SlideShare a Scribd company logo
1 of 45
Approved BBS Coursework Brief Template 2019/20 1 of 5
Br
un
el
B
us
in
es
s S
ch
oo
l
Assessment Title: Brand Management Report
Module Leader: Dr Michael Heller
Submission Deadline: 12:00 noon on 20/04/2020
Feedback by : 20/05/20120 (20 working days from the deadline)
Contribution to overall module assessment: 70%
Indicative student time working on assessment: 60 Hours
Word or Page Limit (if applicable): 2500 Words
Assessment Type (individual or group): Individual Report
Main Objective of the assessment
• To demonstrate an understanding of branding and brand
management
• To show an understanding of the material that was taught in
the module and in the indicative reading and literature
• To demonstrate an ability to understand and apply brand
theory and brand models
• To show both creativity and systematic understanding and
planning in relation to a brand repositioning campaign
• To write a professional report that repositions a brand which
is able to synthesise contemporary brand management practice
and theory
Description of the Assessment
In an individual report of 2,500 words (Times New
Roman/Calibri 12 font, using 1.5 line spacing), based on the
analysis undertaken by your group in
Coursework 1, prepare a brand plan (in report form) for the next
two years, aimed at overcoming the current difficulties and
improving upon the brand’s
market position.
The report should be written as if it were to be presented to the
Board. It must therefore be convincing, comprehensive,
practical and sustainable. It should
fully utilise teaching given in class and contain relevant theory,
models and literature found in both core text books. At least
three models taught in class
should be utilised. The report should also contain academic
reading (articles and books). In addition to the two core text
books used in class, it should
contain references to at least five other academic sources. The
report should open with a brief overview of the problems which
the brand faces, which were
given in the presentation. It should then contain a section which
proposes changes to the brand (the repositioning strategy).
Benefits, identity, use, user,
MG3601 Brand Management
Report Coursework for 2019/20
Approved BBS Coursework Brief Template 2019/20 2 of 5
Br
un
el
B
us
in
es
s S
ch
oo
l packaging, communication, price and other elements of the
marketing mix should be covered. Following this there should
be a section which deals with the
implementation of the plan. Finally, there should be a brief
auditing plan to ensure that the brand maintains its recovery.
Marking Scheme, Submission Instructions and Grading Scheme
Please enter here the marking scheme relevant for the
coursework and provide an illustration of each assessment
criterion achieved at each of the grade
descriptor for UG/PG levels.
UG grades and grade point bands [Senate Regulation 2 (2009
starters onwards)] are: A++ (17), A+ (16), A (15), A- (14), B+
(13), B (12), B- (11), C+ (10), C (9),
C- (8), D+ (7), D (6), D- (5), E+ (4), E (3), E- (2), F (1)
Submission Instructions
Coursework must be submitted electronically via the
University’s Blackboard Learn system. The required file format
for this report is Times New
Roman/Calibri 12 font, using 1.5 line spacing. Your student ID
number must be used as the file name (e.g. 0123456.docx). You
must ensure that you upload
your file in the correct format and use the College’s electronic
coursework coversheet. Please note that submissions of ‘.Pages’
documents will not be
accepted – they should be converted to approved format.
The electronic coursework coversheet must be completed and
included at the beginning of all coursework submissions prior to
submitting on Blackboard
Learn. Electronic coversheets are available on Blackboard Learn
within the Taught Programmes Office folder.
An example under development (for MG5547 Marketing
Communications)
5 marking criteria all equally weighted
Criteria Grade descriptors
A.
B.
C.
D.
E.
F.
1. Understanding
of the topic and
reviewing relevant
literature
(30% weighting)
The report provided a
sophisticated, critical
and thorough discussion
of the relevant literature,
with key references
being applied
throughout. Research is
rigorous and there is an
excellent application of
academic literature.
The report provided a
well-developed, critical
and comprehensive
understanding of the
relevant literature and
was well referenced.
There was a clear
demonstration of
reading and application
of brand literature. Five
The report demonstrated
some understanding of
the relevant literature.
Not all five academic
references are relevant.
There is some evidence
of reading and some
application of the
literature to the report.
Both textbooks books
Whilst reading and
literature is evident, it is
partial and insufficient
in areas. The report does
not use five relevant
academic sources. The
literature is not
consistently applied in
the report and is found
lacking in several key
There is a lack of
reading and literature in
the report. The five
stipulated academic
sources have not been
used. There is an overall
failure to fully apply the
literature to the report.
Both textbooks are not
competently used and
The report shows little
evidence of any relevant
academic reading. It does not
have or use five academic
sources. The literature is not
applied to the report or
understood. There is a failure
to apply the textbooks to the
report. The literature is
basically not used in the
https://blackboard.brunel.ac.uk/
https://intra.brunel.ac.uk/cbass/Handbook%20Documents/Assess
ment%20and%20Award/Coursework%20submissions/CBASS%2
0Coursework%20Submission%20Coversheet.docx
https://intra.brunel.ac.uk/cbass/Handbook%20Documents/Assess
ment%20and%20Award/Coursework%20submissions/CBASS%2
0Coursework%20Submission%20Coversheet.docx
Approved BBS Coursework Brief Template 2019/20 3 of 5
Br
un
el
B
us
in
es
s S
ch
oo
l More than five academic
sources were used and
thoroughly applied and
both core text books
were used consistently
throughout the report.
The report skillfully
applies the literature to
support its argument and
repositioning plan.
relevant academic
sources are used and
applied in the report.
Both textbooks are
applied throughout the
report. Literature is
mostly applied to
reinforce arguments and
analysis in the report
and to support the
repositioning plan.
are used but not
thoroughly. The
literature is used to
support some arguments
and analysis in the
report and to support the
repositioning plan
areas. Both textbooks
are only sporadically
used and could be
applied much more
thoroughly. Whilst the
literature is used to
support arguments,
analysis and the
repositioning plan this is
overall insufficient.
material from them is
not fully understood.
There is a basic failure
to apply the literature to
support arguments,
analysis and the
repositioning plan.
report and the repositioning
plan is not understood in the
context of brand
management.
2 A balanced in-
depth analysis
(30% weighting)
An excellent analysis
and discussion of
branding and brand
theory. The report shows
an outstanding
understanding of key
concepts and issues.
Brand theory and
models are thoroughly
applied throughout the
report. Analysis shows
an excellent knowledge
of branding and brand
management and is
skillfully applied to the
support the repositioning
plan.
Good analysis and
discussion of branding
and brand theory. The
report shows an
understanding of key
concepts and issues.
Brand theory and
models are competently
applied throughout the
report. Analysis shows a
good knowledge of
branding and brand
management and is
applied to the support
the repositioning plan.
A competent analysis
and discussion of
branding and brand
theory. An
understanding of key
concepts and issues was
demonstrated. Brand
theory and models were
mostly but not
thoroughly applied in
the report. An adequate
level of analysis was
applied to the
repositioning plan
though this could have
been more thorough in
areas and theory and
models could have been
more effectively applied.
A partial degree of
competence was shown
in the analysis and
discussion of branding
and brand theory and the
understanding of key
concepts and issues.
Brand models and
analysis were partially
applied but this should
have been done more
thoroughly. Relevant
models were not always
used and were not
consistently applied.
There was a partial
failure to apply analysis
and models to the
repositioning plan.
A very limited
competence was
demonstrated in the
analysis and discussion
of branding and brand
theory and the
understanding of key
concepts and issues.
There was a failure to
apply brand models and
analysis to the report.
While models and
analysis were used this
was mostly ineffectively
done and showed a lack
of understanding of the
subject matter. There
was an overall failure to
apply analysis and
models to the
repositioning plan.
The report failed to show an
understanding of branding
and brand theory and was
completely lacking in
analysis and discussion. It did
not demonstrate an
understanding of key concept
and issues. Brand theory and
models were not applied to
the report or were applied but
not understood. There was no
attempt to apply brand
theory, models and analysis
to the brand repositioning
plan. The report was
fragmented, descriptive and
lacking in brand analysis.
3. Repositioning
brand plan
(30% weighting)
An outstanding and
highly professional
repositioning plan. It
clearly addresses the
problems with the brand
that were outlined in the
presentation. The plan is
thoroughly detailed and
well researched. It is
highly original, creative
and shows evidence of
hard work and thinking.
The plan is also very
convincing and relevant
A very good
repositioning plan that
uses examples and
contains some use of
reliable secondary
sources. The plan
addresses the majority of
the problems of the
brand that was outlined
in the presentation. It
demonstrates creativity
and shows evidence of
research and work. It is
convincing and relevant
A good repositioning
plan with some use of
reliable secondary
sources. The plan
addresses most but not
all of the problems of
the brand that were
outlined in the report
The plan is detailed and
researched in some areas
but not in all. It has
elements of creativity
and shows some
evidence of research and
A weak brand
repositioning plan. It has
some examples and
produces some, but
insufficient, evidence
from reliable secondary
sources. The plan fails to
address the majority of
the problems of the
brand that were outlined
in the proposal. It is
lacking in detail and
creativity and presents
only a very basic
An incomplete brand
repositioning plan that
fails to position the
brand. The plan is
lacking in work,
research and examples
and shows little
evidence of work. It fails
to thoroughly show how
the brand will be
repositioned. It fails to
demonstrate creativity or
original thinking. No
effective repositioning
The plan completely fails to
reposition the brand and
shows no understanding of
brand repositioning. Virtually
no research has taken place.
The plan is completely
wanting in the use of
secondary sources, examples
and evidence. No
repositioning takes place and
the paper is unconvincing.
None of the problems
outlined in the presentation
are addressed and the plan
Approved BBS Coursework Brief Template 2019/20 4 of 5
Br
un
el
B
us
in
es
s S
ch
oo
l to the brand’s social,
cultural and marketing
environment. It has
numerous examples with
plenty of evidence from
reliable secondary
sources.
to the brand’s marketing
environment
work. The plan is
partially convincing and
addresses several issues
that are relevant to the
brand’s marketing
environment.
repositioning plan. The
plan is not fully
convincing and fails to
fully relate to the
marketing environment
of the brand
takes place. The plan is
unconvincing and fails
to address issues in the
brand’s marketing
environment.
fails to address the brand’s
marketing environment.
4. Presentation
(Organisation,
writing, good use
of English,
Harvard
referencing)
(10% weighting)
The report had an
excellent structure and
was professionally
formatted. It had a clear
logical flow between the
sections, making it very
easy to follow the
arguments. The level of
grammar and spelling
was excellent. Correct
use of referencing at all
times.
The report had a very
good structure and was
appropriately formatted.
It had a fairly clear
logical flow between the
sections, making it quite
easy to follow the
arguments. The level of
grammar and spelling
was good. Correct use of
referencing most of the
time.
The report had a good
structure and was
appropriately formatted.
There were, however,
some limitations in the
logical flow between
sections, making parts of
the argument less easy
to follow and incoherent
in parts. The level of
grammar and spelling
was acceptable. Correct
use of referencing was
made most of the time.
The report had an
acceptable structure and
was competently
formatted to some
degree. There were
limitations in the logical
flow between the
sections, making several
parts of its argument less
easy to follow and
incoherent in parts. The
level of grammar and
spelling was
compromised.
Referencing was only
partially applied.
The report had a poor
structure and was
weakly formatted. There
were strong limitations
in the logical flow
between the sections,
making several parts of
argument less easy to
follow. The level of
grammar and spelling
was seriously
compromised.
Referencing was not
correctly used.
The report had a poor
structure and was
inappropriately presented.
There were serious flaws in
terms of its format and
logical flow between the
sections, making it very
difficult to follow the
arguments. The level of
grammar and spelling was
unacceptable. Referencing is
neglected.
Academic Misconduct, Plagiarism and Collusion
Any coursework or examined submission for assessment where
plagiarism, collusion or any form of cheating is suspected will
be dealt with according to the
University processes which are detailed in Senate Regulation 6.
You can access information about plagiarism here.
The University regulations on plagiarism apply to published as
well as unpublished work, collusion and the plagiarism of the
work of other students.
Please ensure that you fully understand what constitutes
plagiarism before you submit your work.
University’s Coursework Submission Policy
Please refer to the College’s Student Handbook for information
on submitting late, penalties applied and procedures.
College’s Coursework Submission Policy
Please refer to the College’s Student Handbook for information
relating to the College’s Coursework Submission Policy and
procedures.
* this can be found at the bottom of the page under the
‘Documents’ section *
http://www.brunel.ac.uk/about/administration/governance-and-
university-committees/senate-regulations
http://www.brunel.ac.uk/services/library/learning/plagiarism
https://intra.brunel.ac.uk/cbass/Pages/Handbook.aspx#/mu_Asse
ssment/mu_Courseworksubmissions
https://intra.brunel.ac.uk/cbass/Pages/Handbook.aspx#/mu_Asse
ssment/mu_Courseworksubmissions
