Skip to content

Managing a Successful Business Project Assignment

INTRODUCTION
This essay is describing about a nurse who makes medication error on surgical patient who
admitted three year ago and nurse give metoclopramide tablet leh had documented allergy of
this tablet and leh had anaphylactic reaction to this medication and ventilated in ICU after some
time leh recover. Nurse did not properly monitor the patient and do medication error and in this
case nurse is in act of guilt of negligence and patient decided to take legal action for nurse. It also
discusses about Guilt of negligence is a law in which a person can't feel guilty if he or she does
crime. It is the form of criminal culpability.

 

DUTY OF CARE
Monitor patient health – Nurses monitor the health condition o f patient and according to
patient condition prepare them for relevant treatment. Properly analyze the patient and give
right medication according to patient health.

Administer medication – First of all monitor patient document and any allergy of any type of
medication Staff nurse ensure all patient get medicine on decided time after providing
medication they stay with patient and observe reaction of the medication talk about reaction to
physician at right time it is important work of nurses (Dowie, 2017).
Maintain medical record -Nurses maintain all medical record of patient for high quality of
medical care and use different type of software and computer for keeping record.
Diagnosis and test patient -All tests are require analyze patient condition and give good
treatment according to patient problem.
Operate medical equipment -Nurse work on thermometer, blood pressure machine,
stethoscope. Staff nurse work as an operator of all machine (McNeill, et al., 2019).
According to case study nurse did not perform duty of care properly and nurse did not monitor
properly previous medication and record and nurse did medication error. Nurse does not
maintain medical record and don’t ask past issue of patient and give medicine so patient had
trouble and ventilated in ICU after reaction of medication because patient have allergy of
metoclopramide medicine after treatment patient recover but took legal action against nurse
because nurse did not perform duty of care perfectly . Nurses did not monitor and administer
patient and record is not maintain so perform medication error.

BREACH OF DUTY OF CARE
Breach duty of care means nurses and doctors always has a duty of care of patient if doctor and
nurses not perform that duty well it means they breaches the duty causes more damage the
patient . If nurses and doctor fails to perform duty and result of this is patient take legal action
toward the doctor and nurses patient require standard degree of care if it does not found it means nurses breach the duty. The term breach defines failure to perform work and wrong doing.

According to case study lea (patient) admitted 3 year ago for surgical process and he
documented allergy of medication of drug but nurses give the tablet metoclopramide this
medication us for nausea and vomiting nurses not check previous record and give this tablet but
patient have documented allergy for this medication so patient have anaphylactic reaction to this
medication and ventilated in ICU after some time leh recover but nurse don’t have guilt of
negligence after breach duty and harm the patient and another more patient leh take legal action
for this nurse. It is example the breach the duty of care nurse not perform better in hospital and
play with and patient healths. Nurses are legally responsible for this failure.
Duty of Care is legal action of nurse patient are safe or not and in this case study this duty breach
the nurse and doctors. Nurses do not properly operate equipment any injury had patient it is part
to breach duty and claim by act of negligence. Medication error is also including in breach duty
of care. Falling to monitor the patient and miss the sign of patient and falling to call the
physician on time (Radoinova & Kolev, 2015). And patient health affect in any type it is
responsibility of nurses. If fail in duty means breach duty and patient take legal action.
Nurse breach the duty of care according to case study and did not properly monitor patient health
and did not check record and document so wrong medicine give patient and patient health affect
ventilated in ICU after some time patent recover but took legal action against nurse.

HARM AND CAUSATION
If nurses do any mistake and failure include medication error and fall in properly monitor it is
harm for patient and causes is failure in work. Medication error is cause of injury and avoidable
harm in health care system Drug error is the harm of medical department and higher harm seen
in surgical department. Diagnostic error and surgical error is harm for patient and blame the
nurse because they do not perform duty of care.
In case study harm is the patient leh suffer anaphylactic reaction to the drug and ventilated the
ICU and cause is medication error by nurses leh take wrong medication and leh have allergy of
this medicine is cause of injury. Leh fenster marcher admitted for surgical treatment and nurse given tablet metoclopramide this tablet use for nausea and vomiting but leh had allergy of this
tablet and leh had anaphylactic reaction to this drug and ventilated in ICU .harm in this process is
patient health and recover in long time and unable to do any work for several time affect health
of patient health is harm and causes id nurse did mistake in monitor customer health and perform
medication error and did not administer properly and affect the leh health.

 

CONCLUSION
Patient suffer medication error and nurses not accept guilt of negligence and patient take legal
action because leh suffer the reaction of medicine and unable to work for several month so many
loss occur because recovering after long time from reaction and ICU admission .Nurse doesn't
monitor properly and falling to check previous document so patient take action against nurses. In
this case nurse responsible for medication error according to guilt of negligence if any error by
nurses that affect that patient health board of nursing take disciplinary action and possible
criminal charges because patient take action toward nurse.

REFERENCES
Dowie, I. (2017). Legal, ethical and professional aspects of duty of care for nurses. Nursing
Standard, 32(16-19), 47-52. https://doi.org/10.7748/ns.2017.e10959
McNeill, C., Alfred, D., Nash, T., Chilton, J., & Swanson, M. (2019). Characterization of nurses’
duty to care and willingness to report. Nursing Ethics, 27(2), 348-359.
https://doi.org/10.1177/0969733019846645
O'Sullivan, J. (2020). A DUTY OF CARE TO BREACH MEDICAL
CONFIDENTIALITY?. The Cambridge Law Journal, 79(2), 214-217.
https://doi.org/10.1017/s0008197320000434
Radoinova, D., & Kolev, Y. (2015). Medical Errors and Negligence in Cases Versus Medical
Professionals. http://www.iempam.bas.bg/journals/acta/acta21/163-166.pdf

Briefing report

Introduction
Blue Healer Resort is the leading resort in Australia. They had one office based in Sydney. in
this particular resort they had 25 staff members. They want to do some changes in the policy
and the procedure in the resorts. In the current policy, they are not able to give them the proper
services in the restraint. So, they want to do some changes to the plan of the resort. They want
to set the “set of skill" program. In this program, they do the discussion regarding the culture of the resort. They want to establish a good approach to the company and share all the approaches
and innovations with the business plan (Rakus-Andersson, 2014).

Suitability of current policy
In this, they had a unique mind of the diversity policy in the organization. they support all over
the people who relate to the organization. they are shares the meeting of the company and they
share the business objectives of the company. Thus they are enhanced their inner capacity and
do the best quality services to the customer need and reach for the customer needs. They all
committed to each other to give fast and furious services. They give their services at the exact
time and they cover all the services with each other.

Overview of relevant legislation
But we want to do the changes in the resource so we think regarding the changes of the resort
policy procedure and the relevant legislation.in this, we think to take the action in our work
regarding this kind of issues in the workplace.
Disability discrimination- as we know regarding thee disability discrimination in the
workplace. Now it is becoming one of the most common forms of discrimination in the
organization (Rakus-Andersson, 2014).
Racial discrimination- nowadays, there is no secret regarding the secret and racial kind of
discrimination in the organization. There is a certain kind of minority group are often it is
based on the past over all the stages of the employment process.

Sex discrimination- as we know that gender discrimination is one of the most common
discrimination all over the world. They are treated you differently regarding your gender. It is
the things that take many forms. It can be done regarding the failure to hire and many more
issues.

Human rights- As we know that the Australia Human rights commission is the independent
third party is does the discrimination complaints and takes all the correct decisions regarding
this (Purnaya, 2016).
Equal opportunity. It is the kind of opportunity they are referred to with all of the good terms
and good treatment terms in the organization. there are many kinds of discrimination held there
like based on race and gender (Purnaya, 2016).
Overview of Dispute Resolution Policy and Procedures
Dispute resolution is a kind of dispute settlement it is the kind of process used to do the
resolution of the dispute between the parties. It is the kind of the terms related to the dispute
solution is te sometimes used interchangeably with the different kinds of conflict and
resolution, although it is generally more deep-rooted by the differences in the length and the
disputes (Seraphin, H., & Thanh, 2020).
Feedback and suggestions
They need to be the leverage with the organizational job boards. It is important and highly
diverse and it is also biased to the diverse area and the career page related to the work and the
website. It also gives you the target internship and scholarship. They need to implement
diverse mentorship. It is a kind of diversity and organizational training. It is rewarded with
diverse referrals

E-Mail
To – info@ceo.ac.in
From- manager.ac.in
Subject- feedback and the approval
Date- 12-07-2022
Hello sir,
Here to inform you that, I will give you the information regarding the management of the Blue Healer
Resort. In this, we are trying to do the implementation of some kind of new policy. In this report, we are
doing the discussion regarding the Diversity Policy and the procedure of the workplace. In this diversity
policy, we are doing the discussion regarding the management of the workplace and its policies. In this they are facing the issue regarding the resort services and process. In this, we are planning to do a diversity policy in the workplace.
Thanks
Regards
Update the diversity policy-
They need to do the leverage of the organizational diversity job boards.
Highlight the diversity regarding the career page.
Give them the target internship and the scholarship.
Offer them the diverse mentorship.
Gives them the training regarding the workplace diversity.
Create the counselling regarding the inclusion of the work.

Assessment task 1: Knowledge question

Question 1
1. Identify hazards and assessing risk for safety
2. Right decision take right time for reduce risk.
3. Creating the risk assessment and management plan.
4. Change in some work that affects the employee productivity and safety of workers.
5. Provide insurance and compensation policy for employees.

Question 2
1 checks all machine and equipment are safe and stable at work place for productivity.
2. How to work employee and analyze and organize the better way for achieve goal before
deadline
3. Provide training and instruction of employee.
4. Make sure employee is aware about hazard and policies of company. And continuously
monitor health of workers.

Question 3
1 .Know all hazards that can hold on work place and keep safe and follow guideline of company.
2. Safe use of machines is requiring all knowledge about equipment and machine before use.
3. Follow all safety signs and warning signal for your health.
4. Workers should follow WHS regulation for safety and welfare purpose.

Question 4
1. Consult about the important decision with employee that give the engagement of employee.
2. Changes are requiring for safety purpose and better health of employee.
3. Consult for hazards and assessing the risk.

Question 5
1. Identify all hazards that affect work force and assessing risk.
2. Control risk by making perfect decision and eliminate the risk.
3. If changes require than change the work place facilities and control hazards and risk.
4. Take care of employee health because better health is important for workplace.

Question 6
1. Management team consults regarding the WHS issue.
2. Employee who share work and consult directly or indirectly with workers.
3. Health and safety department with who manage this consult with person
4. Operational meeting is part of consult.

 

Question 8
The representative who is commonly referred to as the HSR is the worker who elected to serve
the health and safety measures and is interested in their work.
Roles and responsibility of a health and safety representative
He has to represent the workers on the health and safety measures and help them in the
discussion he has to do the discussion with the manager and provide hazards and safety issues.
He has to monitor the entire organization’s working conditions. and ensure that everything is
alright.
Helps to promote the develop the safety and health of employees at your workplace. Provide a huge role in communication link or bridge between the people the workers and the
PCBU.
He has to inspect or investigates the complaints from the employees (Mambwe, et al., 2021).

Question 9
To reduce or prevent risks related to health by ensuring that all the machines and pigments are
well and safe.
It is the employer’s duty and responsibility to protect the employee’s health by taking safety
measures.
Provide employees a safe and healthy environment that is free from serious hazards and health
issues and comply with the set standard (Nielsen, 2014).

Question 10
1. Represent the workers about any problem and health and safety of employee.
2. Investigate complaint from team about work and health or safety.
3 .identify potential hazards and risk and conduct audit at workplace about health and safety.
4. The important work is resolved health and safety issue.

Question 11
1. When new machine or equipment installed at work place and procedure changes.
2. When new information regarding health and safety risk becomes available means follow WHS
rule.
3. If worker do any mistake on new work than find WHS hazard at workplace.
4. after an accident WHS hazard take place

5. If you don't follow hazard guide and new work do and injure.

Question 12
1. physical hazard
2. chemical hazard
3. workload hazard

Question 13
1. Collect the information about workplace hazard.
2. Inspect the workplace for safety hazard.
3. Check all chemical properly before use for chemical hazard.
4. Investigate all equipment and machine before use for safety hazard.
5. Identify health related issue on workplace.

Question 14
1. Conduct internal research at work place for identify risk.
2. Conduct external research at work place for identify risk.
3. Analyze the work of employee and client complaint for risk
Question 15
1. First of all identify the risk than analyze the risk.
2. Isolate the risk those find
3. Engineer control the risk.

