Effective Customer Interviews Make Life Much Easier!

One of the critical success factors for service-related businesses is our ability to understand a client's needs and requirements. Misunderstandings can lead to loss of repeat business, economic loss, and damage to reputation.

Although interactions in small business are often much more casual than those at the big end of town, interviews with clients differ from ordinary conversations even though they may appear to resemble them:

Friendly conversation

a. Not directed toward a purpose
b. Equal distribution of talking/listening
c. Fewer questions
d. Redundancy and repetition are drawbacks to conversation

Interview

a. Directed towards a purpose and therefore has a structure that must reflect its purpose

b. Largely questions from one and answers from other party (interviewer mainly listens while encouraging interviewee to talk)

c. Redundancy and repetition desirable in interviews

d. Interviewer needs to use a range of strategies to make sure interviewee has been fully understood

A good structure for an interview is:

1. Establish rapport
2. Get the big picture (general information gathering)
3. Gather specific information
4. Intervene (give information, advice, or instructions)
5. End, including feedback and summary

These stages may be interactive, occurring several times throughout the interview.Interviews go wrong in predictable ways. Approximately 40% of clients do not ask an initial question that explains their need in precise terms, so the purpose of the interview is to clarify the question. And that process can fall foul of one of five common causes of communication accidents:

i. Not listening

ii. Playing twenty questions (as opposed to open-ended questioning)

iii. Interrupting at inappropriate times

iv. Making assumptions

v. Not following up

To optimise the time spent in an interview, you can use a range of techniques:

1. Open-ended questions (as opposed to closed questions that invite 'yes/no' answers)

2. Sense-making questions ? these provide more structure than open-ended questions but are less likely to lead to premature diagnosis than closed questions. They also leave the interviewee in control

3. Reflecting content ? summarise and paraphrase what your client has said

4. Closure techniques:

i.To indicate that discussion of a topic has been completed, at least for the moment

ii.To focus the interviewee's attention on what has been achieved in the discussion (can be used when the conversation is wandering)

iii. To establish a good communication climate so that the interviewee looks forward to the next encounter

Your marketing, client knowledge of the industry in general and your services in particular, and those client's expectations of your service, play a role in ill-formed queries from clients, because they reflect those clients mental models of how your business and its systems work. Obviously, an individual's mental model of any system is, by definition, inaccurate and incomplete in relation to the conceptual model. It is the degree of discrepancy that is important.

Clients tend to phrase their initial questions in a way they believe meet the requirements of the system. Inadequacy of clients' mental models becomes greater as systems become more complex, so the potential for mismatch will be vastly different for a sandwich bar, for example, compared to a business which is part of a more complex industry, such as a financial services business.

Common generators of ill-formed queries include:

a. Request for something broad and general when the client actually wants something very specific

b. Request for something specific but there is a mismatch between the specific thing requested and what they actually need

c. Client asks a question based on a misunderstanding of how the system works, or to clarify a confusion

d. Terminology used is ambiguous

e. The question involves a reconstruction which the client has gotten wrong

f. The question contains an error or misconception

Small business operators, particularly those operating service-related businesses, need to be aware and take steps to check for discrepancies between interviewer and client mental models. The good news is that mental models change through an incremental learning process.

Jennifer Cram is a sought after Civil Celebrant based in Brisbane, Queensland, who credits her success to her capacity for 'inspired listening'. She has also had 30 years management experience in the public sector. For more information: http://www.jennifercram.com

Copyright ? 2005 Jennifer Cram. You have permission to publish this article electronically or in print, free of charge, as long as the bylines are included. A courtesy copy of your publication would be appreciated.

cleaning help near Mundelein ..
In The News:

A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.

So You Don?t Believe in Outsourcing

Entrepreneurs are hardy stock. But sometimes hardiness can get you... Read More

How to Compete with the Big Guns?!

Many small business startups fail within the first 2 years... Read More

The Hidden Treasure in Your Business

I started working with another new client last week. He... Read More

Secrets Revealed To Having The Most Professional Staff On The Telephone!

Do you have all the customers your business can use?The... Read More

Is a Small Business Web Site a Wise Investment?

One of the greatest pitfalls in e-commerce is Field of... Read More

Serious About Writing A Business Plan... Start A Business Plan Library

Tap these treasures of ideas. The best money you can... Read More

5 Steps To Success for Small Business Owners

Everyone wants to succeed in life. Most people want to... Read More

Expanding Franchisee Advice

Franchisor expansion policies are not as simple as one might... Read More

Small Does Not Mean Invisible!

Running a business on the net these days can be... Read More

Professional Car Care Businesses You Can Start

If you are in the professional car care business you... Read More

What is your Motto?

Company mottos can easily be printed on a business card.Sometimes... Read More

Genius Time? It Matters

I frequently give presentations at small business gatherings, providing me... Read More

Get Approved for a Franchise

Deciding to start your own franchise is just one of... Read More

SBIR vs STTR

SBIR vs. STTR: If you are participating in the SBIR... Read More

Proper Care and Feeding of the Business Owner

That sizzling sound you're hearing may be a symptom of... Read More

Never Burn a Bridge

Why should you always maintain a good report with a... Read More

Expanding A Mobile Car Wash Business

What is the best time to expand a mobile car... Read More

How to Start a Paper Shredding Business

Paper Shredding Business Opportunities are blossoming up everywhere because in... Read More

Small Business 101: Deadly Ignorance

American small business is again in transition. Many employees, now... Read More

You Are Invited

Business card size works well for invitations to special events.What... Read More

Old Data in Database Marketing Software

Database Problems in MarketingI have been working on a direct... Read More

Why is My Restaurant Not Full Every Monday Night?

In a quest for customers and to keep those customers,... Read More

Franchise Buyers from Hell

I ran a franchise company for many years, a car... Read More

Small Business Server Business Tips

Top 3 Ways to Maximize Your Small Business Server Consulting... Read More

Fire the CEO

If you are the boss and you think your job... Read More

reliable maid service Wilmette ..