StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Design Management Training at Aardvark Dog Housing - Term Paper Example

Cite this document
Summary
The following paper "Design Management Training at Aardvark Dog Housing" observes and presents the author's end-of-contract report that s\he conducted while pursuing his\her degree program in Design Management at Aadwark Dog Housing Company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful

Extract of sample "Design Management Training at Aardvark Dog Housing"

Design Management Training at Aardvark Dog Housing Introduction Seeking and gaining working contacts while pursuing one's study is an essential component of self-empowerment. It provides one with the platform to put the theoretical knowledge gained in class into practice. Learning my practicing is the best form of gaining experience during studies. This paper presents my end of contract report that I conducted while pursuing my degree program in Design Management at Aadwark Dog Housing Company. The report consists of fundamental knowledge and experience gained in relation to Maritime Security and the benefits gained from the program before making the conclusion remark. Summary This paper contains a personal contract report conducted at Aadwark Dog Housing Company. The report comprises of the work experience gained at the company and narrows down to explain the benefits accrued to both the company and I during and after the program. For instance, the report seeks to explain the issue of Maritime Security. By so doing, I adequately addressed challenges facing the implementation of Maritime Security and drew vivid discussion on the relevancy of ISPS Code technology over the existing one. In addition, the report describes effective ways of ship management with the use of mixed research methodology to address the current state of the evolving maritime security under ISPS Code. However, the report lays more significance to the role played by the 2006 Maritime Labor Convention. Finally, the report explains professional achievements I made during the program coupled with benefits that accrued and future expectations before narrowing down to state my recommendations, as well as the conclusion statement. Piracy as a threat to maritime Security The International Maritime Organization (IMO, 2000) terms piracy as any act of boarding or attempting to board any ship with an intention to steal or commit any crime with the apparent use of force and violence. IMO identifies piracy as an act that poses a tremendous terrorist threat to Maritime Security. For instance, pirates and terrorists use similar tactics to cause insecurity. They have the ability to maneuver sensitive areas to evade any security measures put in place for them. Notably is the ever-increasing cross-influence of the pirates and terrorist groups that continues to claim lives of many innocent citizens in the world. The number of piracy case continue to increase due to increase in economic drivers such as poverty and low levels of education which lets piracy as the only source of income (Kraska, 2011). Increase in maritime transportation which passes through congested narrow and risky area. Continuous regional political and economic instability with the prospect of windfall profits in Somalia predisposes the nation into deteriorating states of affairs. For instance, terrorism and piracy become the option ways that encourage the pirates to attack ships in search for valuable resources such as oil and cash. Therefore, Piracy remains to be a significant threat to maritime security. Existing versus new ISPS Code technology The technological advancement in the shipping industry has resulted in tremendous improvements as opposed to the initial ways of Maritime Security management. According to Alexander and Richardson (2009), the ISPS Code is the first multilateral ship, and port security standard ever created. Countries around the world began using ISPS on 1st July, 2004 after the Diplomatic Conference on Maritime Security in London in December 2002. The ISPS facilities remained as the best improvement over 1974s International Convention for the security of life at sea. Gritzalis.et al. (2014) ascertained that the evaluation into the existing port community systems needs to create more complex data sharing modules in order to enrich their available data presented to stakeholders for effective security management. Enhancing and complying with ISPS code, modified IT, and the CIs security management standard is the only holistic approach to the Maritime security management. Port facilities and vessels have to conduct security assessments, hire security officers and formulate security plans as compliance with the ISPS Code. Such practices enable the world to increase the ability to prevent maritime related attacks by making ports aware of unusual or suspicious activities (Alexander & Richardson, 2009). Effective Management of Safety of Ships According to Gollasch et al, (2003), ballast water exchange is one of the dangerous ship activities that require prioritization. Ship owners and operators should stick to the ballast water management plan and IMO guidelines for safety ship operation management and for preventing pollution. In recognition of threats facing the Ship companies, Kongress (2012) encourage ship owners to set guidelines, regulations and policies in line with the maritime security to ensure effective management of ships. Kongress (2012) adds that the most significant means of preventing maritime casualties and pollution of the sea from the ships is to design, construct, equip and maintain ships. In