4. Administrative control.
5. Personal protective equipment use last time.

Question 16
Injury and accident reports, which is including records that are investigations and misses
All the policies and procedures which is related to the WHS are recorded.
Assessment of risk
Plan an emergency plan
Register the substance which is hazardous.

Question 17
 It helps to reduce the losses.
 Helps in managing the cash
 Helps to meet any legal requirements
 Helps in the improvement of financial analytics

Question 18
To ensure that the working environment and the working system are safe or not
 Check the machines and pieces of equipment in an effective way that it is safe or not.
 Provide workplace facilities to the workers.
 Make sure that the working condition like health is ok or not.
 Managers have to monitor on a regular basis.

Question 19
Tell employees about their health status and any problem related to health.
They should discuss the problem if they are facing any problem related to the workplace.
One should share the safety and health concerns with the employer.
They can take breaks during working.

Question 20
Ten possible ramifications for employers who fail to observe OHS or WHS laws are
 Fines
 Imprisonment
 Reputation loss
 Potential staff loss
 Reduces time and loss of productivity
 High penalties
 Reduction in employee retention
 Intense injuries and accidents at the workplace
 Death or serious injury (Boadu et al, 2021)
 Life-long jail

Question 21
It is a task that requires the person to lift, push, pull, lower, hold, and restrain any person

 Sustain and repetitive forces.
 Sudden and high forces
 The movement which is repetitive
 Awkward and sustained posture
 Vibration and exposure
It is hazardous when there is one or many factors risk involved are present which are sustains
and repetitive force.
For examples
Putting the shelves and boxes, gardening and painting, writing and typing, and cleaning
(Kadikon & Rahman, 2016)
Question 22
Methods of receiving updated information on OHS or WHS laws and codes of practice are by
watching the local tv news, or by the newspaper, or the social media or apps related to news,
books, and articles.

Question 23

Time when hazard identification
must be carried out Reason

Before premises are used for the first
time.

We have to check before the use for the
first time because it is very important to
check for ensuring the safety purpose and
for the safety of employees.

Before and during the installation or
alteration of any plant, machinery or
equipment.

It is important to check because if any
problems are in a machine it can cause big
issues or serious injuries. So, to prevent
serious injury at a workplace it is very
important to check the plant, machinery or
equipment Before and during the
installation.

Before changes to work practices,
procedures or processes are
introduced.

It is important to find the hazards and risks
before the changes to work practices,
procedures, or processes to prevent or
reduce fatality or serious or normal
injuries. And I the hazards are identified
they can be handled in an effective
manner.

When any new information relating to
health and safety risks becomes
available.

It helps in the analysis of risk and
evaluates and describes the safe risks
system. It helps to provide the information
which helps to enable the personnel
designs which helps to make safety
improvements in an effective way. That’s
why it is important When any new
information relating to health and safety
risks becomes available.

Question 24
 Health and safety procedures and policies
 Normal operating policies
 Code of conduct of an organization
 Induction and training records
 Injuries register

Question 25
Examples of WHS ‘consultation’ record requirements are
 Registers and incidents registers
 Company newsletters
 Notice boards of the company
 Pre-meeting daily
Question 26
Physical hazards, chemical hazards, biological hazards

Question 27
There are some examples of notifiable incidents which are related to the serious injury that are
 Badly or serious injury at head
 Electric shock
 Spinal injury
 Serious eye injury
 Or sometimes death
 Serious illness or a dangerous incident.

Question 28
It is denoted that this is a serious injury which is caused due to lack of concentration and wrong
working conditions a manager must ensure that the working conditions should be very good and
safe. All the machines and equipment are well and in a good situation.

Question 29
The WHS statistics should be reviewed on a regular basis, it is very important it WHS should be
reviewed and reported it allows the trends related to health and safety for the improvement which
is continuous for the WHS management system and for the WHS university’s performances. All
help organizations to control the risks for health and safety measures. Also helps in providing the
current status related to health (Lingard et al., 2014).

Question 30
Agendas for the minutes Agendas for the minutes is an important term that helps to get prepared for the meeting and get ready
and it helps in saving time and arranging an effective meeting.
Committee members
A committee member is an important part of the organization they help in sharing the data and we
can take their ideas and reviews because they have so much experience.
Consultation decisions and follow-up actions
It is very important to consult and decisions and follow up action plan it helps to make a final
decision and helps to manage the business effectively.
Consultation processes
It is a legal need and a very important part of the organization in managing health and reducing risks.
It is very useful and understanding the problem and helps to solve many problems.
Diaries of meetings
It is a very important and necessary thing for business it helps to track everything from an external
and internal meeting. and helps to the dealing conference and travel arrangements.
WHS information provided to personnel
It is a manager’s duty to take care of employees and keep them up to date about sharing with them
every issue and every information related to WHS to maintain a good and safe environment for
them.
Risk controls
For the health of the organization, it is very important. it helps to achieve the desired goals and helps
organisation against the financial risk.
Safe work practices It is generally a written method it is a way that how we can perform with a less risk to employees,
materials and equipment.

Question 31
Injury and accident reports, which is including records that are investigations and misses
All the policies and procedures which is related to the WHS are recorded.
Assessment of risk
Plan an emergency plan
Register the substance which is hazardous.
Health and safety procedures and policies
Normal operating policies
Code of conduct of an organization
Induction and training records
Injuries register.
It is an easy method to track the risks and them control it in an effective manner. helps to solve many
things.

Question 32
details that need to be maintained regarding WHS are identifying the risks related to the workplace,
measures to control the hazards, risk assessment, minimization model should be developed, and
implement the measures which are appropriated. During organization hazard reviews, accessing
with staff, visually viewing effort existence completed, analysis and evaluating internal WHS
records and data, recommending workers that they are essential and encouraged to interconnect
recognized WHS threats.

Question 33
Details that need to be maintained regarding WHS are identifying the risks related to the workplace,
measures to control the hazards, risk assessment, minimization model should be developed, and
implement the measures which are appropriated.

Assessment task 2: WHS Project
Following are the ways to create a safe and healthy working environment
 Identification of workplace hazards- Before the WHS practice, it is important to identify the
hazards taking place in the workplace.
 Conduct safety programs- Safety programs should be conducted to educate the workers and
employees working in the Blue Healer Café.
 Safety training should be provided- training regarding safety and security should be provided.
Education should be given to the employees and workers for safety and security (Johnstone, et
al., 2012).
 Use of safety Equipment- It is important to use safety equipment in the workplace. For example-
The use of PPE (personal protective equipment) Like hand gloves, protective eyewear, etc.
Health and hygiene requirements in a food business-
 Should tell chefs and food handlers regarding hygiene responsibilities.
 Food premises and food equipment like kitchen, utensils, etc should be clean and should be in
good working condition.
 Maintain cleanliness in the food surfaces.
 Food handlers who have any kind of infection should not be allowed to prepare food, until and
unless they get recovered from the infection.
The manager of Food Healer Café should ensure that-
 Whether the hygiene is maintained or not in the place where food is prepared
 The manager should make sure that the workers who are having a disease that can be passed to
one another, those people should stay away from the food.

 It should be kept in mind that the people on the premises do not contaminate the food.
 The food premises should be kept free and stay away from pests and animals.
 Avoid the use of cracked, defective, and broken food equipment and utensils.
 Emphasize cleaning and sanitizing facilities in the workplace.

A systematic procedure and policies should be implemented in the Food Healer Café for smooth
business activities. A chef or food handler in the café must ensure that the food which is going to
be served to the customers should not come into contact with infected people or they should
protect the food from contamination. The food handlers should make sure that they do not
prepare food that is unfit or unhealthy for the people. It is the responsibility of the food handler
to use the right and healthy food ingredients. The ingredients should be free from preservatives.
Blue Healer Café comply the Work Health and Safety Act 2011, codes of practices, and other
Australian legislation and standards to ensure fair and transparent business activities.
The café represents that there is a high fire risk in the workplace, so safety measures regarding
fire incidents should be taken. It includes the emergency exit door in case a fire takes place, or
the emergency evacuation drill should be conducted from time to time.
1. Legislation: Work Health and Safety refers to the safety practices that are developed and
implemented in the workplace to prevent hazardous risks and dangerous incidents or to reduce or
mitigate the risks.
The Work Health and Safety Act 2011- WHS act provides guidelines and a framework in
Australia for the protection of the workforce. It provides the safety measures that all business
organization has to follow to ensure the safety and security of the employees and workers.
The Work Health and Safety Regulations 2011- WHS regulations provide systematic
procedures and administrative requirements to comply with the WHS Act. It provides the roles
and duties which are needed to support the WHS Act. Codes Of Practice- These are the guides that give direction about how to achieve standards that
are mentioned in the WHS Act.

Reporting/Monitoring Monthly reporting
WHS Management Report
Summary of WHS briefing
To avoid serious and death-threatening incidents in the workplace, work health and safety
regulations are introduced in the organization. According to the WHS rules and regulations, all
the workers and staff members are required to follow the guidelines. This includes, if there is any
risk identified by the employee, and then it should be immediately notified to the superiors.
Hygiene and cleanliness should be maintained in the kitchen. It is the responsibility of the food
handler to prevent the food from being contaminated. If the food equipment and tools are getting
damaged, then it should be immediately replaced or repaired (Simao, et al., 2021).
Identification of non-compliance
It is the responsibility of the Manager to ensure that the rules and guidelines are properly
complied with or obeyed by the staff or not. To identify this, the manager will conduct an
inspection monthly to check or investigate whether the regulations are followed properly or the
employees breach the rules. In the inspection, if there is any activity or work fids out which are
to be avoided, then strict action should be taken.
Actions
If the manager finds that the employees or the staff, do not comply with the WHS regulations,
then strict action can be taken so that the mistake or the misconduct could not be repeated in the
future. The manager should implement the fine on breaching the rules. The manager can suspend
or terminate the worker or employee, if they do not follow or comply the WHS rules. The
training program should be conducted to educate the employees and workers for WHS measures
in the workplace.

The training program regarding the work health and safety of the workers and employees who
are working in the organization, the manager should coordinate with other superiors to give
training to the workers. In the training session, safety measures like the use of fire extinguishers,
emergency fire exit doors, etc should be provided. All the workers should use new and updated
technology and tools in the workplace. The obsolete and outdated tools should be avoided to use.
In this session, education is given to workers regarding food safety. The knowledge should be
given regarding How to prevent food and beverages from being contaminated and getting
spoiled, how to maintain the freshness of food etc. in this training program, the knowledge
should be given regarding the hygiene and cleanliness.
WHS Training Report
Summary of WHS training
The training is provided in the rooftop area of the Blue Healer Café on 11 July 2022 at 12:00
pm. The training session emphasizes on work health and safety regulations and rules. In this
session, the major roles and responsibilities of every employee and worker are discussed, and
how to deal with the problem or the risk, without getting anxious, training is provided. The
importance of WHS regulations are to be discussed in this session.
Training options
The training session is taken by the Food Safety Expert. This training is necessary to conduct in
every 2 to 3 months so that the workers and employees can implement the knowledge in the
workplace and face the problem during their work. This mentoring and coaching is important for
workers, they get knowledge regarding the incidents and how to deal with them.
General opinion on the outcomes of the training
Include information on:
 Staff adherence and compliance to the procedure

 How staff reacted during the training and if there is any need for additional training or changes to procedures or training
 The effectiveness of the WHS practice – are current practices ensuring the health, safety and
security of all employees?
Feedback from staff who participated in the training
The training session is taken by the food safety expert. And staff members fully participated in
this mentoring program. They also give feedback. And share their views and various idea which
can be implemented in the workplace.
Recommended actions
In future, the training programs should be taken and examples can be given with the help of 3d
graphs and pictures so that the staff can easily assess the knowledge. Some live examples can be
given regarding the exit entrance door, use of hand gloves etc so that workers could understand
things easily.

