Recent orders
Discuss how Allison’s specific anxiety disorder can be explained through each model
Case Study
Name:
Affiliation:
Course:
Instructor:
Date:
CASE STUDY
3. Discuss how Allison’s specific anxiety disorder can be explained through each model of
abnormality, the biological, cognitive, behavioral, psychodynamic, humanistic, and sociocultural model.
The biological factor contributing to Allison’s specific anxiety disorder is agoraphobia. Agoraphobia is commonly genetically inherited. Allison’s mother had agoraphobia, as she later realizes. She was too cautious and talked about how dangerous the world was. She believed that if one were not careful enough, something terrible would happen to them.
Cognitive errors have also caused Allison’s specific disorder. Cognitive errors refer to the
interpretation of certain events and situations in your life the wrong way such that you react in the wrong way. After the terrorist attacks of September 2001, Allison has been missing work due to the fear that she fears she might target a terrorist attack. She is also worried about the plane she is on crashing.
The behavioral model of abnormality shows that Allison has a specific anxiety disorder. Even
though Allison lives alone, she is so terrified of being burglarized. She has resorted to keeping men tennis shoes and a large dog bowl outside her door, hoping that this will somehow protect her from burglars when they think she is not alone. She is also constantly worried about things that you would view as trivial.
The psychodynamic theory states that events in our childhood have a significant impact on our lives later on. When Allison was eight years old, Mr. Jack sexually abused her. Mr. Jack had invited her over for cookies and milk. Her mother was busy doing the laundry and was not able to watch over her. She chooses not to tell anyone what had happened and blamed herself ever since. She knew it was her fault because she trusted someone who she did not know. When Allison becomes an adult, she still has trust issues, which significantly affect her romantic relationships.
The humanistic approach is also a cause of Allison’s specific anxiety to some extent. She found it impossible to please her family. Her sister made her feel inadequate since she was more successful. Allison also felt as though her sister looked down upon her because of her anxiety. Her father was also an impossible one to please. She did her best, but it just felt like it was never enough to get anyone’s attention.
The sociocultural model also caused Allison’s specific anxiety disorder. Growing up, she could not go outside and play with other children unless under strict supervision. She, therefore, grew up with no friends and believing that she was different from everyone.
CASE STUDY
4. If Allison were to receive treatment for her anxiety would be from:
A humanistic psychotherapist, what approach to treatment would the likely therapist use, how would it be used, and why would it be effective?
Humanistic therapy aims at helping people accept themselves and accept themselves as they are. It assists one to deal away with the fear of disapproved. This method is effective because Allison grew up trying to get attention from her father and siblings and then thinking that she was not enough. The therapist would help her reach her potential and find fulfillment within her.
A cognitive psychotherapist, what approach to treatment likely use, how would it be used, and why would it be effective?
Cognitive therapy is based on changing how someone thinks and reacts to situations. The
treatment method is essential because such patients usually respond to their viewpoint instead of the problem at hand. The cognitive psychotherapist will assist Allison to correct all negative thoughts that she often has.
A psychiatrist (biological perspective ) what treatment would the psychiatrist likely use, how would it be used, and why would it be effective?
A psychiatrist will help Allison find out if her anxiety is related to any underlying medical issue that she may be having. The psychiatrist can also recommend the necessary medication and even offer to counsel her.
Current Company A’s infrastructure
Introduction
Insurance Company A and Company B have executed a consolidation of assets owned under a new company through a merger. Company B is a financial services firm that will help Company A achieve its goal of diversifying and expanding its market dominance in our industry. Following the completion of regulatory formalities, the IT staff will begin the conversion of Business B’s IT ecosystem into Corporation A’s technology. Incorporating network infrastructure, security protocols, technical specifications, maintaining encrypted communications between the companies, assuring full compliance with existing laws and recommended industry standards, reduced stress on Business A infrastructure, satisfying commercial demands after the full merger, and achieving efficiency gains are all required for this initiative to be considered successful. This venture has a budget of $35,000 and is expected to be completed in 6 months. Following the acquisition, Corporation A and B will share a single headquarters as they will be considered a new entity.