Approved BBS Coursework Brief Template 2019/20 5 of 5
Br
un
el
B
us
in
es
s S
ch
oo
l
Extenuating Circumstances Policy
Please refer to the College’s Student Handbook for information
relating to extenuating circumstances and procedures.
https://intra.brunel.ac.uk/cbass/Pages/handbook.aspx#/mu_Asse
ssmentMG3601 Brand ManagementReport Coursework for
2019/20
Available online at www.sciencedirect.com
http://www.keaipublishing.com/en/journals/jfds/
ScienceDirect
The Journal of Finance and Data Science 1 (2015) 1e10
Big data based fraud risk management at Alibaba
Jidong Chen*, Ye Tao, Haoran Wang, Tao Chen
Alipay, Alibaba, China
Received 15 February 2015; revised 8 March 2015; accepted 20
March 2015
Available online 14 July 2015
Abstract
With development of mobile internet and finance, fraud risk
comes in all shapes and sizes. This paper is to introduce the
Fraud
Risk Management at Alibaba under big data. Alibaba has built a
fraud risk monitoring and management system based on real-
time
big data processing and intelligent risk models. It captures fraud
signals directly from huge amount data of user behaviors and
network, analyzes them in real-time using machine learning, and
accurately predicts the bad users and transactions. To extend the
fraud risk prevention ability to external customers, Alibaba also
built up a big data based fraud prevention product called Ant-
Buckler. AntBuckler aims to identify and prevent all flavors of
malicious behaviors with flexibility and intelligence for online
merchants and banks. By combining large amount data of
Alibaba and customers', AntBuckler uses the RAIN score engine
to
quantify risk levels of users or transactions for fraud
prevention. It also has a user-friendly visualization UI with risk
scores, top
reasons and fraud connections.
© 2015, China Science Publishing & Media Ltd. Production and
hosting by Elsevier on behalf of KeAi Communications Co. Ltd.
This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Fraud detection and prevention; Risk model;
Malicious behavior; Risk score; Big data analysis
1. Introduction
Big data is an all-encompassing term for any collection of data
sets which are large, complex and unstructured, so
that it becomes difficult to process using traditional data
processing applications. Big data “size” is dynamic and
constantly growing, as of 2012 ranging from a few dozen
terabytes to many petabytes of data by the time when the
article is written. It is also a set of techniques and technologies
that to analyze, capture, curate, manage and process
data within a tolerable elapsed time (Wikipedia).
Big data has many different purposes e fraud risk management,
web display advertising, call center optimization,
social media analysis, intelligent traffic management and among
other things. Most of these analytical solutions were
not possible previously because data technology were unable to
store such huge size of data or processing technologies
were not capable of handling large volume of workload or it
was too costly to implement the solution in a timely
manner.
* Corresponding author.
E-mail addresses: [email protected], [email protected] (J. Chen).
Peer review under responsibility of China Science Publishing &
Media Ltd.
http://dx.doi.org/10.1016/j.jfds.2015.03.001
2405-9188/© 2015, China Science Publishing & Media Ltd.
Production and hosting by Elsevier on behalf of KeAi
Communications Co. Ltd. This
is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
http://creativecommons.org/licenses/by-nc-nd/4.�0/
mailto:[email protected]
mailto:[email protected]
http://crossmark.crossref.org/dialog/?doi=10.1016/j.jfds.2015.0
3.001&domain=pdf
http://dx.doi.org/10.1016/j.jfds.2015.03.001
http://creativecommons.org/licenses/by-nc-nd/4.�0/
http://www.keaipublishing.com/en/journals/jfds/
www.sciencedirect.com/science/journal/24059188
http://dx.doi.org/10.1016/j.jfds.2015.03.001
http://dx.doi.org/10.1016/j.jfds.2015.03.001
Graph 1. Transaction volume increases at Alibaba.
2 J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
With business needs arose, Alibaba employed optimized system
and platform and developed advanced method-
ology and approach to handle 10 billion level daily volume. It
started from data platform of RAC in 2009, via GP
(Green Plum, an EMC product, see EMC2) and Hadoop (see
White7), and is using ODPS now. Data processing and
analyzing is also improved from T þ 1 mode1 to near real-time
mode.
By adapting big data techniques, Alibaba highlights advances
made in the area of fraud risk management. It invents
a real-time payment fraud prevention monitoring system, called
CTU (Counter Terrorist Unit). And CTU becomes one
of the most advanced online payment fraud management system
in China, which can track and analyze accounts' or
users' behavior, identify suspicious activities and can apply
different levels of treatments based on intelligent
arbitration.
Fraud risk models are one of the supportive layers of CTU2
(Counter Terrorist Centre). They use statistical and
engineering techniques to analyze the aggregated risk of an
intermediary (an account, a user or a device etc). Detailed
attributes are generated as inputs. Different algorithms are to
assess the correlations of these attributes and fraud
activities, and to separate good ones from bad ones. Validating
and tuning are to make sure models apply to different
scenarios. Big data at Alibaba produces thousands and
thousands of attributes, and fraud risk models are built to deal
with various of fraud activities.
Those big data based fraud models are widely used in almost
every procedure within Alibaba to monitor fraud, such
as account opening, identity verification, order placement,
before and after transaction, withdrawal of money, etc. To
build up a safe and clean payment environment, Alibaba decides
to expand this ability to external users. A user-
friendly product is built, called AntBuckler. AntBuckler is a
product to help merchants and banks to identify
cyber-crime risks and fraud activities. And a risk score (RAIN
Score) is generated based on big data analysis and given
to merchants and banks to tell the risk level.
In this paper, we show that Alibaba applies the big data
techniques and utilizes those techniques in fraud risk
management models and systems. We also present the
methodology and application of the big data based fraud
prevention product AntBuckler used by Alibaba.
The remainder of the paper is organized as follows. Section 2
introduces big data applications and basic computing
process at Alibaba. Section 3 explains fraud risk management at
Alibaba in details and fraud risk modeling. Section 4
provides an explanation of AntBuckler. We conclude in Section
5.
2. Big data applications at Alibaba
Alibaba grows fast in past 10 years. In 2005, daily transaction
volume was less than 10 thousands per day. It reached
to 188 million on Nov 11th, 2013 one day. Graph 1 illustrates
that the transaction volume at Alibaba changes from
2005 to 2013 on daily basis.
With business growing exponentially, data computing,
processing system and data storage are bound to change as
well. It started from data computing platform of RAC (Oracle
Real Application Clusters (see Oracle white paper1)) in
2009, via GP and Hadoop, and is using ODPS now. Data
processing and analyzing is also improved from T þ 1 mode
1 T þ N mode: T is time, when system runs. N is time interval.
T þ 1 means the system runs on the second day.
2
CTU: Alipay's internal risk control system, which is fully
developed and designed by Alibaba. This name is inspired by
American TV series
<<24>>.
Graph 2. Big data computing progress at Alibaba.
3J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
to real-time mode, especially in risk prevention at Alibaba,
fraud check on each transaction can be controlled within
100 ms (millisecond). Moreover, data sources are extended from
single unit data to a combination of internal group
data and external bureau data. Graph 2 illustrates that the big
data computing process at Alibaba progress extensively
since 2009. Alibaba has data not only from Taobao, Tmall and
Alipay, but also from partners like Gaode Maps and
others. Data from various sources builds up an integrated data
platform, the platform from business scenarios extends
largely as well. Marketing uses data analysis to target users
accurately and to provide customers service personally.
Merchants and financial companies need professional data
classification to filter out valuable customers. Intelligent
customer service can effectively and efficiently solve users'
requests and complaints using comprehensive data
platform. And the online payment services and systems,
Alibaba, among leaders of online payment service providers,
builds up a fraud risk management platform to ensure both
buyers and sellers with fast and safe transactions. Alibaba
deals with big data extensively on credit score and insurance
prices as well as other types of business.
3. Fraud risk management at Alibaba
3.1. Framework for fraud risks
Fraud risk management at Alibaba is totally different from that
of traditional financial and banking system now due
to big data. To deal with real-time frauds, new engineering
approaches are gradually developed to handle such quantity
of data. On top of hardware system, risk prevention framework
is also built up to support new methodology and
algorithm. There are a few different kinds of risk prevention
frameworks.
One fundamental framework of fraud risk that Alibaba uses is
called multi-layer risk prevention framework. Graph
3 illustrates the multi-layer risk prevention framework Alibaba
uses in Alipay System. There are total five layers in
this system.
At Alibaba, there are 5 layers to prevent fraud for a transaction.
The five layers are (1) Account Check, (2) Device
Check, (3) Activity Check, (4) Risk Strategy and (5) Manual
Review. One fraudster can pass first layer on account
check, and then there are still four layers ahead to block the
fraudster. When a transaction is initiated, the first layer is
Graph 3. Multi-layer risk prevention framework.
4 J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
Account Check, which includes buyer account information and
seller account information. Several checks on the first
layer Account Check are designed as questions: does the buyer
or seller account have bad/suspicious activity before?
Is there any possibility the buyer account stolen etc? Extremely
suspicious transactions may be declined to protect
genuine buyers, or extra authentic methods may be trigged to
double confirmation in this situation. The second layer is
Device Check, which includes the IP address check and
operation check on the same device. Similarly, checks on the
second layer Device Check are designed from passing several
questions: whether there are huge quantify of trans-
actions from the same device? Any transaction is from bad
devices? The third layer is Activity Check, called as
Behavior Check as well, which checks historical records, buyer
and seller behavior pattern, linking among accounts,
devices and scenarios. Checks on the third layer Activity Check
are designed as questions as well: whether the buyer
or seller account link to an identified bad account? The fourth
layer is Risk Strategy, which makes final judgment and
takes appropriate action. Checks on the fourth layer Risk
Strategy are designed to aggregate all results from previous
checks according to severity levels. Some transactions are sent
to auto-decision due to obvious fraud activities. Some
grey cases are sent to Manual Review. On one hand, Alipay
would like to provide better services and experiences for
both parties. On the other hand, Alipay does not want to
misjudge any case. Without strong evidence, suspicious cases
will be manually reviewed in the last layer Manual Review,
where more evidences are revealed and some phone calls
may be made to verify or remind or check with buyers or
sellers.
Another key difference between fraud risk management at
Alibaba and “that” of traditional financial and banking
system is the risky party. Customers are evaluated to be the
main risky party in banking system. At Alibaba, there are 3
layers of risky party. The three layers are (1) Customer level,
(2) Account level and (3) Scenario level. See Graph 4.
Risk fraud prevention at Alibaba is for both customers whether
they are buyers or sellers or not, for both accounts
whether those accounts are prestigious for big company or a
single individual or not, for both scenarios whether those
activities happen during account opening or money withdrawal.
3.2. CTU e fraud prevention monitoring system
CTU is a real-time payment fraud prevention monitoring
system, which can track and analyze accounts' or users'
behavior, identify suspicious activities and apply different level
of treatments based on intelligent arbitration. The first
Graph 4. Multi-layer risk prevention framework.
5J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
version launched on 1st Aug, 2005. This system is
independently developed by Alipay's risk control team. At that
time, it focused more on large transaction investigation,
suspicious refund, etc. Now it extends to money laundry,
marketing fraud, accounts, and card stolen/loss as well as cash
monetization. Additionally, it is a 24 h monitoring
system, which provides throughout protection at any time.
When an event happens, it passes through CTU for judgment.
An event is defined to be that a user logins, changes
profiles, initiates transactions, withdraws money from Alibaba
to other bank accounts and others. There are hundreds
of kinds of events. A suspicious event triggers models and rules
behind the CTU for real-time computing, and within
100 ms, CTU returns the result with risk decision. If this is a
low risk from CTU return, the event is passed to continue
its operation. If this is a high risk, the CTU will direct a stop or
a further challenge step to continue the process. Graph 5
illustrates the CTU operating process.
3.3. Fraud risk modeling
The data that supports CTU judgment is from historical cases,
user behaviors, linking relationship and so on. Risk
models are built to analyze fraudsters' cheating patterns,
relations among fraudsters, different behaviors between a
group of good users and a group of bad ones.
There are a few factors to consider during building risk models.
Bias and Variance are usually concerned together to
balance the effectiveness and impact of a risk model. Bias is a
factor to measure how a model fits for the risk, how to
Graph 5. CTU-risk prevention system at Alibaba.
Graph 6. Three dimension of RAIN score.
6 J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
find the risk of account or transaction accurately. Variance is to
measure whether a model is stable or not, whether it
can sustain a relative longer lifecycle in business. Negative
positive rate, also called wrong cover rate, is to measure
how the accuracy a model is. High negative positive rate will
bring company huge business pressure and bad user
experience. Moreover, interpretability is necessary to explain to
