SlideShare a Scribd company logo
1 of 60
Week 1/BSA 310 Material Week 1.docx
System Inventory
BSA/310 Version 7
1
University of Phoenix Material
System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory
Option 2: General IT System InventoryOption 1: Virtual
Organization System Inventory
Select one of the following Virtual Organizations:
Smith Systems Consulting
Huffman Trucking
Kudler Fine Foods
Complete the following chart, filling in information for each
system used at that Virtual Organization. Add rows to the chart
as necessary.
System Name
Brief Description
Department to Use the System
Purpose of the System
Connects With
Development Details
Option 2: General IT System Inventory
Complete the following chart, filling in information for each
system. Add rows to the chart as necessary.
Industry or Business Type
System Name
Brief Description
Target Departments
Purpose
Would Connect With
System Inventory
BSA/310
Version
7
1
University of Phoenix Material
System Inventory
Select
and complete
one of the following
assignments:
Option 1: Virtual
Organization System Inventory
Option 2: General IT System Inventory
Option 1
:
Virtual Organization
System Inventory
Select
one of the following Virtual Organizations:
·
Smith Systems Consulting
·
Huffman Trucking
·
Kudler Fine Foods
Complete
the
following
chart, filling in information for
each system used at that
Virtual
Organization. Add rows to the chart as necessary.
System
Name
Brief
Description
Department
to
U
se
the
System
Purpose
of
the
System
Connects
With
Development
Details
Week 1/BSA 310 Week 1 DQ 2 (Business Analysis).docx
When businesses do not include analysis, or they skip the
analysis portion of project, they think they are adding precious
time to the project for other items, but they are really just
shooting themselves in the foot. By not taking the proper
precautions and scoping out the project guidelines ahead of
time, they will often fall flat, or even worse, miss their
deadlines by missing something in the project. The other
catastrophe are projects that are planned for too long. If
something is planned for too long, it will end up in development
hell, and will make everyone unhappy. Clients will wonder
where their product has gone, budgetary concerns will creep in,
and management concerns will trickle down to lower
management staff.
By taking the time to do a project the right way, the first time,
everything will work out for the best. Remember the old
saying, "If you fail to plan, you are planning to fail."
When businesses do not include analysis, or they skip the
analysis portion of project, they think
they are adding precious time to the project for other items, but
they are really just shooting
themselves in the foot.
By not taking the proper precautions
and scoping out the project
guidelines ahead of time, they will often fall flat, or even
worse, miss their deadlines by missing
something in the project.
The other catastrophe are projects that are planned for too long.
If
something is planned for too lo
ng, it will end up in development hell, and will make everyone
unhappy.
Clients will wonder where their product has gone, budgetary
concerns will creep in,
and management concerns will trickle down to lower
management staff.
By taking the time to do a
project the right way, the first time, everything will work out
for the
best.
Remember the old saying, "If you fail to plan, you are planning
to fail."
Week 1/BSA 310 Week 1 DQ1 (Discovery Phase).docx
During the "discovery" phase of the system build is when you
would find all the information you would need for the
requirements on the build. There are several "discoveries" that
you will find: The Objective, Scope, Business Activities, and
Functional and Informational Requirements. The four
discoveries will lead you down the path of business analysis and
provide you with the information that will allow your to fulfill
your business objectives. This process is also know as the
Elicitation Process. By discovering who, or what, your
objectives are going to be,or achieve; with this, you will have a
starting point. The next step would be to ask questions that
figure out that impacts the project will have on others. What
will the project have in it, or not have in it. You must define
exactly what the project is going to have in it, at this stage of
development. Next, we will look at what Activities the project
will start. This is a good time to get teams together and start
bouncing ideas off each other. To get ideas flowing and to have
those ideas put down on paper. No idea can be considered too
"stupid", because ideas can be branched off one another to
create better ideas. These sessions can be very productive.
Also, research teams can be utilized during this time, as well.