Current Company A’s infrastructure
Issues identified in Company A’s network
Open ports 88 to 93 on the organization’s workstation – In preparation for interoperability, the IT team hired outside experts to do a risk analysis on Company A. As a consequence of this examination, various risks and dangers were discovered inside the Company A infrastructure. The accompanying dangers were discovered in the risk assessment study. The most serious danger discovered on the system was that ports 88-93 were exposed. This is a significant risk because an unsecured port can be abused by malicious attackers to get remote access. A vulnerability like an open port might have serious consequences for Company A’s performance or resources.
Employees with terminated contracts have their accounts active – Keeping user profiles that are no longer required poses a serious hazard to the security of the organization. If a hacker obtains information of these former registered users, they can exploit the system by gaining unauthorized access. As a result, in order to maintain security from prospective threats, the corporation must delete the previous login credentials. Moreover, because of super user capabilities, the vulnerability assessment detects a legitimate risk likelihood of a system intrusion. Accessibility to a company system is dangerous and can lead to catastrophic consequences. To maintain its integrity and to achieve some kind of responsibility, Company A must ensure permitted admin rights to other networks (Pardoe & Snyder, 2005).
Password changes on a 3-month basis is not enforced in the company – It was determined that password updates are not implemented. Because password changes are not imposed, the service is more likely to be compromised. If the passwords were the same, a hacker might potentially use them to connect directly to other devices in the network. You expose yourself to a host of possible hazards if you don’t employ efficient authentication management solutions.
Weak passwords are unsafe because they expose a vulnerability that hackers can utilize to obtain entry through brute force attacks. As a result, network administrators must implement suitable account management procedures to reduce the possibility of a system intrusion. Company A may create a secure system by executing regular upgrades and mandating the use of complex passwords. These security weaknesses are a widespread danger to total information integrity (Peterson & Davie, 2022).
Use of End-of-Life Software – We must also keep in mind that servicing for the Cisco PIX 515E firewall was set to expire on May 25, 2007. EOL refers to the time at which the intrusion detection system used by Company A has reached the end of its life cycle from the retailer’s viewpoint, and the distributor will no longer support the system. Company A was exposed to potential threats, program inconsistency, compliance concerns, increased operational cost, and poor dependability and efficiency due to an out-of-date company network and the lack of an anti-virus software. Cisco ceased all maintenance for the firewalls after they approached its end-of-life date, which included things like technical assistance and replacement parts. Using an out-of-date mission critical systems exposes the system to possible risks and flaws. Furthermore, it would have a negative influence on system performance and the company rather than a positive impact.
Company A’s infrastructure is also having problems. Staff are now permitted to utilize remote workstations to connect directly to the company’s network. Users are not accessing to the system in a secure manner, such as by using a VPN, which is a tunneling protocol through a network connection. Furthermore, the organization did not have a DMZ to aid increase system security through isolation. When a machine is deployed inside a DMZ, it only has access to special connection to other computers that exist in the corporate network.
Company B’s current infrastructure
Issues that were identified
Several issues were discovered on the Company B network as a result of the foregoing examinations. These concerns will be resolved prior to the completion of the consolidation with Company A. The Zen map scan returns a list of network interfaces that are exposed. Having unnecessary or insecure open ports accessible is risky because a hacker may examine the system and determine which connections are un-patched, exposed, and subject to an attack. To address this, our personnel will block all connections and only allow those that are required to run the company and prevent unauthorized access.
Poorly configured root access – On host 172.17.1.7, an FTP service is operating on ports 21 and 6200. This port has two severe and one intermediate threat found. Modernizing from vsftpd 2.3.4 to 2.3.5 or higher to remedy the potentially dangerous concerns. The moderate risk issue is with anonymized FTP connections, which should be disabled if not necessary. At address 172.17.1.7, the MySQL software is operating on port 3306. On this server, there is one high-risk flaw connected with the MySQL application. The threat is that the computer’s master password is null. To reduce this danger, replace the login details to a safe login.
