Friday, February 28, 2020

Managing Retention Case Study Example | Topics and Well Written Essays - 750 words

Managing Retention - Case Study Example Synopsis The secondary data available from the focus group study and survey questionnaires reveals that the major cause of employees leaving Irontown is stress experienced by the employees, whereas unfulfilled expectation of the employees from their designated jobs appears to be the second major cause of high employee turnover. Other reasons of high employee turnover at the Irontown are lack of efficiency in providing a solution to the customers’ problems, dissatisfaction from the salary and benefits package and finding another job opportunity. From the problems mentioned above, Irontown has been successful in identifying the resultant problems such as the inconsistency of training modules and lack of workforce to carry out the operations of the Irontown. Retention Plan Following are the suggestions that will help Irontown to overcome its human resource issues, particularly the high employee turnover rate. 1. Training and Development A good entrepreneur or manager is one who t akes special care of his or her employees’ growth plans. This practice helps the employer to gain employees’ loyalty. ... The first one is aimed at polishing the skills and customer handling abilities of the new recruits and teaches them about the customers’ preferences and behavioral trends. This information can be fetched from the CM software of the company which would give an insight into the customers’ buying trends and the most frequently asked questions. The next training program is for organizational development which should be offered to all the employees, regardless of how much time these employees have spent at Irontown. Again, the CRM software and the information retrieved from there would be helpful in determining customers’ preferences and bringing changes in the promotional pitch that customer care representatives use while talking to a customer (Russo, 2000). The use of these two training modules would help Irontown to improve the usage of CM software, on which the company has already invested a significant amount. Moreover, the issue of inefficiency in customer relat ionship management would also be resolved by training employees. 2. Revisiting Salary and Compensation Packages Irontown is advised to revisit its salary and compensation packages offered to the employees. By doing this, the company would be able to analyze the salary offered at Irontown against the industry standards. If the salary packages at Irontown are not up to the expectations of employees, than Irontown should raise salaries by increasing the amount of perks given to the employees in addition to the basic salary. In this manner, employees’ financial requirements would be fulfilled and they will gain inner satisfaction from their jobs (Russo, 2000). 3. Rotation Policy Irontown is also advised to introduce a shift rotation policy. This policy would provide every trainee and employer of the company

Wednesday, February 12, 2020

None 1 Case Study Example | Topics and Well Written Essays - 750 words

None 1 - Case Study Example In this paper, I develop a plan of how to analyze the intelligence problem that has been posed on Federal Republic of Ysla by The Sovereign Autocracy of Penin. Overview of the case The case involves a threat from SAP that is currently at war with the Federal Republic of Ysla. SAP has employed air reconnaissance, special operations, and air bombings against FRY as strategizes for a military attack. FRY’s topography, however, does not favor SAP military and only two targets are vulnerable to SAP’s amphibious offensive, and its naval attacks can only extent to 250 nautical miles. Analytical plan on how SAP military invasion will occur The analysis plan to determining how SAP will launch its attack follows a strategic approach that involves the intelligence cycle. The plan involves identification of the problem statement that defines the question, ‘How will SAP launch its attack on FRY?’ A planning stage then follows the problem statement and involves identific ation of key players to the entire process of protecting the FRY from SAP’s threat and the role of such players. The players in the case are experts in communication technology and communication process, informants, analysts and decision makers. The next stage in the analysis involves collection of data that relates to SAP’s potential mode of attack and explores such information as their potential targets, vulnerability of the targets, and potentials of the enemy’s arsenals to hit the targets from their different bases. The collected information is then analyzed; using i2 Analyst’s Notebook, compiled and communicated to relevant authority (IBM, n.d). The analysis process considers information such as appointment of a marine major to command the Third SAP Corps, SAP government’s directive to ban visits to its coast, and reports that SAP attacks will be made near Eyer. Further information indicates increased shipping near Banes, military movements to wards the northwest, and deployed crafts at Haba. Analyzing these pieces of information using i2 Analyst’s Notebook, whose functional features include visualization of intelligence information, analysis, and communication of the intelligence, identifies SAP’s focus on Port Eyer region with movements closer to the port and a base at Banes. The fact that only Mia and Eyer are vulnerable to SAP, that a marine has been appointed to head the Third SAP Corps, and that SAP’s naval initiatives can reach Eyer from Haba identifies marine, sub-marine or missile offensive as the primary mode of attack. This is because the two SAP bases, especially Haba, are strategic for accessing the FRY’s vulnerable ports through the sea (Clark, 2010; Folker, 2000). Analytical plan on where SAP military will occur The intelligence cycle is similarly applicable in analyzing the situation to determine where SAP attack will occur. The analysis begins by development of the problem stat ement in the form, ‘Where will the attack occur?’ Same parties are used in the intelligence process that identifies relevant information for analysis to identifying area of attack. i2 Analyst’s Notebook is used to locate different possible areas from which attacks can be launched and