistics Report, 2011–2015 (Palo Alto, CA: Radicati Group, 2011).

6. Jeanne C. Meister and Karie Willyerd, The 2020 Workplace: How Innovative Companies Attract, Develop, and Keep Tomorrow’s Employees Today (New York: HarperCollins, 2010).

7. Ibid.

8. Beverly Langford, The Etiquette Advantage: The Unspoken Rules for Business Success (New York: American Management Association, 2005).

9. Alan Murray, “Should I Use Email?” The Wall Street Journal web- site, retrieved July 15, 2010, from http://guides.wsj.com/management /managing-your-people/should-i-use-email/.

10. Michael Hyatt, “Email Etiquette 101,” retrieved July 15, 2010, from http://michaelhyatt.com/2007/07/email-etiquette-101.html.

11. Nick Morgan, “Don’t Push That Send Button!” Harvard Manage- ment Communication Letter (August 2002): 4.

12. Susan Bixler and Lisa Scherrer Dugan, How to Project Confi- dence, Competence, and Credibility at Work: 5 Steps to Professional Presence (Avon, MA: Adams Media, 2001): 116.

13. Greg Wright, “Twitter with Care: Web 2.0 Usage Offers Few Second Chances,” Society for Human Resource Management website, July 30, 2009, retrieved June 28, 2010, from http://www.shrm.org/hrdisciplines/technology/Articles/Pages/ TwitterCarefully.aspx.

14. Peter W. Cardon, Melvin Washington, Ephraim A. Okoro, Bryan Marshall, and Nipul Patel, “Emotional Intelligence and Norms of Civility for Mobile Phone Use in Meetings,” presentation at the Association of Business Communication 75th Annual Convention, Chicago, October 28, 2010.

ll

car03199_ch07_176-210.indd 209 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

210 Part Three Principles for Business Messages

15. Beverly Langford, The Etiquette Advantage: The Unspoken Rules for Business Success .

16. Dale Carnegie, How to Win Friends and Influence People (New York: Simon & Schuster, 1981): 83.

17. Joan Waldvogel, “Greetings and Closings in Workplace Email,” Journal of Computer-Mediated Communication online 12, no. 2 (2007), from http://jcmc.indiana.edu/vol12/issue2/waldvogel.html.

18. Kristin Byron, “Carry Too Heavy a Load? The Communication and Miscommunication of Emotion by Email,” Academy of Manage- ment Review 33, no. 2 (2008): 313.

19. Ibid.

20. Ibid.

21. Ibid.

22. Mei Alonzo and Milam Aiken, “Flaming in Electronic Communi- cation,” Decision Support Systems 36 (2004): 205.

23. Pearn Kandola, The Psychology of Effective Business Communica- tions in Geographically Dispersed Teams (San Jose, CA: Cisco, 2006): 5.

24. Norman A. Johnson, Randolph B. Cooper, and Wynne W. Chin, “Anger and Flaming in Computer-Mediated Negotiation among Strang- ers,” Decision Support Systems 46 (2009): 663.

25. Vivien K. G. Lim and Thompson S. H. Teo, “Mind Your E-manners: Impact of Cyber Incivility on Employees’ Work Attitude and Behavior,” Information & Management 46 (2009): 419.

26. Ibid: 419–425.

27. Johnson et al. “Anger and Flaming in Computer-Mediated Nego- tiation among Strangers”: 660–672.

28. Joe Robinson, “Email Is Making You Stupid,” Entrepreneur (March 2010): 61–63.

29. Ibid.

30. Ibid; Sally McGhee, “4 Ways to Take Control of Your Email Inbox,” Microsoft At Work website , retrieved July 15, 2010, from www.microsoft.com/atwork/productivity/email.aspx.

31. Maria Azua, The Social Factor: Innovate, Ignite, and Win through Mass Collaboration and Social Networking (Upper Saddle River, NJ: IBM Press, 2010).

32. Michael Chui, Andy Miller, and Roger P. Roberts, “Six Ways to Make Web 2.0 Work,” McKinsey Quarterly [online version] no. 1 (2010).