Improper Java setup – On host 172.17.1.7, a Java Middleware client is operating on port 1099. The program’s one elevated issue is related to an improper setup that might permits remote malicious code being run. The solution is to turn off the class-loading functionality.
Default database logins – On host 172.17.1.7, a PostgreSQL service is operating on port 5432. A good password is absent and it is the source of this program’s great issue. The system is presently operating using the original PostgreSQL login, which must be replaced with a safe passphrase.
Outdated software – TWiki is listening on port 80 on the host 172.17.1.7. Several flaws have been discovered in the TWiki platform. Many issues may be fixed by changing to release 4.2.4 or above.
Improperly configured demilitarized zone – DMZs serve as a boundary between the company’s network and the world wide web or other systems. This DMZ functionality allows network nodes to deliver to both internal and external networks. However, Company A’s DMZ was also not properly configured. A DMZ is intended to be put behind firewalls, with rules specified to protect the Zone from the website (Forouzan, 2007). A properly configured gateway will also protect the underlying Network infrastructure from the DMZ. By installing a DMZ, you are establishing a defensive strategy, making it even more difficult for hackers to get access to computer systems of the company via the DMZ server.
Poor management of the IT department – The presented organizational chart depicts a concept of information movement and interaction, classifying both computers and the connections as potential threats. In the management structure, for instance, the Head of IT serves as the overarching administrator for any difficulties that the IT team may confront. The Director of IT reports to all security professionals, Computer technicians, and support personnel, however they are divided into levels. As a result, there is a lack of coordination inside the IT division, which has a negative impact on the attempts to secure the Network (Latapy & Willinger, 2008). The failure of information dissemination consumes time, especially when the manager needs to involve networking administration for a problem originating with the support center or Computer experts. When a potentially dangerous situation emerges that necessitates an instant reaction, the time it takes to complete this procedure might cost the firm dearly. Failure to follow suitable standards and requirements exposes the organization to cybersecurity incidents. Databases are also depicted on the flow chart; however, no staff are educated in the upkeep of the databases and the information contained on them (Forouzan, 2007). Furthermore, Company A’s smtp server lacks an account manager to manage the inbound and outbound traffic. All of the problems highlighted are a few of those uncovered while reviewing the organization structure for Company A.
Company’s B network Analysis
584835952500
6419854826000
461010-113030
Proposed Solutions to vulnerabilities
The results from Company B suggest the presence of elevated cybersecurity vulnerabilities.
The obvious security vulnerabilities are rendering the company’s infrastructure vulnerable, which must be addressed before the two firms are combined. The availability of multiple open ports was one of the weaknesses that stood out; this is a problem since it demonstrates a lack of fundamental security measures (Latapy & Willinger, 2008). Failure to manage these sorts of issues weakens the infrastructure and allows hackers to get unauthorized access to the company’s database. The unsecured ports demonstrate that Company B has neglected to conduct regular vulnerability assessments that help in the diagnosis of security flaws (Cohen, 1999). Furthermore, the company’s network indicates a large number of offline nodes.
I discovered two hosts on the network with a sum of 13 high risks on the devices during the OpenVAS assessment. First, the standard Pfsense firewall passwords were not altered. A cybercriminal can obtain the identities and use them to gain access to company B system. The passwords must be changed immediately as feasible to resolve this issue. There is a sum of 12 high risks on the other computer. Because firm A operates in a Windows platform, I feel it would be better to deactivate this Linux system and migrate its services to our Windows server machine.
The presence of down hosts on the network indicates an absence of multiple services.
Putting routing security at risk may result in a scenario in which hackers overwhelm a server and bring the system offline by manipulating the exploited computer. Because of poor physical authentication and authorization measures, these servers are vulnerable to being disabled or compromised. Protective measures are elements of the corporation’s necessities that make a significant contribution to the system’s security management framework (Cohen, 1999). In addition, the system searches for the presence of any unauthorized services running in the background. Unidentified services have the potential to cause network damage by utilizing a range of resources and unprotected computers.
We used effective security design concepts to assure the network’s security when developing the new Company A infrastructure. Defense-in-depth was the first premise we implemented.