I hope you are good. As you know, it is important to comply or implement the work health and
safety measures in our Blue Healer Café, we conduct a training session for our employees and
workers. The training and mentoring session was taken b the Food Safety Expert. This session
goes very nice and various new and innovative idea also came from our staff. In this session, the
training was given on, how to prevent food from getting spoiled, the importance of cleanliness
and hygiene, the use of new and updated tools, etc.
Some deficiencies were also identified in this session which is important to correct immediately.
Like all the staff members have their insurance. Extra availability of the fire extinguishers, use of
preservative-free ingredients in the food, These deficiencies will be kept in mind and some
changes are to be made in the policies. I will ensure that the deficiencies will be corrected
properly. Thank you for your precious time.
Manager
Blue Healer Cafe

References
Australia, S. W. (2015). Work health and safety perceptions: Construction industry. Safe Work
Australia: Canberra, Australia.
Boadu, E. F., Wang, C. C., & Sunindijo, R. Y. (2021). Challenges for occupational health and
safety enforcement in the construction industry in Ghana. Construction Economics and
Building, 21(1), 1-21.
Johnstone, R., Bluff, E., & Clayton, A. (2012). Work health and safety law and policy. Thomson
Reuters. Kadikon, Y., & Rahman, M. N. A. (2016). Manual material handling risk assessment tool for
assessing exposure to. J Eng Appl Sci, 100(10), 2226-32.
Kuempel, E. D., Geraci, C. L., & Schulte, P. A. (2012). Risk assessment and risk management of nanomaterials in the workplace: translating research to practice. Annals of occupational
hygiene, 56(5), 491-505.
Lingard, H., Pirzadeh, P., Blismas, N., Wakefield, R., & Kleiner, B. (2014). Exploring the link
between early constructor involvement in project decision-making and the efficacy of
health and safety risk control. Construction management and economics, 32(9), 918-931.
Mambwe, M., Mwanaumo, E. M., Thwala, W. D., & Aigbavboa, C. O. (2021). Evaluating
occupational health and safety management strategy success factors for small-scale
contractors in Zambia. Sustainability, 13(9), 4696.
Nielsen, K. J. (2014). Improving safety culture through the health and safety organization: A
case study. Journal of safety research, 48, 7-17.
Simao, D. D. C., Karanikas, N., Cortes-Ramirez, J., & Sav, A. (2021). Workplace health and
safety consultation in Australia: a scoping review. Journal of Health, Safety and
Environment, 37(2).

Assessment 1
1.1 The network threats to consider are-
1. Phishing
2. Service attack denial
3. Malware
4. Computer viruses
5. Rogue security software (Jing, et al., 2014).
An enterprise can achieve the right level of security through-
 Malware scanning
 Prevention function of data leakage
 Internet protocol awareness (Jing, et al., 2014).
 AV scanning
 Dynamic URL categorization techniques.
1.2 Security goals that need to be considered are-
 Segmenting and creating the DMZ.
 Enabling secure network access.
 Building security layers around the castle as there is no such defense that is 100% effective.
 Harden security policies, device configuration, and software updates (Dadheech, et al., 2018).
 Perimeter security begins with secure network design by using-
 Authentication of all users access.

Some of the examples of active attacks are Masquerade, service distributed denial, session
replay, etc.
Some of the examples of passive attacks are analysis of traffic, release of a message.
1.3 Windows Defender Firewall with Advanced Security can be defined as a tool that
provides detailed control over the rules applicable by the windows defender firewall. One can
view all the potential rules that are being used by creating new rules, disabling new rules, and
changing their properties. It is an important and crucial part of the security model layer.
Through host-based, windows defender firewall blocks unauthorized network of traffic which
flows in or out of the local device (Ambhore & Wankhade, 2020).
For opening the windows firewall-
 First one has go to the start menu
 Then select Run
 Type WF.msc
 Select OK
Practices used for managing existing windows firewall rules are-
 Blocking by default.
 Allowing only specific traffic.
 Specifying internet protocol sources.
 Specifying the destination port.
1.4 Point to Point Tunneling Protocol (PPTP)- PPTP is created by Microsoft. All windows
operating system has developed PPTP client software. PPTP clients are also available for
Linux. In terms of scalability, PPTP is a good protocol option for remote access.
L2TP- L2TP was introduced as a joint effort among Cisco and Microsoft and joint features of
PPTP and Cisco’s Layer 2 Forwarding protocols. It offers strong security and uses IPSec for
encryption. L2TP has data integrity and also has data confidentiality. L2TP also has certificate-based authentication. L2TP client can be built-in server and XP 2003, Microsoft’s
Windows 2000. Client Software can be installed for free and can be downloaded on Windows
98, NT 4.0, and ME.
IPSec- Doing encryption for L2TP connections IPSec is used to create the connection in
tunnel mode. IPSec VPNs are extensively supported by firewall VPN appliances. IPSec is
the single tunneling protocol that is supported by all the firewall vendors. It includes Check
Point, Netscreen, Cisco PIX, Sonicwall, etc.
1.5 Security Audit- Examination and systematic evaluation of the information system of a
company is called Security Audit. In security audit, the physical configuration of the
system, software used by the company, information handling processes and user practices,
are to be checked or examined. In security audit, the technical experts and professionals
examines the wellness and accuracy of the security protocols. Following are the reasons and
benefits of conducting Security Audits-
It is required to identify the security problems and deviations, and also to know the system
weaknesses. Security Audits help to acknowledge the security policies of internal
organizations.
It helps to determine whether the security training is adequate or not.
It develops a security baseline that helps to conduct future audits.
Security Audits help in the identification of unnecessary resources.
Penetration Test- Penetration Test is a wider term and goes beyond the security audit. The
penetration test or a pen test is an authentic simulated attack that is conducted on the
computer system to check or examine its security. Penetration expert uses the same tools and
techniques which is used by the hackers and attackers to find or identify the weaknesses of
the system. By conducting a Penetration Test, the effectiveness of the computer system can
be improved as because the weak points and deviations can be identified. Following are the
benefits of this test- It helps organizations to eliminate hazardous security flaws (Stiawan,
2017). Helps to identify the defects and faults of the computer system
To analyze the robustness of controls
Helps to detect and prioritize cyber risks
Penetration testing helps to expose the vulnerabilities
1.6 Motion Sensors- Motion Sensors are the sensors that are established outside to detect movements. To sense the motion, these sensors use infrared rays. Motion sensors are of two
types- one is active and the other is passive. If the motion sensor is active, then it uses the
power source to detect the motion. On the other hand, if the motion sensor is passive, then it
only sends an alarm if the movement and temperature change.
CCTV Security- CCTV stands for Closed-Circuit Television. These systems use interior
and exterior cameras that keep a watch on a specific space. CCTV cameras keep an eye on
the activities of the people or the individuals where the cameras are fixed.
Radar System- Radar System is one the important security component. This device helps to
detect vehicles and people who are at short and medium distances. This system helps the
owners who have open field businesses. Radar systems provide protection from the theft of
vehicles.
Electrified Fences- Electrified Fences is a very effective way to stay away the burglars and
invaders. If an intruder tries to climb the fences or try to cut it, the alarm sends the signals
and the system will be activated. Electrified fences can also become a threat because of the
electric shock, which can take the lives of intruder.
Biometric Pattern- With this control system, an organization restricts the entry of unknown
individuals and persons in the business premises. This system uses pin, fingerprint or a
biometric pattern to take entry into the organization. With the help of biometric patterns, an
organization can limit the entry of the unknown persons (Göksel, et al., 2019).
Vibration Sensors- This system uses a wireless alarm to monitor the property. This is a
security device that detects suspicious objects or things. When the device detects something
suspicious, it triggers the alarm and starts to vibrate. These sensors are generally placed on
doorways and windows.
1.7 It is important to back up network configuration or a network backup because backing up
is an integral or important part of a recovery plan. As network configuration contains very
crucial or confidential business information or data, if it is not backed up then the operations
of the business can be adversely affected. If the business’s crucial or confidential data lose
due to a data breach or hacking activities, the backup ensures the recovery of data.
Benefits of network backup include- Decreasing human error, improving the ability of
disaster recovery, automating the backups, etc.
In the backup configuration dialog box, you should first enter the entire path to another folder
or a local folder where all the files can be copied easily. Then, you should provide a path for every data core server. In this, the entries are not case sensitive so we can include spaces
among them like c:\backup configuration. Then you should click on backup.
1.8 Log Analysis refers to interpreting, reviewing, and knowing the computer-generated
records which are called logs. It is the process of inspecting or assessing the computer-
generated logs to identify the security threats and bugs, application performance and other
risks. Log analysis is also used to review the behavior of the user (Svacina, et al., 2020).
The techniques of log analysis include-
Recognition of patterns, classification, and tagging, correlation analysis, and artificial
ignorance.
Purpose- The purpose of log analysis is that it provides a semi-structured data analytics
solution. It helps to mitigate the problem diagnosis and time resolution.
1.9 In the era of digitalization, various sophisticated technologies are becoming popular all
over the world. Business organizations use various technologies to run their business
activities. It is also important for business organizations to protect their confidential and
crucial business data from hacking and other cybercrimes. Security measures perform
following
Critical roles-
It protects the business organization’s ability to function.
It safeguards the technology assessed by the business.
It protects the company’s confidential data from hacking or information leakage.
The security mechanism provides protection against the cybercrimes.
By adopting security mechanisms, the company can protect their data from the misuse.
1.10 The popularity of android phones and smartphones is increasing worldwide. As mobile
devices and tablets become companions, hackers are ready to break the avenue. With the
inexpensive equipment, the hackers seek and gain or assess the nearby mobile devices. This
can leak the mobile data and personal information the individual. Technologies can also be
misused. So it is important to protect your mobile device from these hacking activities
(Karim, et al., 2015). To protect the data and information, the following options are available-
the use of a strong and hard password for mobile devices.

Stick to the official app stores you should backup the data of the mobile from time to time.
Should use VPN

Assessment 2
2.1 Phishing threat – In this threat hackers steal login id and card no via message or email
Cyber attack – in solution tack company network security device is not use for safety so cyber
attack attempt easily in this process steal unauthorized access and data.
Hacking threat – In this threat hack the personal information and discussion by bad websites
and traffic
Malware virus- it is group of viruses that affect your network and it is harmful computer
programs
Spy ware threat – it is most common threat for network and computer user it is installed
computer without your knowledge and hack information of your work.
2.2 Fire wall is use in solution Tech Company for safe use of all network and data or it will give
protection of network against all threat.
Because security is require in this network group of computer work for router and ISP so
hacking is easy and bad traffic occur so use antivirus and firewall for all computer for
maintain safe system.
2.3 Crisco packet tracer is a software use for complicated network and support multi user
network system. In solution tech company model use 3 department this company has 3
department sales, research and management so 3 different local area network VLANs use for
use internet in system if we use Crisco packet tracer means change to topology in network for
security purpose. Different topology from different department like research department has
different VLANs and management department has deferent VLANs and sales department has
own VLANs all network authority in one pace so safe data and communicate and discussion
easy for this change in topology. And add fire wall for data protection and computer
protection and hacking.
2.4 There is need to protect my network and edge router using the ACLs and if sales
department crate problem means block the port of sales department for safety of other department access control lists is control the bad traffic for network and use firewall software
for safety purpose and
SSH means secure socket shell it is protocol that allow to computer to share data it is
process of data transfer in one computer to another computer and because in solution tech
model 3 department work in group so it is important for safe data share.
2.5 For safe use of data and file use virtual private network it is beat solution for data safety
and security
Download the virtual private network firewall software and enter organization public IP
address and enter username or password and connect in network.
Advantage of VPN is secure network and hides private information it is way to secure online
data and web traffic and keep information safe and data secure by use of virtual private
network.
2.6 In this network use 3 department in one line sales department and research department
and management department and security did not use for safety purpose and edge router and
ISP router is use in solution tech network for internet so we add in this network ACLs
software of one port for protect all network device and all department change in deferent
building all department have own local area network for data share and one main VLANs is
for all network for security and this model is best model for protect all computer for hacking
and bad traffic and malicious traffic And virus and easily transfer all information in all
department host and secure data from hacker .
Use firewall in this system for security fire wall is basically use in two form hardware and
software and it is very important device for protect your devices from bad traffic and virus
and keep safe all data and information. Firewall promotes privacy and stops spyware and
virus and prevent from cyber attack and monitor bad traffic and keep safe all information so
this is most important security device that add in this network for safety purpose.

References
Ambhore, P., & Wankhade, A. (2020, January). Firewall for intranet security.
In International Conference on Mobile Computing and Sustainable Informatics (pp. 653-
659). Springer, Cham.
Dadheech, K., Choudhary, A., & Bhatia, G. (2018, April). De-militarized zone: a next level
to network security. In 2018 Second International Conference on Inventive Communication
and Computational Technologies (ICICCT) (pp. 595-600). IEEE.
Göksel, U. Ç. T. U., ALKAN, M., Doğru, İ. A., & Dörterler, M. (2019, October). Perimeter
network security solutions: A survey. In 2019 3rd International Symposium on
Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-6). IEEE.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of
Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
Karim, A., Ali Shah, S. A., Salleh, R. B., Arif, M., Noor, R. M., & Shamshirband, S. (2015).
Mobile botnet attacks-an emerging threat: classification, review and open issues. KSII
Transactions on Internet and Information Systems (TIIS), 9(4), 1471-1492.
Stiawan, D. (2017). Cyber-attack penetration test and vulnerability analysis. International
Journal of Online and Biomedical Engineering.
Svacina, J., Raffety, J., Woodahl, C., Stone, B., Cerny, T., Bures, M., … & Tisnovsky, P.
(2020, October). On vulnerability and security log analysis: A systematic literature review on
recent trends. In Proceedings of the International Conference on Research in Adaptive and
Convergent Systems (pp. 175-180).