Now, we need to find the functional requirements of the
project. By making a list of all the items needed on the project,
you can gather all the functional items needed for the project.
The final portion is Data requirements. All this means is
looking for informational requirements. This is basically a
document level activity. Document all processes that happened
through the process.
During the "discovery" phase of the system build is when you
would find all the information you
would need for the requirements on the build.
There are several "discoveries" that you will find:
The Objective, Scope, Business Activities, and Functional and
Informational Requirements.
The
four discoveries will lead you down the path of business
analysis and provide you with the
information that will allow your to fulfill your business
objectives.
This process is also know as
the Elicitation Process.
By di
scovering who, or what, your objectives are going to be,or
achieve;
with this, you will have a starting point.
The next step would be to ask questions that figure out
that impacts the project will have on others.
What will the project have in it, or not
have in it.
You must define exactly what the project is going to have in it,
at this stage of development.
Next, we will look at what Activities the project will start.
This is a good time to get teams
together and start bouncing ideas off each other.
To get ideas flowing and to have those ideas
put down on paper.
No idea can be considered too "stupid", because ideas can be
branched off
one another to create better ideas.
These sessions can be very productive.
Also, research teams
can be utilized du
ring this time, as well.
Now, we need to find the functional requirements of
the project.
By making a list of all the items needed on the project, you can
gather all the
functional items needed for the project.
The final portion is Data requirements.
All this means is
looking for informational requirements.
This is basically a document level activity.
Document
all processes that happened through the process.
Week 1/BSA 310 Week 1 Individual Assignment System
Inventory (General IT System Inventry) .docx
System Inventory
BSA/310 Version 7
1
University of Phoenix Material
System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory
Option 2: General IT System InventoryOption 2: General IT
System Inventory
Complete the following chart, filling in information for each
system. Add rows to the chart as necessary.
Industry or Business Type
System Name
Brief Description
Target Departments
Purpose
Would Connect With
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Management Support System
A portion of Management Information Systems derived of a set
of questions and answers, for the intended purpose of
generating business analysis.
Any management level of a company
To convert raw data into comprehensible, usable data.
Anyone wanting to edge out the competition
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Management Information Systems
The system in which internal and external data is collected and
distributed in an organized manner, in which a company can
process the information.
Any management level of a company
Centralized repository of stored data, to be processed into a
utilized form
Anyone wanting to edge out the competition
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Decision Support Systems
A computerized system that collects data, analyzes it, and
makes conclusions
Any management level of a company
To give management a hand in making decisions by applying
rules to the acquired data and getting conclusions based on
those rules.
Managers needing help making business decisions
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Operation Support Systems
Encompasses the Transaction Processing System and the
Process Control System
Non-managerial staff
As the name implies, it is the operational portion of a company
The “guts” of a company: the sales force, warehouse, inventory,
payroll, etc.
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Transaction Processing Systems
A system used to process transactions, usually credit cards.
Office employees
A system that allows for the storing and retrieving of
transactions.
Sales people, office personal
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Process Control Systems
An amount of raw data, that is gathered and then transformed
into more useable data
Used in conjunction with Operations Support System
Takes raw data and converts it into more legible information
The Operational Support System
System Inventory
BSA/310
Version
7
1
University of Phoenix Material
System Inventory
Select
and complete
one of the following
assignments:
Option 1: Virtual
Organization System Inventory
Option 2: General IT System Inventory
Option 2:
General IT System Inventory
Complete
the
following
chart, filling in information for each system. Add rows to the
chart as necessary.
Industry
or
Business
T
ype
System
Name
Brief Description
Target
Departments
Purpose
Would
Connect With
If a
company
wants to get
a legitimate
“leg up” on
the
competition,
they would
want to look
into this
type of
system.
Management
Support
System
A portion
of
Management
Information
Systems derived
of a set of
questions and
answers, for the
intended purpose
of generating
business analysis.
Any
management
level of a
company
To convert raw
data into
comprehensible,
usable data.