Defense-in-depth is a strategy that concentrates on limiting an intruder’s progress toward the central system. In the system, for instance, an intruder would need to get over two levels to obtain access to the remote server (Latapy & Willinger, 2008). Furthermore, when visitors connect to the WIFI network, they do so in a secondary Virtual Private Cloud (VPC) connection that is segregated from the core network, servers and databases. Strong network internal controls need the use of several secure layers of protection to make it more difficult to penetrate the safeguards and cause a disturbance or obtain sensitive information.
We have put in place a number of protections based on regulatory compliance. RDP will be replaced with our new VPN capabilities. Users will be able to remote enter the Company A network over an SSL connection using this tool. Defending data against intentional snooping and inadvertent leaking. This functionality also shields nodes and employees from the open web when they are connected to the internal network. Company A will be subject to additional financial rules since Company B is a finance firm, such as PCI-DSS, which is a protocol for safeguarding payment information for businesses that handle, transport, or retain credit card information.
Implementing strict password management is one of the prerequisites. Users from Company A will need to authenticate to the network using VPN in order to obtain access to the system (Pardoe & Snyder, 2005).
Furthermore, a demilitarized zone has been integrated into the system. This is a technical phrase for transferring the most crucial access points and serving as a shield between the internet and the Company A’s infrastructure. The DMZ is set up behind a gateway. In addition, it blocks all incoming packets. Only a few channels are available to facilitate interaction with the web server. A DMZ is essential for SOX 2 audit and compliance conformance. It is a regulatory assessment that addresses a provider institution’s procedures that pertain to processes and safety in terms of privacy, validity, and uptime. Establishing a DMZ falls under the statutory need to inform on organizational protection measures.
OSI MODEL
The OSI model is an abbreviation for open systems interconnection network model. It is a framework that explains all of the functions of communications technology systems. The physical layer is the first layer. This category includes the Pfsense router, NetGear switches, and the Ubiquiti wi-fi access station. This layer includes the physical and electronic expression of a device. The Data Link layer follows, which joins each base station to send information. A media access control (MAC address) number is issued to each device in the network at layer 2 by the switches. Furthermore, because the switch can function at layer 3, we will be able to establish virtual Local area networks to encapsulate the system.
The network layer comes next. At this level, the Pfsense routers functions. It transfers router files from one node to the next. Each computer is given an IP address, which allows devices to interact with one another. The transport layer comes after the network layer. This layer manages how data is transported between hosts and processes.
When information is transported in this level, it is conveyed in split packets within each transmission sent from the servers or host in the layout. These packets can be transmitted over TCP, which emphasizes efficiency over accuracy, or UDP, which values frequency over quality.
Clients in our system will interact on the Session layer by using programs such as Zoom and Google Meets. This layer decides where the packets are sent and which incoming data correspond to which responses. The presentation tier, layer 6, will condense information from the data layer. When the data is transferred across this layer, the data is decrypted when the receiver receives the information. When people send messages across the network, here is an instance of this. Finally, in the OSI model, the application layer is the last level.
Deletion or retention of network components
In the Company A schematic, we highlighted two key elements that will be dropped from the system and major elements that would be preserved. The Cisco 2811 Router and the Cisco PIX 515E firewall will be decommissioned from the system as their end-of-life dates have elapsed. When the company’s maintenance for these technologies’ ends, the component is no longer supported. This implies that if a defect or weakness has to be resolved, it is up to the consumer to rectify the problem or remove the gadget. In our new network, we will use an app that is still under service and support lifetime and will increase performance.
A Pfsense firewall will supersede the PIX 515E firewall. This is an open-source firewall that is continually updated and is freely accessible to all. It is simple to set up and performs flawlessly in addition to creating a variety of capabilities such as virtual private networks, routing, and firewall capabilities. A NetGear 24 port ethernet switch will substitute the Cisco 2811 router. This is a low-cost switch with different functionalities that will help the infrastructure and outperform the Cisco 2811. To save money during the system reconfiguration, we kept the Windows 10 workstations from Companies A and B. Outside of these 35,000 budgets, subscriptions for these devices are featured.
