List and describe three (3) of the safety assurance programs that you learned about in this module. Which of these do you think is most effective? Why?

List and describe three (3) of the safety assurance programs that you learned about in this module.  Which of these do you think is most effective?  Why?

  • Safety assurance– all planned and systematic actions necessary to afford adequate confidence that a product, a service, an organisation or a functional system achieves acceptable or tolerable safety. (Commission Regulation (EC) No 2096/2005);

Safety assurance – SMS process management functions that systematically provide confidence that organisational products/services meet or exceed safety requirements. (FAA AC No: 120-92).

Description

Safety assurance activities are at the core of the safety management system (SMS) that aviation service providers (including aircraft operators) shall implement in order to meet ICAO SARPS and regulatory requirements. Safety assurance includes organisational arrangements and systematic processes for continuous surveillance and recording of the organisation’s safety performance, as well as evaluation of the safety management processes and practices. Safety assurance is the means to demonstrate that organisational arrangements and processes for safety achievement are properly applied and continue to achieve their intended objectives.

Safety Assurance should be intrusive and enquiring and not simply an administrative “box ticking” exercise.

SMS Safety Assurance Components identified by ICAO

According to the ICAO Doc 9859 – Safety Management Manual, safety assurance includes the following activities:

  • Safety performance monitoring and measurement– aircraft operators/service providers shall develop and maintain the means to verify that the safety performance of the organisation complies with the safety policy and objectives, and to validate the effectiveness of safety risk management. This is achieved by monitoring and measuring the outcomes of activities that operational personnel must engage in for the delivery of services by the organisation.
  • Management of change– the aviation service provider organisation shall develop and maintain a formal process to identify and manage the changes within the organisation which may affect established processes, procedures, products and services. The management of change should ensure that required safety performance is achieved by reducing or eliminating the safety risks resulting from the changes in the organisation, the provision of services or in the operational environment.
  • Continuous improvement of the SMS– the aviation service provider organisation shall develop and maintain a formal process to identify the causes of sub-standard performance of the SMS, determine the implications of sub-standard performance in operations, and eliminate such causes.
  • Summary: VDRPs

Under Title 49 of the United States Code (49 U.S.C.) 40123, certain voluntarily provided safety and security information is protected from disclosure in order to encourage persons to provide the information to the Federal Aviation Administration (FAA).

Qualified Participants

Regulated entities as provided in Advisory Circular (AC) 00-58B, as amended, or, for hazardous materials, in accordance with AC 121-37, as amended.

Voluntarily Provided Information Protected from Disclosure Under This Designation

The content of all submissions by a regulated entity that are accepted under the VDRP, including, but not limited to, all of the following items:

(1) Information contained in an initial notification to the FAA:

(a) A brief description of the apparent violation, including an estimate of the duration of time that it remained undetected, as well as how and when it was discovered;

(b) Verification that noncompliance ceased after it was identified;

(c) A brief description of the immediate action taken after the apparent violation was identified, the immediate action taken to terminate the conduct that resulted in the apparent violation, and the person responsible for taking the immediate action;

(d) Verification that an evaluation is underway to determine if there are any systemic problems;

(e) Identification of the person responsible for preparing the comprehensive fix; and

(f) Acknowledgment that a detailed written report will be provided to the designated FAA official within 10 working days.

(2) Information contained in a detailed written report:

(a) A list of the specific FAA regulations that may have been violated;

(b) A description of the apparent violation, including the duration of time it remained undetected, as well as how and when it was detected;

(c) A description of the immediate action taken to terminate the conduct that resulted in the apparent violation, including when it was taken, and who was responsible for taking the action;

(d) An explanation that shows the apparent violation was inadvertent;

(e) Evidence that demonstrates the seriousness of the apparent violation and the regulated entity’s analysis of that evidence;

(f) A detailed description of the proposed comprehensive fix, outlining the planned corrective steps, the responsibilities for implementing those corrective steps, and a time schedule for completion of the fix; and

(g) Identification of the company official responsible for monitoring the implementation and completion of the comprehensive fix.

(3) FAA generated documentation and electronic information that is directly associated with an accepted VDRP submission, including, but not limited to:

(a) Acknowledgement of receipt of a VDRP submission.