33. Simon Wright and Juraj Zdinak, New Communication Behaviors in a Web 2.0 World—Changes, Challenges and Opportunities in the Era of the Information Revolution (Paris: Alcatel-Lucent, 2008): 10.

34. Todd Henneman, “At Lockheed Martin, Social Networking Fills Key Workforce Needs While Improving Efficiency and Lowering Costs,” Workforce Management online (March 2010), retrieved November 20, 2010, from www.workforce.com/section/software-technology/feature -lockheed-martin-social-networking-fills-key-workforce/index.html.

35. Wright and Zdinak, New Communication Behaviors in a Web 2.0 World ; Andreas M. Kaplan and Michael Haenlein, “Users of the World, Unite! The Challenges and Opportunities of Social Media,” Business Horizons 53, no. 1 (2010): 59–68; AON Consulting, Web 2.0 and Em- ployee Communications: Summary of Survey Findings (Chicago: AON Consulting, March 2009); Jacques Bughin, Michael Chui, and Andy Miller, “How Companies Are Benefiting from Web 2.0,” McKinsey Quarterly 17, no. 9 (2009); Andrew McAfee, Enterprise 2.0: New Collaborative Tools for Your Organization’s Toughest Challenges (Boston: Harvard Business Press, 2009); Avanade, CRM and Social Media: Maximizing Deeper Customer Relationships (Seattle, WA:

Avanade, 2008); Jennifer Taylor Arnold, “Twittering and Facebook- ing While They Work,” HR Magazine 54, no. 12 (December 1, 2009); Soumitra Dutta, “What’s Your Personal Social Media Strategy?” Harvard Business Review (November 2010): 127–130.

36. McAfee, Enterprise 2.0: New Collaborative Tools for Your Organization’s Toughest Challenges .

37. Maria Azua, The Social Factor: Innovate, Ignite, and Win through Mass Collaboration and Social Networking .

38. Wright and Zdinak, New Communication Behaviors in a Web 2.0 World .

39. Andy Beal and Judy Straus, Radically Transparent: Monitoring and Managing Reputations Online (Indianapolis, IN: Wiley Publishing, 2008).

40. “Intranet Blogs Hit Critical Mass: Most Employees Don’t Like to Blog, but They Like to Read Them,” retrieved November 20, 2010, from www.prescientdigital.com/articles/intranet-articles /intranet-blogs-hit-critical-mass.

41. Kaplan and Haenlein, “Users of the World, Unite! The Challenges and Opportunities of Social Media”: 62.

42. Wright and Zdinak, New Communication Behaviors in a Web 2.0 World ; Sebastian Paquet, “Wikis in Business,” in Jane Klobas, Wikis: Tools for Information Work and Collaboration (Oxford: Chandos Pub- lishing, 2006): 99–117; Jane Klobas, Wikis: Tools for Information Work and Collaboration (Oxford: Chandos Publishing, 2006).

43. Daniel Nations, “The Business Wiki,” retrieved November 20, 2010, from http://webtrends.about.com/od/wiki/a/business-wiki.htm.

44. Richard McDermott and Douglas Archibald, “Harnessing Your Staff’s Informal Networks,” Harvard Business Review (March 2010): 83–89.

45. Paquet, “Wikis in Business.”

46. Goetz Boue, Don’t Say Web 2.0, Say Intranet 2.0 (London: Con- centra, 2009); Dutta, “What’s Your Personal Social Media Strategy?”; Beal and Straus, Radically Transparent: Monitoring and Managing Reputations Online .

47. Dutta, “What’s Your Personal Social Media Strategy?”

48. Josh Hyatt, “Building Your Brand and Keeping Your Job,” Fortune (August 16, 2010): 74.

49. Adapted from Dutta, “What’s Your Personal Social Media Strat- egy?”: 129.

50. Hyatt, “Building Your Brand and Keeping Your Job”: 71–76.

51. Greg Wright, “Twitter with Care: Web 2.0 Usage Offers Few Sec- ond Chances,” Society for Human Resource Management online.

