Thursday, November 28, 2019

Leader Analysis Sheet Essays (500 words) - 1st Millennium

Leader Analysis Sheet Name of Leader: Justinian Lifespan: c. 482 AD - November 15th, 565 AD Title: Justinian the Great Country/region: Byzantine Empire Years in Power: 527 AD - 565 AD (38 Years) Political: Many former Byzantium lands were lost due to invasions. The Western half of the empire was broken off. The capital was moved to Constantinople. Contact and trade is basically cut off entirely from Western Europe. Social: The Byzantine Empire followed its own branch of Christianity, Orthodox Christianity. Orthodox Christianity was entirely cutoff from the papacy and its power. Economic: The byzantine empire had one of largest and wealthiest economies in the world. The economy was mainly influenced by trade with Constantinople being a major trading hub for the whole world. The Byzantine Empire was a bridge between Europe, Asia, Africa, and other Northern Lands. Agriculture was included but development was slow and there was no major production. Justinian was intent on bringing the Byzantine Empire to a Golden Age and making unified, prosperous, and vast. His goals were to construct a well-developed legal code and system, and conquer lost lands. He also aimed to Beatify Constantinople. -Justinian extended the Byzantine Empire dramatically. He extended the empire back into areas that had previously been part of the Western Roman Empire.-Justinian successfully codified Roman Law. He gathered all the laws, rules etc. and collected them as a base for Byantine law.-He constructed the building of the Hagia Sophia, an extremely elegant and beautiful Church that still stands today. Short-Term Effects: Almost immediately upon his accession Justinian inaugurated a policy of restoration of the Roman Empire, the western part of which had been lost in the barbarian invasions of the 5th century. The eastern front of the empire was secured by an "eternal peace" signed with Persia in 532. Internal unrest was crushed by the great general Belisarius. In 533 an imperial army set out against the Vandal kingdom in North Africa, which was reincorporated into the empire in 534. The following year another imperial army attacked the Ostrogoths in Italy; the Ostrogoths, however, resisted annihilation for another 20 years. A third campaign, undertaken against the Visigoths, reconquered southeastern Spain. By the emperor's death most of the former Roman territory around the Mediterranean Sea, except for Gaul and northern Spain, was again part of the empire, despite a resumption of the Persian war in 540 and gradual Slavic infiltration in the Balkans. Long-Term Effects: The centralized empire envisaged by Justinian required a uniform legal system. Therefore an imperial commission headed by the renowned jurist Trebonianus worked for ten years to collect and systematize existing Roman law. Their work was incorporated into the enormous Corpus Juris Civilis (Body of Civil Law), also called the Justinian Code, promulgated in 534 and kept up to date by the addition of new decrees, or Novellae. This formidable legislative codification still remains the basis for the law of most European countries. Simultaneously with this legal reform, attempts were made to rectify administrative abuses.