users the reason that a model gives such risk level to
his account or transaction. In big data age, except for factors
mentioned above, data scientists keep fighting for data
deficiency, data sparsity and data skewness.
Model building process is also relatively mature at Alibaba after
repeated deliberation. White and black samples
are chosen first. White samples are good risk parties. Black
samples are usually risky parties judged as bad. A good
model can differentiate white and black samples to the most
degree. Behavior data and activity data are collected for
both samples to generate original variables from abstracting
aggregated variables. Through testing, some variables are
validated effectively. They can be finally used in model
building. From our modeling experience by using Alibaba big
data, decision tree C5.0 and Random Forest have better
performance to balance between Bias and Variance. One
obvious reason is that they do not assume data distribution since
they are algorithmic models rather than data models.
When a model is able to better separate good and bad ones
among samples, the model is basically adapted to process.
However, to make sure it applicable to different scenario,
validation is also important. A model can be launched if it
works effectively and efficiently on testing and validating data.
Then, the fraud risk prevention models are needed to
be deployed in the production environment, and are used in
CTU combining with other strategies and rules.
3.4. RAIN score, a risk model
RAIN is one kind of risk models. RAIN stands for Risk of
Activity, Identity and Network. Basically, the risk of an
object (a user, an account or even a card) is composited of three
dimensions of variables, activity, identity and network.
Graph 6 illustrates the three dimensions of RAIN score.
Hundreds of variables are first selected to interpret status and
behavior of an object. Based on testing, verifying and validating
from fraud risk models, variables are selected and
kept. A RAIN score is generated based on different weight of
variables within these three dimensions. Variables and
weight of variables may differ according to different risk
scenarios. For example, for a card stolen scenario, more
Identity variables may be selected and with higher weight.
While for a credit speculation scenario, more Network
variables may be selected and are given higher rate. Weights of
variables are trained by different machine learning
algorithms, such as logistic regression.
3.5. An example of network-based analysis in fraud risk
detection
Graph theory (Network-based Analysis), an applied
mathematical subject is commonly applied on social network
analysis (see Wasserman6). Facebook, Twitter apply the Graph
theory on their social network analysis. Network-based
Graph 7. Network of accounts and information.
7J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
analysis plays a new role in the risk control. Fraudsters
nowadays are mischievous. They know that online risk models
are constantly checking whether fraud accounts are from same
name, address, phone and credit card, etc. Hence, they
try new ways to hide the connections. Therefore, network based
analysis is introduced to reveal the connection in this
area. For example, if each account is considered as a node,
network-based analysis is to locate edges among different
nodes if they are owned by a physical person. If there are
reasonable ways to define the edges among different nodes,
some interesting groups can be disclosed.
In Graph 7, the red nodes represent accounts and green nodes
are detailed profile information for those accounts,
such as enabled IPs, phone numbers, name, address, etc. If an
account (red node) has detailed profile information
(green node), network analysis draws a line between this red
and green node to show the relationship and the line is an
edge. Graph 7 illustrates the network analysis that both groups
have their own enabled IPs. However some accounts in
two groups shared same bind phone numbers. This exposes the
connections between two groups. Another example as
below.
Graph 8. Betweenness detection.
8 J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
Graph 8 tells us another story. One account shares the same
register IP and register device footprint with the left
group. It also shares the same name and info number with the
right group. This is a strong evidence to prove the
connections between two groups of accounts.
Two examples above are just a simple case. In the real world,
connections are extremely complicated. We have to
use paralleled graph algorithms and special graph storage to
handle the huge network connection graph. The
betweenness nodes (concepts from network-based analysis, see
Freeman5) play important roles in finding connections
of different accounts, where betweenness nodes are the
betweenness centralities used in the network analysis.
Connections now is widely used to judge relationship of
accounts, this effectively prevent fraudsters building up their
own networks.
4. AntBuckler e a big data based fraud prevention product
To build up a safe and clean pay0ment environment, Alibaba
decides to expand its risk prevention ability to
external users. A big data based fraud management product is
built and called AntBuckler. This product is fully
developed by Alipay.
AntBuckler is a product to help merchants and banks to identify
cyber-crime risks and fraud activities. We find that
merchants generally deal with similar fraud patterns. One
example is marketing program fraud. Merchants often give
cash reward or voucher certificate to new users to expand their
user base. Fraudsters often take this opportunity to
create hundreds of different accounts. To merchants, the
marketing resource is not given to correct user base. To good
users, they cannot benefit the cash reward or voucher
certificate. Fraudsters may also sell their accounts with coupon
in
higher price. This not only damages the merchant's brand image
and reputation, but also confuses the market and
potential customers.
Antbuckler uses the RAIN model engine and generates a risk
score (RAIN Score) to quantify the risk level. The
score ranges from 0 to 100. The higher, the riskier. It also has
user-friendly visualization. Top reasons are shown on top
with a higher weight and brighter colors. Connection, through
account, email, phone, card and so on, are presented
using network based view. See Fig. 1. Fig. 1 is the main
interface of one risky account. The interface gives detailed
Fig. 1. User-friendly visualization of AntBuckler.
Fig. 2. Operation dashboard of AntBuckler.
9J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
10 J. Chen et al. / The Journal of Finance and Data Science 1
(2015) 1e10
account information, such as name, login email and registered
time. RAIN score is shown together with a colorful bar.
Green means safer and red means riskier. The operation
dashboard tells how many accounts are judged by AntBuckler,
how many accounts are identified with risk, where risky
accounts are distributed, etc. See Fig. 2. Fig. 2 is an example
of operation dashboard.
5. Conclusion
Big data based fraud risk management is a new trend in payment
service business. It leads to a new generation of
fraud monitoring and fraud risk management, which is based on
big data processing and computing technology, real-
time fraud prevention system and risk models. Alibaba has
successfully used big data based fraud risk management to
deal with daily fraud events. In this paper, we outline the fraud
risk management at Alibaba and a big data based fraud
prevention product. We would like to extend the analysis to
build a safer and cleaner payment environment.
References
1. An Oracle White Paper. Oracle Real Application Clusters
(RAC); 2013.
http://www.oracle.com/technetwork/products/clustering/rac-wp-
12c-
1896129.pdf.
2. EMC Inc. Greenplum Database: Critical Mass Innovation,
Architecture White Paper; 2010.
https://www.emc.com/collateral/hardware/white-
papers/h8072-greenplum-database-wp.pdf.
5. Freeman LC. Centrality in social networks I: conceptual
clarification. Soc Netw. 1979;1:215e239.
6. Wasserman Stanley, Faust Katherine. Social Network
Analysis: Methods and Applications (Structural Analysis in the
Social Sciences).
Combridge Unviversity Press; 1994.
7. White Tom. Hadoop: the Definitive Guide. O'Reilly Press;
2012.
http://www.oracle.com/technetwork/products/clustering/rac-wp-
12c-1896129.pdf
http://www.oracle.com/technetwork/products/clustering/rac-wp-
12c-1896129.pdf
https://www.emc.com/collateral/hardware/white-papers/h8072-
greenplum-database-wp.pdf
https://www.emc.com/collateral/hardware/white-papers/h8072-
greenplum-database-wp.pdfBig data based fraud risk
management at Alibaba1. Introduction2. Big data applications at
Alibaba3. Fraud risk management at Alibaba3.1. Framework for
fraud risks3.2. CTU – fraud prevention monitoring system3.3.
Fraud risk modeling3.4. RAIN score, a risk model3.5. An
example of network-based analysis in fraud risk detection4.
AntBuckler – a big data based fraud prevention product5.
ConclusionReferences
1
Slide by Ali, Mert and Kajal
Ali: Reads slide.
Mustafa: Four problems have been identified to provide reasons
as to why New Look
are facing difficulties. These are poor positioning and targeting,
lack of emotional
connection, are providing no symbolic benefits and a lack of
presence on social
media.
2
Slide by Kajal
Kajal: Reads slide.
Kajal: As a result of New Looks lack of unique selling point,
they are not effectively
positioned. New Look no longer offer functional benefits which
is the benefit based
on a products attribute that provides functional utility to the
consumer, and therefore
are not differentiated from their competitors. Resulting in a lack
of attraction from
consumers that could increase sales.
3
Slide by Kajal
Kajal: Reads slide.
Kajal: New Look repositioned from targeting consumers in their
30s to young and
edgy consumers, however their long manufacturing supply chain
taking 3 months for
clothing from China and Indonesia to reach UK stores
contributed to their failure.
New Look were regurgitating similar and basic styles, not
meeting the trends in
society, and were targeting the wrong market.
4
Slide by Karishma
Karishma: Reads slide.
Karishma: People become emotionally connected to brands for
these reasoning's,
which is how an emotional connection is built, as a result
leading to brand loyalty. As
New Look do not interact with their consumers through forming
emotional
relationships, this has led to a decrease in their brand loyalty.
5
Slide by Karishma
Karishma: Reads Slide.
Karishma: Holistic choice means that consumers are unable to
separate individual
functional attributes as to why they prefer this product over
another. For example in
New Look’s case, a customer would rather own a pair of jeans
from Topshop rather
than New Look but when asked why specifically, there are not
specific attributes to
answer as to why.
Karishma: New Look’s involvement in this model shows that
their products do not
have symbolic meanings to their consumers. When consumers
shop there, it does not
give a sense of holistic, self-focused emotional connection with
the brand or the
products.
6
Slide by Karishma
Karishma: Reads Slide.
Karishma: Explaining on New Look’s link with social esteem,
New Look neither have
social integration nor social differentiation. As there is no brand
loyalty, consumers
switch easily from New Look and don’t attain new consumers
leading to a lack of
social integration. New Look does not have diversification in
terms of social
differentiation i.e. mainly women between 16 - 55 shop there
which is their main
audience.
7
Slide by Kajal
Kajal: Reads Slide.
Kajal: The symbolic consumption of brands in the fashion
industry can help to
establish and communicate some of the fundamental cultural
categories such as
social status by the brand image and price linked to the piece of
clothing, and gender
by the styles and colours of clothing consumers choose. Brands
are also validated
through discursive elaboration in a social context whereby they
are authenticated by
the social group. For example, this may be done by a group of
individuals discussing
and arguing about that their clothing preferences and collections
released by brands.
8
Slide by Kajal
Kajal: Reads Slide.
Kajal: New Look are no longer keeping up with and are failing
to offer the latest
trends in fashion, and as a result are losing the interests and are
not meeting the
needs of their target market of young consumers who want to
express their identity
through trendy and fashionable clothes. New Look provide a
lack of meaning and
symbolic benefits through their advertising and clothing to
consumers, who as a
result don’t want to purchase and wear basic and outdated
clothing for their self-
identity, nor does it provide dividends such as social status and
self-esteem as part of
their group or social identity, both considered highly important
for young consumers.
9
Slide by Kajal and Karishma
Kajal: Reads Slide.
Kajal: In relation to New Look, successful engagement in brand
communities and co-
creation strengthens the relationship between consumers and the
brand, which is
usually beyond the value envisioned by the brand itself. This is
crucial for attracting
and retaining consumers and for increasing brand attachment
and loyalty.
10
Slide by Kajal and Karishma
Kajal: Reads slide. Explain the images.. (by looking at the
following images New Look
has far less followers than Primark which was founded in 1969
and Topshop which
was founded in 1964. They were all founded near to each other,
therefore New Look
should have similar numbers however they do not due to their
failures. ASOS,
founded in 2000 and Boohoo founded in 2006 are online fashion
retailers, are doing
far better than New Look although they are not as established
long term and don’t
have any stores. They are direct in their target market, meeting
their needs with
trendy fast fashion and are affordable. They are both secure and
have a dominant
position in the market clearly identified by their strong brand
communities).
Kajal: New Look repositioned and attempted to target young
consumers, however
their lack of an online presence and following indicates weak
brand reputation and
identity. In addition, this also shows that New Look have
decreased brand
attachment, awareness and don’t have strong brand communities
who adore the
brand and want to wear and share it with others.
PTO ->
11
Kajal: When compared to competitors such as Primark,
Topshop, ASOS and Boohoo
their following on social media indicates that consumers want to
have a relationship
and interact with the brand on a daily basis to be aware of all
their activities. This
therefore represents strong brand communities which New Look
lack, hence
contributing to their failure.
11
Slide by Kajal and Karishma
Karishma: Reads Slide.
12
Karishma: This is now the end of our presentation, thank you all
for listening and we
are more than happy to take on any questions that you may
have.
13
14
15
Approved BBS Coursework Brief Template 201920 1 of 5 .docx