Anyone
wanting to
edge out the
competition
Week 1/BSA 310 Week 1 Individual Assignment - System
Inventory (Virtual Organization System Inventory).docx
System Inventory
BSA/310 Version 7
1
University of Phoenix Material
System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory
Option 2: General IT System InventoryOption 1: Virtual
Organization System Inventory
Select one of the following Virtual Organizations:
Smith Systems Consulting
Huffman Trucking
Kudler Fine Foods
Complete the following chart, filling in information for each
system used at that Virtual Organization. Add rows to the chart
as necessary.
System Name
Brief Description
Department to Use the System
Purpose of the System
Connects With
Development Details
Novell 4.11 Server for POS
Point of Sale Server running Novell Operating System 4.11 for
the individual POS machines
Finance and Accounting
To log the transactions of all the Point of Sale machines and
keeps track of sales.
Banking Institutions, Accounting and Finance Department
POS PII WIN9x
(4) Point of Sale computers running Windows 9x operating
systems and Pentium II computers
Finance and Accounting
Enters the orders of the customers at the time of purchase. To
process monetary transactions to banking institutions
Main server (Novell 4.11 Server for POS)
UPS-Standalone
Uninterruptable Power Supply.
Information Technology
Standalone device in case of loss of power, your servers have
time to shut down
Main Servers
PII 64mg RAM WIN 9x w/Office 97 (Server)XLS Inventory
Spreadsheet
Inventory Server, running Windows 9x, with 64MB RAM and
Office 97
Finance and Accounting
Keeps inventory up to date. Able to run reports, with the GL
codes, Inventory name, Summary of the Item, and the amount of
the item.
Point of Sale Server, Sales and Marketing
PII w NT Server IIS4 Winfax Pro Built in Modem and CDROM
Main Intranet/Internet Server. Pentium II running Windows NT
All departments
This is the main server that everyone connects to. Its primary
purpose is to run the website for external and internal
customers.
Everyone
W. Clay Mundy IIIMay 6, 2012 BSA 310
System Inventory
BSA/310
Version
7
1
W. Clay Mundy III
May 6, 2012 BSA 310
University of Phoenix Material
System Inventory
Select
and complete
one of the following
assignments:
Option 1: Virtual
Organization System Inventory
Option 2: General IT System Inventory
Option 1
:
Virtual Organization
System Inventory
Select
one of the following Virtual Organizations:
·
Smith Systems Consulting
·
Huffman Trucking
·
Kudler Fine Foods
Complete
the
following
chart, filling in information for
each system used at that
Virtual
Organization. Add rows to the chart as necessary.
System
Name
Brief
Description
Department
to
U
se
the
System
Purpose
of
the
System
Connects
With
Development
Details
Week 1/BSA 310 Week 1 Summary.docx
One of the main important lessons I learned was what a system
was and the different types there were. Businesses are able to
use the two main types of systems, part of the Management
Information Systems, to help with the overall business process.
By utilizing the TPS, DSS, and other systems, businesses are
able to get an upper hand by compressing raw data into a more
useable form, a form that can be interpreted into many different
ways and separated into different departments.
I also enjoyed reading about the integration of the
improvements made in the supply chain operations, with the
help of IT. By involving the infrastructure of the entire IT
department, as well as other departments, the company is able
to maximize the Enterprise Resource Planning relationships.
Supply chain management has became a very large part of
businesses, and if you want to have a successful company,
integrating ERP and supply chains better be part of it.
Understanding how the intricacies of how IT really affects a
business can be interesting. With all the separate departments
of IT, all working together, if one department fails, it can be
devastating to a company. If a company were to lose the
database functionality, the accounting, sales, warehouse, and
inventory could take a hit.
Once you get all the requirements from the customer, you can
start to plan out the project. With the requirements in hand, you
should be able to get an idea of how many people you will need
for the project, roughly the amount of time you need, and how
much time you are going to need for planning. After you get all
this information, you can carefully plan out how much it will
cost. If you have a budget, you can filter that into the
equation. As long as you take each step, one at a time, you
should have no problem with the project.