1. Introduction
Welcome to the learner’s guide for this unit of competency for the qualification BSB50320 Diploma of Human
Resource Management. This guide provides you with essential information on competency standards, delivery
plan and schedule, assessment plan, assessment tasks and learning resources for this unit of competency.
The purpose of this learner’s guide is to:
 Provide you with information on delivery schedule and plan of this unit
 Ensure that you understand how students will be assessed in this unit
 Provide information on assessment methods, strategies, and evidence requirements
 Provide information on learning activities and assessment tasks
 List resources which may assist in student learning and assessment tasks

2. Unit Overview
This unit describes the skills and knowledge required to develop and monitor the implementation of
operational plans to support efficient and effective workplace practices and organizational productivity and
profitability.
The unit applies to individuals who manage the work of others and operate within the parameters of a broader
strategic and/or business plans.
Learning Outcomes
On successful completion of this unit, the learner/trainee will be able to;
 Establish operational plan
 Manage resource acquisition
 Monitor and review operational performance
As well as demonstrating the performance criteria, to be assessed as competent, the learner must demonstrate
their ability to apply the required knowledge and skills in a range of situations. These are summarized in the
Competency Standards section below.
Prerequisite Requirements
This unit does not have a pre-requisite.
Skill Recognition and Credit Transfer
Appropriate credit(s) may be granted to eligible students against each unit of competency on presentation of
evidence of successful completion of the same unit in an equivalent or higher qualification. Under the
Australian Qualifications Framework, this qualification recognises competencies achieved as part of a
Nationally Recognised Qualification from other institutes or universities.
Students may also apply for Recognition of Prior Learning (RPL) by providing evidence that they have the
required skills and knowledge in the specific areas of competency through work/industry experience and/or
completed eligible assessments in equivalent or higher qualification.

3. Competency Standards
This unit is derived from the Business Service training package, BSB for the qualification BSB50320 Diploma
of Human Resource Management.
Competency standards for this unit are made up of unit descriptor (As provided in the Unit Overview),
performance criteria, required skills, required knowledge, embedded employability skills components,
assessment requirements and evidence guide.
They can also be viewed at:
View Unit
The learners must familiarize themselves with all the competency requirements for this unit of competency and
ensure that they have received all the relevant information and support from the trainer and assessor that might
be detrimental to their academic performance and outcomes.
AQF Descriptor
The Diploma qualifies individuals who apply specialized knowledge in a range of contexts to undertake
advanced skilled or paraprofessional work and as a pathway for further learning. Graduates of a Diploma will
have specialized and integrated technical and theoretical knowledge with depth within one or more fields of
work and learning.
Graduates at this level will have a broad range of cognitive, technical and communication skills to select and
apply methods and technologies to:
 Analyze information to complete a range of activities
 Interpret and transmit solutions to unpredictable and sometimes complex problems
 Transmit information and skills to others
Graduates at this level will apply knowledge and skills to demonstrate autonomy, judgement and defined
responsibility in contexts that are subject to change and within broad parameters to provide specialist advice
and functions.

The following performance criteria specify the required level of performance for each of the elements of
competency:

Element Performance
Criteria

1. Establish operational plan

1.1 Research, analyze and document resource requirements
1.2 Develop operational plan in consultation with, and with
approval from, relevant stakeholders
1.3 Develop contingencies for operational plan
1.4 Explain plan to relevant work teams

2. Manage resource acquisition

2.1 Confirm that employees are recruited and inducted
according to the organization’s human resources management
policies, practices and procedures
2.2 Confirm that physical resources and services are acquired
according to the organization’s policies, practices and
procedures
2.3 Identify and incorporate requirements for intellectual
property rights and responsibilities related to acquisition of
resources

3. Monitor and review operational
performance

3.1 Assess progress of operational plan in achieving profit and
productivity plans and targets
3.2 Identify areas of under-performance, recommend solutions
and rectify the situation
3.3 Plan and implement relevant processes for ongoing
monitoring and confirm that support is provided for individuals
and teams
3.4 Negotiate recommendations for variations to operational
plans and gain approval from designated persons

Performance Evidence
Evidence of the ability to:
 Manage an operational plan for at least one business or work area.
In the course of the above, the candidate must:
 Develop and implement an operational plan using a variety of information sources and consultation
including:
o Resource requirements
o Key performance indicators
o Monitoring processes
o Contingency plans
 Communicate with stakeholders to explain the plan and supporting information, seek approvals,
negotiate variations and engage work teams
 Confirm existence of relevant strategies, including strategies relating to:
o Recruiting, inducting and developing personnel
o Acquiring physical resources and services
o Protecting intellectual property
o Making variations to the plan
o Monitoring and documenting performance.

Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
 Stakeholders involved in development and management of operations plan including escalation points,
colleagues and specialist resource managers
 Key information sources for proposal development and presentation including resource requirement
specialists
 Consultation processes
 Content of operational plans, including:
o Procurement processes
o Employee recruitment and induction strategies
o Physical resource and service acquisition strategies
o Key indicators of organizational performance
 Budget and actual financial relating to profit and productivity
 Methods for preparing operational plans and contingency plans
 Role of an operational plan in achieving an organization’s objectives
 Procedures and records associated with documenting performance
 Approaches for developing key performance indicators to meet business objectives
 Legislative and regulatory framework relating to the development and implementation of operational plan of
the organization, including:
o Fair trading laws
o Work health and safety

 Organizational policies, practices and procedures that relate to the operational plan.

4. Delivery Plan
Delivery is in the form of instructor-led, classroom-based training sessions supported by simulated learning
and/or project sessions. Within the classroom environment, delivery is supported by classroom-based activities,
tasks, lectures and structured lessons. Strategies for classroom-based learning focus on development of skills and
underpinning knowledge through practice, formative tasks, interaction, discussion, reading, feedback, and
practical examples of the theory.
Delivery Arrangement
The unit will be delivered over a prescribed period (term/semester) in a class-room training environment
through a structured learning program comprising of (but not limited to) lectures, presentations, case studies,
practical projects, discussion and classroom-based activities. Delivery schedule of this unit of competency is
provided at the beginning of this guide. Timetables will be advised at the beginning of each academic term and
posted on the notice board and college’s website.
It is expected that training/learning sessions will incorporate collaborative activities and tasks that are relevant
to the learning and evidence outcomes in this unit. The emphasis of learning, where possible, will be on linking
theoretical concepts and models with real-life situations to provide the learners with an opportunity to gain an
insight into key technological processes, professional environment and workplace practices.
Delivery Conditions
 Learners are required to attend the prescribed delivery sessions, in particular where assessment plan,
schedule, projects, and in-class activities and tasks are planned
 On commencement, the learners should review and understand all the course related information
including course structure, prerequisites and competency requirements for each unit of competency
 This unit of competency must be completed within the prescribed duration at the beginning of this
document. Due dates for the assessments will be set by respective assessors on commencement of the
unit and must be adhered to by all the learners
 The learners have the responsibility to maintain the required attendance and participate in all the in-
class activities and assessment/project tasks to be able to develop the required skills and knowledge.
 The learners must keep record of their activities, assessments and research and take an active
interest in exploring new concepts and ideas
 On expiry of the prescribed due dates for assessment, the learners will not be able to attempt any
assessments or the learning materials and must apply for a course extension. Learners should also
refer to other prevailing terms and conditions of delivery and assessment of this course and contact
the administration for further information if required.
Lesson Topics and Plan
The following lesson plans are planned for this unit. According to session times, trainers may expand these
lesson plans into their own session plans. Trainers must take a special note of the activities planned in the right-
hand column. These activities form part of “Formative Assessments”. The formative assessments are not
marked (assessed) but they contribute towards learning that prepares them for summative tasks.
The following topics are covered in the classroom training sessions.

The topics for this unit include; Lesson Topics Activities

1 Unit overview, assessment process, assessment conditions, resources Key
definitions and concepts
What are operational plans: Examples
Why operational plan?
Relevance of operational plans to other plans of the organization
Components of an operational plan
Models and methods for operational plans: Examples

Search and internet and
download sample operational
plans: Review and
understand the structure

Purpose and objectives of an operational plan
Difference between an operational and a strategic plan
Developing purpose and objectives
Defining outcomes
Identifying activities/actions to be delivered
Developing implementation schedules
Identifying and allocating resources
Developing an operational budget
Monitoring and maintaining the plan
Real-life examples and discussion

Review of two contrasting
operational plans: Discuss
specific models and methods
Develop strategies for
addressing resource
requirements

Analyze and document resource requirements
Understanding organizational consultation, feedback and approval
processes
Developing KPIs to measure operational performance
Identifying and remedying under-performing areas
Developing and implementing HR strategies
Developing and implementing strategies to acquire and use resources
Copyright and intellectual property
How to maintain copyright
How to meet copyright requirements

Example: KPIs to measure
organizational performance
Describe budgetary processes
in organization’s
Discuss examples and forms
of IP

Understanding budgeting processes
Forecast Vs. actual budgets
Alternative approaches to improving resource usage
Eliminating resource inefficiencies and waste
Developing contingency plans

Develop a budget for a simple
operation: Training session,
camping

Developing mentoring and coaching skills to work with people with poor
performance
Developing planning and organizational skills
Developing in-house or organizational training plans
Evaluating operational plans and writing performance reports

Case Study discussion:
Training and Development at
TESCO Review and revision
Learner example A
Unit Evaluation

Assessment follow up and
feedback

Suggested Learner Resources
Slack N., Brandon-Jones A. and Johnston R., 2016, Operations Management, Pearson
Slack N., Brandon-Jones A. and Johnston R., 2018, Essentials of Operations Management, Pearson

Other Resources and Readings
Krajewski L. J. et. al., 2018, Operations Management: Processes and Supply Chains, Global Edition, Pearson
Baxter R., 2016, Operational Excellence Handbook: A Must Have for Those Embarking on a Journey of
Transformation and Continuous Improvement, Lulu.com
Ford B. R., Bornstein J. M., Pruitt P. T., Young E., 2010, The Ernst & Young Business Plan Guide (3rd Ed.,). Wiley
Inc The Staff of Entrepreneur Media, 2015, Write Your Business Plan: Get Your Plan in Place and Your
Business off the Ground, Entrepreneur Press
Strategy, Policy and Operational Planning: http://researchbank.swinburne.edu.au/vital/access/manager/Repository/swin:174
Business and Operational Plan Examples: http://www.ontla.on.ca/library/repository/mon/14000/261267.pdf

Referencing Guide
Harvard Referencing Generator:
http://www.harvardgenerator.com/
http://www.citethisforme.com/au/referencing-generator/harvard

Misc. Videos and Online Educational Channels (General ref)
List of some of the online educational channels. Search for the relevant topics and concepts.
Khan Academy Channel https://www.youtube.com/user/khanacademy
#Education https://www.youtube.com/channel/UC3yA8nDwraeOfnYfBWun83g
TED Talks https://www.youtube.com/user/TEDtalksDirector/channels
TED ED https://www.youtube.com/user/TEDEducation
Massachusetts Institute of Technology (MIT)
Channel https://www.youtube.com/user/MIT
Google for Education https://www.youtube.com/user/eduatgoogle
Big Think https://www.youtube.com/user/bigthink/videos
Crash Course https://www.youtube.com/user/crashcourse/videos
Microsoft Education https://www.youtube.com/user/Microsoftedu
Stanford University Channel https://www.youtube.com/user/StanfordUniversity/videos
Management Skills Courses https://www.youtube.com/channel/UChA8eZO-

WYhdLsv8HlBrJcg/videos

Harvard Business Review https://www.youtube.com/user/HarvardBusiness/videos

5. Assessment Plan
Assessments for this unit have been developed by taking into account assessment guidelines as provided in the
training package and evidence requirements stipulated in this unit of competency. Assessment is an ongoing
process of gathering evidence to determine what each student/learner knows, understands and can do in order to
inform teaching and support learning of the intended curriculum.
The purposes of this assessment are;
 To collect evidences that demonstrate competency in the performance criteria of the unit and satisfy
skill, knowledge and employability skills requirements
 To provide feedback to the learners/trainees indicating the areas of improvement and professional
development
 To measure the effectiveness of the delivery plan and evaluate the learning outcomes
The required assessment criteria are provided in each assessment task for learner’s information.
Assessment Method
Assessment in this unit is based on assessment and evidence guidelines provided in the unit of competency and
the training package. The evidence is generated through summative assessment tasks. However, the role of
Formative Tasks is crucial in developing the required skills and knowledge in completing the summative tasks.
Formative tasks enable the trainers to evaluate their own delivery and adjust their facilitation based on the
outcomes from these tasks. The role of formative assessments is to improve learning and adapt to student needs.
These tasks and activities usually take place throughout the unit and planned in accordance with the summative
assessment plan/schedule. The formative tasks are generally referred to as “Portfolio” tasks. Portfolio is a
collection of all the formative tasks completed during the learning sessions. The portfolio can be used by
students as an evidence of participation or example of work completed as part of their learning.

