My Journey to the IIM !!

Re: WORST CASE SOME ONE!!!

The Bullwhip Effect (or Whiplash Effect) is an observed phenomenon in forecast-driven distribution channels. Because customer demand is rarely perfectly stable, businesses must forecast demand in order to properly position inventory and other resources. Forecasts are based on statistics, and they are rarely perfectly accurate. Because forecast errors are a given, companies often carry an inventory buffer called "safety stock". Moving up the supply chain from end-consumer to raw materials supplier, each supply chain participant has greater observed variation in demand and thus greater need for safety stock. In periods of rising demand, down-stream participants will increase their orders. In periods of falling demand, orders will fall or stop in order to reduce inventory. The effect is that variations are amplified the farther you get from the end-consumer.

Supply chain experts have recognized that the Bullwhip Effect is a problem in forecast-driven supply chains, and careful management of the effect is an important goal for Supply Chain Managers. The alternative is to establish a demand-driven supply chain which reacts to actual customer orders. In manufacturing, this concept is called Kanban. This model has been most successfully implemented in Wal-Mart's distribution system. Individual Wal-Mart stores transmit point-of-sale (POS) data from the cash register back to corporate headquarters several times a day. This demand information is used to queue shipments from the Wal-Mart distribution center to the store and from the supplier to the Wal-Mart distribution center. The result is near-perfect visibility of customer demand and inventory movement throughout the supply chain. Better information leads to better inventory positioning and lower costs throughout the supply chain. Barriers to implementing a demand-driven supply chain include investments in information technology and creating a corporate culture of flexibility and focus on customer demand.

Factors contributing to the Bullwhip Effect:

Forecast Errors
Lead Time Variability
Batch Ordering
Price Fluctuations
Product Promotions
Inflated Orders
Methods intended to reduce uncertainty, variability, and lead time:

Vendor Managed Inventory (VMI)
Just In Time replenishment (JIT)
Strategic partnership
Vendor Managed Inventory, (VMI), describes a family of business models in which the buyer of a product provides certain information to a supplier of that product and the supplier takes full responsibility for maintaining an agreed inventory of the material, usually at the buyer's consumption location (usually a store).

As a symbiotic relationship, VMI makes it less likely that a business will unintentionally become out of stock of a good and reduces inventory in the supply chain. Furthermore, vendor (supplier) representatives in a store benefit the vendor by ensuring the product is properly displayed and store staff are familiar with the features of the product line, all the while helping to clean and organize their product lines for the store.

One of the keys to making VMI work is shared risk. Often if the inventory does not sell, the vendor (supplier) will repurchase the product from the buyer (retailer). In other cases, the product may be in the possession of the retailer but is not owned by the retailer until the sale takes place, meaning that the retailer simply houses (and assists with the sale of) the product in exchange for a predetermined commission or profit. A special form of this commission business is Scan-based trading whereas VMI is usually applied but not mandatory to be used.

This is one of the successful business models used by Wal-Mart and many other big box retailers. Home Depot uses the technique with larger suppliers of manufactured goods (ie. Moen, Delta, RIDGID, Paulin). VMI helps foster a closer understanding between the supplier and manufacturer by using Electronic Data Interchange and other statistical methodologies to forecast and maintain correct inventory in the supply chain. Vendors benefit from more control of displays and more contact to impart knowledge on employees; retailers benefit from reduced risk, better store staff knowledge (which builds brand loyalty for both the vendor and the retailer), and reduced display maintenance outlays. Consumers benefit from knowledgeable store staff who are in frequent and familiar contact with manufacturer (vendor) representatives when parts or service are required, store staff with good knowledge of most product lines offered by the entire range of vendors and therefore the ability to help the customer choose amongst competing products for items most suited to them, manufacturer-direct selection and service support being offered by the store, and finally the relatively frequent occurance of "Well, I'm pretty sure this is right for your needs but let me take you over to Luc; Luc works for Company X and he's the real expert on their stuff".
 
Re: WORST CASE SOME ONE!!!

Economic development in different regions has often been accompanied by a decline in
biodiversity. Biotechnology and other value adding technologies offer a possibility of valorizing
biodiversity. But the distribution of the gains among different stakeholders generated through
added value obviously is the function of institutional arrangements. The kind of ethical practices
followed by bioprospectors may determine whether or not the benefits of biotechnological
products are shared fairly among different stakeholders.
The need for low transaction cost system is obvious and yet most global dialogues on intellectual
property rights have not yet embarked upon such a system. In the forthcoming review of the
Trade-Related Aspects of Intellectual Property Rights (TRIPS) of the World Trade Organization
(WTO), a discussion on Article 23 providing for negotiations on the establishment of multi lateral
system of notification and registration of geographical indications in the context of wines is
proposed. There is no reason why such a discussion should be restricted only to the wines and not
include traditional knowledge as well as contemporary innovations of local communities and
individuals.
There are many other policy and institutional modifications that are called for in the IPR laws. It
is not my argument that removing the imperfections in IPR regime will by itself generate
economic rewards and social esteem for local knowledge rich economically poor people. I realize
that the role of non-monetary incentives may be sometime more important. However, the
biotechnology, drug, and other value adding industries have yet not shown any explicit interest as
a stakeholder in generating models of voluntary benefit sharing. Does it imply that they believe
that future gains in biotechnological products may be made only on the basis of public domain
biodiversity?
The empowerment of local knowledge experts will require building bridges between the
excellence in formal and informal science. Reform of TRIPS thus is a process involving reform of
knowledge producing and networking institutions in any society.
 
Re: WORST CASE SOME ONE!!!

Qualitative Data Analysis with a computer: recent developments

Computer-Assisted Qualitative Data AnalysiS (CAQDAS) is a recent development. The arrival of word processors with text retrieval and handling capacities was the background for the development of specialist qualitative packages. While some early experimenters began developing their own software for particular qualitative applications almost as soon as they had assembled their first DIY personal computer, the main impetus came from academic seminars including social researchers and computing enthusiasts during the early 1980s.

The software did not, however, remain an interest only for those in 'pure' academic disciplines. From the first it gained substantial use in applied research. It offered to address the needs of researchers working under the pressure of short-term 'soft money' contracts and yet who retained an enthusiasm for the intrinsic interest of qualitative data. Another major use was in market research, where the focus group approach continues to represent a distinct branch of the field.

This does not mean that CAQDAS is the answer to every qualitative research problem. Indeed, Seidel, the creator of one of the most popular programs, has written of his fear that researchers, especially those with little qualitative experience and those working under the pressure of applied research settings, may be led into slavish adherence to conventions that are set into program assumptions. Many qualitative researchers believe that the use of software poses a threat to the craft skills of a long-established research tradition. There is a perceived danger of superficial analysis produced by slavishly following a mechanical set of procedures. There is also a more profound concern, that the existing software contains an implicit theory of qualitative analysis, one which is not conducive to the full range of analytic postures customarily found in this eclectic field. Insofar as existing software presumes a generic theory of qualitative analysis, it largely relates to the conventional, but by no means universal, grounded theory approach. Those preferring hermeneutic approaches, ethnomethodology, conversation analysis or holistic analysis are less well-served.

It is also apparent that some software imposes a very light touch on the analyst, being confined to simple, albeit rapid, text retrieval (database software such as SONAR). But other packages, notably NUDIST and Atlas-ti, promise much more. The authors of NUDIST explicitly claim that their software 'transforms' qualitative analysis. The co-developer of Atlas-ti has complained that, while developers have already advanced 'over the horizon', users are too conservative and reluctant to use features which are technically feasible. Developers of Hypercard-based applications report that much of their time is spent removing features so as to make their programs accessible to qualitative researchers.

Thus, a researcher considering whether to use a package on a particular project needs to take into account the kinds of analytic work the software facilitates and the kinds of work for which it is unsuitable; the relevance of the features included in the software to the analytic procedures employed by different research traditions; the degree to which holistic as opposed to segmental analysis is facilitated; and the degree to which micro-analysis (e.g., conversation analysis) is facilitated.

Fortunately, the very limits of the existing software seem to hold at bay problems of the sort expressed by Siedel. Those who have used CAQDAS generally find the 'threat' of the software implausible. For the last year Ray Lee and I have been researching user experiences with CAQDAS, by convening focus groups (we plan to carry out more soon; if you'd like to participate, let me know!). For the most part researchers regard CAQDAS as just another tool, to be used when appropriate but not when analytic closure would be premature or when sample size or features of the data do not justify the time setting it up (Lee and Fielding 1991).

What's around
This section concerns dedicated software for qualitative analysis. But a variety of common programs are useful, such as timeliners (MacTimeline, Tom Synder Productions), outliners (MORE, Symantec), graphics packages (SuperPaint, Aldus) and word processing, database and spreadsheet programs (Works, Word and Excel, Microsoft). These are all for Macintosh but similar software exists for all platforms.
In making choices it is important to know what sort of manipulation or presentation is required and on what scale. For example, a straight-forward database like Microsoft Works is certainly adequate for inductive coding at the sentence level of transcripts, where there is little need to interrelate categories with other transcripts. You just create a record template with a field for sentence TEXT, and another (or several, perhaps one for each family of coding categories) to hold a set of CODEWORDS, and one for sentence NUMBERS. This effectively duplicates the process of writing marginal notes when working with paper. Sentences are then coded by typing the names of coding categories in the CODEWORDS field. When this is complete, categories can be extracted by searches and sorts, and printed. You can always return the transcript to its original context by sorting by NUMBERS.

Thus, depending on the amount of data you have and the depth of analysis you want, it might make sense to use The Ethnograph, or a word processor and outlining software, or revert to highlighting pens and Post-It notes. The overhead in setting up and using packages is not always worth it.

Turning to dedicated packages, a few remarks about two well-known packages help to sketch in some key considerations that users face. The Ethnograph, first developed in the early 1980s, has been upgraded periodically and is now a rather sophisticated program for IBM PCs and compatibles. Users have adapted it to many individual analytic approaches, but it is best suited to analysis of the 'cut and paste' kind rather than analytic approaches based on, say, sociolinguistics. Its not very well-suited to use on networks and, like other similar programs, does not allow simultaneous access to data files by multiple users. The current version allows on-screen coding and the attachment of 'memos' to coded data. In contrast, NUDIST is specifically designed for multi-access use. It indexes on-line and off-line data, provides 'audit trails' of retrievals, and now has an interface to the quantitative data management program SPSS. Relationships in the data are displayed in 'tree structures' which users may initially find daunting. Compared to The Ethnograph, the emphasis is on conceptual relations between codes rather than on the construction of typologies where the relationship of data to code is the pre-eminent concern. The interface is common across platforms and advisory support is available to those who can call Australia.

With such points in mind we can go on to some descriptive profiles. Some details, especially prices, are subject to change. This section is based on a selection from the Resources Appendix in Fielding and Lee (1991); an updated Resources Appendix appears in the new edition available from March 1993.

The ETHNOGRAPH
Allows you to identify and retrieve text from documents. Basic unit is the segment. Each can be identified by up to 12 codewords. Segments can be nested and overlapped 7 levels deep. Search results are sensitive to nests and overlaps. Searches can be done on single or multiple codeword(s). Each data file can be identified by facesheet variables. Existing coding schemes can be selectively or globally modified. Includes memo feature and codebook feature. Runs on all PCs and compatibles. Hard disk essential for version 4, recommended for earlier versions. Single copy $150 plus $20 shipping. Site licenses available.

Distributor: Qualitative Research Management, 73425 Hilltop Rd., Desert Hot Springs, CA 92240 USA. Tel. (619) 329 7026

HyperQual
Provides an integrated environment for data entry, memory and illustrations. Designed to assist in the analysis of text data from interviews, observations and documents. A HyperCard application (stack). A special package for focus groups, Hyperfocus, is also available. Any Macintosh; word processor, hard disk; HyperCard ver. 1.2 or higher. $125 plus $10 shipping.

Distributor: as per The Ethnograph. Or Dr R.V. Padilla, 3327 North Dakota, Chandler, AZ 85224 USA.

HyperResearch
A HyperCard-based application that allows for qualitative and quantitative analysis of textual, audio and video materials. An expert system provides a semi-formal mechanism for theory-building. Statistical option allows for the simple analysis of coded data. Reporting allows for the displaying or printing of text and the replay of coded segments of audio or video. Macintosh with System 6.0 or later and HyperCard ver. 1.2 or higher. $175

Distributor: Researchware Inc., 20 Soren St., Randolph MA 02368-1945, USA. Tel (617) 961 3909.

Hypersoft
Offers facilities for filing, copying, indexing, searching and extracting textual data. Includes procedures for summarizing, annotating, categorizing, mapping, coding and quantifying data. Expresses relationships in the data graphically on screen by width of linking line.
 
Re: WORST CASE SOME ONE!!!

Objectivity is shared subjectivity


Everything we perceive is dependent upon our biological nature and reality has meaning only in what our sense and perception biology provide us. Real for me is only what I perceive to be real.

Someone said that objectivity is shared subjectivity; this phrase resonates for me; really. What we can say about reality is based upon our shared objectivity, it does not say anything significant about reality in-it-self, except in its constancy, but it is significant in that we humans share it universally; it is reality-for-humans

Each different comprehension of a situation provides a commitment to what is real about a situation. Each such real commitment is a version of a commitment to truth.

The arts and the sciences endeavor to discover and communicate to the world the meaning of reality. There came a time in the evolution of the human psychic when we became semantic creatures; we discovered the power of symbolic representation of events. Art focuses on the inner reality of the subject whereas science focused on the reality that was external to the subject.

“From this traditionalist standpoint information and the perception of meaning in the information is the central content of both arts and sciences. Hence when we speak of progress in the arts and sciences we can really refer to only one thing, namely that progress is taking place as long as the sum total of meaningful artistic and scientific statements waxes.” “The Coming of the Golden Age” by Gunther Stent

What we mean by “real” is what we need to postulate conceptually in order to be realistic, i.e., in order to function successfully to survive, to achieve ends, and to arrive at a workable understanding of the situation we are in. (Example—“verb”, “concept”, “image schema”, “energy” “charge”—none can be directly observed but play a crucial role in our understanding). “Philosophy in the Flesh”
 
Re: WORST CASE SOME ONE!!!

Biographers, historians and literary scholars have long considered diary documents to be of major importance for telling history. More recently, sociologists have taken seriously the idea of using personal documents to construct pictures of social reality from the actors' perspective (see Plummer's 1983 book Documents of Life). In contrast to these 'journal' type of accounts, diaries are used as research instruments to collect detailed information about behaviour, events and other aspects of individuals' daily lives.

Self-completion diaries have a number of advantages over other data collections methods. First, diaries can provide a reliable alternative to the traditional interview method for events that are difficult to recall accurately or that are easily forgotten. Second, like other self-completion methods, diaries can help to overcome the problems associated with collecting sensitive information by personal interview. Finally, they can be used to supplement interview data to provide a rich source of information on respondents' behaviour and experiences on a daily basis. The 'diaryÐdiary interview method' where the diary keeping period is followed by an interview asking detailed questions about the diary entries is considered to be one of the most reliable methods of obtaining information.

The following discussion is largely concerned with fairly 'structured' diaries, as opposed to free text diaries, and with those where events or behaviour are recorded as they occur ('tomorrow diaries', rather than 'yesterday' or retrospective diaries).

The subject matter of diary surveys
A popular topic of investigation for economists, market researchers, and more recently sociologists, has been the way in which people spend their time. Accounts of time use can tell us much about quality of life, social and economic well-being and patterns of leisure and work. The 'time-budget' schedule, pioneered by Sorokin in the 1930s (Sorokin & Berger 1938) involved respondents keeping a detailed log of how they allocated their time during the day. More qualitative studies have used a "standard day" diary which focuses on a typical day in the life of an individual from a particular group or community.

One of the most fruitful time-budget endeavours, initiated in the mid 60s, has been the Multinational Time Budget Time Use Project (Szalai 1972). Its aim was to provide a set of procedures and guidance on how to collect and analyse time-use data so that valid cross-national comparisons could be made. This group has contributed much to our knowledge of time budget methodology, and for researchers wishing to conduct their own survey into time use, writings published by this group should be their first port of call (Harvey 1990). The BBC Daily Life surveys are also a well-known source of time budget data documenting radio and television audience behaviour (BBC 1984).