One of the main important lessons I learned was what a system
was and the different types there
were.
Businesses are able to use the two main types of systems, part
of the Management
Information Systems, to help with the overall business process.
By util
izing the TPS, DSS, and
other systems, businesses are able to get an upper hand by
compressing raw data into a more
useable form, a form that can be interpreted into many different
ways and separated into different
departments.
I also enjoyed reading ab
out the integration of the improvements made in the supply
chain
operations, with the help of IT.
By involving the infrastructure of the entire IT department, as
well as other departments, the company is able to maximize the
Enterprise Resource Planning
relationships.
Supply chain management has became a very large part of
businesses, and if you
want to have a successful company, integrating ERP and supply
chains better be part of it.
Understanding how the intricacies of how IT really affects a
business
can be interesting.
With
all the separate departments of IT, all working together, if one
department fails, it can be
devastating to a company.
If a company were to lose the database functionality, the
accounting,
sales, warehouse, and inventory could t
ake a hit.
Once you get all the requirements from the customer, you can
start to plan out the project.
With
the requirements in hand, you should be able to get an idea of
how many people you will need
for the project, roughly the amount of time you nee
d, and how much time you are going to need
for planning.
After you get all this information, you can carefully plan out
how much it will
cost.
If you have a budget, you can filter that into the equation.
As long as you take each step,
one at a time, you
should have no problem with the project.
Week 2/BSA 310 Week 2 Summary.docx
This week, learning about how businesses are moving more
from a mobility environment than from a desktop environment.
There are many security concerns when it comes to mobile
devices, as security software and hardware have not caught up
with the technology. IT departments are having to scramble to
figure out the best ways to protect themselves from the mobile
and tablet based devices. Also, we learned how unscrupulous
people can take advantage of others by cold calling individuals
and trying to get information out of them. We found of that
through the methods called phishing and pharming, illegal
enterprises can set up website's that look identical to real
website's for the sole purpose of gaining your personal
information. By sending out emails with links in them, and
some unsuspecting person clicks on that link, they can be
transported to these mirror website's. Lastly, learning how
businesses should take security more into consideration, as
without it, the entire company can be taken down. As the
saying goes, "Loose lips sink ships." Someone who does not
follow protocols and does not keep company information to
themselves can cause great harm to the company. Securing
information should be on the forefront of every company, not
just the IT departments.
This week, learning about how businesses are moving more
from a mobility environment than
from a desktop environment.
There are many security concerns when it comes to mobile
devices, as security software and hardware have not caught up
with the technolog
y.
IT
departments are having to scramble to figure out the best ways
to protect themselves from the
mobile and tablet based devices.
Also, we learned how unscrupulous people can take advantage
of others by cold calling individuals and trying to get infor
mation out of them.
We found of that
through the methods called phishing and pharming, illegal
enterprises can set up website's that
look identical to real website's for the sole purpose of gaining
your personal information.
By
sending out emails with li
nks in them, and some unsuspecting person clicks on that link,
they can
be transported to these mirror website's.
Lastly, learning how businesses should take security
more into consideration, as without it, the entire company can
be taken down.
As the sa
ying
goes, "Loose lips sink ships."
Someone who does not follow protocols and does not keep
company information to themselves can cause great harm to the
company.
Securing information
should be on the forefront of every company, not just the IT
departmen
ts.