Formative tasks are not assessed.
For summative tasks, the following assessment methods are available to collect the aforementioned evidence to
demonstrate satisfactory performance in this unit;
 Written Assessment Tasks
 Practical/Analytical Tasks
 Test/Examinations
 Projects
 Observation
 Integrated Assessment
The Written Assessment Tasks and Tests have been developed to address various parts of Performance
Criteria as well as Required Knowledge.
The Practical Tasks are developed to demonstrate competence in Required Skills. These assessment tasks and
activities are mostly designed as in-class assessments, enabling the trainers to observe the work being
undertaken and completed (i.e., demonstration of a specific/required skill). Practical tasks may also include use
of online learning tools, equipment, activities, or use of software. Instructions for practical tasks are generally
provided within the task description. However, trainers/assessor may set certain conditions for conducting and
observing these tasks.
The Project (Individual based) addresses various aspects of competency standard including Performance
Criteria, Required Skills and Employability Skills. The role of the project in assessment strategy is to measure
student/trainee competence as a form of Summative Assessment. It demonstrates the efficacy of instructions
and learning in the prescribed delivery period by assessing the overall performance of the students/trainees for
the purpose of grading/final results.

The Test/Exam is generally designed to test the Required Knowledge component of the unit of competency. It
may also be used to reinforce learning and test specific aspects of other part of competency where knowledge of
certain processes/procedures is required. A knowledge test may be verbal or written as specified in the task
description. Examinations are conducted under set conditions.
Observation forms part of in-class activities, participation in designated processes, presentation and
provides an option where specific skills need to be demonstrated to the assessor.
Some of the assessments in this course may be used as Integrated Assessments, i.e., to use evidence created in
one unit/task to determine competency in another unit/task. The concept behind the design of the integrated
assessment is to limit repetitive tasks that test the same or similar competency elements in different units of
competency.

Optional/Supplementary Assessments
In addition to the above assessment instruments, the following methods can be used, if required, in the context
of assessment for this unit of competence, especially in the circumstances where assessment involved
components of online learning as well as actual workplace activities and/or performance.
 Workplace Verification through RPL application
 Competency Conversation at completion of the unit
To successfully complete this unit, learners must demonstrate that they have the skills and knowledge needed as
indicated in the Competency Standards (2).
Assessment can be both a formative and summative process. Formative assessment is used to provide
feedback to students and teachers to promote further learning. Summative assessment contributes to the
judgement of student learning for competency/award purposes.
Submission of Work
All the written works must be submitted in a soft/electronic copy required by the trainer/assessor, with an
accompanying “Assessment Cover Sheet”. Each Assessment Cover Sheet should be signed by the student and
must contain student details and date of submission.
Material submitted for assessment—Word processed reports, essays, projects, etc. must contain student’s
name, ID (if available), address and contact details. Within the context of these assessment tasks, the assessor
fulfils the role of client, manager, or supervisor, as applicable. Work submitted for “approval” within this
context must demonstrate care and attention to detail, such that the student inspires confidence that the work is
being undertaken competently.
In soft copy/electronic files students are encouraged to name the files according to established procedure. This
would typically include a course or unit code, assessment, or submission code, and in the case of multiple files
an alphanumeric identifier. Multiple files may also be required to be submitted within an enclosing folder (with
similar, appropriate naming conventions) or archive format—e.g. zip or rar.
Follow submission guidelines in each assessment task for specific instructions.

Assessment Tasks and Schedule
The following assessments are planned for this unit;
# Assessment Task/Activity Type Assessment Method
1 Review and Analyze a Samples Operational Plan Individual Written
2 Project: Develop an Operational plan Individual Written
3 Project: Review Operational Performance Individual Written
4 Knowledge Test Individual Written Test
These assessment tasks/activities have been described in detail in the following section.
Task schedule to be advised by trainer/assessor based on the lesson and session plans.

6. Assessment Tasks
Assessment Task 1: Individual
Assessment Task Review and Analyse a Samples

Operational Plan

Schedule TBA

Outcomes Assessed

Performance Criteria:
1.1, 1.3, 3.1, 3.2
Addresses some elements of required skills and knowledge
as shown in the Assessment Matrix

Description:
 Analysis report on a sample operational plan is required.
An Operational Plan is a detailed action-oriented plan that provides a clear picture of how a team, section or
department will contribute to the achievement of the organization's strategic goals (FLN). An operational plan
could be part of a strategic or a business plan, addressing human resource, physical resource, action items, key
performance indicators, and operational budget requirements to achieve the intended goals. A contingency plan
often accompanies an operational plan that prepares for alternative actions in case the operational plan meets
any obstacles.
With a view to develop an understanding of key components and use of operational plans, you will review and
analyze a sample operational in this assessment task. The sample operational plans are actual plans obtained
from public domain sources for the purpose of this assessment. Formats and contents of the plan differ from
organization to organization. However, you will be required to analyze the plan within the context of the
following areas.
 Stated goals and objectives
 Key performance areas
 Key performance indicators
 Human resource (people), processes, and technology requirements
 Physical and other resource requirements
 Action plan/task/items
 Budget/cost expectations
 Key responsibilities
Ensure that your sample plan provides you with enough information to analyze the above components. Your
analysis will essentially be based on your understanding and explanation of the plan – what you think about it,
its key features, and how, in your view, this plan will help the organization achieve their strategic objectives.
You may also want to visit respective organization’s website and gather further information to support your
analysis/comments.
Please note, merely reiterating the contents of the plan will not be construed as an analysis. Cambridge
dictionary defines analysis as the process of breaking up a concept, proposition, linguistic complex, or fact
into its simple or ultimate constituents. Accordingly, it will be expected that you will write the analysis in your
own words and understanding.
Plan analysis must be word processed and appropriately structured under headings/sub-headings.
Word Limit: 1200 words.

Assessment Criteria
Learner’s work will be assessed based on the following criteria. Learners have also been provided with this
assessment criterion in the “Learner’s Guide” to ensure that they cover all the task requirements. The same
criteria are used in the checklists in Section 8 (Learner Competency Records) to record assessment outcome.
The following criteria must be addressed for this task.
 Selected an appropriate business or strategic plan for the task
 Completed the task within a designated assessment session in presence of an assessor
 Addressed all the required areas of analysis
 Analysis reflects understanding of the concept and the components of an operational plan
 Analysis contains a reasonable level of scrutiny and/or inquiry into specific aspects of the plan
 Goals and objectives are analysed for their measurability and viability in the context of the plan
 Explained how the operational plan may align with other strategic or organisational plans
 Identified and analysed key performance areas of the plan
 Where possible, reviewed, summarised, and commented on KPIs (if provided in the sample plan)
 Identified and analysed company’s human resource requirements to support the operations
 Identified and analysed company’s physical and other resource requirements to support the
operations
 Action items are noted and analysed for their effectiveness
 Budget and cost expectations are noted and explained for their relative influence on the plan
 Expressed on viewed and summarised key aspects of the plan in own words
 Analysis is appropriately structured and provides a clear and concise breakdown of the plan
Submission Guidelines
Submit:
 Electronically, written analysis (typed word-processed)
 Ask trainer for more help

Assessment Task 2: Individual
Assessment Task Project: Develop an Operational

plan
Schedule TBA

Outcomes Assessed

Performance Criteria:
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.3, 3.1, 3.2, 3.3, 3.4,
Addresses some elements of required skills and knowledge
as shown in the Assessment Matrix

Description:
 Operational plan is required
Operational plans provide an organisation with a mechanism to put their strategies in action and identify the
resources required to achieve their stated goals and objectives. Operational plans may also be termed as action
plans, annual plans, management plans or tactical plans. Separate operational plans are often prepared by
different departments within an organisation to outline their specific tasks and priorities.
In Assessment Task1, you developed the understanding of the structure and components of an operational plan
through an analysis of a sample operational plan. In this assessment task, given as a project, you will be required
to develop an Operational Plan for a sample organisation based on its Strategic Plan. You will be provided with
a sample strategic plan for this task.
Your trainer/assessor will play the role of the Senior Manager for the purpose of this task.
A past or an existing organisation can also be used as an example to develop the required organisational
context for this task. Alternatively, based on the sample strategic plan, research and collect some
organisational information as a background to your plan.
Develop an operational plan that includes.
 Executive summary
 Stakeholders, consultation, and approvals
 Operational goals and expected outcomes
 Action plan (convert strategies to actions)
 Key performance indicators (KPIs)
 Human resource requirements (including training or PD and strategies to address the requirements)
 Physical and other resource requirements (including strategies to acquire the resources)
 Resource conservation/waste management tactics
 Budget/cost expectations
 Key responsibilities; including intellectual property rights and responsibilities
 Communication plan (how plan will be communicated to all team)
 Monitoring and evaluation
 Contingency plan
An operational plan fundamentally addresses four questions:
 Where are we now?
 Where do we want to be?
 How do we get there?
 How do we measure our progress?
Contingency planning involves creating an alternative plan in the event of the original operational plan
changing or facing obstacles due to unforeseen circumstances. It can be based on anticipated risks (e.g., non-
availability of raw materials, government approvals etc.) and alternatives that can be used to keep the
operational plan moving.

Assessment Criteria
Learner work will be assessed based on the following criteria. Learners have also been provided with this
assessment criterion in the “Learner’s Guide” to ensure that they cover all the task requirements. The same
criteria are used in the checklists in Section 8 (Learner Competency Records) to record assessment outcome.
The following criteria must be addressed for this task.
 Identified and itemised project tasks
 Used/developed a profile/introduction of the organisation used in the task
 Developed an operational plan from the given strategic plan
 The plan is appropriately structured and presented as an official document reflecting a real-life
example
 Appropriate headings and sub-headings are used to structure the contents
 The content flow covers all the required elements of the plan and contains a logical sequence of the
topics
 An executive summary is included and provides an overview of the plan
 Key stakeholders and consultation/approval processes are identified and defined
 An effective communication plan is developed to communicate the plan
 Operational goals/aims and expected outcomes align with the stated organisational or strategic goals
and objectives
 Key action tasks are developed to help implement the strategies
 The action plan addresses all the key strategic areas and establishes key responsibilities and timelines
 Identified and defined human resource requirements to implement the plan
 Strategies and processes to address human resource requirements are developed to support the
implementation
 Identified and defined physical and other resource requirements to implement the plan
 Strategies and processes to address physical and other resource requirements are developed to
support the implementation
 Requirements for IP rights and responsibilities are identified and addressed in acquisition of resources
 Key Performance Indicator (KPIs) are developed to measure the outcomes and plan effectiveness
 KPIs are realistic and include both qualitative and quantitative measures
 Budget and cost expectations for implementation of the plan/actions are estimated and provided in
appropriate format
 A risk-based contingency plan is developed to cover unforeseen circumstances and address business
performance issues
 The plan includes a detailed evaluation plan that helps monitor the plan and its effectiveness over the
stated duration
 Measures to address performance and skill/training requirements are included as part of the
implementation process
 Appropriate resource conservation tactics are suggested to minimise waste and improve usage
Submission Guidelines
Submit:
 Please ask the trainer
Assessment Task 3: Individual
Assessment Task Project: Review Operational

Performance
Schedule TBA

Outcomes Assessed

Performance Criteria:
3.1, 3.2, 3.3, 3.4,
Addresses some elements of required skills and knowledge
as shown in the Assessment Matrix