Monday, November 25, 2019

The Process of Information System in Apple

The Process of Information System in Apple Introduction Information Systems is a crucial component of many organizations. It is notable that information and communication within the corporate company remains an important aspect of its success. In addition, lack of information communication may present challenges to the decision makers.Advertising We will write a custom essay sample on The Process of Information System in Apple specifically for you for only $16.05 $11/page Learn More Apple is a technology-based organization with a global presence. Its activities include product development, production, assembling, selling, and supply chain management. However, Apple’s research and development has enabled it to retain the market leadership in innovation. Company Background Three people founded Apple as an incorporated company in April 1976. They included â€Å"Steve Jobs, Steve Wozniak, and Ronald Wayne† (Linzmayer 5). The company started with little financial investment that hindered its ability to compete effectively with other firms that were already large market players. The company managed to set up a new headquarter in California. The company’s original Apple II product had become the source of success since 1970. The product remained common with clients and enabled the company to develop its original customer base (Linzmayer 8). The company’s expansion has been unprecedented since then. It started selling computers in the international marketplace. The role that Steve Jobs played in research and development was critical for the generation of highly innovative and exciting products. The company grappled with operational and management challenges that were associated with communication within and outside environment (Daft, Jonathan and Hugh 114). Analysts have argued that the entry of new investors presented challenges with clarity in communication. The company focused on products and significantly ignored organizational functioning. The company c ompartmentalization initiatives were guided by product orientation rather than organizational functioning needs. The companys core activities are supported through diverse activities such as infrastructure, information systems, management of materials, and human resources (see figure 1) (Daft, Jonathan and Hugh 114). Figure 1: Apple Organizational Structure and Core ActivitiesAdvertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The company is highly dynamic in terms of altering the organizational structure to fit with activities. However, the latest organizational structure entails different positions as depicted in the diagram. The corporate structure favors the existence of departmental competencies as opposed to organizational functioning (Daft, Jonathan and Hugh 114). The leadership structure at Apple provides low-level managers with the task of ensuring innovations and direction in every department. The company also facilitates market leadership in other geographical locations through the creation of mid-level management positions. This helps the firm in enhancing leadership within different geographical locations in order to promote a localized market competitive advantage (Daft, Jonathan and Hugh 114). However, the corporate structure presents challenges to strategic communication. The structure creates a double reporting channel. This takes place through ensuring that organizational functioning matters are reported to corporate directors while operational issues are reported to regional directors (Daft, Jonathan and Hugh 114). Information Systems Management at Apple The corporate structure of Apple that comprise of the global presence and departmental level leadership presents a unique situation. The structure necessitates a type of information systems that can facilitate the distribution of appropriate communication through the right channels and in a timely manner. Furthermore, this is critical to promoting consistent and informed decision making at diverse levels. The right information systems can enhance proper communication. The company has a philosophy of being the leader in marketplace on matters related to innovativeness (Wade, Scott and Yogesh 399). The company also applies the same philosophy in its communication and information transfer. Apple manages its internal communication in a manner that enhances its superiority.Advertising We will write a custom essay sample on The Process of Information System in Apple specifically for you for only $16.05 $11/page Learn More The company has implemented virtual business designs that integrate communication and information management (Hamilton 58). The company has used virtualization as a factor in gaining an edge over competitors. The company has used intranet system that enables workers to gain all information they need at their workstations. Furthermo re, the system allows Apple to interact with external stakeholders such as suppliers (Monczka, 15). The company has created unrestricted information exchange system that virtually links suppliers to the product development team and the retail units. Furthermore, information exchange takes place between the retail unit and the customer service center. It is notable that customer service center are always equipped with information about suppliers and company product range (Monczka, 15). The customer center provides services to clients based on the virtually available information. This strategy has enabled Apple to maintain a value chain information exchange system that links different components on an end-to-end basis. The virtually available information in the company enables the reduction of costs involved in transferring information between the people who need it (Hamilton 58). Furthermore, it saves the time of the company and its staff for everything to do with information exchang e takes place virtually. The implementation of a computing utility system also helps Apple minimize costs because it limits the volume of assets that are used in information exchange (Gitman and Carl 506). The company has ensured a lean and efficient information management strategy. Recommendation The company should constantly work on improving its information security management. The expansion of the company means that the information it manages also escalates. The company’s use of software based information management presents potential challenges associated with hacking. Hacking activities are highly dynamic (Stair and George 30). Hackers can hack into the virtual information management system if its not well secured. Apple should focus on creating a robust and insecurity proof systems to enable it secure its information management system.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Daft, Richard L, Jonathan Murphy, and Hugh Willmott. Organization Theory and Design. Andover: South-Western Cengage Learning, 2010. Print. Gitman, Lawrence J, and Carl D. McDaniel. The Future of Business: The Essentials. Mason, OH: Thomson South-Western, 2008. Print. Hamilton, Cheryl. Communicating for Results: A Guide for Business and the Professions. Belmont, CA: Thomson/Wadsworth, 2008. Print. Linzmayer, Owen W. Apple Confidential 2.0: The Definitive History of the Worlds Most Colorful Company. San Francisco, Calif: No Starch Press, 2004. Print. Monczka, Robert M. Purchasing and Supply Chain Management. Mason, OH: South-Western, 2009. Print. Stair, Ralph M, and George W. Reynolds. Principles of Information Systems. Australia: Course Technology Cengage Learning, 2012. Print Wade, Michael R, Scott L. Schneberger, and Yogesh K. Dwivedi. Information Systems Theory: Explaining and Predicting Our Digital Society, Vol. 1. New York, NY: Springer Science+Business Media, LLC, 2012. Print.