Two other major areas where diaries are often used are consumer expenditure and transport planning research. For example, the U.K. Family Expenditure Survey (OPCS) uses diaries to collect data for the National Accounts and to provide weights for the Retail Price Index. In the National Travel Survey (OPCS) respondents record information about all journeys made over a specified time period in a diary. Other topics covered using diary methods are social networks, health, illness and associated behaviour, diet and nutrition, social work and other areas of social policy, clinical psychology and family therapy, crime behaviour, alcohol consumption and drug usage, and sexual behaviour (see references for examples). Diaries are also increasingly being used in market research.

Using diaries in surveys
Diary surveys often use a personal interview to collect additional background information about the household and sometimes about behaviour or events of interest that the diary will not capture (such as large items of expenditure for consumer expenditure surveys). A placing interview is important for explaining the diary keeping procedures to the respondent and a concluding interview may be used to check on the completeness of the recorded entries. Often retrospective estimates of the behaviour occurring over the diary period are collected at the final interview.

Diary design and format
Diaries may be open format, allowing respondents to record activities and events in their own words, or they can be highly structured where all activities are pre-categorised. An obvious advantage of the free format is that it allows for greater opportunity to recode and analyse the data. However, the labour intensive work required to prepare and make sense of the data may render it unrealistic for projects lacking time and resources, or where the sample is large. Although the design of a diary will depend on the detailed requirement of the topic under study, there are certain design aspects which are common to most. Below are a set of guidelines recommended for anyone thinking about designing a diary. They are by no means definitive and readers should consult existing examples of protocols (see references). Furthermore, the amount of piloting required to perfect the diary format should not be under-estimated.

An A4 booklet of about 5 to 20 pages is desirable, depending on the nature of the diary. Disappointing as it might seem, most respondents do not carry their diaries around with them.
The inside cover page should contain a clear set of instructions on how to complete the diary. This should stress the importance of recording events as soon as possible after they occur and how the respondent should try not to let the diary keeping influence their behaviour.
A model example of a correctly completed diary should feature on the second page.
Depending on how long a period the diary will cover, each page denoting either a week, a day of the week or a 24 hour period or less. Pages should be clearly ruled up as a calendar with prominent headings and enough space to enter all the desired information (such as what the respondent was doing, at what time, where, who with and how they felt at the time, and so on).
Checklists of the items, events or behaviour to help jog the diary keeper's memory should be printed somewhere fairly prominent. Very long lists should be avoided since they may be off-putting and confusing to respondents. For a structured time budget diary, an exhaustive list of all possible relevant activities should be listed together with the appropriate codes. Where more than one type of activity is to be entered, that is, primary and secondary (or background) activities, guidance should be given on how to deal with "competing" or multiple activities.
There should be an explanation of what is meant by the unit of observation, such as a "session", an "event" or a "fixed time block". Where respondents are given more freedom in naming their activities and the activities are to be coded later, it is important to give strict guidelines on what type of behaviour to include, what definitely to exclude and the level of detail required. Time budget diaries without fixed time blocks should include columns for start and finish times for activities.
Appropriate terminology or lists of activities should be designed to meet the needs of the sample under study, and if necessary, different versions of the diary should be used for different groups.
Following the diary pages it is useful to include a simple set of questions for the respondent to complete, asking, among other things, whether the diary keeping period was atypical in any way compared to usual daily life. It is also good practice to include a page at the end asking for the respondents' own comments and clarifications of any peculiarities relating to their entries. Even if these remarks will not be systematically analysed, they may prove helpful at the editing or coding stage.
Data quality and response rates
In addition to the types of errors encountered in all survey methods, diaries are especially prone to errors arising from respondent conditioning, incomplete recording of information and under-reporting, inadequate recall, insufficient cooperation and sample selection bias.

Diary keeping period: The period over which a diary is to be kept needs to be long enough to capture the behaviour or events of interest without jeopardising successful completion by imposing an overly burdensome task. The OPCS National Travel Survey and the Adult Dietary Survey use seven day diaries, while the UK Family Expenditure Survey uses a fourteen day recording period. For collecting time-use data, anything from one to three day diaries may be used. Household expenditure surveys usually place diaries on specific days to ensure an even coverage across the week and distribute their field work over the year to ensure seasonal variation in earnings and spending is captured.

Reporting errors: In household expenditure surveys it is routinely found that the first day and first week of diary keeping shows higher reporting of expenditure than the following days. This is also observed for other types of behaviour and the effects are generally termed "first day effects". They may be due to respondents changing their behaviour as a result of keeping the diary (conditioning), or becoming less conscientious than when they started the diary. Recall errors may also extend to 'tomorrow' diaries. Respondents often write down their entries at the end of a day and only a small minority are diligent (and perhaps obsessive!) diary keepers who carry their diary with them at all times. Expenditure surveys find that an intermediate visit from an interviewer during the diary keeping period helps preserve 'good' diary keeping to the end of the period.

Literacy: All methods that involve self-completion of information demand that the respondent has a reasonable standard of literacy. Thus the diary sample and the data may be biased towards the population of competent diary keepers.

Participation: The best response rates for diary surveys are achieved when diary keepers are recruited on a face-to-face basis, rather than by post. Personal collection of diaries also allows any problems in the completed diary to be sorted out on the spot. Success may also depend on the quality of interviewing staff who should be highly motivated, competent and well-briefed. Appealing to respondent's altruistic nature, reassuring them of confidentiality and offering incentives are thought to influence co-operation in diary surveys. The FES gives a 10 pound postal order for completion of their fourteen day diary and other surveys offer lottery tickets or small promotional items.

Coding, editing and processing
The amount of work required to process a diary depends largely on how structured it is. For many large scale diary surveys, part of the editing and coding process is done by the interviewer while still in the field. Following this is an intensive editing procedure which includes checking entries against information collected in the personal interview. For unstructured diaries, involving coding of verbatim entries, the processing can be very labour intensive, in much the same way as it is for processing qualitative interview transcripts. Using highly trained coders and a rigorous unambiguous coding scheme is very important particularly where there is no clear demarcation of events or behaviour in the diary entries. Clearly, a well designed diary with a coherent pre-coding system should cut down on the degree of editing and coding.

Relative cost of diary surveys
The diary method is generally more expensive than the personal interview, and personal placement and pick-up visits are more costly than postal administration. For the majority of OPCS diary surveys, interviewers usually make at least two visits and are often expected to spend time checking the diary with the respondent. If the diary is unstructured, intensive editing and coding will push up the costs. However, these costs must be balanced against the superiority of the diary method in obtaining more accurate data, particularly where the recall method gives poor results. The ratio of costs for diaries compared with recall time budgets are of the order of three or four to one (Juster & Stafford 1985).

Computer software for processing and analysis
Probably the least developed area relating to the diary method is the computer storage and analysis of diary data. One of the problems of developing software for processing and manipulating diary data is the complexity and bulk of the information collected. Although computer assisted methods may help to reduce the amount of manual preparatory work, there are few packages and most of them are custom built to suit the specifics of a particular project. Time-budget researchers are probably the most advanced group of users of machine readable diary data and the structure of these data allows them to use traditional statistical packages for analysis. More recently, methods of analysis based on algorithms for searching for patterns of behaviour in diary data are being used (Coxon 1991). Software development is certainly an area which merits future attention. For textual diaries, qualitative software packages such as The ETHNOGRAPH can be used to code them in the same way as interview transcripts (Fielding & Lee 1991).

Archiving diary data
In spite of the abundance of data derived from diary surveys across a wide range of disciplines, little is available to other researchers for secondary analysis (further analysis of data already collected). This is perhaps not surprising given that the budget for many diary surveys does not extend to systematic processing of the data. Since diary surveys rarely have a remit which requires them to archive their data, there are only a limited number held in the British Data Archive at Essex University (see references below). Many diary surveys are small scale investigative studies that have been carried out with very specific aims in mind. For these less structured diaries, for which a common coding scheme is neither feasible, nor possibly desirable, an answer to public access is to deposit the original survey documents in an archive. This kind of data bank gives the researcher access to original diary documents allowing them to make use of the data in ways to suit their own research strategy. However, the ethics of making personal documents public (even if in the limited academic sense) have to be considered. The Mass Observation Archive holds hundreds of original diaries relating to contemporary experiences and events collected in Britain during the Second World War
 
Re: WORST CASE SOME ONE!!!

Study: For men, family comes first




Having a job schedule that allows for family time is more important to young men than money, power, or prestige, according to a new study released today by the Radcliffe Public Policy Center. Eighty-two percent of men ages 20-39 put family time at the top of their list, keeping pace with 85 percent of women in those age groups. Breaking ranks with their fathers and grandfathers on the important issue of work-family integration, 71 percent of men 21-39 said they would give up some of their pay for more time with their families.

"What we’re seeing is a transformation between generations and gender," said Paula Rayman, director of the Radcliffe Public Policy Center and principal investigator in the study Life’s Work: Generational Attitudes Toward Work and Life Integration. "Young men are beginning to replicate women’s sensibilities instead of women in the workforce trying to be more like men."

The national survey of 1,008 men and women ages 21 to 65-plus, funded by FleetBoston Financial and conducted by Harris Interactive, examined attitudes toward work, life and family across the generations. Researchers found a variety of contrasts between young and old, men and women, labor and professional occupations. The survey showed that increasing numbers of young men want to take an active role in raising their children; most workers perceive that their loyalty toward employers is not reciprocated; and many workers are sleep deprived.

"Today’s worker has more choices and more control over their career than ever before," said Anne Szostak, executive vice president and director of Corporate Human Resources at Fleet. "Any employer who ignores workers’ needs and expectations in the new economy does so at their own peril."

While women’s struggle to balance work and family has been a focus of much study, Center researchers discovered that family time is as important to young men as women. In fact, survey data show that young men in their 20’s are seven percent more likely than young women to give up pay for more time with their families.

For both men and women, the most important job characteristic shifts over time. The family-friendly work schedule favored by 84 percent of workers in their 20’s and 30’s shifts to an interest in challenging and rewarding work for 79 percent in their 40’s and then focuses on enjoyable co-worker relationships for over 86 percent of people 50 and older.

Seventy percent of men and women in all age groups agreed that gender roles have changed dramatically compared to their parents’ generation. The era where the father worked 40 hours a week and the mother stayed home with the children is long past for most Americans. Yet many respondents still held on to some old-fashioned notions.

Center researchers found that workers are of two minds when it comes to raising a family. While a resounding 96 percent of those polled said both parents should share equally in the care-taking of children, 68 percent also said they thought one parent should stay home during a child’s early years.
 
Re: WORST CASE SOME ONE!!!

" Communication is the act of the recepient


Easy Steps To Hands Off Passive Income
So you want to increase your Adsense income? Log into your Adsense account, and look at your last month's stats. There are three key areas that contribute to your earnings: Impressions, Clickthroughs and Effective CPM. Improving your stats in any, or preferably, all of these three key areas will increase your Adsense earnings.


Impressions

Impressions are the number of times your webpages with Adsense ads have been viewed. You can increase Impressions by increasing traffic (preferably targeted traffic) to your webpages. Some of the best ways to increase targeted traffic to your webpages include:

-create more webpages, with relevant, focused content
-create more links to your webpages
-list your website/s under relevant categories in more directories
-set up a directory of relevant sites on your website and accept relevant
reciprocal links
-write relevant articles, with your site information in the 'resource box' at the end of each article, and submit them to article directories
-advertise with pay per click search engines like Google's Adwords. www.Miva.com (formerly www.FindWhat.com, www.YahooMarketing.com (formerly Overture) and 100's of others. When of the best places for pay per click info is www.payperclicksearchengines.com with a descriptive list of 659 search engines.

Clickthroughs

Clickthroughs are the percentage of viewers who click on your Adsense ads. You can increase Clickthroughs by increasing the relevance of Adsense ads on your site, and by tweaking the format and placing of your ads.

Although you can't dictate which Adsense ads show on your site, you can
influence the relevance of the ads by maintaining a tightly focused website. If every page on your site focuses tightly on the site topic, its more likely that the Adsense ads will too. For example, if every page of your site is about fishing, and the word 'fishing' appears several times on every page, its likely that your Adsense ads will relate to fishing.

The best way to tweak your ad format and placement is to invest in an Adsense Tracker, and test, test, test! People who have done this tend to suggest that the best format is the large rectangle, with background and border the same color as the page behind it, so that the ad blends into the page. The best placement is towards the center or top left of the first screen of the page. Try these suggestions first, and then track and test, to be sure of what works best for your pages.

Effective CPM

Effective CPM is a measure of your average earnings, per thousand clicks. You can increase your Effective CPM by selecting topics that attract high bids from Adsense advertisers, and building pages and whole websites on higher paying topics.

Although Google doesn't release information on Adsense bids, you can get a good idea of the top paying topics by looking at information on Adwords bids, or, for that matter, bids on pay-per-click search engines like Overture. There are a number of keyword research tools available, both free and paid, that can help you find high paying topics.

The Formula

So now you have the basics of increasing your Adsense income. Its a deceptively simple formula:

-Build pages and websites on high paying topics for the best Effective CPM.
-Format and place your Adsense ads for maximum Clickthroughs.
-Promote your sites to drive targeted traffic to your Adsense webpages for maximum impressions.
 
Re: WORST CASE SOME ONE!!!

There is one stream that broadly is
concerned with documenting discrimination and bias, both empirical and conceptual and analysing
reasons and offering solutions.
And another stream that does not accept passive victimhood picture but is engaged in retrieving : cultural
and historical models of empowerment, protest and resistance, women's voices, women's writings,
women's sustenance of environment, women's contribution to national movement, and various subaltern
movements.
Dr. Ganesh gave a detailed account of how the gender perspective was dealt with in different disicplines :
economics, demography, political sciences, law, literature, history sociology anthropology, etc. In the
second part of her talk, Dr. Ganesh drew upon examples from her own work to illustrate how gender
relations were complex and nuanced and how gender as a conceptual category could not be understood
without reference to kinship, caste and the cultural matrix. There was no homogeneous ideological
framework for understanding gender. The cultural matrix had elements which denigrated or marginalised
women, and also elements which valued women's labour, fertility and sexuality. There were considerable
variations in the position of women, caste-wise, region wise and between caste communities and tribal
 
Re: WORST CASE SOME ONE!!!


Community/Professional Public Speaking Topics:

When Girls Feel Fat
Addresses what happens to girls in the process of growing up female that encourages them to define themselves by the number on the scale. Addresses gender, development, the stressors of adolescence and offers strategies to connect with girls and to help girls become aware of what feeling fat really means and the stories that lie underneath. (Can also include material on boys).

Getting Girls Off the Scale, Off the Couch and On With Their Lives
Addresses what happens to girls in the process of growing up female that encourages them to define themselves by the number on the scale. Addresses gender, development, the stressors of adolescence. Addresses fat prejudice and why girls are fat and the consequences of dieting. Looks at the barriers for girls to becoming physically active and provides useful strategies for parents, teachers, coaches and girls.

You Can't Come to My Birthday Party and Other Bullying Tactics
Understanding and taking action against bullying includes developing a comprehensive strategy that involves the school, parents, students and community as well as strategies for parents and students.

Developing Healthy Sexuality
Addresses male and female development, the different attitudes towards and experiences of sexuality for each gender, and the pressures that adolescents face. Includes practical suggestions and strategies for teachers, parents and adolescents.

Staying Connected: Surviving the Challenges of Adolescence
Addresses male and female development, the stressors that girls and boys experience during adolescence and the challenges they face. Includes skills and strategies for teachers and parents.

Strong Girls are Powerful Girls:
Encouraging Participation in Sport and Physical Activity
Studies show that by the time girls reach adolescence their aerobic capacity begins to decline. This talk addresses the benefits of physical activity for girls and the barriers that stand in their way of using their bodies. Contains practical suggestions and strategies of teachers and for parents.

Understanding Our Differences: Building Healthy Relationships
Developing an understanding of how gender can determine behavior and influence the relationships between the sexes. Contains practical suggestions for parents, teachers and adolescents to understand themselves and the other gender. Teaches communication skills that enable people to feel heard instead of criticized.

All Shapes and Sizes:
Helping Children Feel Good About Their Bodies and About Themselves
Explores societal beliefs around size and shape. Special emphasis on parenting and working with children who are ‘over’weight so that they can be fat with dignity.