In addition, the existing server hardware was kept, but a standby backup server and active directory service were introduced. The backup servers were installed to offer a network restoration source in the case of a catastrophe or crisis. Contingency planning is critical for mitigating risks that might impair communication networks.
Proposed Network design
Justification for the above network design
We used secure network design concepts to assure the network’s security when developing the new Company A network. Defense-in-depth was the first premise we implemented. Defense-in-depth is a concept that focuses on limiting an attacker’s progress toward the perimeter. In our infrastructure, an intruder would need to pass through two levels to obtain access to the host machine. Furthermore, when visitors connect to the Wi-Fi network, they do so in a secondary virtual local area network that is segregated from the main system. Strong network security measures need the use of several security mechanisms to make it more difficult to penetrate the barriers and cause a disturbance or steal sensitive information.
In addition, we implemented the philosophy of Least access privilege into the architecture of our system. The concept of least privilege is the notion of only granting a client the level of access necessary to complete the task at hand. If the user’s work duties grow, they will need to seek permission inside the system to get authorization. We created an active directory server to handle user profiles to support this idea. All users will now have basic access permissions that will enable them to conduct their jobs. This reduces the network’s system vulnerabilities. It also simultaneously improves audit preparedness.
The two secure equipment and software elements that will be combined into the solution that will fulfill the combined organization’s information security demands. First, there’s the new Pfsense platform, which combines a firewall and a router into a single machine. Pfsense will assist the requirements of the company because it records all network activity using the snort sniffing capability. It also includes a function called p0f that detects which operating system is attempting to access to the Company A network. It also contains a load balancer, which is excellent for reliability. Finally, it provides VPN capability, allowing Company A users to safely access to the internet.
. We determined that installing Malwarebytes on devices connected would be the best way to safeguard customers and the system from malware and viruses. It guards against cyberattacks and can-do fast scans to identify risks. Furthermore, it works well with Active Directory. It can help safeguard users against drive-by infections and dangerous websites. Phishing is a security issue that might arise as a result of any network installation. The present design does not contain mail setups for filtering spam messages or scammers from the public networks. To address this issue, the team will put in place safeguards that will stop spamming or harmful communications.
Security awareness support will be conducted to account holders so that they are alert of questionable emails. Phishing is a challenging risk to defend against and can be the root cause of system cybersecurity incidents. Training users on this issue will make it more difficult for an intruder to get remote access. Controlling the equipment for the Pfsense firewall and router is a possible technical issue that might pose a risk. Pfsense is an open-source solution that will necessitate the majority of setup and deployment by the staff. In comparison to a Cisco firewall and router. Normally, it is distinct, but the computer systems are merged.
References
Cohen, F. (1999). Managing network security: Simulating network security. Network Security, 1999(4), 6–13. https://doi.org/10.1016/s1353-4858(00)80009-4
Forouzan, B. A. (2007). Network security. McGraw-Hill Higher Education.
Latapy, M., & Willinger, W. (2008). Complex Computer and Communication Networks. Computer Networks, 52(15), 2817–2818. https://doi.org/10.1016/j.comnet.2008.06.001
Pardoe, T. D., & Snyder, G. F. (2005). Network security. Thomson/Delmar Learning.
Peterson, L. L., & Davie, B. S. (2022). Computer Networks: A systems approach. Elsevier.
Evaluations and Change
Evaluations and Change
Student’s Name
Institutional Affiliation
Professor’s Name
Course
Date
Evaluations and Change
Introduction
Decision-making is a critical function in both nonprofit and for-profit organizations. Mulyono et al. (2021) define decision-making as the process of determining the nature of an existing opportunity or problem and choosing the best alternative from the available ones to take advantage of the existing opportunity or solve a problem. Usually, organizations make decisions to achieve the set organizational goals (Mulyono et al., 2021). On the other hand, evaluation is the process of gathering and evaluating data in order to offer valuable feedback on a program or a program activity. Most decision-makers utilize the evaluation process during decision-making. This paper analyzes the importance of using the evaluation process for decision-making. It further assesses the future evaluation challenges that organizations may face. Finally, the paper presents a proposed plan for implementing the change of an evaluator within a workplace.