Week 2/BSA 310 Week 2 (Kudler Fine Foods Frequent
Shopper Program 1) Riverpoint Writer.docx
Kudler Fine Foods - Frequent Shopper Program
W. Clay Mundy III
BSA 310
5/13/2012
Running head: KUDLER FINE FOODS - FREQUENT
SHOPPER PROGRAM
1
KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM
2
Kudler Fine Foods - Frequent Shopper Program
If you are from the La Jolla, Del Mar, or Encinitas area, then
you have to be familiar with the gourmet food store of Kudler
Fine Foods (hereby known as Kudler). Kudler has been able to
evolve into such a fine establishment by building its business
model off of a strong customer service base. By keeping their
customer relationships “priority-one”, they were able to explode
onto the market, gaining a valuable foothold in the gourmet
food market. With their exponential growth so far, they are
expected to branch out much further into California. One of the
ways Kudler expects to meet the customer expectations, and
satisfaction requirements, will be to implement an e-commerce
aspect into their existing website. Kudler’s customer service
believes that this will be a cornerstone of the next level of the
companies success.Order Process
Under the current order system, Kudler utilizes an ordinary
logistical order process; everything is done by hand.
Running
head: KUDLER FINE FOODS
-
FREQUENT SHOPPER PROGRAM
1
Kudler Fine Foods
-
Frequent Shopper Program
W. Clay Mundy III
BSA 310
5/13/2012
Week 2/BSA 310 Week 2 (Kudler Fine Foods Frequent
Shopper Program II).docx
Kudler Fine Foods - Frequent Shopper Program
BSA 310
Running head: KUDLER FINE FOODS - FREQUENT
SHOPPER PROGRAM
1
KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM
6
Kudler Fine Foods - Frequent Shopper Program
Kudler Fine Foods wants to create a frequent shopper program
to help their customers by rewarding them, but also wanting
them to be protected by malicious entities that might want to do
them harm. In developing a Frequent Shopper Program, Kudler
Fine Foods (hereby known as Kudler) will need to implement,
and adhere, to strict policies and guidelines that will protect the
patrons that shop at the establishments of Kudler. We can also
use different modeling structures to find what kind of Frequent
Shopper Program works best for Kudler. By contacting an
outside agency, such as Management Science Associates, Inc.,
(MSA) we are able to look at data that will tell us the
demographics of who is going to be utilizing the program. The
MSA can show Kudler different pricing analysis, the average
customer lifetime value and how they would consume, their
purchasing behavior, brand forecasting, and all the while,
maintaining the highest level of personal privacy. (Management
Science Associates, Inc, 2012)
Privacy is always on the forefront of any company’s mind,
especially when it involves their customers. When you are
collecting data on a customer, they should get the feeling that
you are their protector, and you are not there to abuse them or
their information. This is why Kudler will put safeguards in
place to protect their customers. There are no true market
standards to protect Kudler’s customers, so Kudler will have to
devise their own methods and means to protect their customers.
Kudler is not only legally bound to protect their customers, but
also ethically bound as well. Whenever a business takes in
information on someone, and stores it in a database, that
company is legally and ethically bound to protect that customer.
When that information goes into that database, no matter how
seemingly harmless, it must always be protected. The IT
security must be regarded in the highest of standards so that the
data stored within our computer databanks will be protected.
(Britz, 2000)
When the customers are filling out the paperwork, for their
Kudler Shopper cards, they will have the option to accept, or
decline, the program. The program will describe what legal
steps the company plans to do in order to protect them. They
can always decide whether or not to participate. We will
reiterate, numerous times, that their personal information will
be secured and not sold to a third party, and is only used for our
marketing purposes only. By letting the customer know, up
front, what information we will be sharing, why we need certain
information, and how we will be using that information, will be
paramount to our success with our customers. The more upfront
we are with them, the more they will trust us. We will also
ensure that all information, entered into our databases, will be
encrypted and all data will be secure.
With all of our security in place, customers lined up, and
frequent shoppers ready to go, what does this mean for our
owners of the company? According to the Food Management
Institute, if a retail establishment has a frequent shopper
program, 90% of their customers utilize this system. (Food
Management Institute, 2008) With an implementation of a
program, customers get a feeling that they are getting a valued
service, where we could implement automatic coupon
deductions, point-reward systems, or even donations to
charities. By give the impression that they are getting value,
they will increase the amount of times they visit Kudler. At the
same time, we gain value with every purchase they make. Each
of their purchases are tracked, and entered, into a database.