(b) Notification of VDRP acceptance, request for modification, or rejection.

(c) Routine correspondence directly associated with a VDRP submission.

(d) FAA records directly associated with FAA monitoring of a comprehensive fix.

(e) FAA Letter of Correction for an accepted VDRP submission.

(f) A FAA electronic database of VDRP submissions and FAA responses.

The FAA finds that withholding VDRP information provided to the FAA is consistent with the FAA’s safety responsibilities. The VDRP specifically provides that appropriate corrective action must be taken by the regulated entity for all instances of regulatory noncompliance accepted under the program. To be accepted by the FAA, apparent violations disclosed under the program must be inadvertent, and, where applicable, must not indicate a lack, or reasonable question of a lack, of qualification of the regulated entity. Corrective action under the VDRP can be accomplished by the regulated entity and verified by the FAA without disclosure of the protected information. If the FAA determines that the steps taken by the entity are not those documented in the written report, the submission may be excluded from the VDRP, and appropriate legal enforcement action may be initiated.

Important:

The FAA will release information submitted under a VDRP as specified in part 193 and this order. To explain the need for changes in FAA policies, procedures, and regulations, the FAA may disclose de-identified (i.e., the identity of the source of the information and the names of the certificate holder, employees, and other persons, as well as any other information that could be used to ascertain the identity of the submitter, redacted) summary information that has been extracted from submissions accepted under the VDRP.

The FAA may disclose de-identified, summarized VDRP information that identifies a systemic problem in the aviation system, when other persons need to be advised of the problem so that they can take correctiveaction. The FAA may disclose de-identified aggregate statistical information concerning VDRP submissions.

The FAA may disclose independently obtained information relating to any event disclosed in a VDRP report, unless the FAA determines that in the case of an accepted VDRP submission, release of such independently obtained information would be inconsistent with the provisions of this order, or would otherwise be prohibited by public law or regulation.

The FAA also may disclose information concerning enforcement action taken for a regulatory violation initially identified in a VDRP submission, when that submission is not accepted by the FAA, or if accepted, it is later excluded by the FAA, because of the regulated entity’s failure to comply with the criteria of the VDRP.

  • Summary: FOQA

Description

The aviation community is under constant pressure to achieve safety improvement. Operational Flight Data Monitoring (OFDM) offers an efficient solution to this challenge. OFDM is to some extent aquality assurance process but also has a vital Safety Management dimension. It involves the downloading and analysis of aircraft flight recorder data on a regular and routine basis. It is widely used by aircraft operators throughout the world to inform and facilitate corrective actions in a range of operational areas by offering the ability to track and evaluate flight operations trends, identify risk precursors, and take the appropriate remedial action. The potential of OFDM programmes has been materially enhanced by the rapid expansion in the number of data parameters which can be captured using digital recorders now routinely carried on aircraft.

Despite having an enviable safety record, the aviation industry is under constant pressure to drive down accident rates. Air accidents are headline news – from purely a commercial perspective, accidents damage consumer confidence and inhibit the growth of the industry. As an integral part of an airline’s Safety Management System (SMS), analysis of flight data allows safety managers to identify trends and fully investigate the circumstances behind minor incidents so that operational procedures and training can be improved, along with raising awareness of safety issues within the company.

Data from an aircraft is first analysed to identify any exceedances – that is to say any events where the flight manual limitations or guidelines were breached. This is a specialist task undertaken by flight data analysts using sophisticated software tools. Once an event has been identified, an engineer will review the data to confirm its validity, after which the flight safety officer further investigates the circumstances behind the event. Depending on the arrangements within the company, the pilot in command/flying the aircraft at the time of the event will be consulted by the flight safety officer or a union representative. This may result in a formal Air Safety Report (ASR) being raised, or simply an enhancement of the FDM event report. Either way, the involvement of the pilot greatly improves the value of the report.

A just or “no blame” reporting culture is essential if a complete picture of the causal factors behind an event is to be identified. Where the national legal system is such that pilots may be liable to prosecution if events are investigated openly, or the company safety culture is immature, then the anonymity of the crew can be ensured by “de-identifying” the data and through the close involvement of pilot unions or associations in the FDM process. The reluctance of pilots within an airline to contribute to the FDM process is not an indication of any lack of professionalism on their part, but an indication of fear of punishment. Resolution of this fear lies in the hands of the leadership of the company. It is important to realise that the vast majority of accidents within an organisation are the result of a combination of systemic or organisational failures and not the fault of an individual.