Thursday, November 21, 2019

Information Technology Architectures Essay Example | Topics and Well Written Essays - 500 words - 2

Information Technology Architectures - Essay Example CORBA is the standard software that supports distributed objects. It is a complex and a more difficult to learn software than any other communication infrastructure. COBRA offers a lot of functionality such as, programming language independency and the operating system. On the other hand, CORBA possesses the binding power to arrange of standardized programming languages as a communication format (Papadopoulos, 2009). Among the advantages of CORBA process, is its level of maturity, CORBA developed by the Object Management Group and its standard is neither too lax nor too restrictive. CORBA does not endanger the interoperability of some products nor the portability and space for optimization. Therefore, it offers a real international tested and proven power, flexibility and performance. CORBA offers a modularization facility to write objects in different programming languages that provide a service to users that do not require details of implementation of the object(s). CORBA also offers a facility that allows different clients to use the same interface thus working together transparently (Papadopoulos, 2009). CORBA’s disadvantages include its architecture complexity and specification which do not give a clear implementation details. It offers vertical features, which target some users and applications, but not all technology users thus insufficient (Papadopoulos, 2009). Java2 Enterprise Architecture (J2EE) is a mainframe scale computing platform which made for large firms. It simplifies thin client tiered environment application development (Papadopoulos, 2009). It decreases the need for programming, and programmer education by enhancing the tier to perform many programming aspects automatically. The Java 2 Enterprise Architecture (J2EE) consists of a security model which protects data both in web-based application and also locally. It is portable since it consists of a write once and Run anywhere

Wednesday, November 20, 2019

Small Business Innovation Research Programs Case Study

Small Business Innovation Research Programs - Case Study Example Towards this direction, it is noted that ‘a framework based on wisdom rather than knowledge alone provides strategic options for paradigm development in the field of small business and entrepreneurship research’ (Mathys et al., 2005, 657) - a field similar with the one to which the article under examination refers. The current paper focuses on the analysis of the article ‘Technological Entrepreneurship and Small Business Innovation Research Programs’ by Kropp, Fredric, and Zolin, Roxanne. The above article was published in 2005 in the academic journal Academy of Marketing Science Review. In accordance with the authors’ statement, the above article focuses on ‘the conceptual role that government technology programs can play in facilitating the process of technological entrepreneurship’ (page 1). The case of the ‘Small Business and Innovation Research (SBIR) program - United States’ (page 1) is used as an example of the potential support of the stage to the small businesses. The article shows the various methods available to small businesses that are interested in using governmental programs for the development of their performance - it is also explained how these programs could lead to the increase of profitability of firms in various industrial sect ors. The overall effectiveness of these programs is criticized - the authors suggest potential measures that could be used by firms that need to improve their performance – either in the short or the long term – through relevant governmental programs. The value of the article cannot be doubted; however, there are a few points that should be reviewed. Suggestions are made and relevant criticism is developed making sure that any assumption is appropriately justified with reference to the text and to academic material with similar content. The authors use a specific theoretical model, the one created by Lumpkin and Dessin 1996 in order to show the effects of government programs on the improvement of performance of firms that operate in the technology sector – the special reference is made on the firms of small size.

Monday, November 18, 2019

Project Financial Risk Management followed in IT industry enhances the Research Paper