52. Hyatt, “Building Your Brand and Keeping Your Job.”

53. Arnold, “Twittering and Facebooking While They Work.”

54. Ibid.

55. New York Times Corner Office Blog, “Communication,” retrieved June 15, 2010, from http://projects.nytimes.com/corner-office/ Communication.

56. Roger P. Roberts, “An Interview with MIT’s Andrew McAfee,” McKinsey Quarterly , no. 1 (2010).

57. Wright and Zdinak, New Communication Behaviors in a Web 2.0 World : 6.

58. “Online Etiquette & the Workplace,” Liberty Mutual The Respon- sibility Project website, retrieved July 6, 2010, from http://www .responsibilityproject.com/infographics/rp-survey-online-etiquette -the-workplace#fbid=67LBedVyvn7.

car03199_ch07_176-210.indd 210 23/11/12 8:00 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Pa r

t f

o u

r Types of Business Messages Chapter 8 Routine Messages

Chapter 9 Persuasive Messages

Chapter 10 Bad-News Messages

Chapter 11 Crisis Communications and Public Relations Messages

car03199_ch08_211-237.indd 211 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

After studying this chapter, you should be able to do the following:

LO8.1 Describe how delivering routine messages impacts credibility.

LO8.2 Describe the process for developing routine business messages.

LO8.3 Construct routine business requests.

LO8.4 Compose routine sets of expectations.

LO8.5 Construct routine sets of directions.

LO8.6 Compose routine responses to inquiries.

LO8.7 Construct routine announcements.

LO8.8 Compose routine claims.

LO8.9 Construct routine appreciation messages.

LO8.10 Compose apologies.

LO8.11 Construct expressions of sympathy.

Learning Objectives

Routine Messages C

h a

p t

er E

IG H

T

car03199_ch08_211-237.indd 212 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Chapter Case: Routine Emails at Smith & Smith Advertising

Who’s Involved

Bryan Atkins, account executive at Smith & Smith Advertising • Works extensively with clients to ensure they are satisfied with various advertising

campaigns • Leads and coordinates work with the creative teams working on these campaigns

WHY DOES T HIS MATTER?

 

LO8.1 Describe how delivering routine messages impacts credibility.

The vast majority of business messages are routine. In routine messages, you are dealing with straightforward information that does not require in-depth analysis, so you generally expect your readers to react positively, and you do not anticipate resistance. Most routine messages are simple. Yet, routine messages should not be treated as unimportant or inconsequential. They are the glue that holds together most coordi- nated business actions. In this chapter, we discuss common types of routine messages. Many of them primarily focus on work tasks, such as making requests, setting expec- tations, providing directions, making inquiries, providing announcements, and mak- ing claims. Other routine messages focus on maintaining and improving workplace relationships, such as showing appreciation, offering apologies, and expressing sym- pathy. The final two types of messages, apologies and expressions of sympathy, are unlike other messages in this chapter in that they occur far less frequently. However, like other messages in this chapter, they are fairly straightforward and require you to compose them fairly quickly. The day-in-and-day-out routine messages you send may be among the most im- portant for establishing your credibility in the workplace, especially early in your business career. Your approach to routine business messages strongly influences how others evaluate your responsiveness, reliability, attention to detail, commitment, and professionalism. Read the chapter case about a typical morning at work for Bryan Atkins, an account executive at an advertising firm. Throughout the chapter, you’ll see the routine messages Bryan completes before 11 a.m. While Bryan can answer most routine messages with emails of less than one paragraph, we focus on those examples that require slightly more effort. As a result, the examples are generally three to five paragraphs long.

?

Situation 1 (8 a.m.)

Bryan Requests a New Server Bryan arrived with a minute to spare for the weekly morning meeting with the executive management team. His one agenda item was to purchase a replacement for a soon-to-be-outdated server. One of the partners, Andrea Johansen, thought this was a straightforward matter but asked Bryan to put his suggestions in writing with details about the needed purchases.

Hear Pete Cardon explain why this

matters.

bit.ly.com/CardonWhy8

car03199_ch08_211-237.indd 213 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Situation 2 (9 a.m.)

