Effective Customer Interviews Make Life Much Easier!

One of the critical success factors for service-related businesses is our ability to understand a client's needs and requirements. Misunderstandings can lead to loss of repeat business, economic loss, and damage to reputation.

Although interactions in small business are often much more casual than those at the big end of town, interviews with clients differ from ordinary conversations even though they may appear to resemble them:

Friendly conversation

a. Not directed toward a purpose
b. Equal distribution of talking/listening
c. Fewer questions
d. Redundancy and repetition are drawbacks to conversation

Interview

a. Directed towards a purpose and therefore has a structure that must reflect its purpose

b. Largely questions from one and answers from other party (interviewer mainly listens while encouraging interviewee to talk)

c. Redundancy and repetition desirable in interviews

d. Interviewer needs to use a range of strategies to make sure interviewee has been fully understood

A good structure for an interview is:

1. Establish rapport
2. Get the big picture (general information gathering)
3. Gather specific information
4. Intervene (give information, advice, or instructions)
5. End, including feedback and summary

These stages may be interactive, occurring several times throughout the interview.Interviews go wrong in predictable ways. Approximately 40% of clients do not ask an initial question that explains their need in precise terms, so the purpose of the interview is to clarify the question. And that process can fall foul of one of five common causes of communication accidents:

i. Not listening

ii. Playing twenty questions (as opposed to open-ended questioning)

iii. Interrupting at inappropriate times

iv. Making assumptions

v. Not following up

To optimise the time spent in an interview, you can use a range of techniques:

1. Open-ended questions (as opposed to closed questions that invite 'yes/no' answers)

2. Sense-making questions ? these provide more structure than open-ended questions but are less likely to lead to premature diagnosis than closed questions. They also leave the interviewee in control

3. Reflecting content ? summarise and paraphrase what your client has said

4. Closure techniques:

i.To indicate that discussion of a topic has been completed, at least for the moment

ii.To focus the interviewee's attention on what has been achieved in the discussion (can be used when the conversation is wandering)

iii. To establish a good communication climate so that the interviewee looks forward to the next encounter

Your marketing, client knowledge of the industry in general and your services in particular, and those client's expectations of your service, play a role in ill-formed queries from clients, because they reflect those clients mental models of how your business and its systems work. Obviously, an individual's mental model of any system is, by definition, inaccurate and incomplete in relation to the conceptual model. It is the degree of discrepancy that is important.

Clients tend to phrase their initial questions in a way they believe meet the requirements of the system. Inadequacy of clients' mental models becomes greater as systems become more complex, so the potential for mismatch will be vastly different for a sandwich bar, for example, compared to a business which is part of a more complex industry, such as a financial services business.

Common generators of ill-formed queries include:

a. Request for something broad and general when the client actually wants something very specific

b. Request for something specific but there is a mismatch between the specific thing requested and what they actually need

c. Client asks a question based on a misunderstanding of how the system works, or to clarify a confusion

d. Terminology used is ambiguous

e. The question involves a reconstruction which the client has gotten wrong

f. The question contains an error or misconception

Small business operators, particularly those operating service-related businesses, need to be aware and take steps to check for discrepancies between interviewer and client mental models. The good news is that mental models change through an incremental learning process.

Jennifer Cram is a sought after Civil Celebrant based in Brisbane, Queensland, who credits her success to her capacity for 'inspired listening'. She has also had 30 years management experience in the public sector. For more information: http://www.jennifercram.com

Copyright ? 2005 Jennifer Cram. You have permission to publish this article electronically or in print, free of charge, as long as the bylines are included. A courtesy copy of your publication would be appreciated.

tidy up service Glenview ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

Small Business Checks ? Money Saving Options

When you go into business for yourself, there are many... Read More

Starting a Small Business? ?Tips from a Veteran

Congratulations, you are starting a small business! You are taking... Read More

The Perfect Mission Statement

One way to determine your companies mission statement is based... Read More

Postcards Make It Rain Referrals

One of the simplest ways to expand your marketing efforts... Read More

The Joy and Hazards Of Finding Your First Office

Q: I have outgrown my home office and need to... Read More

Keeping Business Alive

Who is responsible for maintaining the business relationship?Nurturing a business... Read More

Increase Your Profits with a Point of Sale (POS) System

Whether you operate a chain of restaurants, a mom-and-pop convenience... Read More

How the Crab Effect Obstructs Growth and How to Conquer It

Some of the greatest words of wisdom for any man... Read More

Why Small Businesses Fail (or Fail to Thrive)

Tammy, a skilled and gifted horticulturist, called me to discuss... Read More

The Power of Why: Your Psychological Ally To Marketing Success!

Here's why 'WHY' is such a profit-making marketing trigger."Stop taking... Read More

Equipment Maintenance Manual for Mobile Cleaning Business Outline

Service Cleaning Businesses must maintain their equipment in order to... Read More

Get Free Payroll Forms Download from the Internet

Having a successful business means also having a good working... Read More

Pressure Washing Graders and Tractor Motors

When pressure washing heavy equipment each piece of equipment has... Read More

Tips on Setting Up Your Small Business Bank Account

One of the first things you will need to set... Read More

7 Card Tricks That Improve Your Personal Networking Power

CARD SHARK7 Card Tricks That Improve Your Personal Networking PowerThe... Read More

Power Tools for Business

How do we keep track of our business deals?If you... Read More

50 Ways to Save Money

There are countless ways to save your business money. Unfortunately,... Read More

Share Ad Expenses to Boost Profits

The challenges of the small business owner are well documented.... Read More

Work is a Four Letter Word

I love work, I can watch it all day.I am... Read More

Do You Want Your Own Fully Programmable ERP? - Part 2

In the first article we mentioned the main characteristics that... Read More

What is Business Process Automation?

Business Process Automation or BPA for short. This was a... Read More

Small Business Health Check-Up

If your home business is not performing the way you... Read More

Private Investigator Tactics

A Private Investigator is a professional trained in the art... Read More

Window Cleaning Business Future Challenge With Self Cleaning Glass

Self-cleaning glass has been talked about a lot, with such... Read More

Boston Suburban areas a good choice to run a business

BioTechs even with the latest news had shed over 1000... Read More

maid service near Winnetka ..