Description:
 Performance review report is required
This task is a continuation of Assessment Task 2.
In a typical workplace environment, implementation and performance review of a plan would be a stepped
process, monitored over a long period time. In a classroom environment, this process will be simulated for this
task. Accordingly, for the purpose of this task, the class audience will play the role of the staff. Your
trainer/assessor will play the role of the Senior Manager.
Assume that your plan has been implemented and is being reviewed for its performance. You will be provided
with sample financial information (Balance sheet and Profit and Loss Statements). Review and analyse the
financial data against the KPIs set in your plan and take notes for presentation.
Next, you will be following the organisational process by,
1. Summarising requirements for implementing the plan – Action plan stages
2. Review of key stakeholder and consultation process in implementation
3. Articulating the KPIs for measuring the success
4. Presenting an analysis of the actual performance (sample financial data) Vs the KPIs
5. Analysing or seeking feedback on KPIs and adjusting as per the feedback in view of the performance
6. Articulating KPI management process and protocols
7. Plans for reviewing and improving the system
8. Articulating requirements for improvements and analysing
Assessment Criteria
Learner work will be assessed based on the following criteria.
The following criteria must be addressed for this task,
 Completed tasks as per instructions with quality of work
 Prepared the required review documentation and a presentation to the stakeholders
 Outlined and articulated implementation process and roles and responsibilities undertaken
 Outlined organisational communication plan and consultation processes
 Linked implementation to organisational policies and procedures as per the context developed within
this and other tasks
 Outlined and explained measures for evaluating plan performance
 Analysed financial information to review performance against the KPIs
 Analysis was succinct and relevant to the plan and its purpose
 Members were able to emulate the organisational process by using the sample data and cohesively
preparing and presenting plan performance information
 Allowed for a robust discussion and simulated a performance review meeting and process
 Captured and recorded audience comments and feedback
 Described processes for improvements and assigned roles and responsibilities
 Set processes for identifying improvement opportunities

 Developed a report comprising of implementation activities, processes, and how consultations and
delegations were made
Submission Guidelines
Submit:
 Performance review report in 1200 words.
 Ask trainer for more help

BSB50320 | BSBOPS502 Manage Business Operational
Plans
Learner’s Guide | V 1.0 | March 2021

The Canberra Training School Pty Ltd t/a Canberra Business & Technology College
Provider Code: 40882 | CRICOS Code: 03465J
Assessment Task 4: Individual
Assessment Task Knowledge Test
Schedule TBA

Outcomes Assessed

Performance Criteria:
Underpinning Knowledge
Addresses some elements of required skills and knowledge
as shown in the Assessment Matrix

Description:
This is an open book test and could be undertaken at home. All the questions must be answered.
Duration: 2-3 Hour
Questions: Provide answers at the end, in answer section:
Q1. What is an Operational Plan? What information would an Operational Plan typically contain?
Q2. Explain the role of an operational plan in achieving the organisation’s objectives
Q3. In your opinion how would an Operational Plan of a Retail and Services firm will differ from that of a
Manufacturing firm?
Q4. Explain a typical budgeting process in an organisation.
Q5. What are Key Performance Indicators (KPIs)? Provide examples of financial and non-financial KPIs in
your own understanding.
Assessment criteria
The following criteria must be addressed for this task:
 All the questions are attempted and answered as per questions
 Answers are consistent with the subject/concepts and demonstrate the required depth of knowledge
for this unit of competency
 Use examples and detail where it is required
Submission Guidelines
Learner to submit.
 Ask trainer for more help

7. Academic Policies and Processes
Students with Special Needs
If leaners/learners have any special needs (e.g. physical disability, learning difficulty) regarding assessment,
they should be directed to discuss these with the Course Coordinator. The college will endeavour to make all
possible and reasonable adjustments to any aspect of assessment in order to address those needs. Some
examples of additional support could include:
 Language, literacy and numeracy (LLN)
 Assistive technology
 Additional materials or tutorials
 Assistance in using technology for online delivery components.
Reasonable adjustment
Reasonable adjustment refers to any modification made to the learning environment, certification
requirements, training delivery or assessment method to help learners with a disability access and participate in
education and training on the same basis as those without disability (IBSA, 2015).
The Disability Standards for Education 2005 were formed under the Disability Discrimination Act 1992. They
clarify the obligations of training providers to ensure that learners who have a disability are able to access and
participate in education and training on the same basis as those without disability.
Some examples of reasonable adjustments could include:
 Personal support services, e.g. a reader, Auslan interpreter, a scribe
 assistive technology or special equipment, e.g. screen readers, magnifiers, alternative keyboards
 modifying the presentation method, e.g. visual, oral, print, electronic
 adjustments to timeframes, e.g. providing materials prior to class, extended time limits
 adjustment of the physical environment, e.g. specific furniture, arrangement of classroom.
The determination of “reasonableness” requires judgement that must take into account the impact on the RTO
and the need to maintain the integrity of the qualification. While reasonable adjustments can be made to the
ways in which evidence of performance is gathered and demonstrated, the criteria for making Competent/Not
Yet Competent decisions (and/or awarding grades) should not be altered in any way. That is to say, the
standards expected should be the same irrespective of the individual being assessed (Disability Standards for
Education 2005).
Recognition of Prior Learning (RPL) and Credit Transfers
Learners may apply for Recognition of Prior Learning (RPL) by providing evidence that they have the required
skills and knowledge in the specific areas of competency through work/industry experience and/or completed
eligible assessments in equivalent or higher qualification.
Appropriate credit transfer may be granted to eligible learners against each unit of competency on evidence to
successful completion of the same unit in an equivalent or higher nationally endorsed qualification. Credit
transfer learners will finish the course in a shorter duration and are advised to consult appropriate
authorities/bodies for applicable criteria if planning further study or stay in Australia.
Applicants who have completed formal training or who have relevant and current work or life experience and
consider they are able to meet the unit purpose may seek recognition.
The college acknowledges skills and knowledge obtained through:
 Formal training (conducted by industry or educational institutions in Australia or overseas)
 Work experience
 Life experience
The main focus is on the learning outcomes of these experiences, not on how, when or where the learning
occurred.

To be granted RPL, applicants will be asked to:
1. Present evidence of their achievement;
and/or
2. Undertake a challenge test;
and/or
3. Attend an interview with specialist staff.
This evidence will be validated through either satisfactory supporting documentation of support from a
recognised industry or workplace representative or challenge testing
Academic Policies and Procedures
Applicable policies and procedure related to this course including plagiarism, assessments, appeals and
complaints, can be found with the course coordinator as well as in the “Policies and Procedures” section of the
college’s website.

ASSIGNMENT: (Answer Section)
Please provide answers of all tasks under following, using appropriate headings:
Task 1:
Analysis report on a sample operational plan (1200 words)
Introduction
The Fairfield Hospital is the local hospital and is placed in Prariewood, the western area of Sydney, New South
Wales, Australia. The hospital has approx. 200 beds. It mainly gives different services of health including
common surgical, common medical, obstetric, emergency, pediatric, drug and physiotherapy services and
amenities of health. For approx. 40 to 45 years, Fairfield Hospital is giving a safe, welcoming and clean
environment for maintaining health and also with good treatment facilities. The strategy of development of
Fairfield Hospital involves giving more accurate places for particular treatment and consultation of outpatient
(Rosenfield, 2013).
Stated objectives and goals
Fairfield Hospital is an established and well-maintained charity that mainly aims for improving the health and
standards of life by giving accurate and well standard efficient and better care to those people who use all their
health services. The main aim of the hospital is for improving the quality and standard of people’s health by
giving the best services and amenities of a health and also some realistic services to their clients and patients.
Their target is to mainly offer a better and more effective quality of health services of medical that support to
improve the health of patients through the growth of safe, affordable, professional and caring services
(Rosenfield, 2013).
Key Performance Areas
The key performance areas are given below:
1. Better quality of health services and facilities – Improving the quality and also performance in the healthcare
environment can be very helpful with trustworthy, sustained and cost-efficient procedures of hospitals and
also permits them to obtain their key goals of improving the complete delivery of health and care and also
enhancing outcomes of patients (Carliner, 2015).
2. Partnerships of society – It is a very efficient key performance area mainly from the viewpoint of health
facilities and services, societies particularly have very great inputs and intelligence on mainly what they need
from all health facilities and services and on what particularly works to improve the health of patients.
3. Innovation & Research – It is very essential key performance area for Fairfield Hospital because it mainly
obliges to use of innovative means for preventing, diagnosing and monitoring issues related to health and it is
also aware of various devices and many drug medicines for managing and curing various diseases.
4. Efficiency and sustainability – Sustainability and efficiency if maintained in the hospital then it can help to
decrease risks and costs and also encourage very positive viewpoints and feedback from people (Carliner,
2015).
Key Performance Indicators
The key performance indicators are given below:
1. Patient and client satisfaction – The overall satisfaction of clients and patients is the key performance
indicator of the hospital that attracts a very large number of clients and patients and if the level of satisfaction
is more, then the hospital is mainly in profitability.
2. Net profit margin – The accurate way to ensure a positive and perfect net profit margin is mainly by
decreasing some inappropriate costs and expenses and also by exploring many streams of sales.
3. Utilization of equipment and tools of equipment – Tracking of all used tools and equipment must be done to
mainly identify where there is any kind of place to improve such as the reorganization of all tools and
equipment to other surroundings where there is mainly major need of improvement (Goldratt & Cox, 2016).

Human resources, technology and process requirements
In Fairfield Hospital, managers of human resources are responsible to make sure that all services and facilities
are efficient for executives of clinicians, staff and patients also. They have to also address many areas of major
concern in all departments of the hospital including directing and managing records of financial resources,
encouraging staff retention and also ensuring that all legislation related to healthcare facilities and services are
accurately obtained.
Various technology needs are there in the Fairfield Hospital. As Electronic health records (HER) support in
sharing of information and data of various clients and patients, outcomes of tests and other information or
data between all healthcare departments in the hospital. Some innovative technologies like blockchain and
machine learning based on the cloud also can be very helpful in maintaining great amounts of data and also
make data easier in managing and regulating (Goldratt & Cox, 2016).
Physical and other resource requirements
The various physical and some other resource needs in Fairfield Hospital involve knowledge, financial
resources, amenities, equipment and supplies. Some of the physical amenities in Fairfield Hospital involve the
supporting system of the building, great equipment for operations and surgeries and also the internal
formation of the infrastructure of the hospital. Other kinds of physical resources in the hospital include
medicine stock, professionals and specialists, beds etc. (Holzer, 2019).
Action plan/items/task
Items of action Responsible Duration
Monitoring all the inaccurate
procedures happening in the
operation theatres that lead to
the death of the patient

Safety Manager November 20XX

Review all framework of policies
and procedures for making sure
of the placement with the
structure of LMD

Operational Manager September 20XX

Appoint the manager of the
project for mainly the project
“Patient Care Challenge”

Operational Manager October 20XX

Budget/Cost Expectations
The expectations of budget and cost particularly involve three kinds of budget for Fairfield Hospital and it
includes mainly equipment for surgeries and treatment, capital and staffing. Out of these kinds of budgets,
mainly the budgets and costs of nursing and other labours are also very high in all facilities in the hospital
(Holzer, 2019).
Key responsibilities
Fairfield Hospital particularly considers offering the best and most effective services of healthcare to all its
clients and patients for satisfying all patients and clients in each manner. So, the main responsibilities of the
hospital are to attain its stated objectives and goals which mainly involve enhancing the health and standard of
life by offering a better and more effective standard of health services and facilities (Pressley & Afflerbach,
2012).