Importance of Using the Evaluation Process for Decision-Making
Evaluation activities support effective and efficient decision-making in several ways. Firstly, evaluation activities assist in setting priorities during decision-making. Research reveals that decision-makers have difficulty in effectively setting priorities due to a lack of agreement on which values should guide their decisions (Sibbald et al., 2009). Evaluation activities assist decision-makers in identifying the best practices for meeting the intended goal. For instance, if decision-making is intended to solve a particular problem within a workplace, the evaluation process can help compare the potential solutions and identify the most effective solution that will solve the existing problem and bring about the desired change.
Secondly, evaluation activities assist decision-makers in deciding how to allocate resources to best achieve the desired outcome in an organization. Notably, business organizations utilize a variety of resources, such as labor and time, which are expensive and limited in nature. Sometimes, decision-makers are required to distribute the limited resources among different projects or activities (Mueller et al., 2018). In such cases, these decision-makers must make the best decision on the best ways of allocating their limited resources in a manner that maximizes benefits to the companies. The evaluation process assists in ensuring that the right amount of resources is allocated to the right projects. The evaluation process may identify the projects that require more resources than the other depending on the expected contribution of these projects. Resources are then allocated based on the evaluation results.
Furthermore, using the evaluation process for decision-making promotes shared learning among decision-makers. After making critical decisions, decision-makers evaluate the effectiveness of their decisions by assessing the components of an initiative that worked and those which did not work. This helps the decision-makers to learn about where they did not and the mistake they made while making their decisions. Therefore, they sit down as a team and learn other ways of completing the failed components of an initiative. This allows them to learn from their past mistakes and from each other and improves their decision-making skills.
Future Evaluation Challenges that Organizations Might Face
One future challenge organizations might face as they relate to evaluation is ensuring that their organizational culture supports evaluation. Supporting the fact that the right organizational culture supports evaluation, research conducted by Morariu et al. (2016) found that having the correct culture is vital to the success of the evaluation process. 77% of organizations cited leadership support and a pro-evaluation culture as the two most important elements in the success of their evaluations (Morariu et al., 2016). Due to globalization, the workforce in organizations is becoming more diverse with people from different cultures and is expected to become more diverse in the future. This may challenge the evaluation process since evaluation is not a one-person activity, but rather it is about having a group of people who are committed to continuous improvement and have a growth attitude. Diversity in the workplace will make it difficult to set an organizational culture to support evaluation. Also, in an organization where there is no right culture, the evaluation process may seem like a means of criticizing and pointing out shortcomings in the organization. Therefore, as organizations struggle to set organizational culture due to diversity in the workplace, this will negatively affect the evaluation process.
Lack of technical expertise is another evaluation challenges that organizations may face in the future. Research reveals that many organizations have difficulty doing evaluations because they lack the necessary staff knowledge, skills, and/or resources required for evaluations (Morariu et al., 2016). The authors further add that the availability of sufficient access to skills and knowledge contributes to successful evaluation processes. However, organizations are already experiencing a lack of technical experts, with only 8% of nonprofit organizations having staff who exclusively perform evaluations (Morariu et al., 2016). This implies that there is already a lack of access to evaluation specialists. It is also anticipated that organizations will have a smaller pool of core full-time workers for a specific function in the future (Bresnahan & Yin, 2017). Thus, it can be logically inferred that evaluation specialists who will be exclusively performing evaluations will be a challenge in the future.
Another future evaluation challenge that an organization may face is difficulty in identifying which areas to focus on. Currently, there is a plethora of data and information about organizations’ projects and their outcomes that an organization may choose to gather. It is expected that such data will continue to increase. With the rich data available, it can be quite challenging to figure out how best to spend an organization’s time and money to get the best outcome. Evaluations may often feel overwhelming, especially when there is no clear understanding of why an evaluation is being conducted or what an organization expects to achieve. Unless such things are clear, an organization may spend a lot of time gathering data without learning anything. Therefore, one of the best ways to support an evaluation in the workplace is by first understanding why there is a need for an evaluation and what is expected to be learned from the entire evaluation process. Then, an organization can focus its resources on fewer areas which can contribute significantly to achieving the organizational set goals.