Each individual event needs to be investigated and appropriate management decisions made by the airline. Event data may also be pooled with other airlines so wider and longer-term trends can be identified and corrective action taken. Importantly, analysts can also analyse the collected data from normal operations to identify trends before there is a significant event or incident. Both approaches to analysis work together to give the safety officer a greater insight into what is happening within the company. Clearly, the more detailed and imaginative the analysis, the greater the value of the Flight Data Monitoring programme to the company, but equally the greater the resources required for the task.

ICAO Standards and Recommended Practices

In 2008 Annex 6, to the Chicago Convention was amended in order to introduce a number of requirments and recommendations related to the implementation of safety management and safety management systems by operators of commercial air transport aircraft and helicopters. The following paragraphs pertain to the implementation of OFDM:

Annex 6, Part I – International Commercial Air Transport – Aeroplanes

3.3.5 An operator of an aeroplane of a maximum certificated take-off mass in excess of 27 000 kg shall establish and maintain a flight data analysis programme as part of its safety management system.

Note.- An operator may contract the operation of a flight data analysis programme to another party while retaining overall responsibility for the maintenance of such a programme.

3.3.6 A flight data analysis programme shall be non-punitive and contain adequate safeguards to protect the source(s) of the data.

Note 1.- Guidance on flight data analysis programmes is contained in the Safety Management Manual (SMM) (Doc 9859).

Note 2.- Legal guidance for the protection of information from safety data collection and processing systems is contained in Annex 13 , Attachment E.

Annex 6, Part III – International Operations – Helicopters

1.3.5 ‘Recommendation’ – An operator of a helicopter of a certified take-off mass in excess of 7 000 kg or having a passenger seating configuration of more than 9 and fitted with a flight data recorder should establish and maintain a flight data analysis programme as part of its safety management system.

Note.- An operator may contract the operation of a flight data analysis programme to another party while retaining overall responsibility for the maintenance of such a programme.

1.3.6 A flight data analysis programme shall be non-punitive and contain adequate safeguards to protect the source(s) of the data.

Note 1.- Guidance on flight data analysis programmes is contained in the Safety Management Manual (SMM) (Doc 9858).

Note 2.- Legal guidance for the protection of information from safety data collection and processing systems is contained in Annex 13 , Attachment E.

Benefits

FDM strongly contributes to increased flight safety and operational efficiency by:

  • Providing data to help in the prevention of incidents and accidents. Fewer flight accidents not only reduce material losses and insurance costs, but also keep passengers’ confidence high.
  • Improved operational insight: providing the means to identify potential risks and to modify pilot training programs accordingly.
  • Improved fuel consumption: FDM provides the ability to identify and make adjustments to company opertating procedures or specific aircraft with unusually high fuel burn rates.
  • Reduction in unnecessary maintenance and repairs: FDM data can be used to help reduce the need for unscheduled maintenance, resulting in lower maintenance costs and increased aircraft availability.
  • Improved ground conditions and airports: in certain cases, airlines can use the data captured from their FDM program to support requested changes to air traffic control and airport procedures.
  • Reduced number of ACARSmessages: non-critical data (e.g. take-off reports, stable cruise reports) that are sent via ACARS messages, can be acquired, recorded and transmitted via flight data monitoring equipment
  • Reduced reliance on flight data recorders: flight-monitoring data can be transmitted automatically over the Internet and be analyzed without delay.
  • Adherence to noise restrictions: flight data monitoring helps airlines demonstrate adherence to noise restrictions in terms of being able to verify or deny actually infringement, and avoid incurring fines.
  • Improved monitoring of flight crew’s cosmic radiationexposure: flight data monitoring can assist in tracking radiation exposure
  • Flight Data Monitoring (FDM) programmes provide powerful tool for the proactive hazard identification.
  • Summary: LOSA

Description

Line Operations Safety Audit (LOSA) is seen as an important way to help develop countermeasures to operational errors. It involves a structured programme of observation of front line activities built around the Threat and Error Management (TEM) concept. It aims to identify threats to operational safety, identify and minimise the risks which are the origin of such threats and implement measures to manage the human error aspects of the residual risk. LOSA provides a way to assess the level of organisational resilience to systemic threats in accordance with the principles of a data-driven approach.

