The project study will use a qualitative narrative inquiry research method to explore the stories told by media production and distribution leaders on their experiences and perspectives on leading and understanding change management approaches, and results of change management arising from media technology changes. The interview candidates are media industry production and distribution leaders located in the New York or Los Angeles metropolitan area with media-technology change management experience within the last five years. Data collection will begin after the gathering of the signed informed consent document. The researcher will advise the participant not to reveal names of others or the organizations where they work. If the participant adds names of others or organizations, these will be removed during the transcription process.
Data collection of the media production and distribution professional's experiences and perspectives will be through face-to-face interviews. The researcher's intention is to interview the candidate at a location, which is mutually convenient to the candidate and the researcher and permits privacy and
…show more content…
confidentially. Determined during communication between the researcher and the candidate is the selection of potential interview locations. The face-to-face interviews will take place at a public venue like a coffee shop or via lunch at a restaurant, which does not require a permission document. Privacy and confidentially is a concern in using a public venue, but the researcher will explore the times the venue has minimum patrons to raise the confidence of maintaining privacy and confidentially. The interviews will include open-ended questions to allow the media production and distribution professional to relate their stories of the media technology change management. Using open-ended questions will initiate the conversation and maintain the storytelling. These open-ended questions are attached. The interviews with the participant will be recorded and expected to last one hour. Explain how the researcher will maintain and destroy materials: Converted into files are all study materials including permission documents, informed consent documents, transcriptions, and audiotapes. Upon checking of the successful conversion of the study materials to files by the researcher, the papers will be shredded, and the audiotapes will undergo bulk erasure. All files will be encrypted using a currently available data encryption solution using the Advanced Encryption Standard (AES) to ensure a level of protection resulting from accidental dissemination. Used for three years is a secure cloud storage solution such as Dropbox.com or Amazon Web Services Cloud Storage for storing the encrypted files. At the end of the three years, the data will be electronically destroyed using a secure deletion technique. Describe the procedures to ensure that information collected for the study will be kept secure: The researcher will advise the participant not to reveal names of others or the organizations where they work.
If the participant provides names of others or organizations, these identifiers will be removed during the transcription process. The confidentiality of the participants will remain confidential by using fictitious or alias names. The use of fictitious or alias names will prevent the accidental, non-disclosure of damaging information. Assigned to each participant is specific code as his or her fictitious or alias names. For example, P1 or Participant 1 will be used as a means of protecting the confidentiality of each participant. The transcription preparation process includes deleting any mentions of a company, or other names. This deletion process during transcription is described later in this
document. The codebook file indicating the participant name and the fictitious name intersection will be encrypted and stored in the encrypted storage. The codebook file will be deleted from the secure storage using a secure deletion technique either after the all the second interviews are complete or upon the recognition that additional second interviews are not necessary. Deleted after all the second interviews are complete, or the recognization that additional interviews are not necessary is the participant information such as contact details. Therefore, as a result of the preparation for the transcription process audiotapes are destroyed, the transcriptions do not contain identifiers, and when the interviews are complete, the codebook with identifiers is deleted. Finally, all project documents such as permission and informed consent, have been scanned, paper destroyed and maintained as encrypted files in encrypted storage. Will you maintain, destroy, or return recordings or photographs to participants? Returned to the participant at the end the interview is any physical assets provided to the researcher by the participant. The researcher is not going to maintain a library of participant assets. During the interviews, audio recordings will be used with participant’s consent. The audiotape will not have identifiers on the cassette or box. Soon after the interview, the audiotapes will be converted into audio files, which will be edited to remove identifiers. After the successful conversion of the audiotape content to an audio file, the audiotape will be destroyed by bulk erasure. The audio file will be transcribed as soon as possible after the interview. Maintained in encrypted cloud storage for three years is the edited audio files for transcription. After the three-year period, the recordings will be electronically destroyed using secure deletion technique. After the interviews, the information collected during the interview sessions will be transcribed. The transcription services company has previously signed a non-disclosure agreement, which is attached. The collected data represents the information that supports the objectives of the study. This information includes the participant’s feelings and experiences managing technical change in media production and distribution. Upon returning home, the digital recordings are copied to ensure the production of a backup copy of the interview. After producing the backup copy, the recording’s content is ingested into a computer to generate a password protected digital audio file, which represents the audio content of the interview. The researcher using Apple's Final Cut Pro software edits the original copy of the audio file, to remove any identifiers. After the editing is complete and content checked the original and backup copies of the audiotapes are destroyed using bulk erasure. A copy of the edited audio file is encrypted and stored on secure storage. Transmitted to the transcription company for conversion into a password protected Microsoft Word file, which represents the interview data is the edited and password protected, audio file. The passwords for the transferred files to and from the transcription company by separate communication emails. The transcription services company will destroy the transcript file and the audio file upon completion and acceptance of their