An action research on improving R-Poultry’s security policies during the harvest of broiler chickens
This paper discussed the issues faced by R-Poultry’s broiler operations, as a contract grower, when it transitioned to a different poultry integrator. The changing of poultry integrator resulted in changes in the farm supplies, consideration, compensation, and policies. Thus, Action Research was use...
Saved in:
Main Author: | |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2021
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etdm_manorg/33 https://animorepository.dlsu.edu.ph/context/etdm_manorg/article/1031/viewcontent/abad2.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Summary: | This paper discussed the issues faced by R-Poultry’s broiler operations, as a contract grower, when it transitioned to a different poultry integrator. The changing of poultry integrator resulted in changes in the farm supplies, consideration, compensation, and policies. Thus, Action Research was used to systematically adjust, improve and implement the security policies of R-Poultry with its new integrator. Furthermore, it was used to properly document the changes in the work process flow and the insights and reactions of the people involved in the harvest and security operations. Action research spearheaded the collaboration that helped improved and prepare the poultry’s security operations when it adjusted to the poultry integrator’s policies and systems, Furthermore, as the operations adapt and the harvest system improves, it resulted in other issues manifesting from the implementation of improved security policies. Thus, this action research project has three full cycles. The first cycle addressed the issue of preparedness in terms of security. The second cycle involves the implemented solutions agreed upon by the members of the organization on the first cycle. The third research cycle also addressed the issues that sprouted during the second cycle due to the implementation of new security protocols addressed. |
---|