Effective Public Speech: Applying Monroe's Motivated Sequence
VerifiedAdded on 2022/08/17
|6
|1033
|17
Report
AI Summary
This report provides an analysis of a public speech, focusing on the application of Monroe's Motivated Sequence for effective communication and persuasion. The speech scenario involves a junior employee presenting to senior management to advocate for the inclusion of resources in the company's budget to improve data security. The report breaks down the speech into the five stages of Monroe's Motivated Sequence: gaining attention, establishing the need for change, providing a solution to satisfy the need, visualizing the positive outcomes of the solution, and calling for action. The report emphasizes the importance of each step in crafting a compelling and persuasive argument, particularly within a business context. The conclusion highlights the effectiveness of Monroe's Sequence in clarifying the speaker's intent and persuading the audience. References to relevant academic sources support the analysis.

Running head: PUBLIC SPEECH
Public Speech
Name of the Student:
Name of the University:
Author note:
Public Speech
Name of the Student:
Name of the University:
Author note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1PUBLIC SPEECH
Introduction:
Delivering a persuasive speech requires certain steps in the communication process.
Higher level management discussions can only be successful when certain steps or tips are
followed for the success. Monroe’s Model for the improvement of the communication skill is
one of the techniques that can used for improvement in business communication and enhance the
success. In the discussion we will talk about how we can communicate successfully and persuade
the people for the implementation of the strategy.
Description of the Scenario: (Scenario 1)
A junior employee has been invited to attend a higher management meeting to deliver a
speech to persuade the team of management for inclusion of certain resources in the company’s
budget or make certain remarkable changes in the company such that the production can be
increased, along with the efficiency of the business.
Monroe’s Motivated Sequence:
The Monroe’s motivated sequence consists of five important stages which may be
followed during the communication as it can help in persuading people to listen to the thoughts
of the individual.
Step 1: Getting Attention
This is very important. This is the part of the speech where one should introduce
them self as clearly as possible with the ability to tell a story. For this scenario
one can proceed in the following manner:
Introduction:
Delivering a persuasive speech requires certain steps in the communication process.
Higher level management discussions can only be successful when certain steps or tips are
followed for the success. Monroe’s Model for the improvement of the communication skill is
one of the techniques that can used for improvement in business communication and enhance the
success. In the discussion we will talk about how we can communicate successfully and persuade
the people for the implementation of the strategy.
Description of the Scenario: (Scenario 1)
A junior employee has been invited to attend a higher management meeting to deliver a
speech to persuade the team of management for inclusion of certain resources in the company’s
budget or make certain remarkable changes in the company such that the production can be
increased, along with the efficiency of the business.
Monroe’s Motivated Sequence:
The Monroe’s motivated sequence consists of five important stages which may be
followed during the communication as it can help in persuading people to listen to the thoughts
of the individual.
Step 1: Getting Attention
This is very important. This is the part of the speech where one should introduce
them self as clearly as possible with the ability to tell a story. For this scenario
one can proceed in the following manner:

2PUBLIC SPEECH
“Hello everyone! I am John. I work here as a junior executive. With all due
respect, have you ever imagined what will happen if our database is hacked or the
data are all lost at once? All the records, data, transaction, customer identities and
everything, just gone.”
Step 2: Establishment of the need:
“Protecting the customer details as well as the inventory assets of the company, I
think we have to think about implementation of technologies to our existing system such
that the databases can be protected. Technologies are enhancing and so are the ways in
which the people can invade the security of the system. There are more ways in which the
hackers can gain access to our system than you can imagine.
Setting up physical security or just passwords are not enough to prevent these
attacks from occurring in the system.
Have you heard about the Brute force attacks? This is the simplest way in which
the attackers can access the system database such that they can get access to the system.
Hence, I think we have to implement some other technology or some other ways in which
the data can be protected.”
Step 3: Need Satisfaction:
“I think that the best way in which the data can be protected is by investment in
cryptography in the company. With application of the cryptographic algorithms to the
data the data can be protected. By encryption of the data transferring becomes easier and
more secure. The encrypted data can help in maintaining the integrity of the information.
“Hello everyone! I am John. I work here as a junior executive. With all due
respect, have you ever imagined what will happen if our database is hacked or the
data are all lost at once? All the records, data, transaction, customer identities and
everything, just gone.”
Step 2: Establishment of the need:
“Protecting the customer details as well as the inventory assets of the company, I
think we have to think about implementation of technologies to our existing system such
that the databases can be protected. Technologies are enhancing and so are the ways in
which the people can invade the security of the system. There are more ways in which the
hackers can gain access to our system than you can imagine.
Setting up physical security or just passwords are not enough to prevent these
attacks from occurring in the system.
Have you heard about the Brute force attacks? This is the simplest way in which
the attackers can access the system database such that they can get access to the system.
Hence, I think we have to implement some other technology or some other ways in which
the data can be protected.”
Step 3: Need Satisfaction:
“I think that the best way in which the data can be protected is by investment in
cryptography in the company. With application of the cryptographic algorithms to the
data the data can be protected. By encryption of the data transferring becomes easier and
more secure. The encrypted data can help in maintaining the integrity of the information.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3PUBLIC SPEECH
So including this into the budget for the improvement of the company will be beneficial
in the long term”
Step 4: Visualization of the Future:
“With this technology in use, the data shall be protected from the harm and the
information exchange between the stakeholders will be much easier and efficient!
Imagine while transferring the data the entire file is corrupted with some
undesired personnel. Will that be desired result? It will be an absolute destruction when
the information that are in use is leaked or misused in some way or the other. The data
are often misused and are highly in demand in the black market for the purpose of
identity threats.”
Step 5: Calling for the Action:
“I would be really be honoured if you look into this matter as it is one of the
greatest issues that can affect the performance of the business. With a hacker accessing the
system and gaining all the needed information, the privacy, security and the integrity of the data
is harmed. As we have technology, we can simply apply it. However, it is a one-time-investment
and the cost6 of maintenance is much lower than the cost of the physical security as well. The
time taken for the implementation of the technology is less as well. I hope I have made my
amendments clear and being able to make the scenario understandable. I hope with this
investment the business as well and the clients will be benefited in either ways. Thank you. Hope
you have a good day.”
So including this into the budget for the improvement of the company will be beneficial
in the long term”
Step 4: Visualization of the Future:
“With this technology in use, the data shall be protected from the harm and the
information exchange between the stakeholders will be much easier and efficient!
Imagine while transferring the data the entire file is corrupted with some
undesired personnel. Will that be desired result? It will be an absolute destruction when
the information that are in use is leaked or misused in some way or the other. The data
are often misused and are highly in demand in the black market for the purpose of
identity threats.”
Step 5: Calling for the Action:
“I would be really be honoured if you look into this matter as it is one of the
greatest issues that can affect the performance of the business. With a hacker accessing the
system and gaining all the needed information, the privacy, security and the integrity of the data
is harmed. As we have technology, we can simply apply it. However, it is a one-time-investment
and the cost6 of maintenance is much lower than the cost of the physical security as well. The
time taken for the implementation of the technology is less as well. I hope I have made my
amendments clear and being able to make the scenario understandable. I hope with this
investment the business as well and the clients will be benefited in either ways. Thank you. Hope
you have a good day.”
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4PUBLIC SPEECH
Conclusion:
The manner in which a speech is delivered says a lot about the intention of the speaker.
By following the Monroe’s Sequence, one can clarify the motive and persuade a person to pay
more attention to the speech that is delivered.
Conclusion:
The manner in which a speech is delivered says a lot about the intention of the speaker.
By following the Monroe’s Sequence, one can clarify the motive and persuade a person to pay
more attention to the speech that is delivered.

5PUBLIC SPEECH
References:
German, K. M., Gronbeck, B. E., Ehninger, D., & Monroe, A. H. (2016). Principles of public
speaking. Routledge.
Haugen, J., & Lucas, K. (2019). Unify and present: Using Monroe's Motivated Sequence to teach
team presentation skills. Communication Teacher, 33(2), 112-116.
Kumari, S. (2017). A research paper on cryptography encryption and compression techniques.
International Journal Of Engineering And Computer Science, 6(4).
Mapes, M. (2019). Persuasive Speaking. Speak Out, Call In: Public Speaking as Advocacy.
Sahu, R., & Ansari, M. S. (2017). Securing messages from brute force attack by combined
approach of honey encryption and blowfish. International Journal, 4.
References:
German, K. M., Gronbeck, B. E., Ehninger, D., & Monroe, A. H. (2016). Principles of public
speaking. Routledge.
Haugen, J., & Lucas, K. (2019). Unify and present: Using Monroe's Motivated Sequence to teach
team presentation skills. Communication Teacher, 33(2), 112-116.
Kumari, S. (2017). A research paper on cryptography encryption and compression techniques.
International Journal Of Engineering And Computer Science, 6(4).
Mapes, M. (2019). Persuasive Speaking. Speak Out, Call In: Public Speaking as Advocacy.
Sahu, R., & Ansari, M. S. (2017). Securing messages from brute force attack by combined
approach of honey encryption and blowfish. International Journal, 4.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