Project Financial Risk Management followed in IT industry enhances the success rates of Projects delivered - Research Paper Example Financial Risk Management in IT Introduction Risks management is in many ways the process of identification, assessment and prioritization of risks, which is then followed by the coordination of all economic resources necessary for the elimination or minimization, monitoring, and control of the probable impacts of uncertain events. It has been found that, risk can come from uncertainties in financial markets, legal liabilities, project failures, accidents, credit risks (Macomber 2003, p. 2). Studies indicate that, there are various project management standards, which have been under development in the project management institute, actuarial societies, ISO standards, and the national institute of standards and technology (Hodgson 2003, p.1). The approaches and objectives of hazard supervision vary greatly dependent on the hazard administration technique applied in the setting of a scheme administration.. In other studies however, hazard administration includes the ranking of the essen tial developments; hazards with the extreme loss are handled first and then the other hazard are handled in a descendent mode in order of precedence. It is pointed out that intangible management usually identifies new types of risks that have about a hundred percent probability but the management ignores because most organizations lack identification capabilities to handle such cases (King 2003, p. 2). It is recorded that relationship risk emanate when inefficient ways of collaboration is experienced. This type of hazard is known to reduce the efficiency of information workforces, effectiveness, service, excellence, product value, and excellence of earnings at the end. Thus, risk management is a subject or process that needs all manner of care to be successful. Literature review From organizational perspective, risks arise most often when businesses pursue opportunities in face of uncertainties, while being compelled by capabilities and cost. In most cases, a challenge comes when it comes to the process of finding a position based on the two dimensions, as it represents in essence itself a risk profile that may be appropriate for the initiative; acceptable to both internal and external stakeholders of the business in question. Studies affirm that, hazard and hazard administration are premeditated in nature. Regarding, information and technology studies show that, software projects have been recognized to be high-risk ventures, which are prone to many failures. Some studies argue that there are mainly two classes of risks; generic risks that are common to all projects, and project specific risks. In many cases, some of these hazards are easy to recognize and regulate or accomplish. However, in some cases, other risks are less obvious and thus very difficult to make predictions on their likelihood to occur and the impact they may cause at that time (Levine 2004, p. 32). The complication and difficulty in predictions comes because of numerous project proportions; structure, size, complexity, composition, novelty, long planning, and execution horizons. All these have a common influence on the modest of the scheme at the end; hus, any indeterminate discrepancy in this has fiscal implications. Therefore, risk management in information technology, especially software