Task 2:
Project: Develop an operational plan (Detailed Activity)
Operational Plan
Executive Summary
Fairfield Hospital is a charitable hospital in the western suburb of Sydney, Australia and is a very reputed
hospital in the state. The main target of the hospital is to improve the health and standard of life of patients by
offering them a better quality of services and facilities related to healthcare and those individuals who mainly
utilize all facilities and services of health care. They are offering healthcare services for further than approx. 40
to 45 years and till now also they are giving the best healthcare services (Pressley & Afflerbach, 2012).
Stakeholders, approvals and consultations
The relevant stakeholders of Fairfield Hospital are consumers, managers, staff members, stream directors and
clinicians. Fairfield Hospital is mainly concerned with developing a better relationship of work with all its
stakeholders for maximizing the margin of profit of the hospital and also to give the best quality of services and
facilities of healthcare. The hospital is also in regular consultation and communication with all administrative of
the state that mainly works on the plans for making and establishing the procedures to provide
accommodations for present and upcoming constraints for assisting in the service and facilities delivery.
Operational goals and expected outcomes
Fairfield Hospital is an established and well-maintained charity that mainly aims for improving the health and
standards of life by giving accurate and well standard efficient and better care to those people who use all their
health services. The main aim of the hospital is for improving the quality and standard of people’s health by
giving the best services and amenities of a health and also some realistic services to their clients and patients.
Their target is to mainly offer a better and more effective quality of health services of medical that support to
improve the health of patients through the growth of safe, affordable, professional and caring services (Griffin,
2021).
Action Plan
Items of action Responsible Duration
Monitoring all the inaccurate
procedures happening in the
operation theatres that lead to
the death of the patient

Safety Manager November 20XX

Review all framework of policies
and procedures for making sure
of the placement with the
structure of LMD

Operational Manager September 20XX

Appoint the manager of the
project for mainly the project
“Patient Care Challenge”

Operational Manager October 20XX

Key Performance Indicators (KPIs)

The key performance indicators are given below:
1. Patient and client satisfaction – The overall satisfaction of clients and patients is the key performance
indicator of the hospital that attracts a very large number of clients and patients and if the level of satisfaction
is more, then the hospital is mainly in profitability.
2. Net profit margin – The accurate way to ensure a positive and perfect net profit margin is mainly by
decreasing some inappropriate costs and expenses and also by exploring many streams of sales.
3. Utilization of equipment and tools of equipment – Tracking of all used tools and equipment must be done to
mainly identify where there is any kind of place to improve such as the reorganization of all tools and
equipment to other surroundings where there is mainly major need of improvement (Griffin, 2021).

Human Resource Requirements
In Fairfield Hospital, managers of human resources are responsible to make sure that all services and facilities
are efficient for executives of clinicians, staff and patients also. They have to also address many areas of major
concern in all departments of the hospital including directing and managing records of financial resources,
encouraging staff retention and also ensuring that all legislation related to healthcare facilities and services are
accurately obtained (Mainardes, et al., 2013).
Physical and other resource requirements
The various physical and some other resource needs in Fairfield Hospital involve knowledge, financial
resources, amenities, equipment and supplies. Some of the physical amenities in Fairfield Hospital involve the
supporting system of the building, great equipment for operations and surgeries and also the internal
formation of the infrastructure of the hospital. Other kinds of physical resources in the hospital include
medicine stock, professionals and specialists, beds etc.
Resource conservation/waste management tactics
There are some ways to decrease waste and for conserving all physical and other resources and these include
the following:
1. Irradiation of microwave
2. Disposal of land
3. Chemical sterilization
4. Arid and drizzly treatment of thermal energy (Mainardes, et al., 2013).
Budget/cost expectations
The expectations of budget and cost particularly involve three kinds of budget for Fairfield Hospital and it
includes mainly equipment for surgeries and treatment, capital and staffing. Out of these kinds of budgets,
mainly the budgets and costs of nursing and other labors are also very high in all facilities in the hospital.
Key responsibilities
Fairfield Hospital particularly considers offering the best and most effective services of healthcare to all its
clients and patients for satisfying all patients and clients in each manner. So, the main responsibility of the
hospital is to attain its stated objectives and goals which mainly involve enhancing the health and standard of
life by offering a better and more effective standard of health services and facilities.
Plan of communication
Fairfield needs to make a communication plan as it mainly helps in developing goals, describing particular
patients and customers, identifying key and accurate duties and accountabilities, outreach the specific plan in a
particular duration and also help in engaging with entire stakeholders and executives of Fairfield Hospital
(Frumkin, 2015).
Evaluating and Monitoring
For monitoring and evaluating the operational plan, Fairfield Hospital mainly assesses the whole performance
of its members of staff by determining the accurate direction and responsibilities of the hospital. It also assists
in documenting the activities and operations of the hospital and also evaluates the definite differences
between mainly planned and realistic performance.
Contingency plan

The main aim of making the contingency plan is for allowing the hospital to appropriately return mainly to its
all daily activities and tasks smoothly after coming across some unforeseen events. It also helps the hospital in
preventing the entire human and other physical resources and also reduces the issues of their patients and
clients (Frumkin, 2015).

Task 3:
Performance review report (1200 words)
Action plan stages
The stages of the action plan assist in determining the timeframe and goals of Fairfield Hospital. These all
actions assist to evaluate the duration for the specific task in which that particular task is accomplished and all
actions were accurately implemented by the Hospital for similarly accomplishing those tasks this also assists in
evaluating the objectives of the hospital. The action plan stages are given below:

1. Key objectives of the hospital – The evaluation will involve mainly how the objectives of Fairfield Hospital
and the entire performance of all action that is mainly taken for making the definite goals and all these
objectives will mainly enhance the efficiency of the hospital.

2. Process – Process that will be particularly considered for implementing the action plan in a specific manner
that will mainly be very productive to achieve the particular key objectives.

3. Indicators – These are the various little process that is mainly taken by the hospital such as the services of
health, department of emergency etc. in the hospital activities, the physical resources like equipment of
medical and various machines will be purchased (Jesmin & Hui, 2012).
Key Stakeholders and consultation in the implementation

The relevant stakeholders of Fairfield Hospital are consumers, managers, staff members, stream directors and
clinicians. Fairfield Hospital is mainly concerned with developing a better relationship of work with all its
stakeholders for maximizing the margin of profit of the hospital and also to give the best quality of services and
facilities of healthcare. The hospital is also in regular consultation and communication with all administrative of
the state that mainly works on the plans for making and establishing the procedures to provide
accommodations for present and upcoming constraints for assisting in the service and facilities delivery
(Jesmin & Hui, 2012).

Articulating KPIs for the measurement of success
The key performance indicators assist to determine the performance report of Fairfield Hospital that is mainly
measured accurately by every department related to business activities of the hospital and by monitoring the
performance report of the whole hospital. These performance indicators are mainly recognized from the
stated goals of the hospital. For some better and more effective services of health which mainly have
performance indicators are required for identifying the performance of various departments of the hospital.
Key performance indicators are very essential as these mainly highlight the development of the hospital and
examine the objectives accurately (Broadbent, 2013).

Actual Performance vs. Key Performance Indicators
The variances between the definite performance and the key performance indicators that are mainly set for
the hospital have a great difference in their viewpoints. The key performance indicators are the goals and
objectives which are mainly set by the hospital but in actuality, these are not taken seriously as per the
situations sometimes by the departments of the hospital which is the major issue.
Some services of health were there of the staff of nursing and also some key indicators were there such as the
efficient manner of the treatment of health of the patient which is mainly offered by the hospital. The key
performance indicators for the department of health are mainly the management of cost and time in the
treatment of patients with some better facilities of health in the hospital (Broadbent, 2013).
Analyzing and seeking feedback and adjustment

The constructive feedback was mainly taken by all the executives and stakeholders of the hospital and also
from some patients feedback related to treatment and facilities of health were taken. Some of the executives
and stakeholders were also asked to give feedback on the action plan and operational plan that is made for
monitoring and evaluating the performance of the overall departments of the hospital (Laffan & Lindner,
2014).
KPIs management procedure and protocols
The protocols and procedures that are linked to the key performance indicators are set for measuring the work
performance of the hospital. These also measure the performance of facilities and services of health care
provided by the hospital.
To achieve the objectives the following protocols and procedures must be followed. These are given below:
1. The key performance indicators must be established in a way that is accurately aligned and controlled with
the goals that were mainly set by the hospital.
2. The requirements of the hospital must be considered and fulfilled and the facilities and services of health
care must be accurately maintained and controlled by the stakeholders and executives.
3. Surety must be there that all key performance indicators are reachable with productivity (Laffan & Lindner,
2014).
Requirements for analyzing and improvement
Some aspects are there that the departments of the hospital must consider requires some enhancement for
the development of the objectives. These objectives could be achieved by the given process:
1. The hospital is required to recruit some staff for each department so that it could increase its rate of
productivity (Mathis, et al., 2016).
2. The hospital must give more knowledge by conducting training and consultation sessions with some
specialists.
3. The hospital is required to be more sustainable so that all patients are treated in a clean and safe
environment (Mathis, et al., 2016).

Task 4:
Knowledge Test (Open Book)
Q1. What is an Operational Plan? What information would an Operational Plan typically contain?
Operational plan is a practical kind of the document used to do the solution of the issues and do
the identification and outline to the given activities and set the target regarding the organization
and set the target during the particular time period it is the usually for the year. It is the kind of the
thing to take the different and undertaking things during the particular time period. I is the link and
the funding agreement of the things. It is the kind of the link and it is do the involvement to the
organization and the organization strategic plan.
It is the organizational target and plan which will the organization carry. It is achieving the work and
the objectives in the strategic plan (Towbin, et al., 2018).
Q2. Explain the role of an operational plan in achieving the organisation’s objectives
It is the operational plan and the organizational activities it is used to the development
and outline the work management and activity. It targets the organizational work and
carry out the organizational solution and the organizational development. It is the
normal kind of work situation and work agreement it is helpful to achieving the goals
and the aims to set out the goals and the goals adjectives. It is the framework and the
organizational activity plan it is the work to do the achievement of the plan and the
adjectives (Shobaki, et al., 2016).
Q3. In your opinion how would an Operational Plan of a Retail and Services firm will differ from
that of a Manufacturing firm?

While you are doing the manufacturing of the operational plan and work for it then the producing
of the goods and it is the thing do the storing them at the warehouse them they are doing the
delivery to the customers. There is the effective services provided by the operational facilities and
the simulation of the work produced. It is known as the consumption of the work and the services.
It is known as the objective regarding the objective and the plan (Towbin, et al., 2018).
Q4. Explain a typical budgeting process in an organisation.
The budgeting process is the land of the organization and it is prepared by the budget n the time
limit and the plan limitation. They had the involvement in the past budget and they are doing the
forecasting and do the work implement and operations. It is the final evaluation of the work budget
and the work procedure. It is the essential budget of the work and the work management. It is the
monitoring and the controlling system to do the work monitoring and the controlling for the final
evaluations of the work and the work services.
Q5. What are Key Performance Indicators (KPIs)? Provide examples of financial and
non-financial KPIs in your own understanding.
It is the performance indicator for the management regarding the specific indicator
and the objectives. It is measured by the work management and the work objectives.
It is the thing provides the target and they gives the work and the measurement of the
objectives and the work. They gives the milestones and the gauge progress (Shobaki, et
al., 2016).

Assignment/Assessment Declaration Sheet
Student ID
Student Name
Unit
Assessment Task – Title/Number
Trainer/Assessor
Date Submitted
Note: Plagiarism/Cheating is a serious offence. If a student is found plagiarising/cheating, it may result in a penalty of
suspension/cancellation of student’s enrolment. In submitting their work, students must be aware of college’s Plagiarism
and Academic Misconduct Policy available in student handbook, college’s website and student administration.
Declaration of Originality: (Compulsory to sign)
By submitting this assignment for assessment, I acknowledge and agree that:
 This assessment task/work is submitted in accordance with the college’s Plagiarism and Academic Misconduct
Policy. I also understand the serious nature of academic dishonesty (such as plagiarism) and the penalties
attached to being found guilty of committing such offence
 No part of this assessment task/work has been copied from any other source without acknowledgement of the
source
 No part of this assessment task/work has been written by any other person, except to the extent of team and/or
group work as defined in the unit/assessment task
 A copy of the original assessment task/work is retained by me and that I may be required to submit the original
assignment to the trainer/assessor upon request
 The trainer/assessor may, for the purpose of assessing this assessment task/work:

Trainer’s
Comments
o Provide a copy of this assignment to another member of the faculty for review and feedback; and/or
o Submit a copy of this assignment to a plagiarism checking service. I acknowledge that a plagiarism
checking service provider may then retain a copy of this assessment task/work on its database for the
purpose of future plagiarism checking

Late submission: Late submission without a prior approval of the trainer/assessor will not be accepted and
may delay the assessment outcome. You may also need to resubmit work as per college’s Reassessment Policy.
I declare that this assessment is my own work.
Student
signature: Date:

Admin Use Only

References
Al Shobaki, M. J., Abu Amuna, Y. M., & Abu-Naser, S. S. (2016). Strategic and Operational Planning As
Approach for Crises Management Field Study on UNRWA.
Broadbent, D. E. (2013). Perception and communication. Elsevier.
Carliner, S. (2015). Training design basics. Association for Talent Development.
Frumkin, N. (2015). Guide to economic indicators. Routledge.
Goldratt, E. M., & Cox, J. (2016). The goal: a process of ongoing improvement. Routledge.
Griffin, R. W. (2021). Management. Cengage Learning.
Holzer, M. (2019). Public productivity handbook. CRC Press.
Jesmin, I., & Hui, H. (2012). A review of literature on contingency theory in managerial accounting. African
journal of business management, 6(15), 5159-5164.
Laffan, B., & Lindner, J. (2014). The budget: who gets what, when, and how?. Oxford University Press.
Mainardes, E., Alves, H., & Raposo, M. (2013). Identifying stakeholders in a Portuguese university: a case
study: La identificación de los stakeholders en una universidad portuguesa. Ministerio de Educación.
Mathis, R. L., Jackson, J. H., Valentine, S. R., & Meglich, P. (2016). Human resource management. Cengage
Learning.