Bryan Responds to Messages in His In-Box from Employees and Prospects After the meeting, Bryan sat down at his computer to find 37 new messages from colleagues, clients, and prospects. Bryan thought all of the messages were important enough that he needed to respond to them within two to three hours. Several were most urgent:

• A member of the creative team, Barry Evermore, said he and his partner, John Anderson, had just finished an account and were waiting for new assignments.

• A new member of the creative team, John Anderson (Barry Evermore’s partner), was scheduled to take a company trip, but he was unfamiliar with travel procedures at Smith & Smith. He was asking Bryan how to set up his trip.

• A potential client emailed Bryan about services offered by Smith & Smith.

Situation 3 (9:30 a.m.)

Bryan Makes an Announcement As the chair of the social activities committee, Bryan wanted to send out an announcement.

Situation 4 (9:40 a.m.)

Bryan Takes Care of Overcharges from a Vendor This morning he noticed that a hotel had overcharged Smith & Smith by not applying a negotiated rate to several hotel stays for members of his creative teams. Bryan wanted to resolve the matter immediately.

Situation 5 (10:05 a.m.)

Bryan Shows Appreciation to His Creative Team During the morning, Bryan took a call from a recent client, Ana Galleraga, director of the local zoo. “Hey, Bryan,” she said. “Just wanted to let you know what a great success we’re having with the ad campaign you developed. Since we started putting up billboard ads and running the radio spots last month, we’ve increased participation in all of our community educational programs. We’re also getting lots of comments about how beautiful the billboards are. Please let everyone over there know what a great job they’ve done. And, we’d like to figure out how to use the campaign concept in our online marketing.” Of course, Bryan told her that the agency could help her out in that regard.

Situation 6 (10:20 a.m.)

Bryan Issues a Brief Apology Over the weekend, he worried about insensitive comments he made in last Friday’s leadership team meeting. Bryan had accused his colleagues of caring more about one of their clients than about their own employees. This particular client frequently made unreasonable requests, but Bryan and other members of the executive management team never pushed back because the client accounted for nearly one-quarter of Smith & Smith’s total revenues.

Situation 7 (10:45 a.m.)

Bryan Expresses Sympathy to a Longtime Client He wanted to write a sympathy card to his close client Felipe Bravo. Over the weekend, Felipe’s wife, Rosa, passed away after a long battle with cancer. Bryan and Felipe have worked together for nearly a decade, and Bryan wanted to express his genuine sympathy to Felipe.

Task 1 How will Bryan write a

routine request for a new server? (See the “Making

Requests” section.)

Task 2 • How can Bryan best set expectations for Barry and John’s

upcoming work schedule? (See “Setting Expectations.”) • How can Bryan most efficiently help John make travel

plans? (See “Providing Directions.”) • How can Bryan respond in a way that best answers the po-

tential client’s questions and maximizes the likelihood that he will become a client? (See “Responding to Inquiries.”)

214 Part Four Types of Business Messages

car03199_ch08_211-237.indd 214 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Task 3 How should Bryan

announce a social outing so that his colleagues will get all the key information rapidly? (See the “Creating Announcements” section.)

Task 5 How should Bryan go

about congratulating his creative team on

its excellent work? (See “Showing Appreciation.”)

Task 4 How should Bryan make

sure the excessive charges are refunded or credited? (See “Making Claims.”)

Task 7 How should Bryan

express condolences to his client? (See “Expressing

Sympathy.”)

Task 6 How can Bryan make

amends for his inappropriate comments? (See the “Making

Apologies” section.)

Developing Routine Messages Since you will send and receive so many routine messages in any given business day, one of your primary goals is efficiency: You need to produce credible messages quickly. Excellent business communicators can develop routine written messages—even those that require several paragraphs—in a matter of minutes. The examples in this chapter should generally take 5 to 15 minutes to complete.

Typically, completing routine messages requires less time than other types of busi- ness messages. Also, compared to other types of business messages, routine messages require proportionately less time for planning and reviewing. Developing routine mes- sages quickly, however, does not mean abandoning the writing process of planning, drafting, and reviewing .