Plan for Implementing the Change of an Evaluator in a Workplace
Often organizations are faced with the need to change an evaluator. Implementing the changes of an evaluator in the workplace depicts a shift from the current way of undertaking the daily business to the new strategies. It entails inducing the employee strategies that consist of using contemporary technology and software. Notably, implementing the changes requires a change in management that enables the employees to prepare for the transition within the organization by applying the new strategies and resources. As such, there is a need to develop a plan to implement the evaluator changes in the workplace. Therefore, the plans describe the comprehensive implementation of strategies that defines the evaluator in the workplace through a step-by-step model.
The plan for the evaluator begins at the top level of the company and the gradual inclusion of the employees at different levels in the change management process. Starting at the top also entails initiating the changes using the C-suite and VPs to ensure the alignment of all the supervised staff (Ballaro et al., 2020). After beginning at the top level, incorporate the existing company culture to ensure that the functional details like decision making and source findings are implemented. Consequently, involving all roles entails a strategic plan which enables the team members to fully vest into participation and have input in the change management strategy. Moreover, the organization should use emotive and rational approaches that enhance the workforce’s motivation by appealing to their emotion.
Most importantly, focusing on the vital behaviour critical to the change initiation as the practical planning step enables the organization to set the productivity objectives by focusing on the essential staff actions. The evaluator should communicate effectively to ensure the planned underway reaches the entire staff at the appropriate time (Ballaro et al., 2020). Further planning includes engagement of the brand ambassadors, creation of the formal and informal solutions, and the evaluation of the accommodated changes to align with the mission of the company’s changing dynamics.
Overall, implementing the change of an evaluator plays a critical role in the organization by enabling the employees to adjust to the new management strategies. As such, it requires planning that ensures the profitability of the workforce within the organization. The plans entail beginning evaluation at the top level, incorporating the beneficial existing company culture, involvement of all roles, focusing on the key behaviors and initiating effective communication. Furthermore, gearing the brand ambassadors, creating the formal and informal solutions and evaluating the accommodated changes enhance the effective evaluation process in the workplace.
References
Ballaro, J. M., Mazzi, M. A., & Holland, K. (2020). Organization development through effective communication, implementation, and change process. Organization Development Journal, 38(1). https://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=08896402&AN=143070660&h=IRwwiEHkN9TEgArJlz1bh1hHn7lfQVJJLTCB4UCvCEP7Lb6qV2cXfWl%2FCn6F0phXwURY9ep155uzOVlIk7oQ0Q%3D%3D&crl=cBresnahan, T., & Yin, P. L. (2017). Adoption of new information and communications technologies in the workplace today. Innovation policy and the economy, 17(1), 95-124. http://dx.doi.org/10.2139/ssrn.2701092.
Morariu, J., Athanasiades, K., & Emery, A. (2016). State of evaluation 2016: Evaluation practice and capacity in the nonprofit sector. Washington, DC: Innovation Network.
Mueller, J., Melwani, S., Loewenstein, J., & Deal, J. J. (2018). Reframing the decision-makers’ dilemma: Towards a social context model of creative idea recognition. Academy of Management Journal, 61(1), 94-110. https://doi.org/10.5465/amj.2013.0887Mulyono, H., Purba, N., Hadian, A., Syamsuri, A. R., & Hasibuan, M. Z. (2021, March). Decision-Making Culture in Organizations. In First International Conference on Science, Technology, Engineering and Industrial Revolution (ICSTEIR 2020) (pp. 227-231). Atlantis Press.
Sibbald, S. L., Singer, P. A., Upshur, R., & Martin, D. K. (2009). Priority setting: what constitutes success? A conceptual framework for successful priority setting. BMC health services research, 9(1), 1-12. https://doi.org/10.1186/1472-6963-9-43