Friday, November 15, 2019

A Sentinel Event Related To Nurse Fatigue Nursing Essay

A Sentinel Event Related To Nurse Fatigue Nursing Essay 12 hour shifts, extended work periods, voluntary and mandatory overtime, and excessive workloads are all factors that dangerously contribute to nurse fatigue, which has led to a number of medication errors and sentinel events (Rogers, Hwang, Scott, Aiken, Dinges, 2004). In the 2004 study by Rogers, Hwang, Scott, Aiken, Dinges, it was found that the longer the shift, the risks for errors increases. Also, when working longer than 17 hours without sleep, nurse fatigue has been shown to demonstrate the equivalence of being under the influence with a blood alcohol concentration of 0.05% (Garrett, 2008). The effects of fatigue on nurses includes problems such as: compromised problem-solving skills, decreased attention span, delayed reaction time, memory lapses, impaired communication, and inability to focus, which are all important for nurses to be aware of in order to provide quality and safe patient care (Warren Tart, 2008). The evidences and dangers of nurse fatigue linked to adverse events from the long work hours and cumulative days of extended work hours has been greatly recognized by The Joint Commission (TJC) issuing a sentinel event alert on December 14, 2011, regarding health care worker fatigue and patient safety (The Joint Commission, 2011). So, I will be discussing the following in the paper that includes: explanation of reviewable sentinel events, a specific sentinel event related to nurse fatigue, and its root cause analysis. Explanation of Reviewable Sentinel Events As defined by TJC, a sentinel event is an unexpected occurrence involving either death, serious physical or psychological harm, or the risk thereof that prompts the need for immediate investigation and response (Sentinel Events Policy and Procedures, 2012). But, for a sentinel event to be considered reviewable, it must meet any of the following criteria: the event resulting in an unanticipated death, coma, permanent loss of function, unrelated to the natural course of the patients illness or underlying condition, or the event is one of the following, but not limited to: suicide within 72 hours of being discharged from a 24 hour care setting rape, sexual abuse/assault elopement abduction (Sentinel Events Policy and Procedures, 2012). A Specific Sentinel Event Related to Nurse Fatigue On July 5, 2006, Jasmine Gant, a pregnant 16 year old high school student, arrived with her mother at St. Marys Hospital in Madison, Wisconsin at 9:30 A.M. for her scheduled induction (Smetzer, Baker, Byrne, Cohen, 2010). The Labor and Delivery (LD) nurse assigned to care for Ms. Gant that day was Julie Thao, 41 years old. Mrs. Thao had been working at St. Marys Hospital since 1993, and worked in the LD department for 15 years. The day before July 5, 2006, Mrs. Thao had voluntarily worked a double shift for a total of 16 hours or more to cover for the units short staff. Mrs. Thao was extremely fatigued by the end of her shift that ended at midnight. She spent the night at the hospital to avoid her hour long commute home and because she was due for her next shift at 7 A.M. So on the morning of July, 5, 2006, the very fatigued nurse Mrs. Thao started her shift caring for one expectant mother. When Ms. Gant presented at the LD unit later that morning, Mrs. Thao spent time with her and her mother completing the admission process that is done with every admitting patient. However, Mrs. Thao did not apply a bar-coded identification band to Ms. Gants arm at this time (Smetzer, Baker, Byrne, Cohen, 2010). When discussing pain management, Ms. Gant expressed the possibility of wanting to use epidural, which Mrs. Thao would relay the message to the obstetrician. At 11:30 A.M., Ms. Gants physician arrived to her room to rupture her amniotic membrane. The physician told Mrs. Thao that he planned to check back before determining with the patient the need for epidural. In the meantime, he had ordered Pitocin, Lactated Ringers (LR) solution, and intravenous (IV) penicillin to treat a strep infection that Ms. Gant had. While Mrs. Thao was in the room, the patient communicated to her that she was anxious about receiving epidural. So, Mrs. Thao thought it would be a good idea to retrieve epidural solution, Bupivacaine, to show the patient and in anticipation since the Anesthesiologist would get upset for not having it readily available. Now, St. Marys Hospital had just started transitioning and training the employees in using the newly installed bar coded medication administration system. Apparently, the hospital was currently having problems with it, so the nurses were instructed to give the medications when needed and document them manually. Well, Mrs. Thao bypassed the system to remove the Bupivacaine, which she also did not have authorization or permission to do so for that medication. Then, she gathered the LR solution and Pitocin before walking back into the patients room. On the way, another nurse handed her the IV penicillin. When Mrs. Thao entered the patients room, she sat the supplies on the counter and began to prepare and initiate the IV infusion. Carelessly, Mrs. Thao made the fatal mistake and grabbed the epidural solution instead of the penicillin, both looking very similar in appearance, administering it intravenously into Ms. Gants arm. Unknowingly of the mistake she had just done that would soon c ost her nursing career and her patients life, Mrs. Thao went on to rewinding the tape on the birthing process to play for the patient, her mother, and the babys father who had just showed up creating lots of tension. Within minutes, the patients mother terrifyingly screamed for mercy. At this point, her daughter was in respiratory distress, seizing, and into a cardiac arrest. The frantic nurse immediately called the rapid response team and code blue. Every effort was made to resuscitate Ms. Gant, but she remained asystolic. Ms. Gant was immediately taken to the operating room to have an emergency cesarean section where the physicians delivered an 8 pound healthy baby boy. The health care team continued resuscitating Ms. Gant, but was pronounced dead by 1:43 P.M. After ruling out several possible causes of her death, it was discovered minutes later that the infusing bag was the epidural solution, instead of the penicillin (Smetzer, Baker, Byrne, Cohen, 2010). Her colleagues reported that Mrs. Thao looked extremely fatigued, which possibly increased her likelihood of making the fatal medication error along with the omission to verify the five rights of medication administration. The Root Cause Analysis A root cause analysis (RCA) is a technique used to help identify the possibilities of causes that led to the end result. When a sentinel event occurs, the hospital is accountable to do a root cause analysis. The point of RCA is not to point out who is to blame. Thus, by conducting a RCA, it allows for a plan of action to prevent the same or similar incidents from occurring. The first part of the RCA is defining the problem or effect. Part two is determining why it happened with the cause and effect technique. Part three is generating solutions and implementing a plan of action to reduce the likelihood of the event from happening again. In the sentinel event above, the problem was a medication error by registered nurse (RN) Julie Thao that had resulted in the maternal death of 16 year old expectant mother, Jasmine Gant. The four cause categories formulated for this specific case are: people, work environment, equipment, and policies and procedures. The nurse Mrs. Thaos fatigued had a tremendous effect on the actions leading to the medication error. She had voluntarily worked a back to back shift of 16 hours or more the night before starting work again the next morning. She expressed the desire to go home halfway through her second shift, too. While taking care of Ms. Gant, the nurse was distracted while preparing the medications. Mrs. Thao reported that there was tension in her patients room when the babys father arrived, so she had intended to administer the IV penicillin and put on the educational video of the birthing process. The work environment of the LD unit that Mrs. Thao worked on was not well organized. The nurses did not directly communicate with the Anesthesiologist making it difficult to have the epidural ready upon their arrival. The unit was also short staffed with several nurses on temporary leave (Smetizer, Baker, Byrne Cohen, 2010). If Mrs. Thao had not worked second shift, they would have been inadequately staffed. The staff and managers did not strictly enforce and comply with the policies such as the identification bands and bar code medication administration system. So, the problems associated with the policies and procedures included the delay of the patients identification bar code band application, omission of verifying the five rights of medication administration, and retrieving the epidural before it was ordered. The issue with the delay of the patients identification band was that it took longer for the bands to be made with the new system. The staff and management were lenient and made it a norm to put it on the patient whenever it was a convenient time. However, Mrs. Thao confessed that she did not comply with the five rights of medication administration. Also, she retrieved the epidural before it was ordered to decrease her patients fear and in anticipation of early epidural. Retrieving the epidural in anticipation upon the Anesthesias arrival was a common practice on the LD floor because of the dissatisfaction expressed by some Anesthesiologist of it not being readily available. For equipment, there was the problem of the newly installed bar code medication administration system and the design of the bag of epidural solution and IV penicillin. The new systems constant problems created low rates on compliance on scanning IV bags, and nurses bypassing the system, which included safety features to prevent such errors from happening. The LD unit staff had inadequate training on troubleshooting the system, especially Mrs. Thao. Instead, management allowed them to hang the medications and document them manually. With the mistake of grabbing the wrong bag, Mrs. Thao had brought all the supplies including the two bags from the anteroom and sat them onto the counter near the patients bedside so that she can converse with the patient directly. The bag containing the epidural solution and the bag of the penicillin looked similar in size, but the epidural was slightly bigger. They were both clear solutions. The two bags both had orange label stickers, but the epidural b ag had an additional bright pink warning label. There is also a design flaw in the interconnectivity making the IV tubing compatible with accessing the epidural bag port like it does with the IV solutions (Smetizer, Baker, Byrne Cohen, 2010).