More Related Content

Similar to Approved BBS Coursework Brief Template 201920 1 of 5 .docx

Proj 587 Success Begins / snaptutorial.com
Proj 587  Success Begins / snaptutorial.comProj 587  Success Begins / snaptutorial.com
Proj 587 Success Begins / snaptutorial.comWilliamsTaylor95
 
Proj 587 Massive Success / snaptutorial.com
Proj 587 Massive Success / snaptutorial.comProj 587 Massive Success / snaptutorial.com
Proj 587 Massive Success / snaptutorial.comReynolds30
 
Proj 587 Enhance teaching / snaptutorial.com
Proj 587 Enhance teaching / snaptutorial.comProj 587 Enhance teaching / snaptutorial.com
Proj 587 Enhance teaching / snaptutorial.comDavis134a
 
Due Jan 24 15In Phase 2, your team will work together to dev.docx
Due Jan 24 15In Phase 2, your team will work together to dev.docxDue Jan 24 15In Phase 2, your team will work together to dev.docx
Due Jan 24 15In Phase 2, your team will work together to dev.docxshandicollingwood
 
Proj 587 Education Organization / snaptutorial.com
Proj 587 Education Organization / snaptutorial.comProj 587 Education Organization / snaptutorial.com
Proj 587 Education Organization / snaptutorial.comBaileya108
 
Assignment 2 (research report) (1)
Assignment 2 (research report) (1)Assignment 2 (research report) (1)
Assignment 2 (research report) (1)Leon Lim
 
MNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docx
MNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docxMNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docx
MNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docxraju957290
 
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docx
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docxBUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docx
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docxfelicidaddinwoodie
 
Assessment taskStudents are required to write an academic report a.docx
Assessment taskStudents are required to write an academic report a.docxAssessment taskStudents are required to write an academic report a.docx
Assessment taskStudents are required to write an academic report a.docxlauricesatu
 
BUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docx
BUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docxBUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docx
BUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docxhumphrieskalyn
 
Assignment 2 (research report)
Assignment 2 (research report)Assignment 2 (research report)
Assignment 2 (research report)Weng Chuan
 
ENG Assignment 2 (research report)
ENG Assignment 2 (research report)ENG Assignment 2 (research report)
ENG Assignment 2 (research report)Madeline Liew
 