addition, ship companies should employ professional and well-trained crews in compliance with the Maritime ship safety and pollution international conventions. More so, professionals need training on how to control the crowd in case an emergency situation arises. They should locate essential safety and emergency equipment on board; communicate effectively with the passengers’ during an emergency. For instance, everyone should use Personal life-saving appliances and comply with the ship safety and emergency procedures for effective ship management (International Maritime Organization, 2000). Research Methods During the study, I employed mixed strategies in approaching the use of research methods to establish sufficient and relevant knowledge. For instance, both primary sources of data and secondary sources were used during the training. The main methods involved the use of questionnaires, observation during rotational visits to various departmental offices and interviewing the practicum supervisors at Maritime. However, secondary sources of information such as already documented reports, books and visiting the online materials were crucial during the training season. The use of quantitative and quantitative methods complement each other to eradicate biases incurred in case a single process (Andrew & Halcomb, 2009) Knowledge and results gained was significant in drafting the final report. In addition, the information served as a future reference for retrieval and use by various key players within Maritime security. New and Maritime Security under ISPS Code Terrorism and Piracy continue to increase despite the amendment of the 1974 SOLAS Convention into ISPS code. Changes should occur with amicable amendments of the ISPS codes. Unlike the SOLAS convention, ISPS codes occur in two major parts whereby part of the system is mandatory while Part B is recommendatory. It is evident that the ISPS code developed in reaction to terrorist attacks on Limburg oil tanker in Yemen and the Twin Towers in the USA. Such objective may be the cause of failure to adequately address piracy and terrorism in third world countries such as Somalia and most of the Asian nations. Promisingly, the world should develop codes that effectively address the empowerment of the impoverished parts of the world. In addition, Daniels (2012) ascertains that the systems should actively involve the poor populations from the initial step of planning, formulation, interpretation, implementation, monitoring and evaluation of the whole process. Independence, rehabilitation and empowerment of those involved could serve as a lesson to the rest. Generation technical and commercial reports Learning how to develop and generate technical and commercial reports is a crucial activity towards self-empowerment. Commercial reports are sources of financial and economic empowerment resulting in the generation of large incomes. For instance, many research firms root themselves in commercial reports as a business establishment generating high revenues. On the hand, technical reports are vital to addressing significant social implications exacerbated by the ever-changing world conditions. Technical reports may result in eradication of major community issues and challenges such as terrorism and piracy. However, developing and generating both technical and commercial; reports is essential in reaching the development of innovative solutions in case of complex and emergent situations due to their ability to the researcher think critically to develop ideas. Maritime Labor Convention 2006 In February, 2006, the world governments adopted The Maritime Labor Convention. Popularized as “seafarers’ bill of rights,” the MLC sets minimum working and living standards for all seafarers who work on the ship and fly the flags of ratifying countries. The convention provides worldwide standards for the first genuinely global ship industry. MLC, 2006 aims to achieve decent work for seafarers while securing economic interests via fair competition for quality ship-owners. The convention is significant in that it ensures a safe and secure work environment that is compliant with the worldwide set safe standards. It negotiates for fair employment terms for seafarers with decent working and living condition while on board ship. Lastly, MLC, 2006 enables seafarers’ health protection, provides medical care, welfare measures coupled with other social security forms (ILO, 2013). Professional Achievement I realized various proficient achievements during the training in meeting the original set objectives of the coursework. I conducted the field training exercise as a prerequisite to developing more experience after completing my third year of study at the University. Learning to self and project management with advanced management of funds to minimize costs formed part of the vast experience learned. The program provided more experience and improved the individual skill of handling the paperwork in line with the British Standards. The eight months of practical learning provided ample time on how handling of projects. I also managed to understand on how the design department exchanges information effectively with its corresponding units. Aardvark Dog Housing equipped me with the adequate knowledge required to become a Design Manager. Benefits of the learning to the Career and Professional Development The eight months learning program presented a variety of benefits in increasing personal experience in design management. I enhanced my skills in self-management of projects as taught in prior lectures at school. I gained knowledge on how to run the Design