Dealing with the Consequences of the War on Fat
Looks at what makes children fat, debunks myths around obesity and around fat and provides suggestions and strategies for teachers and parents for raising healthy, fit children, regardless of their size. (Can also apply to adult obesity).

Nurturing girlpower: Preventing Eating Disorders and Other Social and Health Risks to Girls
Provides an understanding of female development, a framework for prevention and practical skills and strategies for teachers and parents.

Restoring girlpower:
Supporting Girls who May Have Eating Disorders
Provides an understanding of female development, basic counseling skills to intervene with girls who might be at the beginning stages of an eating disorder and suggestions and strategies for supporting girls who may have eating disorders.

Breaking the Diet Syndrome:
Helping Women Get Off the Scale and on With their Lives
Addresses what happens to women in the process of growing up female that encourages them to define themselves by the numbers on the scale. Addresses gender, development and societal and media pressures to be thin. Presents skills and strategies to break the diet syndrome and to develop healthy self-expression and self-esteem.


 
Re: WORST CASE SOME ONE!!!

FRIENDS THIS IS THE KIND OF a STUDY ........................................



BARRIERS TO CHANGE: WHO GETS THE BLAME?

Nancy Mims

State University of West Georgia

(Return to Contents)

The idea of eliminating defects in the American school systems is ongoing. Administrators concerned with successful reform must ask themselves and the educational community what will be most important for students to lead productive lives in the future. The effectiveness of school organization and change depends upon the attitude of the administration. If what James McGregor Burns stated is true that leadership is one of the most observed, but least understood phenomena on earth, then we may need find a way to better understand leadership. Since schools' bureaucracies are deeply entrenched in tradition, change, especially from the top, seems unlikely to be effected without paying a price in the relationships between and among superordinates and subordinates within the organization. A seminar to discuss reform and restructuring held with several northwest Georgia administrators during the summer of 1996, produced another concern. Administrators unanimously stated that a lack of respect was found among student-teacher relationships. They also found instances of faculty-to-faculty disrespect as well as an abundance of apathy on the part of students, parents and the community. Thus, how faculty perceives the quality and knowledge of leadership and any barriers to effective change are important factors to study. Without an understanding of perceived barriers, change or reform within an organization cannot take place in the most superficial of practice. Most school reform and/or restructuring efforts target some form of shared governance or shared-decision making concept. The purpose of this study was to explore perceived barriers to shared governance or site-based shared decision making among public school faculty members in northwest Georgia.

Methodology

Based on a study of intimidating behaviors of school administrators, a survey questionnaire was developed to examine barriers to shared-decision or site-based decision making. The questionnaire consisted of six perceived barriers: ethics, gender bias, political interference, harassment, communication, personal values, cultural diversity, and resources. Respondents indicated the level of agreement (Likert scale) as to who was responsible for each barrier-the faculty or the administrator. Three open-ended questions were included on the questionnaire.

1. How do you define shared governance?

2. Through what actions and by whom is the concept of shared governance expressed in
your school?

3. Through what actions and by whom would you like to see the concept of shared governance
expressed in your school?

Demographic information was obtained from each respondent. The responses were compared by the demographic categories produced for these variables: current position (faculty or administrator), gender, school level (elementary, middle, and high), school location (urban, rural, suburban), school system (city or county), and years of teaching experience (at five year intervals). The sample consisted of one hundred-thirty graduate students from seven education classes (supervision, curriculum, research methods, and school law) held in various sites throughout northwest Georgia.

Although the sample was a convenience sample, the distribution of the demographic variables indicate that it was representative of students enrolled in graduate programs at the State University of West Georgia. Importantly, over half of the students (57%) reported that their school was participating in shared governance. Sample characteristics include the following:

86% faculty and 14% administration;

80% female and 20% male;

51% elementary, 23% middle, and 26% high school;

12% urban, 36% rural, and 52% suburban;

88% county and 12% city;

Teaching experience was fairly evenly distributed through the four categories, with a range of 17% (11-15 years) to 30% (0-5 years and 16+ years).

Findings

Two non-parametric statistical procedures were used to test the hypothesis of independence using nominal and ordinal data: the Mann-Whitney test, also known as the Wilcoxon test, and the Kruskal-Willis one-way analysis of variance. The former was used to test the independence of the nominal variables (e.g., position and school system) and the latter for the ordinal variables (e.g., school level, school location, and years of teaching experience). Content analysis was used to examine the patterning in the responses to the open-ended questions.

Barriers to Shared to Governance

Respondents whose schools were not participating in shared governance showed statistically significant differences in opinion from those whose schools were participating in shared governance in all barrier, except resources. Those not participating in shared governance attributed barriers to both members of the faculty and administration in: ethics, gender bias, harassment, personal values, and cultural diversity. They felt the administrator were more responsible than the faculty for the barriers of political interference and communication.

ETHICS

Significant difference between school location indicated that urban school personnel agreed more than rural and suburban that the both faculty (K-W, p<.02) and the administration (K-W, p<.006) are responsible for this barrier. Although the results were not significant (K-W, p>.05), the teachers in city school systems agreed more than county systems that both the faculty and the administration are responsible for this barrier. Also, elementary school personnel agreed more than middle and high that the administrator is responsible for this barrier.

Gender Bias

Significant difference was found between school locations, with urban school personnel agreeing more than rural and suburban that both the faculty (K-W, p<.02) and the administration (K-W, p<.01) are responsible for this barrier.

Personal Values

No significant difference was found between school level yet elementary school personnel agreed more than middle and high that the administrator is responsible for this barrier (K-W, p>.05).

Cultural Diversity

Significant difference was found between faculty and administrator (W U, p<.07), with more faculty agreeing that the party responsible for this barrier is the faculty.

Opinion differed by number of years taught with those teaching less than five years believing that the faculty were responsible for this barrier (K-W, p<.04). Interestingly, the opposite was found between city and county school systems (M-W u, p<.02), with city systems showing more agreement than county that the administrator is responsible for this barrier.

Significant difference was found between school location, with urban school personnel agreeing more than rural and suburban that the responsibility for this barrier is shared by both the faculty (K-W, p<.03) and the administration (K-W, p<.02).

Resources

Significant difference between school location, with urban school personnel agreeing more than rural and suburban that both the faculty (K-W, p<.01) and the administration (K-W, p<.02) are responsible for this barrier.

Definitions of Shared Governance

Eleven percent (14 of 130) of the students surveyed did not respond or state that they did not know what shared governance meant. Of those responding (N=119), nearly everyone mentioned the defining attributes of rule by faculty, staff and administration. These included their perceptions that the decisions made in school are done by the administration and the faculty working together toward a common goal and purpose; the faculty and administrators make decisions and policy together for the school; shared governance is the school management system whereby everyone involved has ownership. All participants share in decision making and taking responsibility. These participants also perceived their administrator as a facilitator. Teachers actively participating in building decisions such as instructional management, and teachers work as team member with administration to accomplish the goals of the school.

Very few responses included students (n=4 of 119, 3%), parents (n=3 of 119, 3%), or the community (n=3 of 119, 3%) in their definition of shared governance.

The next open-ended question asked: Through what actions and by whom is shared governance expressed in your school?

Thirty-four (26%) of those surveyed did not respond or stated that no actions were being taken with respect to shared governance in their school.

Seventy-four per cent (n=96 of 130) were involved in some form of shared decision making. However, no one described specific actions that were being taken in their school. Rather, they wrote of processes and meetings-school improvement committees, participation in Leadership Teams, Design Teams, or Empowerment Committees. Members of these teams, or those involved in shared governance, typically were the faculty and the administration. Participants mentioned that shared governance is done through committee made up of the administrations such as Leadership Team Committee. Others stated that they have "school improvement committees" and each faculty member has the opportunity to serve on these committees or to recommend and follow through on goals established to better the school.

The principal and executive council usually set agenda for committee meetings school improvement teams and executive council (one member of each of five teams and two members at large) task forces.

At some schools, a teacher advisory council includes a teacher from each team and from the exploratory classes. This council discusses various school policies and toss around ideas for new rules or lessening of rules.

Very few of the participants (2 of 96, 2%) specifically mentioned the curriculum. The only comments made concerning curriculum were that the leadership team meets weekly then in turn they meet with their team or grade level to share ideas and activities to carry out the curriculum and its enhancement. One other comment was that the current principal uses joint or shared decision making only in areas concerning the curricular issues. Through what actions and by whom would you like to see shared governance expressed in your school?

Thirty-seven (28%) of those surveyed did not respond or stated that they did not know what their school could do to participate in shared governance. Seven-two per cent (n=93 of 130) had opinions either regarding how they would like to see their school involved in shared decision making or whom they felt should be responsible for the actions. Interestingly, although accounting for only 14% (13 of 93) of those with opinions, most were satisfied with current efforts in shared governance at their school. Other expressed a diversity of opinions regarding actions for improvement: curriculum, texts, materials, activities, and schedules (12 of 93, 13%); rules (3 of 93, 3%); general school policies and procedures (3 of 93, 3%); discipline (2 of 93, 2%).

Others indicated who should be responsible for these actions: teachers, faculty, staff (28 of 93, 30%); both faculty and administration (11 of 93, 12%).

Some respondents volunteered persons who they perceived as barriers to change in their system: state, county, school board (8 of 93, 9%); administration, principal (5 of 93, 5%).

Comments representative of actions and who should be responsible included the following: "I would like more voice in important school issues (discipline, curriculum, schedules)." "More say so in the texts used on the various grade levels by the teachers, instead of choosing the same textbook company for all grades." "Curriculum and classroom management. Teaching staff making more decisions concerning policies regarding the above mentioned." "I would like teachers to be able to enforce their rules and be able to teach what and how they think is best (not same for 200+ students of all different abilities)." "All actions hiring, rules, schedules should be governed by a team. The team should consist of new teachers as well as more experienced." "Faculty and administration working together with less involvement from the central office." "I would like to see shared decision-making by administration and faculty in regards to curriculum."

Comments about the county, state or school board as barriers included these remarks: "I don't think the problem lies within the school as much as the restrictions set by our county office or the state." "The county administrators need to give us an even freer hand to do such things as establish a school dress code (uniforms), decide our own yearly schedule or decide if and when we will do standardized testing."

Regarding the principal or other administrators as barriers: "Principal should have more say and be heard by the board." "There should be more actions on the part of the principal. Principals must be willing to share their power."

Conclusions

Responses to the open-ended questions were meaningful and somewhat surprising because of the plethora of literature on shared governance and/or the number of school districts that practice, in various degrees, this concept. It should be noted that city systems are smaller units-usually consisting of no more than two or three elementary schools, one or two middle schools and one high school.

City school personnel, perhaps because of size, indicate a joint responsibility toward barriers of practicing ethics. They believe, however, that the administrator is a barrier to resources and also for a lack of cultural diversity. This is interesting because there is usually more diversity found within the city limits, and there are often more tax dollars available to schools-especially when the city system is also in an urban area.

Elementary schools, by nature, are smaller units than most middle schools or high schools, and a "family" atmosphere may account for the fact that elementary school personnel believe the principals is a barrier to personal values and ethics which are closely related.

Of particular interest are the responses from urban areas regarding gender bias, cultural diversity, and resources. Urban school personnel find that both the faculty and administration are barriers in these three areas. Knowing this, the implications are that these barriers be addressed, in detail, not only through some method of staff development, but also in college courses.

Of note is that most of the new schools are being built in the suburbs which may imply greater resources, yet the beliefs of suburban respondents regarding changed were most aligned with rural teachers.

A summary of the responses to open-ended questions may provide some insights as to how and why faculty members perceive barriers to shared governance. Most participants defined Shared-Decision-Making as a process: developing teams, belonging to teams/committees. Very few responses mentioned the curriculum, the students, or the community-at-large as being a part of the actions. Responses regarding how they would like to see shared governance expressed are dealing with procedures, and materials.

Implications

Until the educational community can get together to fully understand that reform, restructuring, or renewal efforts should impact student achievement, and shared governance should focus on those concerns, there will be barriers to implementation. The focus, perhaps, is not where it belongs.
 
Re: WORST CASE SOME ONE!!!

Barriers to Effective Communication

There are a wide number of sources of noise or interference that can enter into the communication process. This can occur when people now each other very well and should understand the sources of error. In a work setting, it is even more common since interactions involve people who not only don't have years of experience with each other, but communication is complicated by the complex and often conflictual relationships that exist at work. In a work setting, the following suggests a number of sources of noise:
Language: The choice of words or language in which a sender encodes a message will influence the quality of communication. Because language is a symbolic representation of a phenomenon, room for interpreation and distortion of the meaning exists. In the above example, the Boss uses language (this is the third day you've missed) that is likely to convey far more than objective information. To Terry it conveys indifference to her medical problems. Note that the same words will be interpreted different by each different person. Meaning has to be given to words and many factors affect how an individual will attribute meaning to particular words. It is important to note that no two people will attribute the exact same meaning to the same words.
 
Re: WORST CASE SOME ONE!!!

Gender Barriers in Athletics


What are the social and cultural costs and benefits of an individual (male or female) entering a non-traditional sport for their gender/sex (eg women who enter body building, power lifting, boxing; men who enter synchronized swimming or field hockey)?

Throughout history it is clear that not only women, but both genders have faced seemingly insurmountable barriers when attempting to break into a sport that is not "proper" or stereotypical for their gender to participate in. Though as a society we are making strides towards equality in sport, such as the advent of Title IX, it is clear that we still have a long way to go. Though breakthrough policies such as this are moving in the right direction, other evidence points towards the fact that as a society, we are still more comfortable with women in traditionally female sports such as field hockey as opposed to boxing, and men in traditionally male sports such as body building as opposed to synchronized swimming, since these activities fit with our preconceived notions
 
Re: WORST CASE SOME ONE!!!

Overcoming Communication Barriers between Genders


Roles of men and women

Of the many changes which have taken place in American society since World War II, one of the greatest has been in the roles of men and women. Members of both genders have lived multiple roles in the past, but these were generally established ones, such as men being the wage earners and women the caregivers.

Communication followed largely defined cultural and societal norms. Usually, nuances in speech and in body language could readily be interpreted. As Archie Bunker nostalgically sang in television’s "All in the Family," "... and you knew who you were then; girls were girls and men were men."

Many of the roles have remained the same, but now they frequently are carried out by members of either gender. Women have careers in engineering or sports; a growing number of men have full-time care of home, children, and the disabled. Both men and women have a variety of jobs in the workplace and positions in the hierarchy of management.

Communication between the genders has become more prevalent and pervasive in society, as norms have changed. When one adds the mobility of the American population and the differences among the cultures they represent, both the importance and difficulty of effective communication increases. Now medical and sociological researchers are offering aid, even across cultural lines, in gender communication.
 
Re: WORST CASE SOME ONE!!!

In a perfect world there would be no social barriers. Everybody would get along no matter what their social or financial standing. However, there is no such thing as a perfect world, only a world filled with prejudice and hatred. The theme of Great Expectations shows that social class and an abundance of money are worth less that love, and family.
A high social standing, and money do not provide the necessities of a happy life. Great Expectations shows that people of a high social class are only popular amongst themselves. The reason for this is that to retain their social standing, they are not to have relationships with lower class people. If it is found that they do accept these people as part of society, they are their peers shun them. Likewise, money does not provide a happy future. Money can only buy material possessions. For a truly happy life, one must have healthy relationships, like that of Joe and Biddy. A person with money and no social skills will often become depressed due to their lack of relationships.
Even the poorest person can lead a richer life than the wealthiest man in the world. Happiness comes easy to a happy family that gets along. Money isn’t needed for a fun time either. A poor family can entertain each other with good conversation. Low class people get along with a variety of people. There are no stipulations on who a low-class citizen can talk to, where high-class people have such barriers as peer pressure and spoiled tendencies. Life is much easier socially for a person who is not concerned about what others think of them.
The message that social classes and money are worth less than love, and family is important to remember in every day life. The central theme of Great Expectations is very complex. It sends a good message to readers
 
Re: WORST CASE SOME ONE!!!

Breaking Down Barriers with Positive Feedback


Each one of you is faced with the challenge of giving feedback each day. Whether it is on a stimulating topic in class or something as simple as telling a friend whether or not you like the outfit that they have on, giving feedback is something that everyone has had experience with. However trivial this process may seem, it is imperative that one understands its importance. This semester I took a course called En101, or College Writing. In this class we are required to give feedback on essays and articles. Giving negative feedback is often easier than giving positive feedback. In fact, most people would probably admit that giving positive feedback is very difficult for them. The same things applies in my College Writing class. Most students find that the most difficult thing to do in this class is to give feedback without saying something negative. However, we all have to learn how to give positive feedback, or be prepared to face the consequences.
 