Eng II FNBE 0115 Essay Brief
Eng II FNBE 0115 Essay BriefEng II FNBE 0115 Essay Brief
Eng II FNBE 0115 Essay BriefTamZhaoWei
 
Assignment 2-research-report
Assignment 2-research-reportAssignment 2-research-report
Assignment 2-research-reportZheng Chee Cham
 
Assignment 2 (research report)(1)
Assignment 2 (research report)(1)Assignment 2 (research report)(1)
Assignment 2 (research report)(1)Louise Foong
 
Research Report Brief
Research Report BriefResearch Report Brief
Research Report BriefTamZhaoWei
 
Assignment 2 (research report)
Assignment 2 (research report)Assignment 2 (research report)
Assignment 2 (research report)Cherilyn Chia
 
English 2 Assignment 2 Brief
English 2 Assignment 2 BriefEnglish 2 Assignment 2 Brief
English 2 Assignment 2 BriefNatalie Yunxian
 
ENG Assignment 2 (research report)
ENG Assignment 2 (research report)ENG Assignment 2 (research report)
ENG Assignment 2 (research report)Cherilyn Chia
 
ENG II - Assignment 2 (research report)
ENG II - Assignment 2 (research report)ENG II - Assignment 2 (research report)
ENG II - Assignment 2 (research report)christinelee1996
 

Similar to Approved BBS Coursework Brief Template 201920 1 of 5 .docx (20)

Proj 587 Success Begins / snaptutorial.com
Proj 587  Success Begins / snaptutorial.comProj 587  Success Begins / snaptutorial.com
Proj 587 Success Begins / snaptutorial.com
 
Proj 587 Massive Success / snaptutorial.com
Proj 587 Massive Success / snaptutorial.comProj 587 Massive Success / snaptutorial.com
Proj 587 Massive Success / snaptutorial.com
 
Proj 587 Enhance teaching / snaptutorial.com
Proj 587 Enhance teaching / snaptutorial.comProj 587 Enhance teaching / snaptutorial.com
Proj 587 Enhance teaching / snaptutorial.com
 
Due Jan 24 15In Phase 2, your team will work together to dev.docx
Due Jan 24 15In Phase 2, your team will work together to dev.docxDue Jan 24 15In Phase 2, your team will work together to dev.docx
Due Jan 24 15In Phase 2, your team will work together to dev.docx
 
Proj 587 Education Organization / snaptutorial.com
Proj 587 Education Organization / snaptutorial.comProj 587 Education Organization / snaptutorial.com
Proj 587 Education Organization / snaptutorial.com
 
Assignment 2 (research report) (1)
Assignment 2 (research report) (1)Assignment 2 (research report) (1)
Assignment 2 (research report) (1)
 
MNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docx
MNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docxMNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docx
MNG81001 2017 Session 3 MARKING RUBRIC ASSESSMENT 4MNG81001 M.docx
 
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docx
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docxBUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docx
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docx
 
Assessment taskStudents are required to write an academic report a.docx
Assessment taskStudents are required to write an academic report a.docxAssessment taskStudents are required to write an academic report a.docx
Assessment taskStudents are required to write an academic report a.docx
 
BUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docx
BUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docxBUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docx
BUSM 4194 Leading for ChangeSemester 1, 2014Assessment Tas.docx
 
Assignment 2 (research report)
Assignment 2 (research report)Assignment 2 (research report)
Assignment 2 (research report)
 
ENG Assignment 2 (research report)
ENG Assignment 2 (research report)ENG Assignment 2 (research report)
ENG Assignment 2 (research report)
 
Eng II FNBE 0115 Essay Brief
Eng II FNBE 0115 Essay BriefEng II FNBE 0115 Essay Brief
Eng II FNBE 0115 Essay Brief
 
Assignment 2-research-report
Assignment 2-research-reportAssignment 2-research-report
Assignment 2-research-report
 
Assignment 2 (research report)(1)
Assignment 2 (research report)(1)Assignment 2 (research report)(1)
Assignment 2 (research report)(1)
 
Research Report Brief
Research Report BriefResearch Report Brief
Research Report Brief
 
Assignment 2 (research report)
Assignment 2 (research report)Assignment 2 (research report)
Assignment 2 (research report)
 
English 2 Assignment 2 Brief
English 2 Assignment 2 BriefEnglish 2 Assignment 2 Brief
English 2 Assignment 2 Brief
 
ENG Assignment 2 (research report)
ENG Assignment 2 (research report)ENG Assignment 2 (research report)
ENG Assignment 2 (research report)
 
ENG II - Assignment 2 (research report)
ENG II - Assignment 2 (research report)ENG II - Assignment 2 (research report)
ENG II - Assignment 2 (research report)
 

More from festockton

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxfestockton
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxfestockton
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxfestockton
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxfestockton
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxfestockton
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxfestockton
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxfestockton
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxfestockton
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxfestockton
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxfestockton
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxfestockton
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxfestockton
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxfestockton
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docxfestockton
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxfestockton
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxfestockton
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxfestockton
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxfestockton
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxfestockton
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxfestockton
 

More from festockton (20)

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docx
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docx
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docx
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docx
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docx
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docx
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docx
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docx
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docx
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docx
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docx
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docx
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