LOSA uses trained observers to collect data about pilot behaviour and its situational context on “normal” flights from supernumerary seats on the flight deck. Such monitoring allows the capture of data which can characterise pilot strategies for managing “threats, errors and undesirable states”. The audits are conducted under strict no-jeopardy conditions; therefore, flight crews are not held accountable for their actions and errors that are observed. During flights that are being audited, observers record and code:

  • potential threats to safety;
  • how the threats are addressed;
  • the errors such threats generate;
  • how flight crews manage these errors;
  • specific behaviours that have been known to be associated with accidents and incidents.

The LOSA method is seen as closely linked with Crew Resource Management (CRM) training. A particular strength of LOSA is perceived as the way it identifies examples of “superior” pilot performance that can be provide models for use in training.

Background

The initial research and project definition was a joint endeavour between The University of Texas at Austin and Continental Airlines, with funding provided by the Federal Aviation Administration (FAA). In 1999, ICAO endorsed LOSA as the primary tool to develop countermeasures to human error in aviation operations and made LOSA the central focus of its Flight Safety and Human Factors Programme for the period 2000 to 2004. The number of operators joining LOSA grew in the period following March 2001 to include some major international operators from different parts of the world and diverse cultures but a reliable picture of the extent of continued use is not known.

Role of ICAO

ICAO has promoted the potential of LOSA and acted as an enabling partner in the LOSA programme. ICAO has developed a manual (Doc 9803) that provides an introduction to the concept, methodology and tools of LOSA and to the potential remedial actions which can be undertaken using the data collected.

  • Summary: ASAP

What is ASAP?

The purpose of an Aviation Safety Action Program (ASAP) is to identify and reduce flight safety concerns, minimize deviations from Federal Aviation Regulations and to implement corrective measures that manage risks as part of the organization’s Safety Management System.

Pilot ASAP provides the airline’s pilots with a voluntary, cooperative, non-punitive environment for the candid reporting of safety concerns.

For those reports qualified for inclusion in the program which involve substantiated but inadvertent violations or ATC deviations, the FAA will use Administrative Action or Informal Action in lieu of certificate action.

  • Informal Action is verbal/phone or written discussion of the event with an ERC or Fleet representative.
  • Administrative Action is a letter from the FAA that is held by the FAA for either 30 days or 2 years (depending on severity), then expunged from the pilot’s record.
  • No letter is put into the pilot’s permanent records at the airline.
  • Administrative Action is not considered a violation.

A Pilot ASAP report itself will not be used to initiate or support any company disciplinary action, except when the report is excluded from ASAP.

Each pilot must submit a separate, individual ASAP report for the same incident in order to be covered under Pilot ASAP for any unintentional regulatory violations resulting from an incident. The reporting pilot should describe the event in as much detail as possible to facilitate the ERC’s clear understanding of all contributing factors.

What type of events can be submitted to ASAP?

Pilot ASAP reports may be submitted for the following:

  • Inadvertent violation or potential violation of FAA Regulations.
  • Both pilots must report individually.
  • Inadvertent deviation or potential deviation from airline Operating Procedures and/or Policies.
  • Any event listed in company manuals for which a report is required.
  • General flight safety concerns.

Accepted vs. Excluded Reports

ASAP Reports will be accepted into the program upon timely submission with the following exceptions:

  • Only events involving the following will be excluded by the Pilot ASAP Event Review Committee (ERC) and will not receive the protective provisions or the enforcement related incentives of the program:
    • Criminal activity
    • Substance abuse
    • Controlled substances
    • Alcohol
    • Intentional falsification
    • Intentional disregard for safety

NOTE: Reports of events which involve criminal activity, substance abuse, alcohol, controlled substances or intentional falsification will be forwarded to the FAA, law enforcement and/or the company for enforcement or disciplinary action.