For most routine messages, you can accomplish the AIM planning process fairly quickly (see Figure 8.1 ). Because you generally are working with straightforward mat- ters and your audience is likely to respond positively, you will generally not need much time for audience analysis . Since you are typically dealing with straightforward matters, you don’t need much time for idea development . Developing your ideas is mostly a matter of identifying and gathering relevant, accurate, and up-to-date infor- mation. However, avoid the impulse to skip this step. Ask yourself questions such as the following: How would my audience want to receive this information? How much detail do my audience members expect?

The most important planning step is message structuring . Since routine messages are so common and your readers are likely overloaded with so many other messages and tasks, your primary challenge is to make sure your readers pay attention. There- fore, your message should be direct and front-loaded. The primary message should have ten words or fewer, and you should typically place it in the subject line of your email to immediately capture attention. Furthermore, the primary message should ap- pear in the first sentence or two of the message and again in the closing if your message is several paragraphs long.

In the body of the routine message, you should provide short paragraphs with re- lated details. To make sure your message receiver will comply, include all needed in- formation. Not only are readers less likely to comply when you don’t provide enough information, but you also lose credibility. Once you establish a reputation for providing

LO8.2 Describe the process for developing routine business messages.

Components of Routine Messages

• State the primary message (ten words or fewer).

• Provide details in paragraphs of 20 to 80 words.

• Restate the request or key message in more specific terms.

• State goodwill.

Routine Messages Chapter Eight 215

car03199_ch08_211-237.indd 215 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

216 Part Four Types of Business Messages

incomplete, overly general messages, your readers are less likely to pay close attention to your future messages.

As you draft the message, aim for a helpful, professional, and reader-centered tone. Focus on making the message easy to read. Readers expect to understand your primary message in under 10 to 15 seconds, so use short sentences and paragraphs. Design your message so readers can find information in just moments. Use bullets, numbering, special formatting, and external links to relevant information to highlight key ideas.

Your proofreading in the reviewing stage should take a minute or two. Since busi- ness professionals send so many routine messages each day and their content can be repetitive, they often do not take time to reread them. Avoid this impulse to hit “send” without rereading your messages. By rereading, you will make sure the content is com- plete and without errors. Even minor typos can distract your readers from complying with your messages.

FIGURE 8.1

The Writing Process for Routine Messages

FAIR Test

Proofreading Feedback

Review Key Reviewing Steps

FAIR Test: Ensure that the message contains all needed information and that it is entirely correct.

Proofreading: Check for typos and any signals that you are not attentive to the needs of others.

Feedback: Request feedback from trusted colleagues when speaking on behalf of a team or unit.

Audience Analysis

Idea Development

Message Structuring

Plan Key Planning Steps

Audience Analysis: Consider exactly what information your audience needs and how they want to receive it.

Idea Development: Identify and gather relevant, accurate, and up-to-date information.

Message Structuring: Create a front-loaded, direct, complete, and detail-oriented message.

Draft Key Drafting Steps

Tone: Aim for a helpful, professional, reader-centered tone. Show respect for your readers’ time.

Style: Make your message easy to read. Use short sentences and paragraphs and action-oriented language.

Design: Use subject lines and formatting to let your readers process and find information immediately.

Tone

Style Design

car03199_ch08_211-237.indd 216 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Routine Messages Chapter Eight 217

Since routine messages are straightforward and rarely sensitive, you generally do not need to ask for feedback from trusted colleagues. However, when you speak on behalf of your team, you might check with other team members to ensure they agree about the content. The most important aspect of the FAIR test is checking for accuracy—that is, making certain your information is accurate and reliable.

Making Requests You will make thousands of requests of others during your career, and others will make thousands of requests of you. Requests are the essence of people coordinating work efforts, buying and selling products and services, and maintaining work relationships.

Routine requests involve cases where you expect little or no resistance from mes- sage recipients. Like all routine messages, routine requests should contain clear and specific subject lines, often stating the entire request . As you reread the message before sending it, one question you’ll ask yourself is whether the message recipient will un- derstand exactly what to do.