Re: WORST CASE SOME ONE!!!

FRIENDS THIS IS THE MOST TALKED ABOUT RESEARCH STUDY DO READ

ABSTRACT

Department of Education statistics suggest college enrollments to be approximately 20 million by the year 2010 (Cardenas, 1998). Implementing "distance education" based on computer-mediated communication (CMC) is one of the main ways these institutions are addressing rising student enrollments and related costs. According to a recent study by the American Demographics (1994), women are about equally likely to use home computers for educational purposes, and have been forecast as a major target market for CMC-based higher education (Anwyl, Powles, & Patrick, 1987). Although distance education may extend access to learning opportunities for adults who otherwise might not be served (Gardner and James, 1995), it cannot be assumed the CMC-based distance education provides an equitable learning environment when traditional higher education has been well-documented to have inequitable characteristics for female students (Woolf, 1938; Gilligan, 1982; Hensel, 1991; Tisdel, 1998). This research project was an interpretative qualitative case study of higher education students learning through asynchronous, CMC-based distance education. Subjects consisted of adult professionals studying for bachelor and master degrees. Male and female preferred learning styles, communication patterns, and participation barriers (Cross, 1981) were compared for differences in gender. On-line differences were then contrasted with traditional gender differences in face-to-face (F2F) higher education learning environments. Results of content analysis from one month of on-line student messages suggests there are gender differences between male and female distance education students. Findings suggest the CMC-based distance education environment supports gender differences which are both similar and different from the traditional face-to-face learning environment. Major findings supported Belenky, Clinchy, Goldberger and Tarule's (1986) model of the male separate learner and the female connected learner; found higher dispositional, situational, and institutional barriers for female distance education students; and indicated a high tolerance of male domination in on-line communication patterns which effectively silenced female students. Implications for practice are discussed.


INTRODUCTION

Gender equity in higher education is more than putting women on equal footing with men--it is eliminating barriers to participation and stereotypes that limit the opportunities and choices of both sexes. Gender equity is about enriching classrooms, widening opportunities, and expanding choices for all students (Bailey, 1996).
According to the Department of Education (1997), one of the main ways higher education institutions are facing rising student enrollments and increasing costs is to implement distance education programs based on asynchronous, computer-mediated communication (CMC). In spite of the increase in CMC-based distance education, there are few studies which are based upon a gender-conscious perspective (Burge & Lenskyj, 1990; Carl, 1988). For example, although gender differences in terms of lower participation in education and employment are widely documented for both science and technology in general (Faulkner & Arnold, 1985), and for computer technology in particular (Hoyles, 1985), distance education is still touted as a form of education better suited for women (von Prummer, 1987).
Anwyl, Powles, and Patrick (1987) have forecast women as a major target market for distance education institutions. As more higher education organizations implement CMC-based distance education, a growing concern is that the needs of female distance students are not being met.
According to Merriam (1988), interpretative case studies are useful when, because of inadequate or outdated theory, hypotheses cannot be developed to structure the research design. Glaser and Strauss (1967) would label this grounded case study methodology where theory is built from descriptive data "grounded" in real-life situations. Roberts, Smith, and Pollock (1997) found that grounded theory has been successfully applied to CMC-based environments. For these reasons, a case study analyzing higher education students attending CMC-based distance education was the chosen methodology. The results of this research can then be used as a theoretical model to create equitable CMC-based distance education learning environments for both male and female adult students.

PURPOSE

The purpose of this study is to examine male and female students in relationship to increased reliance upon asynchronous, computer-mediated communication (CMC) based instruction and to an increased number of female students. Asynchronous CMC-based distance education will be examined to determine if the environment is equitable for both male and female distance students. By examining barriers to participation, learning styles, and communication patterns of on-line student messages, this study's purpose is to determine if there are any significant differences between male and female higher education students in CMC-based distance education. Any differences can then be compared to gender differences in traditional higher education face-to-face (F2F) learning environments. These differences can then be used to create a working model for CMC-based distance education institutions that is equitable for both male and female adult students.

METHODOLOGY


Data Collection

Data was collected from 149 on-line messages of students attending a large, U.S.-based higher education distance organization which primarily uses asynchronous, CMC-based technology for instruction. Students are non-traditional undergraduate and graduate students over the age of 25. Students are career-oriented members of the labor force who are working full-time in a chosen career and attending school on a part-time basis. Most students come from all occupations and ranks, but they are primarily from the ranks of middle and lower management, supervisors, technicians, specialists, and to a lesser extent, the most ambitious of the front-line production and service workers. On-line student messages were drawn from a school-provided electronic student forum (similar to a listserv) for a period of one month. Students used this forum to discuss school-related issues with other on-line students at the university. The month of March was selected because most students posting messages during this time period had at least six months distance education experience. To protect the confidentiality of the distance education organization and its students, the institution was labeled OU.

Framework for Data Analysis

Messages were analyzed for gender differences by performing a content analysis using Nud*Ist software. Belenky, Clinchy, Goldberger, and Tarule's (1986), and MacKeracher's (1994) separate and connected preferred learning style models were used as a framework to compare learning styles of male and female messages. According to these studies, in face-to-face (F2F) learning, adult students typically prefer to learn in either a separate or connected manner. Students who prefer to learn in a separate manner are associated with autonomy, separation, certainty, control, and abstraction; the gender of separate learners is often male (Gilligan, 1982).
In contrast, Belenky's et al. (1986) and MacKeracher's (1994) connected learning style is one which places emphasis on relationships, is empathetic in nature, and one where cooperation is stressed rather than competition. Gilligan (1982) suggests that the gender of connected learners is often female.
Participation barriers were analyzed following Cross's (1981) model of classifying barriers into institutional, situational, and dispositional categories. Institutional barriers consist of all those practices and procedures that exclude or discourage students from participating. Situational barriers are those arising from one's situation in life at a given time. Dispositional barriers are those related to attitudes and self-perceptions about the student as a learner.
Communication patterns were analyzed through the use of several models. First, differences in male and female messages were compared following Lakoff's (1975), Goodwin's (1980), Maltz and Borke's (1982), and Cameron's (1992) research which analyzed communication for words indicating feminine and masculine tones. Following these models, feminine tones are defined as being elegant in nature, while male tones are determined as those consisting of a more rough content. For example, rough words used in this context would consist of slang, swearing, and words which are considered to be short substitutions for lengthier words of the same meaning.
Second, Michel's (1992) model was used to determine the nature of the sender's position. For example, tone, content, and length of each message was analyzed to gain insight on the position of the sender as one seeking power, striving to help others, or as one seeking to establish status.
Third, messages were categorized by gender for frequency (Vanfossen, 1996), domination, initiation, and the use of tag words which Katz & Aspden, (1997) found females in a face-to-face environment frequently employed and implies a connected learning style. Tag words are those at the end of a sentence used to confirm a statement. For instance, the words "isn't it" are tag words when used in the context of "it's really cold in here, isn't it?"
Fourth, messages were analyzed for the quality of the sender's writing ability following Suler's (1996) model, and Herring's (1994) model of different communication styles. For example, in his model, Suler (1996) suggested that the writing quality of the sender's message determines the number and type of responses. Using this framework, messages were categorized by writing ability measured on, for instance, grammar, insults, derogatory words, and slang. Herring's (1994) model of two distinct styles of personal and impersonal on-line communication was similarly used to compare male and female on-line student messages. Using Suler's (1996) and Herring's (1996) models as a framework, messages were categorized as personal if they were supportive in nature, contained references to self or family, or were generally considerate of others. In contrast, messages which contained put-downs, were assertive, or were abstract with no references to self, personal experiences or family were categorized as impersonal.
Lastly, messages were categorized and counted by gender for the number of words in each message, number of sentences in each message, number of messages posted (rate of participation), number of responses, and number of questions asked.


RESULTS

Results of content analysis suggested patterns which indicated that on-line students prefer to learn the same as F2F environments where learning style preferences differ by gender. Data patterns supported Belenky's et al. (1986) and MacKeracher's (1994) models of male separate and female connected learning styles.
Data patterns of on-line messages exhibited similarities to F2F male and female learning styles in several ways. First, similar to F2F learning, male students exhibited characteristics of attempting to control the on-line environment. For example, when a question was posted by either male or female on-line students, more males responded than females (58% more). Males also posted 9% more messages than female students. Neither of these patterns are conclusive when considered separately. However, the frequency of male responses to questions, when combined with a greater number of male messages, suggests that males control the on-line environment at OU. These results support findings of traditional learning environments where the separate male learning style has long dominated female students by simply speaking more in the classroom (Gilligan (1982).
Second, the content of male messages often had a tone of certainty (76.7% of all messages that had a tone of certainty were from males). Messages were "certain" in their tone because they were slightly arrogant, were brief in length, and not tempered by polite words to reduce negative reactions of the reader. These messages were absolute in their certainty of the sender's conviction of being correct. For example, one male student posted a response to a student questioning the blame of MCI (a telephone company) as responsible for Internet access problems:

Why would MCI be responsible for your ISP's [Internet Service Provider] connection to their backbone? I would expect AT&T to blame their number one competitor. I use MCI as my ISP and have never had one problem. Maybe you need to switch ISP's.

Male messages with a tone of certainty were quite common. In yet another example, a male student argued that another male student "was confused" when the student attempted to disagree. These tones of certainty from male students at OU supports Belenky's et al. (1986) model of the male separate learner for F2F learning environments.
Third, data patterns of on-line messages exhibited similarities of F2F male learning styles because on-line male students often communicated in an abstract manner (78% abstract messages were from males). This follows Belenky's et al. (1986) and MacKeracher's (1994) model of the male separate learner. For example, many male messages provided facts presented in an impersonal nature . Most male messages were also shorter than female messages (the exception were jokes). The content of these messages contained no tag words, no questions, no references to self, personal experiences, or family, nor had any additional words other than statements. For instance, one male student posted a response to a question about where to obtain used books by simply stating, "You can get used books from other people through a meeting called OU On-line Book Exchange". In contrast, female responses to the same question resulted in messages containing more emphatic content. For instance, these messages included the use of on-line symbols for smiles (87.5% of all messages containing :-) or were from female students), and the additional sentence tempering the content with such content as "just a thought" following a statement (all messages using tag words were from female students). In yet another example, one female student's message contained the following similar empathetic answer:

...have you tried your local public library, or a library loan from a nearby campus library? The overdue fees are usually more cost effective if you are not interested in using the book as a future reference. Just a thought. :-).

On-line female students also exhibited characteristics of F2F learning styles because they exhibited signs of preferring to learn in a connected manner following Belenky's et al. (1986) and MacKeracher (1994) models. These models suggest that female students place emphasis on relationships, are empathetic in nature, and prefer to learn in an environment where cooperation is stressed rather than competition. This occurred at OU in several ways.
First, female messages did not contain the tone of certainty male messages exhibited. Instead the content was often empathetic (66% of all messages of an empathetic nature were from female students). In contrast to male messages, female messages were tempered with polite words acknowledging the original sender. For example, many female students attempted to modify their responses when they disagreed with a previous message by slightly agreeing at the start of their response. This was then followed with a "but", after which a disagreeing statement continued (66.7% of all messages with this pattern were from female students).
Second, female messages contained the niceties people often use when they care about relationships. For example, female students almost always added "thanks" or "thank you" to their messages (81% of all messages containing the word thanks or thank you were from female students). Other niceties included personal remarks added to absolute statements (83.3% of all messages containing personal references were made by female students). For instance, one female student, when posting precise directions on how to back up a file on a computer, ended the directions saying "these notes really helped me out, hope you and whoever else can use them also!".
Third, similar to F2F female students, women on-line at OU preferred to learn in a connected manner because data patterns suggested that cooperation was used as a learning tool. For example, more females than males asked questions (80.8% of all questions were asked by female students). Females students asked for help from other students on such things as course assignments, tips on getting through the program, saving money on textbooks, and obtaining grades. Female students seemed to prefer learning from other students rather than going through formal channels for information. In conclusion, findings showed gender differences for on-line students indicating males prefer to learn in a separate manner while female students prefer to learn in a more connected style. This supports Belenky's et al. (1986) and MacKeracher's (1994) findings for F2F traditional learning environments.
Data was also analyzed for differences in male and female participation rates using Cross's (1981) model of classifying barriers into institutional, situational, and dispositional barriers. Institutional barriers are defined as all those practices and procedures that exclude or discourage students from participating. Results suggested several areas of concern for female on-line students in distance education which are different than males, and are different than the F2F learning environment.
First, the technology required "attend" courses was a substantial institutional barrier for on-line female students. Patterns in the data from the content analysis indicated that females asked more technical questions than males (66.7% of all technical questions were posted by female students). The content of such messages often contained a tone of concern over institutional issues such as problems with the software used to connect to classrooms, technical problems with outside software used to find information on the World Wide Web, and general, computer-related concerns. These findings are consistent with recent studies (Baine, 1991; Kantrowitz, 1994; Tannen, 1994) suggesting that females have higher technical barriers. Unlike traditional F2F learning environments, this is cause for greater concern in CMC-based distance education which requires more computer skills.
Second, the content analysis revealed a related female concern over another institutional barrier of CMC-based distance education: More females than males were frustrated or worried about the fast pace of on-line courses at OU (62.5% of all messages concerned with the fast pace were posted by female students). This may be related, at least initially, to the higher technical barrier for female on-line students; most of the messages of this nature indicated the sender was a fairly new student enrolled in their first to third course. This pattern is also unique to the on-line environment because most traditional F2F college environments have courses of a much longer duration.
Third, both male and female OU students showed frustration over the timeliness of the institution's responses on issues such as grades and financial aid. For example, many students wrote that they expected answers much faster than they received them and indicated by the nature of the medium. Expectations seemed to be much higher for institutional response time than F2F learning environments.
Situational barriers are those arising from one's situation in life at a given time. Results of content analysis suggested that some situational barriers are higher for females than males in the on-line environment. More females than males commented over a lack of time (66.7% of all messages concerned about time were posted by female students). The OU environment has been established for and currently targets working professionals. As a result, most of the students have full-time jobs. In contrast to male students, many female students indicated they were also responsible for and/or primary caretakers of children and homes. Findings suggest that the situational barrier of time is a greater concern for female on-line students than it is for males. It is also at least as much of a barrier as it can be for adult female students in F2F environments.
In addition to more concerns about time, female students voiced more concerns than males over cost of tuition, books, software required for courses (i.e. statistical packages), and connecting to the Internet for research. Studies (Baine, 1991; Eager, 1991) have indicated these situational barriers have been greater for females than males in F2F environments. Results of the data suggest that females have similar higher situational barriers in the on-line environment.
Dispositional barriers are those related to attitudes and self-perceptions about the student as a learner (Cross, 1981). Patterns found by the content-analysis using Belenky's et al. (1986) and MacKeracher's (1994) framework of male separate and female connected learning styles suggested that the on-line male learning style had elements of a controlling nature. For instance, male messages were often arrogant, had a tone of certainty, and were controlling in nature (76.6% of these type of messages were posted by male students). These patterns support the theory that dispositional barriers for on-line males are lower because their self-perception and attitudes are higher.
Findings of the content analysis also supported studies (Spender, 1981, 1982; Leveson, 1984) which suggest that in F2F college environments, males dominate the learning environment. This was supported by two patterns. First, more males than females posted messages on-line (9% more) and answered more questions (79% of all responses to questions were posted by male students). Second, male students tended to dominate the on-line discussion for a time period (many times over days). When a female interjected a message, the resulting trend was an abundance of more female messages. Time after time this female pattern of communication was stopped by a male message of an extraordinary length (usually pages and pages), a message containing a female "put-down", or a message of an arrogant nature. After this occurred it was often days before female students would post any messages.
Male domination was accomplished in a variety of ways on-line. For example, techniques which stopped female responses were very lengthy jokes of a sexual nature (males posted 63% of all jokes posted and posted 95.5% of all jokes of a sexual nature). Other techniques were male messages containing words deemed as "shouting" in CMC environments (words typed in CAPS), the use of slang, and messages telling females to "stop whining about...the problem" (a response to a female posting a technical question).
Once a female student did post a message, this action seemed to start a trend of female messages in abundance. However, each time this occurred, similar to F2F college environments, an "interruption" by a male effectively stopped female communication for a period of time. In summary, data supported the theory that on-line female students have higher dispositional barriers than males because similar to F2F environments, males tend to dominate the learning environment. The means used to dominate females by male students are slightly different on-line, but the silencing of females is the same.
Further analysis showed a pattern of female messages expressing a concern (often a fear) of not succeeding in school (100% of all messages of this sort were posted by female students). This is similar to F2F environments where studies (MacDonald & Knights, 1979; Vallos, 1992) have shown that female students often have lower confidence levels than their male counterparts in education and with using computers (Sanders, 1993; Petzing, 1996). In the on-line environment, this was portrayed by patterns of female messages concerned with either stating fears, or helping to alleviate other students' similar fears. For example, there were many messages about the fear of returning to school after a lengthy absence, fears of succeeding in a course, and concerns over using the required technology to attend school. For instance, a message posted by a female student stating her fear of "having what it takes to return to school" produced seven responses from other female students indicating they either felt or had felt the same emotion. In summary, results suggested that, similar to F2F traditional learning environments, female students at OU have high institutional, situational, and dispositional participation barriers; these are higher than males. When lack of technical skills, fears about distance education, and lower confidence about the nature of the medium of CMC are combined with these barriers, findings suggest participation barriers are even higher for CMC-based distance education female students than female students in F2F learning environments.
Gender differences were found in communication patterns for OU's on-line students. Some of these differences were similar to F2F communication. For example, female messages consisted of words of a more elegant nature. For instance, the word "acquire" was typically used by female students. In contrast, male messages used the word "get" to express the same meaning. In yet another example, more females used the word "received," while males used the word "got."
Second, the overall tone of female messages were less rough in nature (for example, 62.5% of all messages containing slang were posted by males). Males used arrogant tone with words of a more assertive nature, formed in a manner which included "rough" words. For example, some male messages used such words as "hey guys, need help...". In contrast, more females used less rough sentences to address others such as "Hello, I would appreciate advice...". Males used slang and shouted more (in CMC, the use of CAPS indicates shouting). These findings support findings for traditional gender communication differences (Lakoff, 1975; Goodwin, 1980; Maltz & Borke, 1982; Cameron, 1992).
Similar to F2F communication, data patterns imitated gender differences in the nature of the sender's position. According to Michel (1992), the tone, length, and content all indicate the nature of the sender's position as one establishing power, status, or striving to help others. An analysis of the message content indicated more males answered technical questions (80% of all technical responses were from males); the response was often certain, assertive, and slightly arrogant in nature. This could indicate those males as students seeking status supporting O' Barr's (1982) and Michel (1992) research finding males in F2F communication often have an underlying purpose of establishing status or power. Other studies support this theory (Key, 1975; O'Barr; Baine, 1991) that in F2F communication, especially in higher education (Spender, 1981, 1982; Leveson, 1984), males typically attempt to seek power and status and domination (Vanfossen, 1996) through communication.
Female communication patterns at OU also imitated F2F communication indicating a preference for collaboration (Gilligan, 1982). For example, many female students both asked for and responded to pleas for help (80.8% of all questions were posted by female students). In addition, results showed that female students used tag words more often than males (100% of all messages containing tag words were posted by female students). This supports Katz and Aspden (1997) findings of gender differences for F2F communication. Results also suggested that the grammar of female distance education students at OU contained fewer insults, less slang, and almost no derogatory words. In contrast, male messages contained more slang, some insults, and were sometimes derogatory (96% of all messages containing "put-downs" were posted by male students). These results were similar to Suler's (1996) on gender differences in F2F communication.
Males at OU posted more jokes (63% of all jokes were posted by male students), in particular after a pattern of many female messages. Most were of a sexual nature (95.5%). Females posted few jokes, although sometimes they seemed to be posted by OU female students in defense of a wave of multiple postings by males of jokes of a sexual nature.
And lastly, female messages suggested a more personal nature because the content often had references to self, life experiences, or family (83.3% of all references were posted by female students). In contrast, males did not contain personal references and contained more impersonal statements. These patterns supported Herrings (1994) research on gender differences for F2F communication showing that females have a more personal style of communicating style while males communicate in a more impersonal manner.
In summary, results suggest that gender differences in communication patterns for male and female students in CMC are the same as F2F communication. Females communicate in an elegant way, while males are generally rough with the use of shorter words and slang. Males communicate with an underlying purpose of seeking power or status while females more often communicate striving to help others. Males dominate the conversation, effectively silencing females. Females use tag words to justify a statement, while males use slang, insults, derogatory words, and often post jokes of a sexual nature. And lastly, females communicate in a more personal manner, often including mention of self, personal experience, and family in their messages. In contrast, male messages did not contain such references, instead they contained impersonal statements in an abstract manner
DISCUSSION