Medical IssuesPilot ASAP is not intended to address medical certification or qualification reports. If a Pilot ASAP report is submitted that raises a medical certification or qualification issue, the FAA ERC member will refer the matter to, and follow the directions of, the FAA Regional Flight Surgeon.Events involving crew medical or incapacitation issues while on duty should be immediately reported to the airline’s Duty Pilot and followed up by submission of an Air Safety Report (ASR).ASAP vs. ASR and ASRSASAP reports and Air Safety Reports (ASR) utilize the same electronic form for submission. Both reports go to the airline’s Flight Safety department. The difference is that ASAP reports are strictly voluntary. They are routed to the ASAP Program Manager and have all identifying information (names, date, flight number) removed prior to Event Review Committee (ERC) review of the event.Both ASAP reports and the ASR meet the reporting requirement contained in company operational manuals. Pilots are thus strongly encouraged to utilize the voluntary ASAP report for both required and non-required company reports, any suspected deviation from either company procedures or FAA regulations as well as for any general flight or ground safety concerns.To encourage participation and gain insight into safety events that may have previously gone unreported, all included ASAP reports carry with them an FAA enforcement related incentive as well as a company disciplinary protection incentive.The NASA ASRS voluntary safety reporting system is independent of ASAP and carries its own, independent, and less comprehensive FAA enforcement related incentives. It is not associated with any airline and therefore does not carry with it a company disciplinary protection incentive.

What factors did the researchers investigate to determine an association with the outcome listed above? There may be more than one.

Now that you’ve had the experience of designing a research study, you will have the opportunity to review and report on study designs developed by others.

To prepare for this Application Assignment:

  • Select two of the study abstracts provided below:
  •  Cohort Studies ·         Rollison,D., Page, W., Crawford, H., Gridley, G., Wacholder, S., Martin, J., Miller, R., & Engles, E. (2004). Case-control study of cancer among US Army veterans exposed to simian virus 40-contaminated adenovirus vaccine. American Journal of Epidemiology. 160(4), 317–324. Retrieved from: http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=743158741&Fmt=2&clientId=70192&RQT=309&VName=PQD  ·         Chronic fatigue syndrome; Investigators at Emory University publish new data on chronic fatigue syndrome. (2009, February). Virus Weekly,42. Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?index=1&did=1638100591&SrchMode=1&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1259947230&clientId=70192&cfc=1Cross Sectional Studies  ·         Sun, C., Yuan, J., Koh, W., Lee, H., & Yu, M.. (2007). Green tea and black tea consumption in relation to colorectal cancer risk: the Singapore Chinese health study. Carcinogenesis, 28(10), 2143–8.  Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1362826161&Fmt=2&clientId=70192&RQT=309&VName=PQD  Ecologic Studies ·        Volpp, K., Troxel, A., Pauly, M., Glick, H., Puig, A., Asch, D., Galvin, R., Zhu, J., Wan, F., Deguzman, J., Corbett, E., Weiner, J., & Audrain-mcgovern, J. (2009). A randomized, controlled trial of financial incentives for smoking cessation. The New England Journal of Medicine. 360(7), 699–709.  Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?index=0&did=1644906961&SrchMode=1&sid=1&Fmt=4&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1259947402&clientId=70192 ·         Smoking; Study results from Brown University update understanding of smoking. (2009, September). Drug Week, 996. Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1855711131&sid=13&Fmt=3&clientId=70192&RQT=309&VName=PQD
  • ·         Vainionpää, A., Korpelainen, R., Väänänen, H., Haapalahti, J., Jämsä, T., & Leppäluoto, J. (2009). Effect of impact exercise on bone metabolism. Osteoporosis International, 20(10), 1725–1733. Retrieved from:  http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1853287521&sid=15&Fmt=6&clientId=70192&RQT=309&VName=PQD
  • Randomized Controlled Trials
  • ·         Steven H Lamm, & Michael B Kruse. (2005). Arsenic ingestion and bladder cancer mortality – What do the dose-response relationships suggest about mechanism? Human and Ecological Risk Assessment. 11(2), 433–450.  Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=842567361&sid=12&Fmt=4&clientId=70192&RQT=309&VName=PQD
  • Prospective Cohort Study
  • ·         Wiltshire, J., Person, S., Kiefe, C., & Allison, J. (2009). Disentangling the influence of socioeconomic status on differences between African American and white women in unmet medical needs. American Journal of Public Health, 99(9), 1659–65.  Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1836951311&sid=5&Fmt=3&clientId=70192&RQT=309&VName=PQD
  • ·         Imai, K., & Nakachi, K. (1995). Cross sectional study of effects of drinking green tea on cardiovascular and liver diseases. BMJ. 310, 693–696. Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=4493472&sid=4&Fmt=3&clientId=70192&RQT=309&VName=PQD
  • ·         Heim, C., Nater, U., Maloney, E., Boneva, R., Jones, J., & Reeves, W. (2009). Childhood trauma and risk for chronic fatigue syndrome association with neuroendocrine dysfunction.Archives of General Psychiatry. 66(1), 72–80.  Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?index=1&did=1638100591&SrchMode=1&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1259947230&clientId=70192
  • Case Control Studies
  • ·         King, M., Fountain, C., Dakhlallah, D., & Bearman, P. (2009). Estimated autism risk and older reproductive age. American Journal of Public Health. 99(9), 1673–9. Retrieved from:http://proquest.umi.com.ezp.waldenulibrary.org/pqdweb?did=1836951331&sid=1&Fmt=3&clientId=70192&RQT=309&VName=PQD