For most requests, you will often use a portion of the message to provide the ratio- nale for the request. Since you expect a favorable response, you typically do not need to be particularly persuasive. However, justifying the request shows your professional- ism and attention to detail. It also helps a company maintain transparency by keeping written records of why certain decisions were made.

One primary goal for routine requests is to retain goodwill with the recipient. No one wants to feel bossed around, so make sure you achieve a positive, other-oriented tone. Also, when working with superiors, be careful about setting deadlines. Even in today’s flatter organizations, being bossy to the boss can be counterproductive. Finally, when making requests, showing respect for the recipient’s time goes a long way in maintaining goodwill.

In Bryan’s request memo to Andrea for a new computer server (see Figures 8.2 and 8.3 ), the request is routine because Andrea has already verbally committed to mak- ing the purchase. The primary goal is to convey the information in an easy-to-read, complete format. In the more-effective memo, Bryan asks for the purchase authoriza- tion within a specific time frame (within two weeks; preferably before the end of the week). He justifies the request with sufficient detail. Finally, he is direct but not bossy or domineering, which is important since he is writing to his boss.

Setting Expectations Working with others involves setting expectations, especially when you are in manage- ment and supervisory roles. Many young business professionals—especially first-time managers—are not comfortable with telling others what to do. They are nervous about overstepping their authority and disrupting a friendly feeling with subordinates. Yet, setting expectations is directly tied to your credibility and ability to foster interpersonal trust in the workplace. Dennis S. Reina and Michelle L. Reina have examined the nature of trust in hundreds of companies over the past few decades and say this about setting clear expectations:

A lack of clarity regarding expectations causes misperceptions and misconstrued intentions. When people’s expectations are not met, they may feel a range of emotions. They may feel disappointed, discounted, taken advantage of, angry, or hurt. The result may be distrust and feelings of betrayal. . . . When people don’t find out what is expected of them until they run into a wall, go down the wrong road, or fail to get a promotion or pay raise, it’s too late. In these kinds of situations, people may experience a range of emotions from disappointment to betrayal. 1

So, although setting expectations is often a routine matter, failure to do it can lead to lasting professional disappointments and breakdowns in working relationships.

LO8.3 Construct routine business requests.

LO8.4 Compose routine sets of expectations.

Components of Requests

• Make request. • Provide rationale. • Call to action.* • State goodwill. *Optional—appropriate at the end of lengthy messages

car03199_ch08_211-237.indd 217 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

218 Part Four Types of Business Messages

Three components are central in setting expectations for those you manage: describing responsibilities, providing deadlines, and discussing coordination. Describing responsibilities means designating tasks and work outcomes to certain employees, providing deadlines means setting out the timeline by which the work should be accomplished satisfactorily, and discussing coordination involves pro- viding guidelines for how employees should communicate and cooperate with one another. From time to time, you should also describe your own role and responsi- bilities to supervisees. When you do so, they see they are accountable to you and you are also accountable to them. This means you may need to occasionally own up to your own mistakes and accept responsibility when everything has not gone as expected.

Notice the differences between the less-effective and more-effective expectations messages in Figures 8.4 and 8.5 , in which Bryan makes a new assignment and sets out

FIGURE 8.2

Less-Effective Routine Request

smith & smith advertising

Server

From: Bryan Atkins Mon, June 24, 2013 To: Andrea Johansen CC: Jenny Nguyen

Hi Andrea:

We need an additional server since our current one will soon be vulnerable to data loss if we experience a system failure. Currently, our server runs on a 32-bit processor. In the near future, Microsoft will release an update to Windows 2008 that will end the life of this server. If we cannot run the most current version of Windows, we will soon fall behind in security and technology. Jenny Nguyen from IT and I have determined that we can replace the soon-to-be-outdated server at minimal expense with a new server and an external drive. The proposed server will exceed the requirements of Windows Server 2008 R2 and allow for future expansion. This server will not require the purchase of an operating system (OS) or peripherals (keyboard, mouse, monitor, etc.). The Buffalo external storage will provide for a reliable backup solution for all the data housed on the server. We have priced the needed equipment at a total of $3,530.11 for a Dell PowerEdge 2970, Quad Core AMD Opteron 2.2GHz, 32GB RAM (8x4GB) 800MHz, 1.5TB (3x500GB) HDD, DVD-RW, Dual Embedded Broadcom NetXtreme II Gigabit Ethernet, RAID 5 ($3,031.08). We will also get a Buffalo LS-XH2.0TL 2TB External Storage ($314.99). With the estimated sales tax of $184.04, the final amount would be as specified above. If you could get us a purchase authorization by Friday, we could purchase the new equipment and install it over the weekend, which would avoid any network outage during workdays. The network would be fully functional and secure by Monday morning when everyone comes into work.

Bryan

NAVIGATION is challenging: one

paragraph of 260 words.

Nondescriptive SUBJECT LINE.

REQUEST is difficult to find.

Components of Expectations

• Explain overall expectation.

• Describe responsibilities.

• Provide deadlines. • Discuss coordination. • State goodwill.

car03199_ch08_211-237.indd 218 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Routine Messages Chapter Eight 219

FIGURE 8.3

More-Effective Routine Request

smith & smith advertising

TO: Andrea Johansen

FROM: Bryan Atkins

CC: Jenny Nguyen

DATE: June 24, 2013

SUBJECT: Request for Purchase Authorization for New Server

Can you provide a purchase authorization for a new server and external drive? We should purchase this equipment as soon as possible to keep our information system as secure as possible. I recommend that we purchase the new server within two weeks.

The primary reason we need an additional server is that we will soon be vulnerable to data loss if we experience a system failure. Currently, our server runs on a 32-bit processor. In the near future, Microsoft will release an update to Windows 2008 that will end the life of this server. If we cannot run the most current version of Windows, we will soon fall behind in security and technology.

Jenny Nguyen from IT and I have determined that we can replace the soon-to-be-outdated server at minimal expense with a new server and an external drive. The proposed server will exceed the requirements of Windows Server 2008 R2 and allow for future expansion. This server will not require the purchase of an operating system (OS) or peripherals (keyboard, mouse, monitor, etc. ). The Buffalo external storage will provide for a reliable backup solution for all the data housed on the server. We have priced the needed equipment as follows:

Dell PowerEdge 2970, Quad Core AMD Opteron 2.2GHz, 32GB RAM (8x4GB) 800MHz, 1.5TB (3x500GB) HDD, DVD- RW, Dual Embedded Broadcom NetXtreme II Gigabit Ethernet, RAID 5 $3,031.08 Buffalo LS-XH2.0TL 2TB External Storage $314.99 Estimated Sales Tax $14.04

Estimated Total Cost $3,530.11

Andrea, we would like to move forward as soon as possible with these purchases to make sure our system is secure. If you could get us a purchase authorization by Friday, we could purchase the new equipment and install it over the weekend, which would allow us to avoid any network outage during workdays. The network would be fully functional and secure by Monday morning when everyone comes into work.

NAVIGATION is easy: Paragraphs are 40, 70, 89, and 67 words long.

RATIONALE is specific and clear.

SUBJECT LINE is short (7 words) but effective.

REQUEST is stated clearly and up front.

the deadlines for Barry and John, two of his supervisees. The less-effective example violates the basic requirements of routine messages because it does not provide the key message clearly at the beginning. It is also difficult to read. In the more-effective mes- sage, Barry and John can grasp the key messages within seconds. They can process all of the information rapidly and understand the responsibilities, deadlines, and coordina- tion associated with these new accounts.

car03199_ch08_211-237.indd 219 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