Findings from this study suggest that on-line higher education students learning through CMC-based distance education prefer to learn the same as students in a F2F environment. On-line male students exhibited separate learning styles while females showed a preference for connected learning. These findings are supportive of Belenky, et al. (1986) and MacKeracher's (1994) models of F2F learning for males (separate) and females (connected) and agrees with Severiens and Ten Dam's (1997) more recent study.

One finding which deserves serious consideration is the data pattern suggesting, similar to Gilligan's (1982) findings in F2F learning environments for higher education, males tend to dominate the on-line environment. Although the techniques used by male students were different than F2F environments, the end result was a similar "silencing of female students." This finding did not support other studies which found that women are not silenced in distance education (Kelly, 1987; Martin, 1988) but did agree with Eager's (1991) study suggesting males dominate distance education. However, data did indicate a pattern of more females requesting help from other students, especially when they had initial positive responses. This is somewhat different than F2F environments and supports studies which contend that distance education allows a pedagogy preferred by women that is sharing and interactive (Block, 1984; Gunawardena & Little, 1998), and provides an environment for differing learning style preferences (Daloz, 1987; Anderson, 1995; Romero, 1995; Murphy, Segur & Kodali, 1997; Thompson, 1997; Stoney & Oliver, 1998) because distance education has collaborative potential (Mason, 1994; Collis, 1997; Jehng, 1997).

Findings of on-line institutional barriers at OU suggested that, similar to F2F learning environments originally noted by Virginia Woolf (1938) and supported by later research (Stalker, 1996), there are higher barriers for females than males. However, findings suggested that for on-line females, this barrier could be even higher because the nature of the medium which requires at least some technical skills and supports recent findings (Murph, Segur & Kodali, 1997) that female students have a lack of confidence with distance education. Studies abound showing that females have fewer computer skills (Cross, 1981; Kantrowitz, 1994; Tannen, 1994), less access to computers in prior educational years (Kirkpatrick & Cuban, 1998), and have lower confidence levels with computers (Sanders, 1993; Petzing, 1996). In addition, data suggested that females have more concern than males over the fast pace of CMC-based higher education, supporting Baine's (1991) findings. Gibson's (1998) found that distance education's lower confidence levels are due to their unfamiliarity with the process and related role expectations in distance learning; further research is needed to determine if distance education confidence levels are correlated with the pace of CMC-learning environments.

Both male and female barriers for on-line environments could be higher as the nature of the medium produces an expectation of rapid institutional and faculty responses as suggested by Anderson's (1997) study. When this fails to occur, higher frustration is felt by both genders than in the F2F learning environment, where more tolerance might be the norm as found by Hewitt and Seymour (1997).

Findings supported previous studies suggesting that females have higher situational barriers in higher education related to lack of time (Grace, 1991; Hensel, 1991; Muro, 1988). Data suggested that females enrolled in distance education have even less time than traditional students in F2F environments because in addition to being primary caretakers, many of the female students were also full-time working professionals. This finding agreed with Eager's (1991) and Katz & Jarvis's (1996) studies.

Female students on-line also were more concerned about costs. This supports Baine's (1991) and Harman's (1997) studies which found cost to be a difficult barrier to overcome for women in distance education. Eager (1991) agreed, suggesting that this was the experience of distance education women worldwide. For example, Strong and Harmon (1997) found average costs of CMC-based distance education master degrees to range from $7,155 at The Graduate School of America (p. 63) to $19, 085 at The University of Phoenix On-line (p. 60).

Barriers of a dispositional nature were found to be the same as F2F environments consisting of male domination found by Spender (1981, 1982) and Leveson (1984) and lower female confidence (Petzing, 1996; Sanders, 1993) in self (Darkenwald & Valentine, 1985; Gallos, 1992; Steinman, 1992), and in learning (MacDonald & Knights, 1979). Findings also supported computer studies which suggest that on-line females have lower confidence in general (Sanders, 1993), higher insecurities about learning (Knapper, 1989; Sweet, 1986; Oaks, 1996; Galusha, 1996) and higher negative attitudes (Kantrowitz, 1994; Tannen, 1994) towards computers than men.

Communication patterns exhibited by on-line higher education students at OU were both the same as F2F environments, and yet they were different. Several traditional gender differences in communication were discovered for distance education students. For example, female students posted messages using elegant words supporting Key's (1975) findings on gender differences for F2F communication. In contrast, males posted messages which often had words of a more rough nature. Males were often assertive and seemed to be trying to establish status and power, supporting O'Barr's (1982) study of F2F communication and Baine's (1991) and Hackett's (1994) studies which suggested male and female traditional communication continues to be the same in computer-mediated communication. This was especially true when answering technical questions. In contrast, women voiced more concerns over helping others, supporting Herring's (1994) study which found that on-line females have supportive styles, and found that only males used rude, derogatory, or inappropriate language. This agrees with Suler's (1996) study on CMC grammar which found that male messages often contain insults and slang of a derogatory nature and supports Cropland, Driskell, and Salas's (1996) study which found that women are better able to encode happiness while men are better able to encode anger.

Communication in CMC was also found to be the same as F2F communication because female students included personal information in their messages and related this to the conversation. For example, spouses, children, homes, and geographical area information were some of the things related to the subject of discussion. In contrast, male students seldom incorporated personal subjects into the topic. The lack of personal content by males supports the male impersonal communication style suggested by Herring's (1994) study of on-line communication.

Communication patterns were different on-line where male domination seemed to be stronger than F2F communication because it was more tolerated. Similar to F2F communication, when males dominated the conversation, females were silenced. For example, the Women's International Network (1993) found that girls participate in class discussions at only an eighth the rate that boys do. However, the difference between the CMC environment at OU and F2F learning environments was that male domination often lasted for days. Male domination was also tolerated by female students. It was also ignored by the distance education institution (OU). For example, a surprising amount of sexual jokes were posted by males. This often created a time period of days where only males posted messages. This was very effective in "silencing females," who reacted by not posting messages for days and failed to complain about sexual jokes. These findings support King's (1995) study which found that rude behavior is often tolerated on-line, even to the point of certain groups which have no purpose other than to send rude comments and sexual jokes to each other.

IMPLICATIONS FOR PRACTICE

Data from this study indicated that the learning style of CMC-based distance education students is strongly associated with gender. Distance education organizations should strive to create an environment which provides for equal opportunity to both the separate male and connected female learning style. According to James and Gardner (1995), distance learning programs should be "supported efficiently and effectively with technology that is appropriate for the learners and learning" (p. 27) and suggests the distance education organization should design "programs to provide alternative tracks or instructional sequences depending on identified learner needs and preferences" (p. 28). Verduim and Clark (1991) agree, arguing that "those designing distance education should, moreover, pay attention to differences among adults--in individual learning styles, [and] preferences for acquiring new knowledge and skills" (p. 32). Findings from this study suggest that for females, this means creating a learning environment which promotes and encourages collaborative learning for the female connected learner, but yet allows the male separate learner the freedom of learning in an abstract, autonomous manner. It also means that the professor in the CMC distance education environment must act as a facilitator who constantly looks for ways for the students to build a sense of community (Cook, 1995). Small-group instruction is "a common teaching strategy" (p. 38) for distance education organizations.

Both the organization and its professors should be aware that males tend to dominate the on-line environment and should realize that the same mode of communication may be perceived differently by the sexes, suggesting that more favorable CMC distance education might be created that take into account not only the organizational contextual factors, but also the gender of the students (Gene & Straug, 1997). Rules should be established from the initial start of the program, and reinforced with each course. For example, students should be informed of the acceptable etiquette of the on-line environment. These rules should inform students how to be polite on-line, how to address and end each message, what on-line symbols are acceptable, ethics on rudeness, jokes, and should remind students that before they hit the "send" button, they should remember the medium. Students must be reminded that similar to F2F communication, polite conversation should be the norm. This includes the use of the usual niceties such as "thank you" and careful choice of words. Cook (1995) agrees, arguing that "students new to this medium will experiences some degree of difficulty...differences in communication...[is] a potential source of problems for students," and suggests that students should be helped with becoming comfortable with the on-line environment and supports Smith's (1979) finding that "the system must allow for and indeed encourage two-way communication...as regularly as possible so that ambiguities, misconceptions, and frustrations are minimized" (p. ix).

Of particular importance for organizations is how to lower participation barriers. In regard to institutional barriers, findings suggest that females have higher technical barriers. Practices which could be implemented to lower this barrier are procedures for the technical aspects of learning at a distance, a strong technical support department, and procedures that weigh carefully the use of short-term courses using CMC-based technology when optimal learning time is often achieved through the use of courses of longer duration.

Once students become comfortable with the medium, they expect prompt responses from faculty and the institution. Distance education organizations should be careful on both the number of students assigned to each faculty, training faculty members to respond in a faster manner than they may be used to in traditional education, and to continually evaluate the effectiveness of their formal student support systems.

Data suggested that on-line female students have less time than their traditional education female counterparts, and have even less time than on-line males. Data from the analysis on learning styles showed that on-line females prefer to learn in a connected manner. These two findings together offer a solution to reduce this situational barrier for females: Institutions could make it a policy to include more collaborative and cooperative learning in their courses. In this way the workload is distributed through a group. Results could be shared to further learning, however, this should reduce the time required for female students while supporting their preferred method of connected learning.

Males seem to dominate the on-line learning environment the same as in F2F environments and tend to exhibit higher confidence levels. However, in the on-line environment, male domination could literally last for days. To combat this, distance education organizations should make faculty aware of these data patterns, and provide training on how to encourage females to post messages while asking males to subside if they notice a pattern of male domination (excessive messages in number and/or length, as both are tactics which seem to silence females on-line).

Findings suggested that on-line females have a double-dose of lower confidence levels: they have lower overall confidence in the educational environment, and they have lower confidence in computers. For organizations who wish to lower this dispositional barrier, this means attempting to raise female confidence in both technical skills and skills in the educational environment. Examples of procedures which could improve these areas are assigning both faculty mentors and student partners (Cook, 1995). Stephenson (1998) found that a low-cost, low maintenance distance mentoring program decreased the attrition rate of at-risk students and also increased both their grades and their probability of staying. Other researchers across academic and business worlds have cited mentoring outcomes as increased effectiveness regarding a) retention, b) developmental gains, c) competence, d) satisfaction, e) job acquisition, and f) subsequent career advancements (Dreher & Ash, 1990; Jacobi, 1991; Wolf, 1993). Blackwell (1989), Cullen (1993), and Bruce (1995) found that mentoring was particularly helpful for women students in their pursuit of higher degrees. For instance, Walden University assigns each student a faculty mentor to help them through the program. This mentor gives advice on topic reading lists, improving writing skills including scholarly writing, and tips on researching. In addition, the education department, through the efforts of a cyberspace Phi Delta Gamma (an educational honor society), has created a student-to-student mentoring program where newer students are matched with those students who have been in the Ph.D. program longer. Other research (McKenzie, 1997) suggests that female students have never been taught how to synthesize and analyze information because these skills are typically associated with the often male separate learner (Faulkner & Arnold, 1985); programs which address these missing skills would be beneficial towards lowering female barriers of this sort, especially in distance education as learners are faced with massive amounts of information (McKenzie, 1997).

Technical barriers could be addressed in a similar manner where females students are required to attend a student orientation that introduces procedures for learning at a distance (Gibson, 1998). As Gibson (1998) argues, "instruction in the process of directing one's own learning and in study strategies also seems appropriate early in a study's program" (p. 33). Data from this study suggests that this is particularly important for female distance students.