To complete the Application Assignment, analyze the articles from different perspectives. With the two articles in mind, use the attached Epidemiologic Study Worksheet to answer the following questions. The final worksheet should be 2–3 pages in length.

  • What did the researchers want the study to determine?
  • What health condition(s) did the researchers study?
  • What factors did the researchers investigate to determine an association with the outcome listed above? There may be more than one.
  • Who did the researchers study? How many?
  • What type of epidemiological study design (observational or experimental) does the study describe? Why?
  • What type(s) or method(s) were used to collect the data for the study?
  • What were the results of the study? What were the conclusions of the researchers?

Note: Following each abstract, you will find a link to the full article in the Walden Library. If you are interested in exploring the entire article, follow the link to the full article. It is not required to read the entire article, but doing so may deepen your understanding of epidemiological studies. 

Be sure to support your work with specific citations from this week’s Learning Resources and additional scholarly sources as appropriate. Refer to the Pocket Guide to APA Style to ensure that your in-text citations and reference list are correct.

What examples of bias and deception have you seen in sources related your group’s social issue? Why is it important to identify bias and deception in sources related to your group’s issue?

Is your topic economically or politically charged? If so, there may be a group or groups that oppose efforts to address the social issue you have chosen for the Group Project. To gain support for the opposing views, these groups may create resources that have a particular slant or bias to their side of the issue, or they may create resources that are outright untrue. For this Journal Assignment, consider how you determine whether a resource is credible and how awareness of divisive views is important for addressing a social issue.

To prepare for this Assignment:

  • Review the explanation of Walden University’s DEEP-C Model General Education Learning Outcome “Evaluation” in the Syllabus.
  • Consider the resources you and your group members chose for your Topic Exploration and Analysis.
    • What types of sources are the most credible? Why?
    • What sources can be less reliable or less credible? What makes them less reliable and less credible than other sources?
    • What examples of bias and deception have you seen in sources related your group’s social issue? Why is it important to identify bias and deception in sources related to your group’s issue?

The Assignment:

Writea 2- to 3- paragraph journal entry in which you evaluate the credibility of information sources in general and specifically for the social issue your group has selected for the Group Project. the social issue our group chose is workforce violence, and the 2 documents attached are the work we have done on the topic so far.

General Education Learning Outcomes (The DEEP-C Model)

