Wikipedia:Articles for deletion/Disaster Preparedness and Response Business Process Management (DPRBPM)
- The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.
The result was delete. Jujutacular talk 00:39, 17 August 2010 (UTC)[reply]
- Disaster Preparedness and Response Business Process Management (DPRBPM) (edit | talk | history | protect | delete | links | watch | logs | views) – (View log • AfD statistics)
- (Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL)
WP:OR essay where all sources are written by Paula Smith, Phd. Appears to be a vehicle used to promote the works of Smith and possibly a WP:COI. Drdisque (talk) 00:53, 10 August 2010 (UTC)[reply]
- Note: This debate has been included in the list of Business-related deletion discussions. -- • Gene93k (talk) 16:16, 11 August 2010 (UTC)[reply]
- Note: This debate has been included in the list of Computing-related deletion discussions. -- • Gene93k (talk) 16:16, 11 August 2010 (UTC)[reply]
- Delete. Agree with the nominator that this seems to paint entirely too rosy a picture, and seems to be intended to sell consulting services:
The DPRBPM can integrate and accommodate all other software applications and systems already in existence. None of these would have to change, or be replaced except as an operational choice....
The process is capable of infinite expansion in its structure, and as such invites collaborative and cooperative use simultaneously. It can reconcile all programs into common use....
The system is very user friendly and easy to operate....
...its use is to drive business and trade transactions – fast, utilizing all resources, communicating accurately and quickly...
This process can reside globally and securely, completely interoperable communications - in a laptop or Blackberry....
The Interoperable Communications component, when included, is reliable and secure, defaulting to the optimal system use with dedicated secure (cots) processes within this system....
In addition to these specific concerns, like many such articles this text is entirely too vague and abstract to really be informative. To the extent that this is one person's theory --- all the references mention Dr. Paula Smith, and the article creator is User:Pabs22 --- this may also qualify as original research. - Smerdis of Tlön - killing the human spirit since 2003! 16:34, 11 August 2010 (UTC)[reply] - Delete - There is no indication that this methodology is notable. -- Whpq (talk) 17:01, 13 August 2010 (UTC)[reply]
- Delete - Promotional in nature. All sources self-referential. --MelanieN (talk) 00:58, 16 August 2010 (UTC)[reply]
- The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.