Office in the absence of the boss and practiced the theoretical knowledge provided in class. The lecture on Management of Product Design made me realize how Aardvark Dog Housing Company used the British Standards to run their operations efficiently. The project reassured my determination spirit in meeting strict deadlines by completing the 120 credits offered at the University. For instance, the learning program was instrumental in the completion of the Individual Project. Benefits to the Company The company benefited from my completion of my third year learning program in a number of ways. First, the company managed to improve the learning system to fit the trainees’ needs by developing a manual for trainees. The manual simplified the Hydraulic Calculations in the Work Based Learning 3. The company gained insights on how to conduct a stepwise explanation for trainees on designing of an In-Rack Sprinkler System. In addition, the program helped the company on how to improve communication between Designers and Sprinkler fitters during fitting of In-Rack Sprinkler System. My efforts in to serve the company saved them of other costs that they could incur in my absence. Future Career and Learning Plans In collaboration with Aardvark Dog Housing, I envision to pursue further studies in Design Management. I hope that the company will still give more education opportunities and incorporate me into their system to assist in Design management while still on studies. Conclusion I wish to express my sincere gratitude to all those who made my work contract, as well as training field successful. Notably, I appreciate Aardvark Dog Housing for honoring my training and contract application and awarding me such a noble chance to work while on studies. The University Practicum Coordinating Team in collaboration with my supportive and inspirational parents and lecturers feel appreciated. Lastly, colleagues who helped in the completion of the training sessions and pursuing of our studies feel honored too. All stakeholders should invest more efforts in strengthening Maritime Security as it is a challenging issue in the achievement of peace in the world. Notably, the ISPS code needs amendments and further improvements in order to address the contemporary issues in the world. Governments should, however, divert resources to empowerment and addressing the rights of the underprivileged and economically vulnerable communities that are at risk of engaging in terrorism and piracy. Recommendation According to the experience gained from my Design Management degree, I would recommend that students should pursue studies in Technology Extended Campus Degree. However, working for a company while studying keeps one focused towards achieving the highest grade possible. Despite the challenging multi-tasking experience, support from the company can oversee your continuity and well-being. The gestation period was stressful and exempted me from social life. Nevertheless, I believe I did my level best. However, I have to invest more efforts in studies as an appreciation to Aardvark Dog Housing in supporting my degree. References Alexander, Y., & Richardson, T. B. (2009). Terror on the high seas: From piracy to strategic challenge. Santa Barbara, Calif: Praeger Security International. Andrew, S., & Halcomb, E. (2009). Mixed methods research for nursing and the health sciences. Chichester, U.K: Wiley-Blackwell Pub. Daniels, C. L. (2012). Somali piracy and terrorism in the Horn of Africa. Lanham, Md: Scarecrow Press. Davies, J W. (2001). Communication Skills: A guide for engineering and applied science students (2nd edition). Harlow: Pearson Education. ISBN 0‑130‑88294‑1. Gritzalis, D., IFIP TC11 International Conference on Information Security, Furnell, S., & Theoharidou, M. (2012). Information security and privacy research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Berlin: Springer. International Labor Organization. (13th August, 2013). Labor Standards: Basic facts on the Maritime Labor Convention 2006.-Promoting Jobs protecting People. United Nation. Geneva, Switzerland. Retrieved from: http://www.ilo.org/global/standards/maritime-labour-convention/what-it-does/WCMS_219665/lang--en/index.htm International Maritime Organization. (2000). Crowd management, passenger safety and safety training for personnel providing direct services to passengers in passengers spaces. London: International Maritime Organization. Kongress. (2012). Resolutions and other decisions: ... session // International Maritime Organization, Assembly; 17. Kraska, J. (2011). Contemporary maritime piracy: International law, strategy, and diplomacy at sea. Santa Barbara, Calif: Praeger. Truss, L. (2003). Eats, Shoots and Leaves. London: Profile Books. ISBN 1 86197 6127. Van Emden, J (1998) A Handbook of Writing for Engineers. Basingstoke: Palgrave. ISBN 0-333- 72807-6 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Design Management Training at Aardvark Dog Housing Term Paper, n.d.)
Design Management Training at Aardvark Dog Housing Term Paper. https://studentshare.org/social-science/2055350-design-management-training-at-aardvark-dog-housing
(Design Management Training at Aardvark Dog Housing Term Paper)
Design Management Training at Aardvark Dog Housing Term Paper. https://studentshare.org/social-science/2055350-design-management-training-at-aardvark-dog-housing.
“Design Management Training at Aardvark Dog Housing Term Paper”. https://studentshare.org/social-science/2055350-design-management-training-at-aardvark-dog-housing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Design Management Training at Aardvark Dog Housing