And lastly, differences in communication patterns for male and female on-line students offers insight for distance education institutions practices. For example, faculty awareness of the rougher nature of male communication would eliminate female professor bias for messages she might label rude but are in reality part of the male communication style. Along these same lines, the female student needs to include personal information as part of her connected learning style, and it should not be discounted as non-academic. And, most importantly, sexual jokes should not be allowed from either gender; data patterns suggested that sexual jokes worked as effective means to silence female messages. In this case, on-line learning environments should follow traditional higher education practices and ban the posting of writing of an obvious sexual nature. In addition, electronic forums should be scanned for sexual messages which might be construed as sexual harassment on a regular basis. To fail to do so is opening up legal litigation (Coate, 1993) where the student suing has written proof of sexual "harassment" with the time, content, and number of occurrences of the posting. As Fitzgerald (1996) notes in The Legal Context of Sexual Harassment, hostile environment cases are generally thought to trigger employer liability...when the organization knew or should have known of the sexual misconduct" (p. 115). Making sexual jokes is considered to be sexual harassment (Women Against Sexual Harassment (1991).


CONCLUSION

Gender equity in higher education is more than putting women on equal footing with men--it is eliminating barriers to participation and stereotypes that limit the opportunities and choices of both sexes. Gender equity is about enriching classrooms, widening opportunities, and expanding choices for all students (Bailey, 1996). Distance education organizations can create more equitable environments for both male and female students by reviewing the gender differences in CMC found in this study in learning styles, participation barriers, and communication patterns, and working to incorporate what other studies have suggested works to equalize genders in their practices.

Table 1
Percentage of Messages by Type and Gender

Gender
Male
N=81 Female
N=68 % of All Messages Domination

Posted 54.5% 45.5% 100.0% n=149
Reponses to Questions 79.0% 21.0% n=40
With "Thanks or Thank You" 33.3% 81.0% 14.1% n=21
Without "Thanks or Thank You" 88.9% 75.0% 82.6% n=123
Tone of Certainty of being absolutely correct 76.7% 23.3% 28.9% n=43
Containing Abstract Statements 78.0% 22.0% 27.5% n=41
Containing :-) or Symbols 12.5% 87.5% 5.4% n=8
Tone of an Empathetic Nature 34.0% 66.0% 33.6% n=50
Slightly agreed then used "but" to disagree 33.3% 66.7% 0.7% n=36
Contained personal remarks
(family, life, spouse) 16.7% 83.3% 40.3% n=60
Questions Asked 19.2% 80.8% 40.3% n=60
Questions of a Technical Nature 33.3% 66.7% 14.1% n=21
Jokes 63.0% 37.0% 36.2% n=54
Jokes of a Sexual Nature 95.5% 4.5% 14.8% n=22
Time 33.3% 66.7% 20.1% n=30
Cost 10.0% 90.0% 13.4% n=20
Containing Put-downs or Insults 96.0% 4.0% 16.8% n=25
Expressing Fear 0.0% 100.0% 14.1% n=21
Containing Slang 62.5% 37.5% 26.8% n=40
Containing Tag words 0.0% 100.0% 15.4% n=23
Containing "!" 0.0% 100.0% 47.8% n=11
Containing CAPPED Words 0.0% 100.0% 4.7% n=7
Concern about Grades 28.6% 71.4% 4.7% n=7
Concern about fast pace 37.5% 62.5% 5.4% n=8



--------------------------------------------------------------------------------

Note: Overall Percentages do not add up to 100% because messages contained more than one type of content.




Table 2
Message Length by Gender
Gender
Male Female
N=81 N=68 N=149
Average Number of Words Per Message 146.35 59.3
Average Number of Sentences Per Message 205.65 23.05
_________________________________________________________________________________
Note: Averages included jokes, which were often pages and pages.





Table 3
Categories Used During Data Analysis of Gender Differenences
_________________________________________________________________________________
Topics
_________________________________________________________________________________
Male
Female
Subject
Response
Inititator
Abstract Statements
Brief
Certain of Being Correct
Empathetic
Reference to Family/Spouse/Self
Seeking Status
Seeking to Help Others
Elegant Grammar
Long words
Rough Grammar
Slang
Short words
Put-downs
Impersonal Nature
Use of Tags
Use of Symbols
:-)

!
CAPS
Contains the word But
Cost
Time
Technical Questions
Response to Technical Questions
Fear
Frustration
Number of words per message
Number of sentences per message
Jokes
Non-sexual
Sexual
Use of the word "but"



REFERENCES

American Demographics. (1994). American demographics business reports: Markets. American Demographics, 16(12), 20-22.

Anderson, R. (1997). Evaluating your distance learning program: Part I. Excerpt from posting on DEOS-L Listserv, [on-line]. Available from Howard Anderson at 601.266.5724.

Anwyl, J., Powles, M., & Patrick, K. (1987). Who uses external studies? Who should? Commonwealth Tertiary Education Commission Evaluations and Investigations Program, Center for the Study of Higher Education, University of Melbourne, Melbourne.

Ayersman, D. J. (1995). Effects of learning styles, programming, and gender on computer anxiety. Journal of Research on Computing in Education, 28(2), 148-161.

Bailey, S. M. (1996). Shortcoming girls and boys. Educational Leadership, 53(8), 75-80.

Baine, S. (1991). Personal computing, gender, and distance education. In Erickson, I. V., Kitchenham, B. A., & Tijdens, K. G., (eds.)., Women, Work and Computerization. Amsterdam: North Holland Press.

Belenky, M. F., Clinchy, B. M., Goldberger, N. R., & Tarule, J. M. (1986). Women's ways of knowing: The development of self, voice, and mind. New York: Basic Books.

Block, J. (1984). Gender differences and implications for educational policy. In Block, J. (ed.)., Sex role identity and ego development, 207-252. San Francisco: Jossey-Bass.

Burge, E., & Lenskyj, H. (1990). Women studying in distance education: A case study. The American Journal of Distance Education, 4(2), 3-13.

Bruce, M. A. (1995). Mentoring women Doctoral students: What counselor educators and supervisors can do. Counselor Education & Supervision, 35(2), 139-150.

Cameron, D. (1992). Feminism and linguistic theory. New York: St. Martin's Press.

Cardenas, K. (1998). Distance learning. Academe, May-June, 30-38.

Carol, D. (1988). Bridging the gap. The contributions of individual women to the development of distance education to 1976, in Faith, K. (ed.). Toward new horizons for women in distance education: International perspectives. London: Routledge.

Cifuentes, L., Murphy, K. L., Segur, R., & Kodali, S. (1997). Design considerations for computer conferences. Journal on Computing in Education, 30(2), 176-198.

Coate, J. (1993). Cyberspace innkeeping: Building on-line community, [on-line]. Available at: http://www.sfgate.com

Collis, B., & Smith, C. (1997). Desktop multimedia environments to support collaborative distance learning. Instructional Science, 25, 433-462.

Cook, D. L. (1995). Community and computer-generated distance learning environments. New Directions for Adult and Continuing Education, 67, 33-39.

Copeland, C. L., Driskell, J. E., & Salas, E. (1996). Gender differences in nonverbal correlates of social status. Communication Abstracts, 19(3), 416-427.

Cross, K. P. (1981). Adults as learners. London: Jossey-Bass Publishing.

Cullen, D. L. (1993). Women mentoring in academe: Addressing the gender gap in higher education. Gender & Education, 5(2), 125-138.

Daloz, L. A. (1987). Effective teaching and mentoring: Realizing the transformational strategies for adult learning experiences. San Francisco: Jossey-Bass Publishers.

Darkenwald, G. G., & Merriam, S. B. (1982). Adult education: Foundations of practice. New York: Harper and Row.

Department of Education. (August, 1997). The baby boom echo continues: A back to school special report on the baby boom echo, [on-line]. Available at: http://www.gov.edu

Dreher, G. F., & Ash, R. A. (1990). A comparative study of mentoring among men and women in managerial, professional, and technical positions. Journal of Applied Psychology, 75, 539-546.

Eager, C. J. (1991). Developing a computer access course for women--a course tutor's perspective. In Eriksson, I. V., Kitchenham, & Tijdens, K. G., (eds.), Women, work and computerization. North Holland: Elesier Science Publishers.

Faulkner, W., & Arnold, E. (eds.). (1985). Smothered by invention: Technology in women's lives. London and Sydney: Pluto Press.

Fitzgerald, L. F. (1996). The legal context of sexual harassment. In Lott, B., & Reilly, M. E., Combating sexual harassment in higher education, 110-128. Washington, D. C.: National Education Association.

Gallos, J. (1992). Educating women and men in the 21st century: Gender, diversity, leadership opportunities. The Journal of Continuing Higher Education, 2, 8.

Galusha, J. M. (1996). Barriers to learning in distance education. An unpublished manuscript, University of Southern Mississippi.

Gene, D., & Straug, D. W. (1997). Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS Quarterly, 21(4), 389-402.

Gibson, C. (1998). Toward an understanding of academic self-concept in distance education. The American Journal of Distance Education, 10(1), 23-36.

Gilligan, C. (1982). In a different voice. Cambridge, Mass: Harvard University Press.

Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. San Francisco: Aldine De Gruyter.

Goodwin, M. (1980). Directive-response speech sequences in girl's and boys' task activities. In McConnel-Ginet, S., Borker, R., & Furman, N. (eds.)., Women and language in literature and society, 210-229. New York: Praeger.

Grace, M. (1991). Gender issues in distance education--a feminist perspective. In Evans, T., & King, B., Beyond the text: Contemporary writing on distance education. Australia: Deakin University Press.

Gunawardena, C. N., & Zittle, F. J. (1998). Social presence as a predictor of satisfaction within a computer-mediated conferencing environment. The American Journal of Distance Education, 11(3), 9-39.

Hackett, G. (1994). Men, women and computers. Newsweek, 5/16/94, 123(20), 48-54.

Hensel, N. (1991). Realizing gender equality in higher education: The need to integrate work/family issues. ASHE/ERIC Higher Education Report No. 2.

Herring, S. (1994). Gender differences in computer-mediated communication: Bringing familiar baggage to the new frontier, [on-line]. Available at: http://www.cpsr.org

Hewitt, N. M., & Seymour, E. (1997). The problems of women in science, mathematics and engineering. Abstract on factors contributing to high attrition rates among science and engineering undergraduate majors. Ethnography and Assessment Research Bureau of Sociological Research, Boulder Colorado: University of Colorado.

Hill, M. S., & Ragland, J. C. (1995). Women as educational leaders: Opening windows, pushing ceilings. Thousand Oaks, California: Corwin Press.

Hoyles, C. (1985). The learning machine: The gender gap, BBC, 1, 9 May.

Jacobi, M. (1991). Mentoring and undergraduate success: A literature review. Review of Educational Research, 61, 505-532.

James, W., B., & Gardner, D. L. (1995). Learning styles: Implications for distance learning. New Directions for Adult and Continuing Education, 67, 19-31.

Jehng, J. J. (1997). The psycho-social-processes and cognitive effects of peer-based collaborative interactions with computers. Journal of Educational Research, 17(1), 19-46.

Kantrowitz, B. (1984). Men, women, and computers. Newsweek, 124 (20), 48-55.

Katz, J., & Aspden, P. (1997). Internet users aren't isolated loners, report find. Communications Daily, December 29, 1997, [on-line]. Available at: http://www.iaginteractive.com/emfa/comdaily.htm

Katz, J., & Jarvis, L. (1996). Four notorious ISMS & 1 dirty little secret. Executive Female, 19(2), 50-57.

Kelly, S. (1987). The prize and the price: The changing world of women who return to study. North Ryde, NSW: Methuen Haynes.

Key, M. R. (1975). Male/Female language. Metuchen, New Jersey: The Scarecrow Press, Inc.

King, S. A. (1995). Effects of mood states on social judgments in Cyberspace: Self focused sad people as the source of flame wars. Psych Central, July 2, 1995.

Kirkpatrick, H., & Cuban, L. (1998). Should we be worried? What the research says about gender differences in access, use, attitudes, and achievement with computers. Educational Technology, July-August, 98, 56-59.

Knapper, C. (1988). Lifelong learning and distance education. American Journal of Distance Education, 2(1), 63-72.

Lakoff, R. (1975). Language and women's place. New York: Harper and Row.

Leveson, N. G. (1997). Educational pipeline issues for women. A panel presentation for the CRA Snowbird meeting on educational pipeline issues for women, [on-line]. Available at: http://www.ai.mit.edu/people/ ellens/Gender/pipeline.html

MacDonald, R., & Knights, S. (1979). Returning to study: The mature-age student. Programmed Learning and Educational Technology, 16, 101-110.

MacKeracher, D. (1994). Women as learners. In Barer-Stein, T., & Draper, J. A., (eds.)., The craft of teaching adults. Malabar, Florida: Krieger Publishing Company.

Maltz, D. N., & Borke, R. A. (1982). A cultural male-female miscommunication. In Gumperz, J. (ed.). Language and social identity, 196-216. Cambridge University Press.

Mason, R. (1994). Using communications media in an open and flexible learning. London: Kogan Page.

Martin, J. E. (1988). Second chance: Women returning to study. Ringwood, Victoria: Penguin.

McKenzie, J. (1997). Deep thinking and deep reading in an age of info-glut, info-garbage, info-glitz, and info-glimmer. From Now On, 6(6).

Merriam, L. E. (1988). Case study research in education: A qualitative approach. San Francisco, California: Jossey Bass.

Michel, K. (1992). Gender differences in computer-mediated conversations. An unpublished manuscript, [on-line]. Available at: gopher.kidlink.org.

Muro, A. (1988). Providing post-primary education and training through distance tutoring in Tanzania. International Council for Distance Education Bulletin, 7, May, 58-62.

Oaks, M. (1996). Western Cooperative for educational telecommunications, Washington State University. [on-line]. Available at: [email protected]

O'Barr, W. M. (1982). Linguistic evidence: Language, power, and strategy in the courtroom. New York: Academic Press.

Petzing, T. (1996). Females pioneers fostered practicality in computer industry. Wall Street Journal, November, 1996 [on-line]. Available at: http://climate.gsfc.nasa.gov/~chesters/text/computer-programmers.html

Roberts, L. D., Smith, L. M., & Pollock, C. (1997). A model of social interaction via computer-mediated communication in real-time text-based virtual environments. An unpublished manuscript. Perth, Western Australia: University of Technology.

Romero, M. G. (1995). Planning and collaboration, engaging multiple institutions in a shared vision: A case study. Paper presented at the 1995 CAUSE annual conference, [on-line]. Available at: http://www.colorado.edu

Sanders, J. (1993). Making the computer neuter. The Computing Teacher, 12, 23-27.

Severiens, S., & Ten Dam, G. (1997). Gender and gender identity differences in learning styles. Educational Psychology, 17(1/2), 79-94.

Shale, D., & Garrison, D. R. (1987). Education and communication. New York: Sage Publications.

Smith, K. C. (1979). External studies at New England: A silver jubilee review 1955-1979. Armidale, New South Wales: The University of New England.

Spender, D. (1981). Men's studies modified: The impact of feminism on academic disciplines. Oxford: Pergamon Press.

Spender, D. (1982). Invisible women. London: The Women's Press.

Stalker, J. (1996). Women and adult education: Rethinking androcentric research. Adult Education Quarterly, 46(2), 98-113.

Steinman, G. (1992). Revolution from within: A book about self-esteem. Boston: Little, Brown, & Company.

Stephenson, S. D. (1997-8). Distance mentoring. Journal of Educational Technology Systems, 26(2), 181-186.

Stoney, S., & Oliver, R. (1998). Interactive multimedia for adult learners: Can learning be fun? Journal of Interactive Learning Research, 9(1), 55-81.

Strong, R. W., & Harmon, E. G. (1997). Online graduate degrees: A review of three internet-based master's degree offerings. The American Journal of Distance Education, 11(3), 58-70.

Suler, J. (1996). E-mail relationships. Psychology of Cyberspace, January, 1996. Rider University, [on-line]. Available at: http://www1rider.edu /~suler/psycyber/psycyber.html

Sweet, R. (1986). Student drop-out in distance education: An application of Tinto's model. Distance Education, 7, 201-213.


Tannen, D. (1994). Gender gap in cyberspace. Newsweek, 123(20), 52-53.