Wednesday, November 13, 2019

Workplace Violence and How to Prevent it Essay -- Workplace Health and

Workplace Violence and How to Prevent it The Workplace is considered a second home for many people because a work shift may range 8 to 12 hours daily. Based on that fact alone it is important to feel safe, comfortable and content in the workplace. Despite the differences in the public and private sector the mission, goals and objectives of any organization can be similar. For example, productivity, cost effectiveness, efficiency, profit or goods/services and the safety within the establishment is equally important. Unfortunately, the challenges that face management are increasing rapidly and during the past 2 decades "Violence in the Workplace" has become an increased fear among employers and employees. Violence in the Workplace can be defined as" (1) any problem related to the workplace or away from the workplace if it relates to the job" http://www.state.il.us/isp/viowkplc/vwpp1.htm. Violent incidents that may occur on site and violence that occurs away from the job but is job related. Types of job related violence away f rom the job may include telephone harassment, stalking and confrontations. Violence in the workplace has intensified from idle threats to homicides and the majority of assailants are reportedly domestic partners, strangers, customers or clients and employees. "Homicide was the third leading cause of occupational death from 1980 to 1985, accounting for 13 percent of all workplace deaths" (2) http://www.nsi.org/Tips/workdeth.txt. More recent data indicates that the statistics and fear is increasing and the level of safety is decreasing. The National Institute for Occupational Safety and Health (NIOSH), reports "nearly 7000 workers were victims of homicide in the workplace during the period of 1980 to 1989... ...ace". accessed October 17, 1999 available from http://www.workviolence.com ;Internet. Marianne Minor. "Preventing Workplace Violence; Positive Management Strategies". Crisp Publications, Park, Menlo, California, 1995, pg.20. Occupational Safety and Health Administration (OSHA). "Workplace Violence" available from http://www.osha-slc.gov/SLTC/workplaceviolence/index.html accessed November 19, 1999 Internet. Occupational Safety and Health Administration (OSHA). "Workplace Violence" available from http://osha.gov/oshinf/priorities/violence.html accessed on November 21, 1999; Internet. Robertson, Dirk. "Violence in your Workplace; How to Cope". Souvenir Press, London, 1993, pg. 19. Tyler, Mary P. "A Manager's Guide: Traumatic Incidents at the Workplace. U. S. Office of Personnel Management (OPM) 1993.