  • Discovery:  Students will locate and identify appropriate sources of information using multiple sources and methods, including bibliographic, textual, experiential, and experimental research.
  • Evaluation:  Students will critically assess texts and arguments in multiple forms and contexts using quantitative and qualitative logic, the scientific method, ethics, and pragmatics.
  • Expression:  Students will effectively and ethically communicate information and opinions verbally and nonverbally using written, oral, behavioral, and visual methods adapted for diverse audiences and purposes.
  • Perspective: Students will be able to articulate the consistency and flexibility of knowledge as it is experienced across time, space, and culture.
  • Change:  Students will articulate how their ability to discover, evaluate, and express ideas from different perspectives is instrumental in their progress toward achieving personal goals and effecting positive social change. 
    1. Group Project Week 4: Literature Review  Group Project Week 4: Literature ReviewWorkplace violence is usually perpetrated by disgruntled employees, customers, or a domestic violence/stalking relationship that surfaces at a workplace. Stressful situations are a precursor to workplace violence.  At different times in an individual’s life, they have been exposed to a stressful situation.  The outcome to the situation will often be unique to the individual.Sometimes, when people get upset they walk away; other times they encounter situations that force them to confront the unwarranted event.   The behaviours displayed by the aggressor are intended to sway personal choice.  People that create violent situations feel they are in control of a situation or a person (Rizzo & Philpott, 2012).Workplace issues require tact when issues arise. If disruptive behaviour persists, management is consulted to obtain resolution. It is not uncommon for aggressive behaviour to proceed into physical violence in the workplace (Dillona, 2012). When employees are not satisfied with the outcome of the reported issue, they take matters into their hands.Often disgruntled employees will produce an undesirable workplace atmosphere.  The individuals reach a breaking point, and they act upon it (Rizzo & Philpott, 2012). Education and training to prevent, identify and de-escalate violent episodes is the responsibility of the employer.Workplace violence exists for many different reasons and has become an acceptable norm in various organizations. Social media have provided an outlet to showcase highly publicized violent episodes that occur on a daily basis.  The negative occurrences are insignificant to many, only eliciting response when directly affecting the individual.It is the responsibility of the employee to provide a safe environment, and this is not occurring in many organizations.  Research points out a 70 percent failure rate for employees to provide necessary programs and policies to assist with managing problems in the workplace (Dillona, 2012). It is not necessary for individuals to sustain bodily harm while at work. Employers are accountable for employee injuries particularly if undergone workplace violence training.It is essential for employees to attend anger management sessions to assist with undesirable behaviour issues. When behavioural issues are unresolved, the negative outcome from altercation cause medical and litigation costs (Dillona, 2012). The climbing cost for injured employees requires immediate attention as the problem infiltrating various organizations.It may be necessary for employers to complete background checks for individuals that continue to display violent behaviour after attending educational sessions.  Employers are responsible for both internal and external safety issues for ensuring employees are safe while at work.  Proper lighting and security are essential for maintaining a safe work environment.With proper training for managing and deescalating violent occurrences, employees will feel safe while engaging with others at work.  We are all human and become angry when managing stressful situations. With the right tools and education, overcoming workplace violence situations will be simplified.   ReferencesDillona, B. L. (2012). Workplace violence: Impact, causes, and prevention. Work,42 (1), 15-20.Retrieved from Walden Library databaseshttp://web.a.ebscohost.com.ezp.waldenulibrary.org/ehost/pdfviewerRizzo, R., & Philpott, D. (2010). STEP 1: UNDERSTANDING THE VIOLENCE CYCLE. In      Workplace Violence:  A Seven-Step Process to Address & Manage Potentially Violent      Situations in the Workplace (pp. 17-39). Government Training IncWorkplace Violence Workplace violence has become a prominent issue in today’s society. According to the Occupational Safety and Health Administration, workplace violence is any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site. It ranges from threats and verbal abuse to physical assaults and even homicide. It can affect and involve employees, clients, customers and visitors. The categories utilized to describe workplace violence may be necessary to compile data for statistical purposes. It is, however necessary to explore the core issues that surround workplace violence.  The causes of violence in the workplace are intertwined and very complex as they are from different natures like economic, social, and psychological. Workplace violence can be defined in different categories such as criminal intent, customer/client, worker on worker, and personal relationship.Studies have presented questions that aim at resolving the issue of workplace violence.  