Approved BBS Coursework Brief Template 201920 1 of 5 .docx

  • 1. Approved BBS Coursework Brief Template 2019/20 1 of 5 Br un el B us in es s S ch oo l Assessment Title: Brand Management Report Module Leader: Dr Michael Heller Submission Deadline: 12:00 noon on 20/04/2020 Feedback by : 20/05/20120 (20 working days from the deadline)
  • 2. Contribution to overall module assessment: 70% Indicative student time working on assessment: 60 Hours Word or Page Limit (if applicable): 2500 Words Assessment Type (individual or group): Individual Report Main Objective of the assessment • To demonstrate an understanding of branding and brand management • To show an understanding of the material that was taught in the module and in the indicative reading and literature • To demonstrate an ability to understand and apply brand theory and brand models • To show both creativity and systematic understanding and planning in relation to a brand repositioning campaign • To write a professional report that repositions a brand which is able to synthesise contemporary brand management practice and theory Description of the Assessment In an individual report of 2,500 words (Times New Roman/Calibri 12 font, using 1.5 line spacing), based on the analysis undertaken by your group in Coursework 1, prepare a brand plan (in report form) for the next two years, aimed at overcoming the current difficulties and improving upon the brand’s market position. The report should be written as if it were to be presented to the Board. It must therefore be convincing, comprehensive, practical and sustainable. It should
  • 3. fully utilise teaching given in class and contain relevant theory, models and literature found in both core text books. At least three models taught in class should be utilised. The report should also contain academic reading (articles and books). In addition to the two core text books used in class, it should contain references to at least five other academic sources. The report should open with a brief overview of the problems which the brand faces, which were given in the presentation. It should then contain a section which proposes changes to the brand (the repositioning strategy). Benefits, identity, use, user, MG3601 Brand Management Report Coursework for 2019/20 Approved BBS Coursework Brief Template 2019/20 2 of 5 Br un el B us in es s S
  • 4. ch oo l packaging, communication, price and other elements of the marketing mix should be covered. Following this there should be a section which deals with the implementation of the plan. Finally, there should be a brief auditing plan to ensure that the brand maintains its recovery. Marking Scheme, Submission Instructions and Grading Scheme Please enter here the marking scheme relevant for the coursework and provide an illustration of each assessment criterion achieved at each of the grade descriptor for UG/PG levels. UG grades and grade point bands [Senate Regulation 2 (2009 starters onwards)] are: A++ (17), A+ (16), A (15), A- (14), B+ (13), B (12), B- (11), C+ (10), C (9), C- (8), D+ (7), D (6), D- (5), E+ (4), E (3), E- (2), F (1) Submission Instructions Coursework must be submitted electronically via the University’s Blackboard Learn system. The required file format for this report is Times New Roman/Calibri 12 font, using 1.5 line spacing. Your student ID number must be used as the file name (e.g. 0123456.docx). You must ensure that you upload your file in the correct format and use the College’s electronic coursework coversheet. Please note that submissions of ‘.Pages’ documents will not be accepted – they should be converted to approved format.
  • 5. The electronic coursework coversheet must be completed and included at the beginning of all coursework submissions prior to submitting on Blackboard Learn. Electronic coversheets are available on Blackboard Learn within the Taught Programmes Office folder. An example under development (for MG5547 Marketing Communications) 5 marking criteria all equally weighted Criteria Grade descriptors A. B. C. D. E. F. 1. Understanding of the topic and reviewing relevant literature (30% weighting)
  • 6. The report provided a sophisticated, critical and thorough discussion of the relevant literature, with key references being applied throughout. Research is rigorous and there is an excellent application of academic literature. The report provided a well-developed, critical and comprehensive understanding of the relevant literature and was well referenced. There was a clear demonstration of reading and application of brand literature. Five The report demonstrated some understanding of the relevant literature. Not all five academic references are relevant. There is some evidence of reading and some application of the literature to the report. Both textbooks books Whilst reading and literature is evident, it is partial and insufficient
  • 7. in areas. The report does not use five relevant academic sources. The literature is not consistently applied in the report and is found lacking in several key There is a lack of reading and literature in the report. The five stipulated academic sources have not been used. There is an overall failure to fully apply the literature to the report. Both textbooks are not competently used and The report shows little evidence of any relevant academic reading. It does not have or use five academic sources. The literature is not applied to the report or understood. There is a failure to apply the textbooks to the report. The literature is basically not used in the https://blackboard.brunel.ac.uk/ https://intra.brunel.ac.uk/cbass/Handbook%20Documents/Assess ment%20and%20Award/Coursework%20submissions/CBASS%2 0Coursework%20Submission%20Coversheet.docx https://intra.brunel.ac.uk/cbass/Handbook%20Documents/Assess ment%20and%20Award/Coursework%20submissions/CBASS%2
  • 8. 0Coursework%20Submission%20Coversheet.docx Approved BBS Coursework Brief Template 2019/20 3 of 5 Br un el B us in es s S ch oo l More than five academic sources were used and thoroughly applied and both core text books were used consistently throughout the report. The report skillfully applies the literature to support its argument and repositioning plan. relevant academic sources are used and applied in the report.
  • 9. Both textbooks are applied throughout the report. Literature is mostly applied to reinforce arguments and analysis in the report and to support the repositioning plan. are used but not thoroughly. The literature is used to support some arguments and analysis in the report and to support the repositioning plan areas. Both textbooks are only sporadically used and could be applied much more thoroughly. Whilst the literature is used to support arguments, analysis and the repositioning plan this is overall insufficient. material from them is not fully understood. There is a basic failure to apply the literature to support arguments, analysis and the repositioning plan.
  • 10. report and the repositioning plan is not understood in the context of brand management. 2 A balanced in- depth analysis (30% weighting) An excellent analysis and discussion of branding and brand theory. The report shows an outstanding understanding of key concepts and issues. Brand theory and models are thoroughly applied throughout the report. Analysis shows an excellent knowledge of branding and brand management and is skillfully applied to the support the repositioning plan. Good analysis and discussion of branding and brand theory. The report shows an understanding of key concepts and issues. Brand theory and models are competently
  • 11. applied throughout the report. Analysis shows a good knowledge of branding and brand management and is applied to the support the repositioning plan. A competent analysis and discussion of branding and brand theory. An understanding of key concepts and issues was demonstrated. Brand theory and models were mostly but not thoroughly applied in the report. An adequate level of analysis was applied to the repositioning plan though this could have been more thorough in areas and theory and models could have been more effectively applied. A partial degree of competence was shown in the analysis and discussion of branding and brand theory and the understanding of key concepts and issues. Brand models and
  • 12. analysis were partially applied but this should have been done more thoroughly. Relevant models were not always used and were not consistently applied. There was a partial failure to apply analysis and models to the repositioning plan. A very limited competence was demonstrated in the analysis and discussion of branding and brand theory and the understanding of key concepts and issues. There was a failure to apply brand models and analysis to the report. While models and analysis were used this was mostly ineffectively done and showed a lack of understanding of the subject matter. There was an overall failure to apply analysis and models to the repositioning plan. The report failed to show an understanding of branding
  • 13. and brand theory and was completely lacking in analysis and discussion. It did not demonstrate an understanding of key concept and issues. Brand theory and models were not applied to the report or were applied but not understood. There was no attempt to apply brand theory, models and analysis to the brand repositioning plan. The report was fragmented, descriptive and lacking in brand analysis. 3. Repositioning brand plan (30% weighting) An outstanding and highly professional repositioning plan. It clearly addresses the problems with the brand that were outlined in the presentation. The plan is thoroughly detailed and well researched. It is highly original, creative and shows evidence of hard work and thinking. The plan is also very convincing and relevant
  • 14. A very good repositioning plan that uses examples and contains some use of reliable secondary sources. The plan addresses the majority of the problems of the brand that was outlined in the presentation. It demonstrates creativity and shows evidence of research and work. It is convincing and relevant A good repositioning plan with some use of reliable secondary sources. The plan addresses most but not all of the problems of the brand that were outlined in the report The plan is detailed and researched in some areas but not in all. It has elements of creativity and shows some evidence of research and A weak brand repositioning plan. It has some examples and produces some, but insufficient, evidence from reliable secondary
  • 15. sources. The plan fails to address the majority of the problems of the brand that were outlined in the proposal. It is lacking in detail and creativity and presents only a very basic An incomplete brand repositioning plan that fails to position the brand. The plan is lacking in work, research and examples and shows little evidence of work. It fails to thoroughly show how the brand will be repositioned. It fails to demonstrate creativity or original thinking. No effective repositioning The plan completely fails to reposition the brand and shows no understanding of brand repositioning. Virtually no research has taken place. The plan is completely wanting in the use of secondary sources, examples and evidence. No repositioning takes place and the paper is unconvincing. None of the problems
  • 16. outlined in the presentation are addressed and the plan Approved BBS Coursework Brief Template 2019/20 4 of 5 Br un el B us in es s S ch oo l to the brand’s social, cultural and marketing environment. It has numerous examples with plenty of evidence from reliable secondary sources. to the brand’s marketing environment work. The plan is
  • 17. partially convincing and addresses several issues that are relevant to the brand’s marketing environment. repositioning plan. The plan is not fully convincing and fails to fully relate to the marketing environment of the brand takes place. The plan is unconvincing and fails to address issues in the brand’s marketing environment. fails to address the brand’s marketing environment. 4. Presentation (Organisation, writing, good use of English, Harvard referencing) (10% weighting) The report had an excellent structure and was professionally formatted. It had a clear logical flow between the
  • 18. sections, making it very easy to follow the arguments. The level of grammar and spelling was excellent. Correct use of referencing at all times. The report had a very good structure and was appropriately formatted. It had a fairly clear logical flow between the sections, making it quite easy to follow the arguments. The level of grammar and spelling was good. Correct use of referencing most of the time. The report had a good structure and was appropriately formatted. There were, however, some limitations in the logical flow between sections, making parts of the argument less easy to follow and incoherent in parts. The level of grammar and spelling was acceptable. Correct use of referencing was made most of the time.
  • 19. The report had an acceptable structure and was competently formatted to some degree. There were limitations in the logical flow between the sections, making several parts of its argument less easy to follow and incoherent in parts. The level of grammar and spelling was compromised. Referencing was only partially applied. The report had a poor structure and was weakly formatted. There were strong limitations in the logical flow between the sections, making several parts of argument less easy to follow. The level of grammar and spelling was seriously compromised. Referencing was not correctly used. The report had a poor structure and was inappropriately presented. There were serious flaws in
  • 20. terms of its format and logical flow between the sections, making it very difficult to follow the arguments. The level of grammar and spelling was unacceptable. Referencing is neglected. Academic Misconduct, Plagiarism and Collusion Any coursework or examined submission for assessment where plagiarism, collusion or any form of cheating is suspected will be dealt with according to the University processes which are detailed in Senate Regulation 6. You can access information about plagiarism here. The University regulations on plagiarism apply to published as well as unpublished work, collusion and the plagiarism of the work of other students. Please ensure that you fully understand what constitutes plagiarism before you submit your work. University’s Coursework Submission Policy Please refer to the College’s Student Handbook for information on submitting late, penalties applied and procedures. College’s Coursework Submission Policy Please refer to the College’s Student Handbook for information relating to the College’s Coursework Submission Policy and procedures. * this can be found at the bottom of the page under the ‘Documents’ section *