Training Design

?? Differentiate trainees on basis of positive and negative answers and briefly discuss with them why they assumed so and what would make it better. Inform trainees of the key learning objectives for the training module and describe training Design: Communication Skills training As Robert Gagne said, “Organization is the hallmark of effective instructional materials”, the training design based on Gagne-Briggs model for communication skills is as follows;Gain attention: Use flip chart to initiate interest in communication skills by taking a short general quiz....
2 Pages (500 words) Essay

Training & Talent Management

Failure of Training and Talent Management to meet this objective creates a Running Head: TRAINING AND TALENT management training and Talent management training and Talent management training and Talent Management refers to the process of identifying, tapping and recruiting as well as orienting the recruit to a particular task and its working environment.... training and Talent Management refers to the process of identifying, tapping and recruiting as well as orienting the recruit to a particular task and its working environment....
2 Pages (500 words) Essay

Design the Training Plan

With these imported values implanted in the culture of Hilton, the present paper wishes to analyze what sort of… With the use of ADDIE as a method for training needs analysis, the present paper finds out how such method could specify the important facets for the employees improvement of their Indeed, ADDIE has been very useful to determine how the knowledge, skills, and abilities of the employees would be enhanced that would be suitable to the cultural values imposed by the Hilton hotel (Thomas, Mitchell, & Joseph, 2002; Chevalier, 2011)....
5 Pages (1250 words) Research Paper

The Advertisement Company

ome of the controls that can be used on the switchboard are:a) Images: This control can be used to insert the picture of the dog and display it on the advertisement site.... ) Text: The text can be used to provide a description of the dog and give the necessary information concerning the dog.... ) Boxes: This control can be used to tick where the services available for the dog appear.... For instance, the dog can either be for sale or for hire....
1 Pages (250 words) Essay

The Philosophy of Dog Intelligence

The paper "The Philosophy of dog Intelligence" describes that dog psychology advanced by the cynicism philosophy was that a dog, though intelligent to differentiate between friends and enemies, lives according to nature by only requiring the bare necessities of life.... hellip; The philosophy of dog intelligence continued through to the Greco-Roman period, where the dog became the epitome of the Hellenistic philosophy, especially under the Cynicism philosophy advanced the concept of living for virtue....
6 Pages (1500 words) Essay

Training Design Proposal

Through training, companies can impart significant knowledge and skills to its employees and at the same time collect feedback from them.... When a designer is tasked with the development and delivery of a two-day training… shop for 100 managers, the designer needs to identify the training needs and how to design, develop and meet those needs in a manner that will ensure the objectives of the training are achieved (Blanchard 2013)....
4 Pages (1000 words) Assignment

The Issue Concerning the Shooting of Dogs

Some owners have demonstrated to have suffered… However, the issue concerning the shooting of dogs is not just any other killing, whether the dog belongs to a citizen or the police, but rather it is a subject that is In addition, there are also various consequences as well issues that accompany the killings.... Police presence is inevitable in our lives because of increased crimes and thus lack of training on how they should handle pets is quite a concern....
7 Pages (1750 words) Essay

Inside of a Dog: What Dogs See, Smell, and Know

Another question about dogs is that why only dogs were able to establish relationships with human while all the other members of the dog species like the fox, jackal, etc failed to do so.... I have selected the topic about dog because of my love towards dogs.... dog is my pet animal and it keeps strong relationships with me and my family members while it hate all the others.... dog's ability to smell and identify objects and human was often utilized by us....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us