Within that database, we are able to start tracking what people
are buying, at what time of the year they are buying, and how
much they are buying.
Another aspect of the program will allow us to help prevent
waste. We may be purchasing too much of a particular product,
or a particular product may be staying on the shelf and never
selling. The frequent shopper program will not only tell us
what is being sold, but more importantly, will tell us what is not
being sold. We will also be able to improve our efficiency
between our suppliers. By being able to track what is being
sold and what is being wasted, we can achieve a much more
accurate inventory count. Having this program fits in all win-
win scenarios for Kudler Fine Foods.
The last step, in the entire equation, will be the training of our
employees. They will need to know that their professionalism
will be key in keeping this system alive. They are the ones that
are on the front lines. These are the individuals that meet and
greet our customers. Training them to know the privacy rules,
to know the new security procedures, and to know the legal and
ethical steps they need to take to ensure that the customer’s data
is protected is paramount to keeping this organization at the
highest levels it has always had. Kudler has always prided
itself in having outstanding customer service capabilities. We
want to prove ourselves worthy once again.
References
Britz, J. J. (July, 2000). Technology as a Threat to Privacy:
Ethical Challenges to the Information Profession. Retrieved
from http://web.simmons.edu/~chen/nit/NIT%2796/96-025-
Britz.html
Food Management Institute. (April, 2008). New FMI Report
Shows Food Retailers Using Technology to Remain Competitive
and Meet Consumer Needs. Retrieved from
http://www.fmi.org/news-room/news-
archive/view/2008/04/22/new-fmi-report-shows-food-retailers-
using-technology-to-remain-competitive-and-meet-consumer-
needs
Management Science Associates, Inc. (2012). Frequent Shopper.
Retrieved from
http://www.msa.com/analysis/consumer/frequent.htm
Plagiarism Checker
Top of Form
Bottom of Form
Top of Form
·
·
Bottom of Form
· preferences
· help
Document Viewer
Turnitin Originality Report
· Processed on: 13-May-2012 2:29 PM CDT
· ID: 249178768
· Word Count: 928
· Submitted: 1
Similarity Index
3%
What's this?
Similarity by Source
Internet Sources:
3%
Publications:
2%
Student Papers:
N/A
include quotedinclude bibliographyexclude small
matchesdownloadrefreshprint
mode:
1% match (Internet from 6/16/11)
http://www.antiessays.com
1% match (Internet from 4/10/12)
http://www.papercamp.com
Running head: KUDLER FINE FOODS - FREQUENT
SHOPPER PROGRAM 1 Kudler Fine Foods - Frequent Shopper
ProgramBSA 310 May 12, 2010 William Schuyler Kudler Fine
Foods - Frequent Shopper Program Kudler Fine Foods wants to
create a frequent shopper program to help their customers by
rewarding them, but also wanting them to be protected by
malicious entities that might want to do them harm. In
developing a Frequent Shopper Program, Kudler Fine Foods
(hereby known as Kudler) will need to implement, and adhere,
to strict policies and guidelines that will protect the patrons that
shop at the establishments of Kudler. We can also use different
modeling structures to find what kind of Frequent Shopper
Program works best for Kudler. By contacting an outside
agency, such as Management Science Associates, Inc., (MSA)
we are able to look at data that will tell us the demographics of
who is going to be utilizing the program. The MSA can show
Kudler different pricing analysis, the average customer lifetime
value and how they would consume, their purchasing behavior,
brand forecasting, and all the while, maintaining the highest
level of personal privacy. (Management Science Associates, Inc,
2012) Privacy is always on the forefront of any company’s
mind, especially when it involves their customers. When you
are collecting data on a customer, they should get the feeling
that you are their protector, and you are not there to abuse them
or their information. This is why Kudler will put safeguards in
place to protect their customers. There are no true market
standards to protect Kudler’s customers, so Kudler will have to
devise their own methods and means to protect their customers.
