Effective Customer Interviews Make Life Much Easier!

One of the critical success factors for service-related businesses is our ability to understand a client's needs and requirements. Misunderstandings can lead to loss of repeat business, economic loss, and damage to reputation.

Although interactions in small business are often much more casual than those at the big end of town, interviews with clients differ from ordinary conversations even though they may appear to resemble them:

Friendly conversation

a. Not directed toward a purpose
b. Equal distribution of talking/listening
c. Fewer questions
d. Redundancy and repetition are drawbacks to conversation

Interview

a. Directed towards a purpose and therefore has a structure that must reflect its purpose

b. Largely questions from one and answers from other party (interviewer mainly listens while encouraging interviewee to talk)

c. Redundancy and repetition desirable in interviews

d. Interviewer needs to use a range of strategies to make sure interviewee has been fully understood

A good structure for an interview is:

1. Establish rapport
2. Get the big picture (general information gathering)
3. Gather specific information
4. Intervene (give information, advice, or instructions)
5. End, including feedback and summary

These stages may be interactive, occurring several times throughout the interview.Interviews go wrong in predictable ways. Approximately 40% of clients do not ask an initial question that explains their need in precise terms, so the purpose of the interview is to clarify the question. And that process can fall foul of one of five common causes of communication accidents:

i. Not listening

ii. Playing twenty questions (as opposed to open-ended questioning)

iii. Interrupting at inappropriate times

iv. Making assumptions

v. Not following up

To optimise the time spent in an interview, you can use a range of techniques:

1. Open-ended questions (as opposed to closed questions that invite 'yes/no' answers)

2. Sense-making questions ? these provide more structure than open-ended questions but are less likely to lead to premature diagnosis than closed questions. They also leave the interviewee in control

3. Reflecting content ? summarise and paraphrase what your client has said

4. Closure techniques:

i.To indicate that discussion of a topic has been completed, at least for the moment

ii.To focus the interviewee's attention on what has been achieved in the discussion (can be used when the conversation is wandering)

iii. To establish a good communication climate so that the interviewee looks forward to the next encounter

Your marketing, client knowledge of the industry in general and your services in particular, and those client's expectations of your service, play a role in ill-formed queries from clients, because they reflect those clients mental models of how your business and its systems work. Obviously, an individual's mental model of any system is, by definition, inaccurate and incomplete in relation to the conceptual model. It is the degree of discrepancy that is important.

Clients tend to phrase their initial questions in a way they believe meet the requirements of the system. Inadequacy of clients' mental models becomes greater as systems become more complex, so the potential for mismatch will be vastly different for a sandwich bar, for example, compared to a business which is part of a more complex industry, such as a financial services business.

Common generators of ill-formed queries include:

a. Request for something broad and general when the client actually wants something very specific

b. Request for something specific but there is a mismatch between the specific thing requested and what they actually need

c. Client asks a question based on a misunderstanding of how the system works, or to clarify a confusion

d. Terminology used is ambiguous

e. The question involves a reconstruction which the client has gotten wrong

f. The question contains an error or misconception

Small business operators, particularly those operating service-related businesses, need to be aware and take steps to check for discrepancies between interviewer and client mental models. The good news is that mental models change through an incremental learning process.

Jennifer Cram is a sought after Civil Celebrant based in Brisbane, Queensland, who credits her success to her capacity for 'inspired listening'. She has also had 30 years management experience in the public sector. For more information: http://www.jennifercram.com

Copyright ? 2005 Jennifer Cram. You have permission to publish this article electronically or in print, free of charge, as long as the bylines are included. A courtesy copy of your publication would be appreciated.

cleaning help near Mundelein ..
In The News:

A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.

Look Like Sizzle, Be The Steak

You've heard marketing and advertising gurus quip, "Sell the sizzle,... Read More

Want to Grow Your Business? Make an Irresistible Offer

My clients and many of my readers are small and... Read More

Power Tools for Business

How do we keep track of our business deals?If you... Read More

Who Makes the BEST Business Partner

How do you find the best business partners?Finding a good... Read More

Setting Up a Pressure Washer Rig to Clean Concrete

Maximum efficiency in the cleaning industry is a key to... Read More

Shopping For a Franchise

Shopping for a franchise is easy if you know what... Read More

Getting City Contracts; Local Government Contracting

All cities have a purchasing office and/or a procurement officer.... Read More

The Perilous Franchise Agreement: What Did You Sign?

Purchasing a franchise has become one of the most popular... Read More

Money Series 1: Who Takes Your Money

Your business is making profits, but where is the cash?... Read More

Small Business - Big Business...Whats the Diff?

Small Business, Big Business ? What's the Diff?Well a lot... Read More

Is Your Business Making Money?

Is your business making money? Would you know?Figuring out whether... Read More

(P)Refer to Grow Your Business

(Although this article is geared towards small business owners, the... Read More

Small Business Failures in America - Cash Flow Issues

We are noticing an increase in the length of time... Read More

How to Curb Antique Shop Theft Inexpensively

If you have ever had your antique shop or mall... Read More

Is a Small Business Web Site a Wise Investment?

One of the greatest pitfalls in e-commerce is Field of... Read More

To Buy A Fat Pig

What does buying a fat pig have to do with... Read More

Going Public by Way of Regulation D (504) Offering

Under the Securities Act of 1933, any offer to sell... Read More

How To Make Sure Your Customers Still Trust Your Small Business

The stock market is still on a wild roller coaster... Read More

The Truth About Government Grants for Your Business

Free money! Receive up to $25,000 that never has to... Read More

Packing Material Thats Cheap!

Shipping materials can be expensive! Even the styrofoam "peanuts" can... Read More

How to Become Successful in the Field of Financial Consultants

Financial Consultants are one of the fastest growing industries today.... Read More

Todays Chef, Tomorrows Restaurateur -- Startup Tips by Restaurant Consultants Inc

Researching information for a recent business plan, I came across... Read More

Don?t Quit Before You Get to the City!

We were more than excited. Our women's doubles tennis team... Read More

Five Quick Ways to Speed Up Cash Flow

At one point or another, almost every business runs short... Read More

Essex Accountants: Top Things to Look For

One of the most common horrific mistakes a business can... Read More

reliable maid service Wilmette ..