After studies were conducted it was determined that workplace violence was a struggle for power.  In addition, it was determined that there was conflict of values between the parties: such as differences in leadership styles, work expectations, etc. individuals who perceived themselves as competent specially targeted the vulnerable and sensitive persons to engage in this power struggles.Strandmark’s article proposes that “the educational system reinforces the belief that the dominant group is superior”. Overtime this causes the oppressed group to feel that they are inferior, as a result a state of psychiatric alienation occurs that internalizes the oppression in the individuals. In this context, horizontal violence directed towards others in one’s group is a form of adaptive behavior, an attempt to gain control over one’s sense of psychic alienation and powerlessness.Social isolation is addressed in the article International perspectives on workplace bullying among nurses: a review. Workplace violence is manifested passively through acts such as withholding information, not returning phone calls and emails and ignoring a person. The bullied individual might be subjected to an unreasonable workload, unrealistic deadlines and excessive monitoring of their work.In the USA “prevalence has been reported in the range of 10–38%, and a majority of the bullies are managers or supervisors.” Leadership styles such as highly authoritarian, are believed to create an environment in which bullying occurs more frequently. Therefore management can also be the direct causes of bullying. Some managers even use bullying tactics as their way to get their workers to work harder. In this case, the managers are using organizational rules and policies in an abusive manner.FBI takes the idea a step further and warns for increased caution and responsibility, as workplace violence is most often, overlooked: “Workplace violence is now recognized as a specific category of violent crime that calls for distinct responses from employers, law enforcement, and the community. This recognition is relatively recent.According to Karen J. Mathis, a Colorado lawyer specialized in workplace violence, in the United States, the financial damages suffered by organizations, due to this issue, account for $4.2 and $22 billion per year.There should be a no tolerance to violence policy in the business. Laws must be reviewed to protect the employee. There should an open line of communication with the employer and the employees. Continued exposure to bullying will cause: lower self-esteem, depression, anxiety, post-   traumatic stress disorder and financial problems and may even go as far as inability to work.ReferencesBruce, M. D., & Nowlin, W. A. (2011). Workplace Violence: Awareness, Prevention, and            Response. Public Personnel Management, 40(4), 293-308 (Retrieved from Walden Library).Grimes, D. (2003) How to Reduce the Potential of Workplace Violence. policechiefmagazine.org. Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=90&issue_id=092003(n.a.). (2004). Guidelines for Preventing Workplace Violence for Health Care & Social Service Workers. Occupational Safety and Health Administration. Osha.gov. Retrieved from https://www.osha.gov/Publications/osha3148.pdfJohnson.S, L. (2009). International perspectives on workplace bullying among nurses: A review. International Nursing Review, 56, 34-40. Retrieved October 30, 2014, from http://onlinelibrary.wiley.com/doi/10.1111/j.1466-7657.2008.00679.x/pdfMathis, K. J. (n.d.). Americanbar.org. Retrieved from https://www.americanbar.org/newsletter/publications/gp_solo_magazine_home/gp_solo_magazine_index/w96viol.htmlMorris, J. B. (n.d.). Violence in the Workplace: A Growing Problem in America. Employeescreen.com. Retrieved from http://www.employeescreen.com/WorkplaceViolence.pdfStrandmark, M., & Hallberg, L. (2007). The origin of workplace bullying: Experiences from theperspective of bully victims in the public service sector. Journal of Nursing Management, 15, 332-
    1. Retrieved October 30, 2014, from http://www.readcube.com/articles/10.1111/j.1365-2834.2007.00662.x?r3_referer=wol&show_checkout=1

Develop a coherently structured paper with an introduction, body, and conclusion.

Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Assignment 2.2: The Public Needs to Know – Revised Version

worth 250 points

Revise your paper on your selected scenario.

  1. Your boss has asked you (a communication specialist) to write an informative paper about the  free clinic that will be opening in your local neighborhood for those without medical insurance. Describe the process and benefits of the program for the public.
  2. The state school board chairperson has asked you (a consultant on health and wellness) to write an informative paper about the recent changes to the national breakfast and lunch program to improve nutrition and health. Describe the process and benefits of the program for parents.
  3. The director of a local domestic violence shelter has asked you (a board member and volunteer for the organization) to write an informative paper about your local organization’s program. Describe the process and benefits of the program for the community members.

Based on the feedback from your instructor, revise your three to four (3-4) page paper in which you:

  1. Provide a clear thesis statement.
  2. Describe the process (decisions, steps) involved in the program.
  3. Explain the benefits of the program.
  4. Develop a coherently structured paper with an introduction, body, and conclusion.
  5. Provide three (3) relevant and credible sources to support claims. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.