work. Upon receiving the transcript, the researcher will compare the textual content in the Word file with the substance of the audio file, which is the result of the interview. The discovery of minor errors will lead to the researcher repairing the text. If significant errors are detected, the password protected Word file will be sent back to the transcription service company for redress. When the repair file returns from the transcription service company, the file will be checked again for errors. The Word file is encrypted and sent via email to the participant for their acceptance of the transcription content. Forwarded to the participant in a separate message are the passwords to open the file. Acceptance or changes of the transcript content will occur using a phone conversation. Therefore, interview content has not been insecure from the ingestion stage to the participant's acceptance stage. Additionally, from the editing stage to the participant's acceptance stage, the content has not contained identifiers and has been encrypted and stored securely. Describe your plans for maintaining personal identifiers securely: The personal identifiers with the code associated will be kept in softcopy form and not included in the final study. The maintenance of the personal identifiers during data collection will be maintained in encrypted cloud storage when not being utilized. Only the researcher will have access to this storage. Assigned to each participant is specific code as his or her fictitious or alias names. For example, P1 or Participant 1 will be used as a means of protecting the confidentiality of each participant. The transcription preparation process includes deleting any mentions of a company, or other names. This deletion process during transcription is described later in this document. The codebook file indicating the participant name and the fictitious name intersection will be encrypted and stored in the encrypted storage. The codebook file will be deleted from the secure storage using a secure deletion technique either after the all the second interviews are complete or upon the recognition that additional second interviews are not necessary. Deleted after all the second interviews are complete, or the recognization that additional interviews are not necessary is the participant information such as contact details. Therefore, as a result of the preparation for the transcription process audiotapes are destroyed, the transcriptions do not contain identifiers, and when the interviews are complete, the codebook with identifiers is deleted. Finally, all project documents such as permission and informed consent, have been scanned, paper destroyed and maintained as encrypted files in encrypted storage. Describe your plans for the destruction of linkages to personal identifiers and the time frame: The codebook file indicating the participant name and the fictitious name intersection will be encrypted and stored in the encrypted storage. The codebook file will be deleted from the secure storage using a secure deletion technique either after the all the second interviews are complete or upon the recognition that additional second interviews are not necessary. Deleted after all the second interviews are complete, or the recognization that additional interviews are not necessary is the participant information such as contact details. Therefore, as a result of the preparation for the transcription process audiotapes are destroyed, the transcriptions do not contain identifiers, and when the interviews are complete, the codebook with identifiers is deleted. Finally, all project documents such as permission and informed consent, have been scanned, paper destroyed and maintained as encrypted files in encrypted storage. Upon completion of the three-year period, the records in secure storage will be electronically destroyed using secure deletion technique. Describe efforts to minimize risks to participants: Assigned to each participant is specific code as his or her fictitious or alias names. For example, P1 or Participant 1 will be used as a means of protecting the confidentiality of each participant. Eliminated from the study content are organization and other names. All files are encrypted and stored in secure storage. Therefore, the risk will be minimized for participants. Describe any potential direct benefits to the participants: The potential benefits to the media-technology change management community will provide information necessary for leadership, business knowledge, and general expertise in how to reduce the possibility of failure of the media change management. Describe any possible benefits to society, the field of study, or discipline: The potential benefits to the media-technology change management community will provide information necessary for leadership, business knowledge, and general expertise in how to reduce the possibility of failure of the media change management. Describe any potential risks that the participants could encounter through their participation in this study: There are no foreseeable risks to the participants. Describe any potential costs to the participants: There are no potential costs to the participants.
Leading Change was named the top management book of the year by Management General. There are three major sections in this book. The first section is ¡§the change of problem and its solution¡¨ ; which discusses why firms fail. The second one is ¡§the eight-stage process¡¨ that deals with methods of performing changes. Lastly, ¡§implications for the twenty-first century¡¨ is discussed as the conclusion. The eight stages of process are as followed: (1) Establishing a sense of urgency. (2) Creating the guiding coalition. (3) Developing a vision and a strategy. (4) Communicating the change of vision. (5) Empowering employees for broad-based action. (6) Generating short-term wins. (7) Consolidating gains and producing more changes. (8) Anchoring new approaches in the culture.
- Taylor, L., & Willis, A., 1999, Media Studies – Texts, Institutions and Audiences, Blackwell Publishers Ltd., Oxford
An understanding of the medical transcription process and incidents involving privacy violations will aid in the answering these questions. Rich Bagby describes the transcription process and how outsourcing factors in:
Mitchell, D. (2005). Power media bluebook: With talk show guest directory. (15 ed.). Broadcast Interview Source, Inc. Retrieved from books.google.com/books?id=AQqnULQq6JUC
Narrative research is a qualitative methodological approach in research (Bedford & Landry, 2010. Since the early 1980s, narrative inquiry has been emerging in regards to individual life stories. Storytelling is closely related to psychoanalytic tradition. Narrative research, consist of a multiple of approaches, that are apart of social constructionism, which is guided by the philosophical assumptions of an interpretive constructivist paradigm (Patsiopoulos & Buchanan, 2011). Through this qualitative method researchers are able to explore and obtain an understanding about individuals through specific data gathered through interviews.