Thompson, R. (1997). Costs of higher education. Posting to DEOS-L listserv. October 5, 1997, [on-line]. Tisdel, E. J. (1998). Poststructural feminist pedagogies: The possibilities and limitations of feminist emancipatory adult learning theory and practice. Adult Education Quarterly, 48(3), 139-156.

Vanfossen, B. (1996). Gender differences in communication. Paper presented at the ITROW's Women and Expression Conference. Institute for Teaching and Research on Women, Towson State University, Maryland, [on-line]. Available at: http://midget.towson.edu/~vanfoss

Verduim, J. R., Jr., & Clark, T. A. (1991). Distance education: The foundations of effective practice. San Francisco, California: Jossey-Bass.

von Prummer, C. (1987). Gender in distance education - the experience of the West German FernUniversitat. Paper presented to the Second International Workshop on Counseling in Distance Education. Open University Regional Academic Services in conjunction with the International Council for Distance Education (ICDE). Cambridge, UK.

Wolf, M. A. (1993). Mentoring middle-aged women in the classroom. Adult Learning, 4(5), 8-22.

Women Against Sexual Harassment. (1991). A report prepared and posted by the Psychology Department, University of Rhode Island.

Woolf, V. (1938). Three guineas. London: Hogarth Press.

Women's International Network News. (1993). Girls face discrimination barriers starting in the cradle. Women's International Network News, 19(4), 75-77.


Kimberly Dawn Blum is a Ph.D. candidate at Walden University, an accredited distance education doctoral program, working on a Ph.D. in Education. The last two years since starting at Walden, Kim has been researching Gender Differences in CMC-based distance education for higher education. Currently she is at work finishing her dissertation in this area. Kim has a B.S. in Management Information Systems from the California State University, Hayward (1985) and a M.A. in Organziational Management from the University of Phoenix's On-line program (1996). The last fifteen years Kim has worked in the computer field for such firms as Chevron and Compaq, training, programming, designing web-pages, creating curriculum, installing personnel systems, and teaching computer courses at several Community Colleges (Montgomery Community College and Tomball Community College. Currently, Kim is on a sabbatical from adjunct teaching while she completes her dissertation. Her latest project has been to install a computer lab for an elementary-level school where she now teaches computer courses to grades K-3 and is currently at work comparing gender differences for CMC-learning environments between children and adults.
 
Re: WORST CASE SOME ONE!!!

Talk, Power and Organisational Change

Stream description
Talk forms an important and potentially problematic function in social settings as it constitutes and illuminates relationships between and among individuals and organisations. It is therefore axiomatic that the role of talk (written, spoken and non-verbal) dominates a range of societal institutions and structures, including organisations. Despite this dominance, the more ‘visible and measurable’ elements of organisations and organising are still largely privileged in research endeavours and management education, while the more subterranean and ‘hidden’ phenomena remain neglected. This sub-theme is interested in re-connecting the hidden features of talk in organisations with wider issues of power and organisational change by exploring informal talk in different national contexts.

Informal talk can take many different forms including gossip, hearsay, emails, text messages, pictures, gestures and body language. Through talk, individuals communicate widely about rules, values, and history as well as providing others with information about social structures, expectations, norms and so on. In this stream, we assume that informal talk is ubiquitous, enduring, performs many different functions (both positive and negative) in organisations, and helps shape and constitute meaning for individuals, groups and organisations. In other words, organisations and inter-personal relationships are constitutive of talk.

Talk in organisations and organisational talk point to a range of topics of interest to critical management scholars including those relating to power, resistance, control, identity and change. Following Foucault that power is found in all social relationships, informal talk as an aspect of social interaction is pertinent to this analysis. Power is manifest in the informal and unofficial discourses of talk and can reflect and reinforce extant power and gender relations. Informal talk can build, sustain and erode group and organisational networks. The power of talk (for instance, gossip) is potentially destructive and damaging to people’s reputations and self esteem, and can be distressing to the individual being gossiped about. Alternatively, talk might prove positive as it can express and communicate emotion, reduce uncertainty and anxiety, and act as a means of problem solving and sensemaking. Talk can therefore help create and re-create identity.

The ‘micropolitics’ of informal talk also relates to the choices people make in accepting, challenging or colluding with various organisational ‘hegemonic practices’. In this way, informal talk can represent numerous attempts to retain the status quo or change organisations. Dissent, protest, resignation, acquiescence and enthusiastic support can be among the multiple objectives of talk. These objectives can all be present concurrently and how organisational change takes places (or not) can reflect struggles for dominance among the forms, contents, processes and contexts of informal talk.

Some of the questions and issues that could be addressed in this stream include:

In what ways do historical meanings of talk influence contemporary understanding in organisations?
How do the different mediums of informal talk (written, spoken, non-verbal) change the nature, content and processes of meaning in organisations?
How do the cross-cultural dimensions and meanings of talk influence change in organisations?
What paradoxes about organisations and the experience of organisational change are revealed by and through informal talk?
How do organisations develop and change through talk? Conversely, how does talk inhibit organisational change?
To what extent can informal talk be ‘managed’?
How successful are organisational attempts to silence negative talk?
What relationships exist between informal talk and other important concepts including trust, identity, socialisation, emotion, voice, power, discipline, control, and resistance?
Are there gendered rules and roles of informal talk?
What are the micro-level and macro-level processes of informal talk and the relationship between them in organisational change?
What are the ethical/moral issues surrounding informal talk?
How can informal talk be fruitfully studied and what pitfalls/limitations are there in doing so? For example, in what ways can anecdotes – bit of gossip – be understood as ‘legitimate’ data? (‘can you turn off the tape recorder?’
 
Re: WORST CASE SOME ONE!!!

Talk, Power and Organisational Change

Stream description
Talk forms an important and potentially problematic function in social settings as it constitutes and illuminates relationships between and among individuals and organisations. It is therefore axiomatic that the role of talk (written, spoken and non-verbal) dominates a range of societal institutions and structures, including organisations. Despite this dominance, the more ‘visible and measurable’ elements of organisations and organising are still largely privileged in research endeavours and management education, while the more subterranean and ‘hidden’ phenomena remain neglected. This sub-theme is interested in re-connecting the hidden features of talk in organisations with wider issues of power and organisational change by exploring informal talk in different national contexts.

Informal talk can take many different forms including gossip, hearsay, emails, text messages, pictures, gestures and body language. Through talk, individuals communicate widely about rules, values, and history as well as providing others with information about social structures, expectations, norms and so on. In this stream, we assume that informal talk is ubiquitous, enduring, performs many different functions (both positive and negative) in organisations, and helps shape and constitute meaning for individuals, groups and organisations. In other words, organisations and inter-personal relationships are constitutive of talk.

Talk in organisations and organisational talk point to a range of topics of interest to critical management scholars including those relating to power, resistance, control, identity and change. Following Foucault that power is found in all social relationships, informal talk as an aspect of social interaction is pertinent to this analysis. Power is manifest in the informal and unofficial discourses of talk and can reflect and reinforce extant power and gender relations. Informal talk can build, sustain and erode group and organisational networks. The power of talk (for instance, gossip) is potentially destructive and damaging to people’s reputations and self esteem, and can be distressing to the individual being gossiped about. Alternatively, talk might prove positive as it can express and communicate emotion, reduce uncertainty and anxiety, and act as a means of problem solving and sensemaking. Talk can therefore help create and re-create identity.

The ‘micropolitics’ of informal talk also relates to the choices people make in accepting, challenging or colluding with various organisational ‘hegemonic practices’. In this way, informal talk can represent numerous attempts to retain the status quo or change organisations. Dissent, protest, resignation, acquiescence and enthusiastic support can be among the multiple objectives of talk. These objectives can all be present concurrently and how organisational change takes places (or not) can reflect struggles for dominance among the forms, contents, processes and contexts of informal talk.

Some of the questions and issues that could be addressed in this stream include:

In what ways do historical meanings of talk influence contemporary understanding in organisations?
How do the different mediums of informal talk (written, spoken, non-verbal) change the nature, content and processes of meaning in organisations?
How do the cross-cultural dimensions and meanings of talk influence change in organisations?
What paradoxes about organisations and the experience of organisational change are revealed by and through informal talk?
How do organisations develop and change through talk? Conversely, how does talk inhibit organisational change?
To what extent can informal talk be ‘managed’?
How successful are organisational attempts to silence negative talk?
What relationships exist between informal talk and other important concepts including trust, identity, socialisation, emotion, voice, power, discipline, control, and resistance?
Are there gendered rules and roles of informal talk?
What are the micro-level and macro-level processes of informal talk and the relationship between them in organisational change?
What are the ethical/moral issues surrounding informal talk?
How can informal talk be fruitfully studied and what pitfalls/limitations are there in doing so? For example, in what ways can anecdotes – bit of gossip – be understood as ‘legitimate’ data? (‘can you turn off the tape recorder?’
 
Re: WORST CASE SOME ONE!!!

Talk, Power and Organisational Change

Stream description
Talk forms an important and potentially problematic function in social settings as it constitutes and illuminates relationships between and among individuals and organisations. It is therefore axiomatic that the role of talk (written, spoken and non-verbal) dominates a range of societal institutions and structures, including organisations. Despite this dominance, the more ‘visible and measurable’ elements of organisations and organising are still largely privileged in research endeavours and management education, while the more subterranean and ‘hidden’ phenomena remain neglected. This sub-theme is interested in re-connecting the hidden features of talk in organisations with wider issues of power and organisational change by exploring informal talk in different national contexts.

Informal talk can take many different forms including gossip, hearsay, emails, text messages, pictures, gestures and body language. Through talk, individuals communicate widely about rules, values, and history as well as providing others with information about social structures, expectations, norms and so on. In this stream, we assume that informal talk is ubiquitous, enduring, performs many different functions (both positive and negative) in organisations, and helps shape and constitute meaning for individuals, groups and organisations. In other words, organisations and inter-personal relationships are constitutive of talk.

Talk in organisations and organisational talk point to a range of topics of interest to critical management scholars including those relating to power, resistance, control, identity and change. Following Foucault that power is found in all social relationships, informal talk as an aspect of social interaction is pertinent to this analysis. Power is manifest in the informal and unofficial discourses of talk and can reflect and reinforce extant power and gender relations. Informal talk can build, sustain and erode group and organisational networks. The power of talk (for instance, gossip) is potentially destructive and damaging to people’s reputations and self esteem, and can be distressing to the individual being gossiped about. Alternatively, talk might prove positive as it can express and communicate emotion, reduce uncertainty and anxiety, and act as a means of problem solving and sensemaking. Talk can therefore help create and re-create identity.

The ‘micropolitics’ of informal talk also relates to the choices people make in accepting, challenging or colluding with various organisational ‘hegemonic practices’. In this way, informal talk can represent numerous attempts to retain the status quo or change organisations. Dissent, protest, resignation, acquiescence and enthusiastic support can be among the multiple objectives of talk. These objectives can all be present concurrently and how organisational change takes places (or not) can reflect struggles for dominance among the forms, contents, processes and contexts of informal talk.

Some of the questions and issues that could be addressed in this stream include:

In what ways do historical meanings of talk influence contemporary understanding in organisations?
How do the different mediums of informal talk (written, spoken, non-verbal) change the nature, content and processes of meaning in organisations?
How do the cross-cultural dimensions and meanings of talk influence change in organisations?
What paradoxes about organisations and the experience of organisational change are revealed by and through informal talk?
How do organisations develop and change through talk? Conversely, how does talk inhibit organisational change?
To what extent can informal talk be ‘managed’?
How successful are organisational attempts to silence negative talk?
What relationships exist between informal talk and other important concepts including trust, identity, socialisation, emotion, voice, power, discipline, control, and resistance?
Are there gendered rules and roles of informal talk?
What are the micro-level and macro-level processes of informal talk and the relationship between them in organisational change?
What are the ethical/moral issues surrounding informal talk?
How can informal talk be fruitfully studied and what pitfalls/limitations are there in doing so? For example, in what ways can anecdotes – bit of gossip – be understood as ‘legitimate’ data? (‘can you turn off the tape recorder?’
 
Re: WORST CASE SOME ONE!!!

Communication







Edgar Schein 1 visited Australia in 1980. On one occasion he described the most important management skills as technical, interpersonal and emotional.

By emotional skills Schein meant the ability to make difficult decisions, to take responsibility, and the like. A simpler equivalent term is courage, with elements of self-management.

Emotional skills, he said, were most important. Without emotional skills the interpersonal skills cannot be used to most effect. And without interpersonal skills the technical skills may be wasted. Emotional skills are a necessary foundation for interpersonal skills, which in turn are needed to make the most of technical skills.


Schein was talking about managers. I believe the same can be said for action researchers and evaluators.



Below 2 I set out the bare elements of good interpersonal skills. I describe them in such a way that under some circumstances you can get by with only moderate levels of emotional skills. You communicate as if you are self- confident. You achieve this by using an explicit problem- solving approach in your communication.

The real gains are achieved, however, when you have the courage as well. The usual forms of communication in our culture do not usually favour effective problem solving. There are rules which discourage people from giving the information which is often important to developing a solution.

Especially important are rules which forbid exchanging information about motives and about negative feelings.

To communicate well you often have to change the rules. You have to renegotiate the unstated rules of communication. To complicate matters, there are rules against renegotiating the rules. There are rules against making the rules explicit. 3

That is where the courage comes in. It is needed to challenge the taboos and renegotiate the rules. With courage, though, it usually works. The result, for both parties, is a clearing of the air and an improved relationship. 4

This is most apparent when you are involved in difficult communication. When you are severely under threat, you will find the approach to be described below may work if you are a person of robust self-confidence, well practised in this approach. Otherwise you will probably do as most people do: act impulsively, and perhaps regret it later.

To make matters worse, threat triggers a set of defensive strategies. Emotional skills are required for people to accept that they may be part of the problem. People are least able to understand their own contribution when they are most under threat.



The approach described in this document is built around specific ways of getting and giving information. In other words, it comprises listening skills, and expressive skills. In both, I define what information you can most usefully give and get.



The information chain

Imagine two people within a close relationship. Of the two, consider who is most likely to have accurate information about each person's behaviour; each person's beliefs; each person's feelings.

We can see another person's behaviour more clearly than our own -- notice how surprised people are to see themselves on videotape for the first time. Among other things, our eyes are better placed for observing others than for observing ourselves. We tend also to judge ourselves more by our intentions than by our behaviour.

We cannot see each other's feelings directly; we deduce them from the behaviour we see. We are able to sense our own feelings directly (though we may sometimes fail to do so).

Similarly, we can be aware of our own beliefs. We must depend on other people's report to know their thoughts, or again deduce them from behaviour.

For two people A and B:

A
can most clearly perceive
B
can most clearly perceive

B's actions
A's actions

material outcomes for A
material outcomes for B

A's assumptions
B's assumptions

A's feelings
B's feelings

A's intentions towards B
B's intentions towards A


This is the information which may be relevant for action researchers and evaluators. For instance, it may help to define roles or resolve a conflict or to provide important but threatening critique.

You will notice that each person has part of the relevant information. Yet some issues become resolvable only when each person understands all this information.

The tasks of the effective communicator are twofold. One is to give and get appropriate information. The other is to guide herself and the other person through a process which is constructive for both.



The elements of the information chain are linked together. Actions by one person typically produce material outcomes for the other. In response to these outcomes, the second person develops thoughts about the first person, typically about her motives. There is then some emotional response to this. The second person forms an intention to act, arising partly from the emotional response.

action --> outcomes --> beliefs --> feelings --> intentions
Action then follows. This starts an equivalent chain of information in the reverse direction. Under some circumstances, common where there are relationship problems, the reverse chain gives rise to more of the actions which started the problem in the first instance. Defensiveness begets defensiveness.

In many instances, particularly when there is a history of conflict or friction, all of the information above is relevant: behaviour, feelings and thoughts (including intentions).



The skills of communication

By way of example, suppose I wish to improve a relationship with a client. I can now classify the skills I need into three varieties, each requiring emotional skills as a foundation.

Expressive skills to convey my information to others. I can use expressive skills to give others information about their behaviour, and my beliefs and feelings (and perhaps intentions). Emotional skills enable me to say those things which need to be said, but which are difficult to say.

Listening skills obtain information from others. I can use them to get information about my behaviour, and their beliefs and feelings and intentions. Emotional skills enable me to take on board even the more threatening aspects of what the other person is saying. They also enable me to postpone my own concerns until I understand the other person's.