  • 22. https://intra.brunel.ac.uk/cbass/Pages/handbook.aspx#/mu_Asse ssmentMG3601 Brand ManagementReport Coursework for 2019/20 Available online at www.sciencedirect.com http://www.keaipublishing.com/en/journals/jfds/ ScienceDirect The Journal of Finance and Data Science 1 (2015) 1e10 Big data based fraud risk management at Alibaba Jidong Chen*, Ye Tao, Haoran Wang, Tao Chen Alipay, Alibaba, China Received 15 February 2015; revised 8 March 2015; accepted 20 March 2015 Available online 14 July 2015 Abstract With development of mobile internet and finance, fraud risk comes in all shapes and sizes. This paper is to introduce the Fraud Risk Management at Alibaba under big data. Alibaba has built a fraud risk monitoring and management system based on real- time big data processing and intelligent risk models. It captures fraud signals directly from huge amount data of user behaviors and network, analyzes them in real-time using machine learning, and accurately predicts the bad users and transactions. To extend the
  • 23. fraud risk prevention ability to external customers, Alibaba also built up a big data based fraud prevention product called Ant- Buckler. AntBuckler aims to identify and prevent all flavors of malicious behaviors with flexibility and intelligence for online merchants and banks. By combining large amount data of Alibaba and customers', AntBuckler uses the RAIN score engine to quantify risk levels of users or transactions for fraud prevention. It also has a user-friendly visualization UI with risk scores, top reasons and fraud connections. © 2015, China Science Publishing & Media Ltd. Production and hosting by Elsevier on behalf of KeAi Communications Co. Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Keywords: Fraud detection and prevention; Risk model; Malicious behavior; Risk score; Big data analysis 1. Introduction Big data is an all-encompassing term for any collection of data sets which are large, complex and unstructured, so that it becomes difficult to process using traditional data processing applications. Big data “size” is dynamic and constantly growing, as of 2012 ranging from a few dozen terabytes to many petabytes of data by the time when the article is written. It is also a set of techniques and technologies that to analyze, capture, curate, manage and process data within a tolerable elapsed time (Wikipedia). Big data has many different purposes e fraud risk management, web display advertising, call center optimization, social media analysis, intelligent traffic management and among other things. Most of these analytical solutions were not possible previously because data technology were unable to store such huge size of data or processing technologies
  • 24. were not capable of handling large volume of workload or it was too costly to implement the solution in a timely manner. * Corresponding author. E-mail addresses: [email protected], [email protected] (J. Chen). Peer review under responsibility of China Science Publishing & Media Ltd. http://dx.doi.org/10.1016/j.jfds.2015.03.001 2405-9188/© 2015, China Science Publishing & Media Ltd. Production and hosting by Elsevier on behalf of KeAi Communications Co. Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). http://creativecommons.org/licenses/by-nc-nd/4.�0/ mailto:[email protected] mailto:[email protected] http://crossmark.crossref.org/dialog/?doi=10.1016/j.jfds.2015.0 3.001&domain=pdf http://dx.doi.org/10.1016/j.jfds.2015.03.001 http://creativecommons.org/licenses/by-nc-nd/4.�0/ http://www.keaipublishing.com/en/journals/jfds/ www.sciencedirect.com/science/journal/24059188 http://dx.doi.org/10.1016/j.jfds.2015.03.001 http://dx.doi.org/10.1016/j.jfds.2015.03.001 Graph 1. Transaction volume increases at Alibaba. 2 J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 With business needs arose, Alibaba employed optimized system and platform and developed advanced method-
  • 25. ology and approach to handle 10 billion level daily volume. It started from data platform of RAC in 2009, via GP (Green Plum, an EMC product, see EMC2) and Hadoop (see White7), and is using ODPS now. Data processing and analyzing is also improved from T þ 1 mode1 to near real-time mode. By adapting big data techniques, Alibaba highlights advances made in the area of fraud risk management. It invents a real-time payment fraud prevention monitoring system, called CTU (Counter Terrorist Unit). And CTU becomes one of the most advanced online payment fraud management system in China, which can track and analyze accounts' or users' behavior, identify suspicious activities and can apply different levels of treatments based on intelligent arbitration. Fraud risk models are one of the supportive layers of CTU2 (Counter Terrorist Centre). They use statistical and engineering techniques to analyze the aggregated risk of an intermediary (an account, a user or a device etc). Detailed attributes are generated as inputs. Different algorithms are to assess the correlations of these attributes and fraud activities, and to separate good ones from bad ones. Validating and tuning are to make sure models apply to different scenarios. Big data at Alibaba produces thousands and thousands of attributes, and fraud risk models are built to deal with various of fraud activities. Those big data based fraud models are widely used in almost every procedure within Alibaba to monitor fraud, such as account opening, identity verification, order placement, before and after transaction, withdrawal of money, etc. To build up a safe and clean payment environment, Alibaba decides to expand this ability to external users. A user- friendly product is built, called AntBuckler. AntBuckler is a
  • 26. product to help merchants and banks to identify cyber-crime risks and fraud activities. And a risk score (RAIN Score) is generated based on big data analysis and given to merchants and banks to tell the risk level. In this paper, we show that Alibaba applies the big data techniques and utilizes those techniques in fraud risk management models and systems. We also present the methodology and application of the big data based fraud prevention product AntBuckler used by Alibaba. The remainder of the paper is organized as follows. Section 2 introduces big data applications and basic computing process at Alibaba. Section 3 explains fraud risk management at Alibaba in details and fraud risk modeling. Section 4 provides an explanation of AntBuckler. We conclude in Section 5. 2. Big data applications at Alibaba Alibaba grows fast in past 10 years. In 2005, daily transaction volume was less than 10 thousands per day. It reached to 188 million on Nov 11th, 2013 one day. Graph 1 illustrates that the transaction volume at Alibaba changes from 2005 to 2013 on daily basis. With business growing exponentially, data computing, processing system and data storage are bound to change as well. It started from data computing platform of RAC (Oracle Real Application Clusters (see Oracle white paper1)) in 2009, via GP and Hadoop, and is using ODPS now. Data processing and analyzing is also improved from T þ 1 mode 1 T þ N mode: T is time, when system runs. N is time interval. T þ 1 means the system runs on the second day. 2
  • 27. CTU: Alipay's internal risk control system, which is fully developed and designed by Alibaba. This name is inspired by American TV series <<24>>. Graph 2. Big data computing progress at Alibaba. 3J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 to real-time mode, especially in risk prevention at Alibaba, fraud check on each transaction can be controlled within 100 ms (millisecond). Moreover, data sources are extended from single unit data to a combination of internal group data and external bureau data. Graph 2 illustrates that the big data computing process at Alibaba progress extensively since 2009. Alibaba has data not only from Taobao, Tmall and Alipay, but also from partners like Gaode Maps and others. Data from various sources builds up an integrated data platform, the platform from business scenarios extends largely as well. Marketing uses data analysis to target users accurately and to provide customers service personally. Merchants and financial companies need professional data classification to filter out valuable customers. Intelligent customer service can effectively and efficiently solve users' requests and complaints using comprehensive data platform. And the online payment services and systems, Alibaba, among leaders of online payment service providers, builds up a fraud risk management platform to ensure both buyers and sellers with fast and safe transactions. Alibaba deals with big data extensively on credit score and insurance prices as well as other types of business. 3. Fraud risk management at Alibaba
  • 28. 3.1. Framework for fraud risks Fraud risk management at Alibaba is totally different from that of traditional financial and banking system now due to big data. To deal with real-time frauds, new engineering approaches are gradually developed to handle such quantity of data. On top of hardware system, risk prevention framework is also built up to support new methodology and algorithm. There are a few different kinds of risk prevention frameworks. One fundamental framework of fraud risk that Alibaba uses is called multi-layer risk prevention framework. Graph 3 illustrates the multi-layer risk prevention framework Alibaba uses in Alipay System. There are total five layers in this system. At Alibaba, there are 5 layers to prevent fraud for a transaction. The five layers are (1) Account Check, (2) Device Check, (3) Activity Check, (4) Risk Strategy and (5) Manual Review. One fraudster can pass first layer on account check, and then there are still four layers ahead to block the fraudster. When a transaction is initiated, the first layer is Graph 3. Multi-layer risk prevention framework. 4 J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 Account Check, which includes buyer account information and seller account information. Several checks on the first layer Account Check are designed as questions: does the buyer or seller account have bad/suspicious activity before? Is there any possibility the buyer account stolen etc? Extremely
  • 29. suspicious transactions may be declined to protect genuine buyers, or extra authentic methods may be trigged to double confirmation in this situation. The second layer is Device Check, which includes the IP address check and operation check on the same device. Similarly, checks on the second layer Device Check are designed from passing several questions: whether there are huge quantify of trans- actions from the same device? Any transaction is from bad devices? The third layer is Activity Check, called as Behavior Check as well, which checks historical records, buyer and seller behavior pattern, linking among accounts, devices and scenarios. Checks on the third layer Activity Check are designed as questions as well: whether the buyer or seller account link to an identified bad account? The fourth layer is Risk Strategy, which makes final judgment and takes appropriate action. Checks on the fourth layer Risk Strategy are designed to aggregate all results from previous checks according to severity levels. Some transactions are sent to auto-decision due to obvious fraud activities. Some grey cases are sent to Manual Review. On one hand, Alipay would like to provide better services and experiences for both parties. On the other hand, Alipay does not want to misjudge any case. Without strong evidence, suspicious cases will be manually reviewed in the last layer Manual Review, where more evidences are revealed and some phone calls may be made to verify or remind or check with buyers or sellers. Another key difference between fraud risk management at Alibaba and “that” of traditional financial and banking system is the risky party. Customers are evaluated to be the main risky party in banking system. At Alibaba, there are 3 layers of risky party. The three layers are (1) Customer level, (2) Account level and (3) Scenario level. See Graph 4. Risk fraud prevention at Alibaba is for both customers whether they are buyers or sellers or not, for both accounts
  • 30. whether those accounts are prestigious for big company or a single individual or not, for both scenarios whether those activities happen during account opening or money withdrawal. 3.2. CTU e fraud prevention monitoring system CTU is a real-time payment fraud prevention monitoring system, which can track and analyze accounts' or users' behavior, identify suspicious activities and apply different level of treatments based on intelligent arbitration. The first Graph 4. Multi-layer risk prevention framework. 5J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 version launched on 1st Aug, 2005. This system is independently developed by Alipay's risk control team. At that time, it focused more on large transaction investigation, suspicious refund, etc. Now it extends to money laundry, marketing fraud, accounts, and card stolen/loss as well as cash monetization. Additionally, it is a 24 h monitoring system, which provides throughout protection at any time. When an event happens, it passes through CTU for judgment. An event is defined to be that a user logins, changes profiles, initiates transactions, withdraws money from Alibaba to other bank accounts and others. There are hundreds of kinds of events. A suspicious event triggers models and rules behind the CTU for real-time computing, and within 100 ms, CTU returns the result with risk decision. If this is a low risk from CTU return, the event is passed to continue its operation. If this is a high risk, the CTU will direct a stop or a further challenge step to continue the process. Graph 5 illustrates the CTU operating process.
  • 31. 3.3. Fraud risk modeling The data that supports CTU judgment is from historical cases, user behaviors, linking relationship and so on. Risk models are built to analyze fraudsters' cheating patterns, relations among fraudsters, different behaviors between a group of good users and a group of bad ones. There are a few factors to consider during building risk models. Bias and Variance are usually concerned together to balance the effectiveness and impact of a risk model. Bias is a factor to measure how a model fits for the risk, how to Graph 5. CTU-risk prevention system at Alibaba. Graph 6. Three dimension of RAIN score. 6 J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 find the risk of account or transaction accurately. Variance is to measure whether a model is stable or not, whether it can sustain a relative longer lifecycle in business. Negative positive rate, also called wrong cover rate, is to measure how the accuracy a model is. High negative positive rate will bring company huge business pressure and bad user experience. Moreover, interpretability is necessary to explain to users the reason that a model gives such risk level to his account or transaction. In big data age, except for factors mentioned above, data scientists keep fighting for data deficiency, data sparsity and data skewness. Model building process is also relatively mature at Alibaba after repeated deliberation. White and black samples are chosen first. White samples are good risk parties. Black samples are usually risky parties judged as bad. A good