Kudler is not only legally bound to protect their customers, but
also ethically bound as well. Whenever a business takes in
information on someone, and stores it in a database, that
company is legally and ethically bound to protect that customer.
When that information goes into that database, no matter how
seemingly harmless, it must always be protected. The IT
security must be regarded in the highest of standards so that the
data stored within our computer databanks will be protected.
(Britz, 2000) When the customers are filling out the paperwork,
for their Kudler Shopper cards, they will have the option to
accept, or decline, the program. The program will describe what
legal steps the company plans to do in order to protect them.
They can always decide whether or not to participate. We will
reiterate, numerous times, that their personal information will
be secured and not sold to a third party, and is only used for our
marketing purposes only. By letting the customer know, up
front, what information we will be sharing, why we need certain
information, and how we will be using that information, will be
paramount to our success with our customers. The more upfront
we are with them, the more they will trust us. We will also
ensure that all information, entered into our databases, will be
encrypted and all data will be secure. With all of our security in
place, customers lined up, and frequent shoppers ready to go,
what does this mean for our owners of the company? According
to the Food Management Institute, if a retail establishment has a
frequent shopper program, 90% of their customers utilize this
system. (Food Management Institute, 2008) With an
implementation of a program, customers get a feeling that they
are getting a valued service, where we could implement
automatic coupon deductions, point-reward systems, or even
donations to charities. By give the impression that they are
getting value, they will increase the amount of times they visit
Kudler. At the same time, we gain value with every purchase
they make. Each of their purchases are tracked, and entered,
into a database. Within that database, we are able to start
tracking what people are buying, at what time of the year they
are buying, and how much they are buying. Another aspect of
the program will allow us to help prevent waste. We may be
purchasing too much of a particular product, or a particular
product may be staying on the shelf and never selling. The
frequent shopper program will not only tell us what is being
sold, but more importantly, will tell us what is not being sold.
We will also be able to improve our efficiency between our
suppliers. By being able to track what is being sold and what is
being wasted, we can achieve a much more accurate inventory
count. Having this program fits in all win-win scenarios for
Kudler Fine Foods. The last step, in the entire equation, will be
the training of our employees. They will need to know that their
professionalism will be key in keeping this system alive. They
are the ones that are on the front lines. These are the individuals
that meet and greet our customers. Training them to know the
privacy rules, to know the new security procedures, and to know
the legal and ethical steps they need to take to ensure that the
customer’s data is protected is paramount to keeping this
organization at the highest levels it has always had. Kudler has
always prided itself in having outstanding customer service
capabilities. We want to prove ourselves worthy once again.
References Britz, J. J. (July, 2000). Technology as a Threat to
Privacy: Ethical Challenges to the Information Profession.
Retrieved from http://web.simmons.edu/~chen/nit/NIT'96/96-
025- Britz.html Food Management Institute. (April, 2008). New
FMI Report Shows Food Retailers Using Technology to Remain
Competitive and Meet Consumer Needs. Retrieved from
http://www.fmi.org/news-room/news-
archive/view/2008/04/22/new-fmi-report-shows- food-retailers-
using-technology-to-remain-competitive-and-meet-consumer-
needs Management Science Associates, Inc. (2012). Frequent
Shopper. Retrieved from
http://www.msa.com/analysis/consumer/frequent.htm KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 2 KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 3 KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 4 KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 5
Running head: KUDLER FINE FOODS
-
FREQUENT
SHOPPER PROGRAM
1
Kudler Fine Foods
-
Frequent Shopper Program
BSA 310
Week 2/BSA 310 Week 2 DQ 1 (Security Of Data).docx
Usually, a company puts a ton of money into the security of its
data, but forgets that the biggest security flaws it has is its
every day employee, walking in and out, on a daily basis.