Skills for managing the overall process and identifying the needed information -- which information to give or get? and mine or others'? Emotional skills enable me to challenge a poor process, and renegotiate the rules of the interaction.

The three types of communication skill are described in a little more detail below.

It is hard using the written word to describe the aspects of communication other than the words. The nonverbal aspects are, however, extremely important. No matter what words we use, how those words are said may determine what the listener makes of them. Attitudes in particular are likely to be judged more from nonverbal than from verbal behaviour.

These non-verbal aspects of communication will be addressed first.



Non-verbal expression

Factual information is often deduced from the words used. As already said, attitudinal information is often assumed from the nonverbal aspects. These include the characteristics of a person's speech such as tone of voice, pace, pauses, inflection, volume, timbre and the like. They also include facial expression, direction of gaze, posture, gestures, and nearness.

Aware of it or not, we make a judgment about how genuine the other person is. To a large extent we base our judgment on the amount of agreement between what their words say and what the rest of their body says. The simplest way to handle the non- verbal aspects of expression, therefore, is to be honest and attentive. For most of us, the nonverbal aspects will then look after themselves. 5

We are often unaware of our nonverbal behaviour. We often process other people's nonverbals without conscious attention. It may be difficult (an not always useful) to make this conscious.

In understanding other people's feelings, however, there are some overall patterns which can be used. Large-silhouette postures, advancing gestures, threatening facial expression, loud volume, sustained eye contact together may indicate aggression. Small-silhouette postures, retiring gestures, troubled or masked facial expression, low volume, and avoidance of eye contact together may indicate appeasement or withdrawal.

Non-defensive tone of voice, posture and gesture tend to be intermediate between the two patterns just listed:

Appeasing
Non-defensive Aggressive

small silhouette
posture
normal posture large-silhouette
posture

retiring gestures
gestures in place of body advancing gestures

soft or tremulous
tone of voice
firm but pleasant
tone of voice demanding
tone of voice

apprehensive expression
normal expression angry expression

minimal eye contact
frequent eye contact sustained eye contact


Overall patterns are important. I wouldn't recommend that you take the individual elements too seriously.


Aggression and appeasement are both means of self-defence. People very often react to defensiveness with defensiveness, producing a vicious cycle of escalating defensiveness. Both aggression and appeasement therefore encourage defensiveness in the other person.

As implied above, changing your non-verbal behaviour by taking conscious control of it is very difficult. Your behaviour is likely to become stilted. The effects on the other person may be very different to what you intend.

However, you may become aware of some habitual postures or gestures that others interpret as defensive. When you know about these behaviours you can then deliberately avoid them while still leaving most of your behaviour under unconscious control.

(Whether you intend these gestures as defensive is not the issue. Whatever your intentions, certain nonverbal behaviour is likely to be interpreted as defensive. If so, it is usually simpler to avoid it.)

Non-verbal aspects of communication are important in all three types of communication skill...



Expressive skills

These are the simplest skills. You can use them to convey to another person the information to which you have access. You do this in three stages...

first you get the other person's attention;

then you convey the information to her; 6

then you check her understanding.

You can put together the necessary information by asking yourself these questions...

What precisely does she do or say?

What are the material outcomes for me of this behaviour?

If relevant, what do I assume she is trying to accomplish with these actions?

If relevant, what do I then feel like doing in response (that is, what is my emotional response)?

If relevant, how do I intend to act in response?

If relevant, how do I actually react?

The other person is more likely to understand it if you convey it specifically, and not defensively. It helps to avoid blaming, criticising, interpreting, or making demands on the other person.

It is also an advantage to convey as much as possible of this information by describing specific actions and things. The other person can then most easily verify it.

For example ...
"When you do/say ... (i.e. the other's behaviour), ... then I am obliged to do or prevented from doing ... (i.e. the material consequences for me) ..."
If relevant, you can also add the information on your beliefs and feelings, and perhaps intentions.

"I assume you are trying to do ... [i.e. here you express your beliefs about the other's motives] ... In return I feel like doing ... [i.e. your emotional response]. I intend to ... though I actually ..." [i.e. your actual response]
Information about your intentions needs to be handled with some care. It may otherwise be taken as a threat.

Rather than learn this as a formula, I suggest you find your own words, and experiment with different ways of saying it. Some people find they get better results if they change the order of this to describe the consequences for themselves first.

For a particular situation, it may sound like this: 7

"Jack, I'd like to talk to you about something which is troubling me.
"I have the impression that, recently, you haven't been as enthusiastic about this program as you were in its early stages. For instance, I thought when you postponed the formation of the monitoring team, this may have illustrated some caution on your part. As well, you've missed the last couple of planning meetings.

"I realise I may be quite mistaken about this. However, at the possibility that you may be withdrawing your support I get pessimistic about the program, and quite discouraged.

"As I say, this may be fantasy on my part. It's important to me to know how you really feel about this project. It's important to me that we can continue to be open with one another about our views.

"How do you see it?"



So far I've addressed the use of expressive skills to deal with the issue which you hope to resolve. No matter how well you do it, it may still trigger defensiveness on the part of the other person. Treat that as a sign that it is time to use listening skills. When you understand the other person's position, you are able to return to your own issue.



Listening skills

The easiest way of describing listening skills is as a mirror image of expressive skills. They are the skills needed to help the other person make a clear and unthreatening statement of her own position. You...

give the other person your attention;

listen for understanding;

let the other person know what you think they said.

This can usefully be further expanded.

Listening skills are in most respects a little harder than expressive skills. One reason for this is that, again, they depend upon a foundation of emotional skills. It is hard to place yourself one hundred per cent at the other person's disposal when you are under threat.

Yet this is what good listening requires. It is listening for understanding, not listening for ammunition (a different listening style), and not mentally rehearsing your next statement.

Another reason for the difficulty is that there are more components to listening than to speaking. After you have given the other person your attention, there are still three or four different things for you to do (the fourth of them is unnecessary, but can be useful under some circumstances).

Briefly, they are as follows...

L isten
A cknowledge
C heck, and
E nquire
The "enquire" is optional, and not used in the effectiveness training literature 8 or in some of the counselling literature.

In more detail:

L isten
Give the other person your undivided attention as you try to understand what the problem is like for her. Listen with your eyes as well as your ears -- use her verbal and non- verbal expression to work out just what it is like to be in her position as she perceives it.

A cknowledge
Let the other person know just what you have understood her to imply verbally and non-verbally: the whole message. Make clear that this is just your interpretation.

C heck
Make sure that you understand her, by making it as easy as possible for her to amend or add to your understanding.

E nquire
Ask the questions that will help the other person to change her first answer (which probably avoids the issue, or blames, or demands) into one which gives specific information about what you have done or said, or about what she wants you to say or do.

Of these components, acknowledgment is by far the most important. If it is done well, and often, it automatically improves your use of the other components. The rest of the communication process is then much more likely to be effective.



Listening skills in more detail

The form that listening skills take depends on two things. One is how complex the problem is. The other is how upset the other person is, and how strong her beliefs are. But in general, good listening ...

begins by acknowledging what has already been said;

and then agrees with what is specific and true;

and then perhaps enquires for more information.

An example follows...

"As I understand you, you are saying ... I do sometimes ..., and I can now see why it appears to you that ... Could you give me a specific example?"
Jack's response to the earlier example might be framed like this:

"Let me be sure I understand what you're saying, Jill.
"You've noticed that I've missed a couple of meetings. You think that this might be evidence that I'm not as enthusiastic about the project as I was. You think my delaying of the monitoring team might also be an example.

"Your reaction is that you think this may place the program in jeopardy, and -- you said "discourage" -- you wonder if the effort you're putting into it is worth it?

"And, although you didn't say it in so many words, you're disappointed that I didn't mention it?

[Jack waits for confirmation]

"It is true that I've allowed other distractions to divert me from the project. That's why I missed the meetings. I could have made more of an effort.

"I'm as enthusiastic about the long term worth of the program as I ever was. I am disappointed at how slowly it's moving."

Jill is fortunate, here. Jack shares her skills, and makes her task easy. In practice, it is unlikely that the other person will use good expressive skills. Instead she is likely to make assumptions, cast blame, and make demands. The best way of responding will depend on the circumstances.

The style used by the other person may change over time as she slowly defuses her emotion by expressing it. For many issues, five distinct stages can be identified...

Visible emotion It is evident in the person's non-verbal behaviour that she is emotional. Your task is to listen, and from time to time restate what you think she is saying. Avoid inquiry or defence.

"Oh, come on, Jill! You know me better than that!"
Loaded words The emotionality is less evident in behaviour; but she uses words ("good", "bad", "disloyal", "should", etc.) which say more about attitude than about fact. Your task is to restate the message. Include what is implied as well as what is actually stated. Agree with what is true. It is best to avoid inquiry or defence.

"You don't think you're being a little paranoid about this?"
Vague words The words no longer have strong negative or positive connotations, but are not very specific or concrete. You can now use inquiry to good effect.

"Um, look, there isn't any cause for concern. Everything's OK."
Concrete detail You now begin to get specific information about what you (or someone) said or did, and with what consequences. You need only restate from time to time, and enquire after information when you don't understand.

Complete information Now is the time to move to resolution.

In the earlier example, Jack's reply indicates one of these final two stages.



Managing the overall process

Third person skills are the skills I need to decide whose concerns to work on and what sort of information to exchange. In other words, third person skills are about choosing priorities -- deciding what can most usefully be tackled first or next.

Before a mutual concern (or one which is an issue only for you) can be worked on, there may be other issues that need to be got out of the way.

A process issue is given highest priority of all. Anything that prevents the real issue being addressed counts as a process issue. It is your issue, but a special type deserving priority.

If unresolved, process issues prevent any other concerns being addressed effectively. I return to this later.

One of the commonest and most important forms of process issue is where the implicit rules of conversation prevent the problem being addressed. The rules must be renegotiated before the interpersonal issue is dealt with.

The other person's concerns are usually best given next highest priority. Such concerns are usually identified by some wish on the other person's part to change your behaviour. The other person is more likely to give attention to your concerns, or to mutual concerns, if her own concerns are first addressed and resolved.

A mutual concern is often the main object of the exercise. Despite this, it is usually more effective to deal first with process issues and then the other person's concerns.

Last in priority are your own concerns. Except when they prevent the other issues being addressed, they can usually wait until other issues have been resolved. They are usually more easily resolved when the other person's concerns have been met.


Similarly, there are priorities about the type of information to be exchanged.

The aim is to produce satisfactory future outcomes for all.

But these future outcomes arise from present decisions. Decisions are therefore a higher priority than outcomes. This is so even though the outcomes are the purpose of the exercise.

Effective decisions depend in turn on the appropriate information having been exchanged and understood and believed. Information therefore takes priority over decision making.

Strong feelings prevent understanding. Their resolution is a higher priority than is the exchange of information.

Feelings have many different sources. Some arise directly from the present process, and disappear when process issues are resolved. Others can be understood only when the underlying beliefs have also been understood. Beliefs are therefore given the highest priority.

This second set of priorities can be remembered as FIDO:


--------------------------------------------------------------------------------

F eelings which are

positive towards outcomes, processes, people and self
and not strongly negative towards anything
allow the interchange and understanding of

I nformation which if

specific, adequate, accurate and relevant, and
understood and accepted as valid by all
helps those present to make more effective

D ecisions. If these

have the commitment of those affected
specify who will do what, by when, and
include monitoring and coordination
then the desired

O utcomes are more likely to be realised


--------------------------------------------------------------------------------




FIDO is not intended to be a description of the stages of communication. It is instead a set of priorities. In more detail, it can be used to determine the appropriate information to be used in problem solving. In the event of difficulty at any level, attention is given to the higher priority level.

For example, imagine that you are having difficulty achieving the end results (the outcomes) that were agreed to. The model would indicate that revising the decisions might be the most appropriate action.

If decisions are not being made effectively, perhaps important information has been overlooked or misunderstood. If information is being ignored, perhaps feelings are getting in the way.



Process issues

The communication style described above will help you to engage more easily with interpersonal issues, and in ways that in the long term improve relationships. Used to deal with issues as they arise, they more often allow mutually-satisfactory outcomes to be achieved.

There real power, however, is when they are used to address process issues -- that is, to renegotiate the rules by which the interaction is taking place. Precisely the same skills are used: expressive skills to describe the process you believe is occurring; listening skills to understand what is happening for the other person; skills in managing the overall interaction.

The main difference is that you are dealing with immediate and present information: what is happening between you and the other person right now.

The information chain can still be used...

The actions are what you and the other person are doing and saying in the present moment

The material outcomes, if any, are the immediate physical results of those actions

The beliefs are primarily the assumptions you and the other person are beginning to form, right now, about the motives of each other in the present interaction

The feelings are most importantly those you both hold towards each other, and the present process

The intentions are how you both would prefer to be acting.

In other words, the information you need exists in the present.

The rules can be renegotiated either before you start the interaction, or as required.

If you know ahead of time that the situation is likely to be difficult, you can negotiate with the person for a time when you can both give the process your full attention, without distractions.

You can begin the interaction by indicating what you hope to get out of it, and inviting the other person to express her goals. You can then agree, jointly, on the process you will use and the way you will monitor it.

A caution. If the other person is likely to be mistrustful of your motives, it is important that you do not impose a process on her. If she is familiar with a problem-solving process that can be effective, use it. If not, ensure that you take her views into account.

On other occasions you will find yourself in the thick of an issue before you realise it. The following sequence will then often be appropriate...

You begin by stating, without blame or criticism or demand, your own position

You then invite a response from the other person, give her all of your attention, and try to understand what the world is like where she is

If she reacts with obvious defensiveness to your initial statement, switch immediately from expressive skills to listening skills. Get her perception of the issue first

If you are unable to proceed because the process is getting in the way, renegotiate the rules. Settle those, then return to the issue.

Using these skills to address the issue will eventually improve your style of interaction, and your relationship. The strongest improvement, however, results when you address the process and the relationship directly. The more difficult the person is to deal with, the truer this is.



In conclusion

Acquiring the skills of good communication is not difficult. Using them when it really matters is the difficult part. To help, there are several things you can keep in mind...

It takes two sets of skills, which I have called expressive and listening skills, to give and get information. A further set of skills is then needed to manage the overall process.

Often, however, there is more good will between people than is at first apparent. When everyone understands all the information, and when there are good enough relationships between people, resolution often emerges easily.

The two most common barriers to effective communication, I think, are a lack of skills, and the rules which forbid certain information. Using the skills within the existing rules may resolve many issues. The difficult issues, however, may not be resolvable within the rules.

It is when you use your communication skills to renegotiate the rules that real improvements in relationships and in problem solving become possible.



Notes

Personal communication. During Schein's visit, he joined a number of us on a management development workshop we were running outside Warwick, in Brisbane's hinterland. [ back ]

This document is based on a communication skills paper I wrote. That in turn was modified from one prepared as part of a conciliation workshop for a tertiary institution. That was based on material from my book Learning to communicate: activities, skills, techniques, models, St Lucia: Interchange and University of Queensland Bookshop, 1986, and available only from the University of Queensland Bookshop, St Lucia Q 4067 (and perhaps no longer available from there). [ back ]

The evidence for this is most apparent in the voluminous work of Chris Argyris, alone or with Donald Schon. A readable introduction -- Argyris, C. (1990) Overcoming organisational defences: facilitating organisational learning. Boston: Allyn & Bacon. [ back ]

Evidence suggests that provided both people listen, conflict is more likely to enhance than to destroy a relationship. See for example P. Middlebrook (1980), Social psychology and modern life, second edition, New York: Knopf. [ back ]

An implication of the preceding paragraph is that the approach used here is intended for use by normal people. A few people have marked deficits in their nonverbal expression. More specialised remedial work may be necessary for such people before the approaches described here will be completely effective. [ back ]

To avoid the clumsiness of unisex pronouns I use feminine gender throughout. [ back ]

I've used Viviane Robinson's approach to put together this example: Robinson, V. (1993) Problem-based methodology: research for the improvement of practice. Oxford: Pergamon Press.

Deriving her approach from Argyris, she suggests threestages. I think of them like this. First assert your own position, labelling it as yours. Second, provide detailed and specific evidence. Third, do whatever you can to encourage the other person to challenge and modify your view. [ back ]
 
Back
Top