  • 32. model can differentiate white and black samples to the most degree. Behavior data and activity data are collected for both samples to generate original variables from abstracting aggregated variables. Through testing, some variables are validated effectively. They can be finally used in model building. From our modeling experience by using Alibaba big data, decision tree C5.0 and Random Forest have better performance to balance between Bias and Variance. One obvious reason is that they do not assume data distribution since they are algorithmic models rather than data models. When a model is able to better separate good and bad ones among samples, the model is basically adapted to process. However, to make sure it applicable to different scenario, validation is also important. A model can be launched if it works effectively and efficiently on testing and validating data. Then, the fraud risk prevention models are needed to be deployed in the production environment, and are used in CTU combining with other strategies and rules. 3.4. RAIN score, a risk model RAIN is one kind of risk models. RAIN stands for Risk of Activity, Identity and Network. Basically, the risk of an object (a user, an account or even a card) is composited of three dimensions of variables, activity, identity and network. Graph 6 illustrates the three dimensions of RAIN score. Hundreds of variables are first selected to interpret status and behavior of an object. Based on testing, verifying and validating from fraud risk models, variables are selected and kept. A RAIN score is generated based on different weight of variables within these three dimensions. Variables and weight of variables may differ according to different risk scenarios. For example, for a card stolen scenario, more Identity variables may be selected and with higher weight. While for a credit speculation scenario, more Network variables may be selected and are given higher rate. Weights of
  • 33. variables are trained by different machine learning algorithms, such as logistic regression. 3.5. An example of network-based analysis in fraud risk detection Graph theory (Network-based Analysis), an applied mathematical subject is commonly applied on social network analysis (see Wasserman6). Facebook, Twitter apply the Graph theory on their social network analysis. Network-based Graph 7. Network of accounts and information. 7J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 analysis plays a new role in the risk control. Fraudsters nowadays are mischievous. They know that online risk models are constantly checking whether fraud accounts are from same name, address, phone and credit card, etc. Hence, they try new ways to hide the connections. Therefore, network based analysis is introduced to reveal the connection in this area. For example, if each account is considered as a node, network-based analysis is to locate edges among different nodes if they are owned by a physical person. If there are reasonable ways to define the edges among different nodes, some interesting groups can be disclosed. In Graph 7, the red nodes represent accounts and green nodes are detailed profile information for those accounts, such as enabled IPs, phone numbers, name, address, etc. If an account (red node) has detailed profile information (green node), network analysis draws a line between this red and green node to show the relationship and the line is an edge. Graph 7 illustrates the network analysis that both groups
  • 34. have their own enabled IPs. However some accounts in two groups shared same bind phone numbers. This exposes the connections between two groups. Another example as below. Graph 8. Betweenness detection. 8 J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 Graph 8 tells us another story. One account shares the same register IP and register device footprint with the left group. It also shares the same name and info number with the right group. This is a strong evidence to prove the connections between two groups of accounts. Two examples above are just a simple case. In the real world, connections are extremely complicated. We have to use paralleled graph algorithms and special graph storage to handle the huge network connection graph. The betweenness nodes (concepts from network-based analysis, see Freeman5) play important roles in finding connections of different accounts, where betweenness nodes are the betweenness centralities used in the network analysis. Connections now is widely used to judge relationship of accounts, this effectively prevent fraudsters building up their own networks. 4. AntBuckler e a big data based fraud prevention product To build up a safe and clean pay0ment environment, Alibaba decides to expand its risk prevention ability to external users. A big data based fraud management product is built and called AntBuckler. This product is fully developed by Alipay. AntBuckler is a product to help merchants and banks to identify
  • 35. cyber-crime risks and fraud activities. We find that merchants generally deal with similar fraud patterns. One example is marketing program fraud. Merchants often give cash reward or voucher certificate to new users to expand their user base. Fraudsters often take this opportunity to create hundreds of different accounts. To merchants, the marketing resource is not given to correct user base. To good users, they cannot benefit the cash reward or voucher certificate. Fraudsters may also sell their accounts with coupon in higher price. This not only damages the merchant's brand image and reputation, but also confuses the market and potential customers. Antbuckler uses the RAIN model engine and generates a risk score (RAIN Score) to quantify the risk level. The score ranges from 0 to 100. The higher, the riskier. It also has user-friendly visualization. Top reasons are shown on top with a higher weight and brighter colors. Connection, through account, email, phone, card and so on, are presented using network based view. See Fig. 1. Fig. 1 is the main interface of one risky account. The interface gives detailed Fig. 1. User-friendly visualization of AntBuckler. Fig. 2. Operation dashboard of AntBuckler. 9J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 10 J. Chen et al. / The Journal of Finance and Data Science 1 (2015) 1e10 account information, such as name, login email and registered
  • 36. time. RAIN score is shown together with a colorful bar. Green means safer and red means riskier. The operation dashboard tells how many accounts are judged by AntBuckler, how many accounts are identified with risk, where risky accounts are distributed, etc. See Fig. 2. Fig. 2 is an example of operation dashboard. 5. Conclusion Big data based fraud risk management is a new trend in payment service business. It leads to a new generation of fraud monitoring and fraud risk management, which is based on big data processing and computing technology, real- time fraud prevention system and risk models. Alibaba has successfully used big data based fraud risk management to deal with daily fraud events. In this paper, we outline the fraud risk management at Alibaba and a big data based fraud prevention product. We would like to extend the analysis to build a safer and cleaner payment environment. References 1. An Oracle White Paper. Oracle Real Application Clusters (RAC); 2013. http://www.oracle.com/technetwork/products/clustering/rac-wp- 12c- 1896129.pdf. 2. EMC Inc. Greenplum Database: Critical Mass Innovation, Architecture White Paper; 2010. https://www.emc.com/collateral/hardware/white- papers/h8072-greenplum-database-wp.pdf. 5. Freeman LC. Centrality in social networks I: conceptual
  • 37. clarification. Soc Netw. 1979;1:215e239. 6. Wasserman Stanley, Faust Katherine. Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences). Combridge Unviversity Press; 1994. 7. White Tom. Hadoop: the Definitive Guide. O'Reilly Press; 2012. http://www.oracle.com/technetwork/products/clustering/rac-wp- 12c-1896129.pdf http://www.oracle.com/technetwork/products/clustering/rac-wp- 12c-1896129.pdf https://www.emc.com/collateral/hardware/white-papers/h8072- greenplum-database-wp.pdf https://www.emc.com/collateral/hardware/white-papers/h8072- greenplum-database-wp.pdfBig data based fraud risk management at Alibaba1. Introduction2. Big data applications at Alibaba3. Fraud risk management at Alibaba3.1. Framework for fraud risks3.2. CTU – fraud prevention monitoring system3.3. Fraud risk modeling3.4. RAIN score, a risk model3.5. An example of network-based analysis in fraud risk detection4. AntBuckler – a big data based fraud prevention product5. ConclusionReferences 1 Slide by Ali, Mert and Kajal Ali: Reads slide.
  • 38. Mustafa: Four problems have been identified to provide reasons as to why New Look are facing difficulties. These are poor positioning and targeting, lack of emotional connection, are providing no symbolic benefits and a lack of presence on social media. 2 Slide by Kajal Kajal: Reads slide. Kajal: As a result of New Looks lack of unique selling point, they are not effectively positioned. New Look no longer offer functional benefits which is the benefit based on a products attribute that provides functional utility to the consumer, and therefore are not differentiated from their competitors. Resulting in a lack of attraction from consumers that could increase sales. 3 Slide by Kajal Kajal: Reads slide. Kajal: New Look repositioned from targeting consumers in their 30s to young and
  • 39. edgy consumers, however their long manufacturing supply chain taking 3 months for clothing from China and Indonesia to reach UK stores contributed to their failure. New Look were regurgitating similar and basic styles, not meeting the trends in society, and were targeting the wrong market. 4 Slide by Karishma Karishma: Reads slide. Karishma: People become emotionally connected to brands for these reasoning's, which is how an emotional connection is built, as a result leading to brand loyalty. As New Look do not interact with their consumers through forming emotional relationships, this has led to a decrease in their brand loyalty. 5 Slide by Karishma Karishma: Reads Slide. Karishma: Holistic choice means that consumers are unable to separate individual functional attributes as to why they prefer this product over another. For example in
  • 40. New Look’s case, a customer would rather own a pair of jeans from Topshop rather than New Look but when asked why specifically, there are not specific attributes to answer as to why. Karishma: New Look’s involvement in this model shows that their products do not have symbolic meanings to their consumers. When consumers shop there, it does not give a sense of holistic, self-focused emotional connection with the brand or the products. 6 Slide by Karishma Karishma: Reads Slide. Karishma: Explaining on New Look’s link with social esteem, New Look neither have social integration nor social differentiation. As there is no brand loyalty, consumers switch easily from New Look and don’t attain new consumers leading to a lack of social integration. New Look does not have diversification in terms of social differentiation i.e. mainly women between 16 - 55 shop there which is their main audience. 7
  • 41. Slide by Kajal Kajal: Reads Slide. Kajal: The symbolic consumption of brands in the fashion industry can help to establish and communicate some of the fundamental cultural categories such as social status by the brand image and price linked to the piece of clothing, and gender by the styles and colours of clothing consumers choose. Brands are also validated through discursive elaboration in a social context whereby they are authenticated by the social group. For example, this may be done by a group of individuals discussing and arguing about that their clothing preferences and collections released by brands. 8 Slide by Kajal Kajal: Reads Slide. Kajal: New Look are no longer keeping up with and are failing to offer the latest trends in fashion, and as a result are losing the interests and are not meeting the needs of their target market of young consumers who want to express their identity through trendy and fashionable clothes. New Look provide a
  • 42. lack of meaning and symbolic benefits through their advertising and clothing to consumers, who as a result don’t want to purchase and wear basic and outdated clothing for their self- identity, nor does it provide dividends such as social status and self-esteem as part of their group or social identity, both considered highly important for young consumers. 9 Slide by Kajal and Karishma Kajal: Reads Slide. Kajal: In relation to New Look, successful engagement in brand communities and co- creation strengthens the relationship between consumers and the brand, which is usually beyond the value envisioned by the brand itself. This is crucial for attracting and retaining consumers and for increasing brand attachment and loyalty. 10 Slide by Kajal and Karishma Kajal: Reads slide. Explain the images.. (by looking at the following images New Look has far less followers than Primark which was founded in 1969
  • 43. and Topshop which was founded in 1964. They were all founded near to each other, therefore New Look should have similar numbers however they do not due to their failures. ASOS, founded in 2000 and Boohoo founded in 2006 are online fashion retailers, are doing far better than New Look although they are not as established long term and don’t have any stores. They are direct in their target market, meeting their needs with trendy fast fashion and are affordable. They are both secure and have a dominant position in the market clearly identified by their strong brand communities). Kajal: New Look repositioned and attempted to target young consumers, however their lack of an online presence and following indicates weak brand reputation and identity. In addition, this also shows that New Look have decreased brand attachment, awareness and don’t have strong brand communities who adore the brand and want to wear and share it with others. PTO -> 11 Kajal: When compared to competitors such as Primark, Topshop, ASOS and Boohoo their following on social media indicates that consumers want to have a relationship
  • 44. and interact with the brand on a daily basis to be aware of all their activities. This therefore represents strong brand communities which New Look lack, hence contributing to their failure. 11 Slide by Kajal and Karishma Karishma: Reads Slide. 12 Karishma: This is now the end of our presentation, thank you all for listening and we are more than happy to take on any questions that you may have. 13 14 15