Pressley, M., & Afflerbach, P. (2012). Verbal protocols of reading: The nature of constructively responsive
reading. Routledge.
Rosenfield, S. (2013). Instructional consultation. Routledge.
Towbin, A. J., Perry, L. A., Moskovitz, J. A., & OConnor, T. J. (2018). Building and implementing an operational
plan. Radiographics, 38(6), 1694-1704.

Introduction
The Microservices are a cutting-edge breakthrough in the field of programming development.
It is capable of maintaining the overall business at a high level with low level help and
freedom to operate. Therefore, we can conclude that this is a development variation of a good
programming application that quickly resolves the present business difficulties. Numerous
features, like flexibility, freedom, and loose coupling, are included in this engineering. This
aid engineering also makes it possible to deal with security and administration that facilitates
cloud computing. This design has been made in consideration of several components,
including framework skills and group association.

They have also developed using agile programming development and DevOps. As a result,
each organisation has a variety of legal obligations for data protection. Microservices design
is a practical approach for a large number of programming tasks. The main goals of this
engineering are adaptive and have a high level of adaptability. The programme may degrade
into multiple components, each of which would function independently. The microservices
application was segregated from the stone structures and operated by a single person.
In microservices, a large, substantial application is divided into roughly linked, free, and
independent services that collaborate with one another to provide solutions to extremely
complicated business problems. In the IT industry, microservices are becoming more and
more prevalent. Amazon, Netflix, and Spotify are really just a few examples of enterprises
that use microservices-based systems to manage their operations.
This article aims to discuss the fundamental principles and concepts of microservices design,
as well as its advantages and disadvantages.

Body of the report
Microservices design is a practical approach for a large number of programming tasks. The
main goals of this engineering are adaptive and have a high level of adaptability. The
programme may degrade into multiple components, each of which would function
independently. The microservices application was segregated from the stone structures and
operated by a single person.

The key principles are :

  1. Single Responsibility Principle
  2. Work around Business Capabilities
  3. You Build It, You Own it
  4. Framework Automation
  5. Plan for Failure
  6. Microservices Architecture Benefits and Drawbacks

Microservices engineering is growing in popularity these days because of its features, which
include flexibility, versatility, and many others that are clearly superior than stone monument
design. Nevertheless, despite its benefits, the microservices design requires a few different
points of view. The benefits and drawbacks of the architecture of microservices are shown in
the table below.

Advantages

  1. Microservices provide these kinds of help with amazing nimbleness.
  2. Bilingual programming is made possible via microservices.
  3. Administrations become independent thanks to decentralised information and management.
  4. Microservices allow for more rapid project development.
  5. Traditional services are less adaptable than microservices.

Disadvantages

  1. The complexity of microservices exceeds that of a solid.
  2. Microservices demand societal change.
  3. Solid services cost less than microservices.
  4. Microservices may be more defenceless in the face of security threats.
  5. The board of distributed applications and administrators

Engineering with microservices has several benefits. Microservices allow for very flexible
planning, creation, testing, and various administrations. Changes can be made quickly as a
result of more conservative administration.Because the services in the microservices are
independent of one another, if one stops operating, it won't affect the other services, which is
not always the case with granite monument architecture. Overall, microservices have
numerous shortcomings (Francesco. Et.al, 2019). There is no compelling necessity to replace
the entire code because the administrations in microservices are independent. The only area
that needs alteration is modified, tested, and communicated, which speeds up the user's
communication. Since multilingual programming is made possible by the administrations,
programmers may choose the best language to carry out their work. The inexact coupling of
the microservices allows for great group flexibility (Kuprenko, 2019).

Microservices design, which is loosely connected as compared to solid engineering, is rising
to fame in the product development space and is frequently used by the organizations. The
adoption of microservice architecture has changed as a result of the problems with solid that
have been found. Microservices provide the organisation a number of benefits that aid in
increasing agility and flexibility. Although switching from solid to microservices is
advantageous for the organisation, actually putting microservices into practise is challenging
as well.

Microservices Architecture Benefits
Programming for microservices may be divided into several component advantages, enabling
each of these administrations to be supplied and then repurposed free without endangering
the security of an application. In other words, developers may dynamically build and deploy
administrations thanks to the microservices architecture.
Better problem segregation ensures that even if one of the microservices fails, the others will
continue to function.
Code for various administrations might be written in many languages.
Simple integration and pre-planned setup; use of open-source continuous reconciliation
technologies like Jenkins, etc.
The idea of microservices makes persistent delivery possible.

The code is based on the capabilities of the organization, and it must be flexible and reusable
in addition to being effective. Integration with third-party services and scaling are both
simple processes.
The distribution of parts among many servers or even network infrastructure is possible.
Excellently work with compartments, like Docker.
Because the many components of a programme are decoupled, microservices focus on
security monitoring.

Case studies and examples of successfully implemented microservices architecture
Large-scale websites and apps like Netflix, eBay, Amazon, the UK's Government Digital
Service, Twitter, PayPal, The Guardian, and a plethora of others have all made the transition
from traditional solid architecture to microservices engineering. To examine the results, let's
look at some examples of people who overcame hardships:
A superb user experience is made possible by Spotify's usage of microservices.
Kevin Goldsmith, Spotify's VP of Engineering, is aware from personal experience that a
project requiring scalability need a design that can adapt rapidly and continue to be inventive
in a cutthroat market. As a consequence, Spotify came to the conclusion that you should
design your framework such that you can easily scale individual components if you're
worried about scaling to a high number of customers. Spotify sought to maintain these
limitations to a minimal because they presently have around 90 teams, 600 designers, and
five development offices working on a comparable product across two continents.

Amazon Embraced the DevOps Philosophy with Microservices
Amazon has also embraced microservices. Their prior, two-layered architecture would have
been practically unable to manage the constant requests they receive from a number of
sources, including apps that interface with the web administration API in the same manner
that they interact with the live site. In 2001, the Amazon.com ecommerce site was still under
construction. It was built on a number of levels, each of which included a sizable number of
rooms, yet they were all securely connected to one another and functioned as an one
enormous stone monument.

These significant adjustments started structurally, when Amazon switched their robust
application to a Service Oriented Architecture. Amazon also changed the way their company
conducted business. They split up into smaller "two-pizza groups" their primary, developing
item development group.After making these adjustments, Amazon greatly enhanced the
lifetime of front-end innovation. Currently, item groups are able to make decisions on and
deploy new microservice provisions fast. The organisation now completes 50 million
arrangements annually thanks to microservice engineering and its never-ending conveyance
processes.

Ethical factors in particular security and privacy concerns
The issue should be notably upright in the first place and questionable in the second.
In applied morality, we apply regularising criteria from a more pragmatic perspective. The
following are probably the most well-known examples of such criteria being used in applied
morals:

Rule of generosity: Be kind to people who are unfortunate.
Rule of authenticity: Don’t deceive people.
Damage rule: Don’t injure other people.
Paternalisms guiding principle is to assist others in pursuing their general interests when they
are unable to do it on their own.

PC morality also referred to as data morals or cyber ethics—is the framework through
which the ethical implications of data security are thought through. PC ethics is a branch of
applied morality that has received significant attention from ethicists as well as from experts
in data innovation. A significant component of this curiosity is the expected outcome of the
rapid change in PC innovation, its applications, and its recommendations. Despite the term
"PC Ethics"

Conclusion
Many businesses have switched between solid to microservices engineering. Microservices
provide a lot of advantages over traditional applications, but because they integrate several
different services into a single application, security and protection are a concern.

Instead of incorporating such services into a single monumental stone structure,
microservices engineering focuses on creating several independent, limited-scope
arrangements of Microservices. Microservices are an alternative to stone monuments that
overcome the challenges posed by deteriorating solid designs dividing a single application
into smaller microservices Due to its potential advantages, such as versatility and
adaptability.Microservices for computerised transmission and readiness are widely accepted
in the IT industry. It cannot, in any case.Never forget that, compared to traditional services,
microservices are more complicated, expensive, and vulnerable to security risks with strong.
However, many companies already do so, with the advantages weighing more heavily than
the disadvantages now started operating their firm in a microservices structured manner.

References
Di Francesco, Paolo, Patricia Lago, and Ivano Malavolta. 2019. “Architecting with
Microservices: A Systematic Mapping Study.” Journal of Systems and Software
150(4):77–97. Retrieved from https://www-sciencedirect-
com.ezproxy.laureate.net.au/science/article/pii/S0164121219300019.
GOTO conference. (2015, December 23). GOTO 2015. Microservices at Spotify. Kevin
Goldsmith. [Video file]. Retrieved from https://youtu.be/7LGPeBgNFuU. James Lewis,
Martin Fowler. 2014. Microservices: A Definition of this New Architectural Term. Retrieved
from https://www.martinfowler.com/articles/microservices.html.
Koschel, A., Astrova, I., & Dotterl, J. (2017). Making the move to microservice architecture.
2017 International Conference on Information Society (I-Society).
https://doi.org/10.23919/isociety.2017.8354675
Lokesh Gupta. 2019. Microservices – Definition, Principles and Benefits. Retrieved from
https://howtodoinjava.com/microservices/microservices-definition-principles-benefits/.
Phil Witmer. 2019. The Top Microservices Disadvantages & Advantages. Retrieved from
https://www.tiempodev.com/disadvantages-of-a-microservices-architecture/
Vitaly Kuprenko. 2019. 6 key benefits of microservices architecture. Retrieved from

6 Key Benefits of Microservices Architecture

Report
Overview of the research
An AI is used to research and study humans’ brains to solve problems. This is spreading all
over the fieldwork in the technical and engineering department. It is also used in AI
technology to improve the work efficiency and its accuracy. It provides new height for
construction work and provides more opportunities and reduces the risks. The objective of the
research is to implement AI technology in construction projects (Krishnamoorthy, & Rajeev,
2018).

Literature review of the research
Construction building is a fast-growing business that needs good design and accuracy.AI
automation helps to make the work easy and accurate because it requires a lot of planning and
information. It helps to decrease the burden on the engineer and understand employees that
how can utilize the resources effectively. There are lots of reaches and articles which reviews
the articles that how to use AI in a more effective way which gives lots of accurate results in
the project and industry. AI is a useful tool that is used to modernize the construction
industry.

Objectives of research
The main objective of the research is to know how important AI is for designing the project
for the modernization of industry. It is important to maintain the AI and use it to provide
more accuracy and effectiveness in project construction. And it provides a great scope in the
construction field. Questions in the research are
1) Is AI helps in the field of construction?
2) Is AI reduce or increase the project cost?
3) Is AI bringing more effectiveness to the project?

Methodology of the research

The objective of the research is a qualitative approach that helps to find the question which
will be asked in the project and to find the proper strategies which provide more effective and
helpful research work. By observations, we can present conditions that how much we extend
the AI in the construction field. Through interviews, we can be asked people personally about
the research questions and people are positive that AI really boosts the industries to a new
height. And by focusing on a target group that is engaged in a discussion about AI design.
The advantage of AI is It is also used in AI technology to improve the work efficiency and its
accuracy (Berente, et al., 2021). It provides new height for construction work and provides
more opportunities and reduces the risks. The objective of the research is to implement AI
technology in construction projects. The disadvantage is it needs lots of modification and also
it requires a high technical team expert to use it.

Significance
The project will provide the scope which is needed the construction field and requires AI in
the construction project for accurate and effective work and reduces the risks.

Issues
It is an important factor while research the work of research should be efficient without the
hurting community and without targeting a part of society. Analytical data is used for
maintaining a qualitative approach (Siau, & Wang,2020).

 

References
Berente, N., Gu, B., Recker, J., & Santhanam, R. (2021). Managing artificial
intelligence. MIS quarterly, 45(3), 1433-1450.
Krishnamoorthy, C. S., & Rajeev, S. (2018). Artificial Intelligence and Expert Systems for
Artificial Intelligence Engineers. CRC press.
Siau, K., & Wang, W. (2020). Artificial intelligence (AI) ethics: ethics of AI and ethical
AI. Journal of Database Management (JDM), 31(2), 74-87.