220 Part Four Types of Business Messages

FIGURE 8.4

Less-Effective Example of Setting Expectations

smith & smith advertising

Deadlines

From: Bryan Atkins Mon, June 24, 2013 To: Barry Evermore, John Anderson

Hey Barry and John. You two will be our lead team for the following two projects: Jansen Slippers and Forrester Eyeglasses. Tentatively (depending on our discussions with each client over the next week or so and a few other factors), I expect the following deadlines over the next two months. For Jansen, we will present the preliminary concepts to the client on Friday, July 12, 2013. Then, we’ll present initial layout/copy on Wednesday, August 7. We’ll wrap up by completing the final layout/copy by 8-23. With Forrester, we are going to present preliminary concepts on Friday, July 19. We’ll do the initial layout and copy on Friday, August 16. We’ll finish the final layout/copy on Wednesday, September 4. We really value these new clients and want to make sure we get repeat business from them, so you two need to step it up and really be on your game. Stop by my office this afternoon at 3 and we’ll talk this over some more. Bryan

TONE is demanding and bossy.

NAVIGATION is challenging: Deadlines are buried.

SUBJECT LINE reveals little about the expectations.

Another common type of routine message provides directions for others. Messages that provide directions share many similarities with those that set expectations. The primary distinction is that directions typically include specific—often step-by-step— guidelines for accomplishing particular tasks.

Since describing step-by-step procedures is so specific, insufficient detail can frus- trate your readers. For routine matters, you are generally safe reviewing your own work and making sure it is complete. For more technical and complicated procedures, make sure you have several people test the procedures to find where you can better clarify the steps involved.

In messages with procedures and directions, make the steps stand out clearly by enumerating each one. This helps your reader keep track of progress completing the tasks. Steps that are written in narrative form within a paragraph are typically difficult to follow.

Notice the differences between the less-effective and more-effective messages in Figures 8.6 and 8.7 , where Bryan gives directions to John on how to make company travel arrangements. The less-effective example in Figure 8.6 has an un- helpful and careless tone, written almost entirely in passive voice. The message is abrupt and insufficiently detailed. Many readers will decode a meta message of “I don’t have time for you.” In the more-effective example in Figure 8.7 , Bryan provides clear directions by pasting the human resources policies into the mes- sage and inserting his own comments as additional guidelines and tips. He also tells John where to go for more information. In reality, Bryan could have simply emailed “check the HR intranet portal.” Yet, this more-effective message, written in just three to four minutes, is a strong sign of Bryan’s willingness to help John. Many readers will decode a meta message of “I want to help you out as much as possible.”

Providing Directions

LO8.5 Construct routine sets of directions.

Components of Directions

• State goal. • Give step-by-step

directions. • State goodwill.

car03199_ch08_211-237.indd 220 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

Routine Messages Chapter Eight 221

FIGURE 8.5

More-Effective Example of Setting Expectations

smith & smith advertising

Tentative Deadlines for Jansen Slippers and Forrester Eyeglasses;

Can You Meet This Afternoon?

From: Bryan Atkins Mon, June 24, 2013 To: Barry Evermore, John Anderson

Hi Barry and John,

We have just secured two new accounts: Forrester Eyeglasses and Jansen Slippers. You two will form our lead creative team on these promising accounts. I recommended you for these accounts to the executive management team due to your excellent past work on fashion and clothing accounts.

Tentatively, I expect the following deadlines over the next two months:

Action Deadline Preliminary Concepts Presented to Jansen (F) July 12 Preliminary Concepts Presented to Forrester (F) July 19 Initial Layout/Copy Presented to Jansen (W) August 7 Initial Layout/Copy Presented to Forrester (F) August 16 Final Layout/Copy Completed for Jansen (F) August 23 Final Layout/Copy Completed for Forrester (W) September 4

I would like to stop by your offices later this afternoon to discuss priorities for these clients. Can we meet in Barry’s office at 3 p.m.? If that doesn’t work, how about 4 p.m. today? Let me know which time works best for you.

Bryan

TONE is positive and upbeat.

COORDINATION to be addressed.

RESPONSIBILITIES and DEADLINES are displayed.

EXPECTATIONS stated clearly and immediately.

car03199_ch08_211-237.indd 221 23/11/12 8:01 PM

J O H N S O N , O L I V I A 9 1 1 0

 

 

222 Part Four Types of Business Messages

FIGURE 8.7

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"