Joseph STRAUBHAAR and Robert LaROSE (2002). Media Now. Communication Media in the Information Age. 3rd Edition. Belmont, Wadworth/Tompson Learning.
The New England Wire and Cable (NEWC) present a situation that was quite possibly very common amongst many towns and smaller cities in the United States during the mid-1980s to the early 1990s. As large corporations with new technology swept across the country, small town American and its legacy manufactures and companies struggled to keep pace. This case study references the New England Wire and Cable Company that in some ways was resistant to change. John P. Kotter’s article, Why Transformation Efforts Fail, outlines eight classic errors that are made in the transformation process. Likewise, Kotter’s article also outlines eight steps that could spearhead transformation within an organization. There was clearly a commonly hidden problem within the NEWC the so many times goes unseen. That problem was the leadership of NEWC.
AK is an ELL student in Mrs. Tobin’s fourth grade classroom. AK is nine years old. He was five years old and entering Kindergarten when his family moved to the United States of America from Macedonia. This means he’s been in the country for four years and he has received all of his formal schooling here in the United States. According to his teacher, AK’s parents are very involved in his education and they seem to be very intelligent, well-educated individuals. AK’s mother only speaks English to AK at home, but she has a very distinct accent, which does affect some of her pronunciation of English words. AK’s grandmother also live with him, and she only speaks Macedonian. This allows AK to maintain his native language, while still learning and using the English language at home. I believe his family has found a balance between the languages used in his home that will greatly benefit AK in the long run.
It is generally know that the media industry in the UK is quite developed, being at a leading and unshakable status in the modern international communication. It has accumulated abundant of expertise. Your esteemed department is well-known for your excellence in the media field, and has a large number of world-leading and internationally excellent experts. I will obtain a broad understanding of media and communications in your program, and even have chances to visit world-famous media organizations like Reuters, Mirror, BBC, etc. Studying in your program will be a significant step forward towards my
Two new managers have been appointed at Sony in the last 15 years due to a number of developing problems, including the innovation ‘cogs’ within Sony slowing down, being forced into an aggressive pricing strategy, increased competition, losing the battle of VHS and Betamax, profit and sales remaining flat and the ongoing poor performance of Sony films (Mintzberg et al, 2003). Both managers initiated major strategic changes with varying degrees of success; firstly Nobuyuki Idei was appointed and initiated a major shift from analogue to digital technology, as there was a belief that Sony was falling behind the market in this respect. Idei also targeted the top position in the audio and visual industry, a universal standard in home computer devices and a new distribution infrastructure. He believed his job was the ‘regeneration of the entrepreneurial spirit’ (Mintzberg et al, 2003), believing it had been lost.
For this assignment I was having difficult time getting an informational interview in the documentaries production industry. Therefore, I interview three individual who are in the career field of information technology, senate, and accounting. I just asking them basic questions since I couldn’t get to specific with my career that focus on the production industry. Therefore, I ask them questions and advices that they would give a college school who have graduation or wo is going to graduation next year. The following individual that I interview was James Gregory who work in the information technology include in this interview my mother participation during the question about how to approaches the topic on race when it comes to create documentaries,
Everyday we encounter the media in some form. It could be waking up to the sound of the radio, or passing billboards in the streets or simply just watching television. They are a lot of different forms of media, for example, verbal or written media, visual media and aural media. Examples of media would include newspapers, magazines, film, radio, television, billboard advertisements as well as the internet. Media studies came about because of the developments in mass communication and it provokes the generation of exigent questions about what we think we know as well how we came about knowing it. There are always changes in the media and the term “media” refers to the many ways of physically forming meanings as well and carrying them. The term “media studies” on the other hand, means different courses priorities different media; different theories and different learning outcomes (Bazalgette, 2000).
Joseph STRAUBHAAR and Robert LaROSE (2002). Media Now. Communications Media in the Information Age. 3rd Edition. Belmont, Wadsworth/Thompson Learning.
Perhaps the strongest foundation for media education rests in the fact that increased awareness of media transforms students from passive to active participants in society. Learners must be offered hands-on application opportunities to increase their own knowledge and enjoyment of the media. The integration of formal media analysis with media production is an essential constituent of media literacy. Creative ventures, such as television or radio production, the development of a rock video or song, photography classes, script-writing, web-page development, or hypertext projects should be made available for students' participation and perusal. Students must be exposed to various forms of communication before they can recognize logical disparities, determine the strength of an argument, evaluate mass media, and actively join our democratic society as partners.
5. Price, S., 1997. The complete A- Z media and communication handbook. London: Redwood Books