Without giving employees proper training, they may not know
how dangerous that they are leaving their offices, or their entire
workspace. When I worked for a school system, they trained us
to, the IT staff, to always lock our computers, even if we only
got up from our desks for a moment. Even if it meant we were
walking over to get something from the printer, we needed to
lock the computer. That way, nothing could ever be done from
our computers and all the burden was left to us. If something
happened from our computers, it was our fault, unless there was
an outside breach.
Teaching employees that they have a responsibility to the
company to keep their data protected is paramount. People can
be easily tricked into giving up information, even in basic
conversation with one another. If you do not know who is
around you, you can tell something private and give out
secrets. This is why you should always keep company secrets to
yourself and only discuss them with appropriate personnel.
Teaching this early on, to the employees, will keep the chance
of information getting out.
Usually, a company puts a ton of money into the security of its
data, but forgets that the biggest
security flaws
it has is its every day employee, walking in and out, on a daily
basis.
Without
giving employees proper training, they may not know how
dangerous that they are leaving their
offices, or their entire workspace.
When I worked for a school system, they tra
ined us to, the IT
staff, to always lock our computers, even if we only got up from
our desks for a moment.
Even
if it meant we were walking over to get something from the
printer, we needed to lock the
computer.
That way, nothing could ever be done from
our computers and all the burden was left
to us.
If something happened from our computers, it was our fault,
unless there was an outside
breach.
Teaching employees that they have a responsibility to the
company to keep their data protected is
paramount.
People can be easily tricked into giving up information, even in
basic conversation
with one another.
If you do not know who is around you, you can tell something
private and
give out secrets.
This is why you should always keep company secrets to yours
elf and only
discuss them with appropriate personnel.
Teaching this early on, to the employees, will keep the
chance of information getting out.
Week 2/BSA 310 Week 2 DQ 2 (Phishing and Pharming
Security).docx
Phishing is a method of where an non-legitimate source will try
and get information from someone, either by providing a link to
a site or to a bogus site. This is usually a way to see if there
are legitimate email addresses or not. Pharming utilizes the
same technology as Phishing, but may take you to a copy of a
banking site (IE PayPal) and ask you for your login ID and
password. When you login, it may say your login ID has failed
and you need to re-verify who you are. When you do this, you
are actually giving your information to someone else, instead of
the target you intended. Spoofing is very popular with the
Nigerian Scam. Where someone makes someone believe that
you have won a ton of money, but you need to send them
money, and your information first.
The best way to help your employees from not getting involved
with any of this type of trouble, is to teach them to not open
anything from an email. If they get an email from a "trusted"
source, always open a browser themselves, and go to the source
manually. This way, there is no middleman. If you use the
shortcut, it puts all the power in the hands of the email sender.
This is how I keep myself safe in my own emails.
Phishing is a method of where an non
-
legitimate source will try and get information from
someone, either by providing a link to a site or to a bogus site.
This is usually a way to see if
there are legitimate email addresses or not.
Pharming
utilizes the same technology as Phishing,
but may take you to a copy of a banking site (IE PayPal) and
ask you for your login ID and
password.
When you login, it may say your login ID has failed and you
need to re
-
verify who
you are.
When you do this, y
ou are actually giving your information to someone else, instead
of
the target you intended. Spoofing is very popular with the
Nigerian Scam.
Where someone
makes someone believe that you have won a ton of money, but
you need to send them money,
and your i
nformation first.
The best way to help your employees from not getting involved
with any of this type of trouble,
is to teach them to not open anything from an email.
If they get an email from a "trusted" source,
always open a browser themselves, and go
to the source manually.
This way, there is no
middleman.
If you use the shortcut, it puts all the power in the hands of the
email sender.
This
is how I keep myself safe in my own emails.
Week 3/BSA 310 Week 3 (Kudler Accounting System)
Accounting System.docx
Kudler Accounting System
BSA 310
Running head: KUDLER ACCOUNTING SYSTEM
1
KUDLER ACCOUNTING SYSTEM
5
Kudler Accounting System
To the Executives of Kudler Fine Foods,
Today, I introduce to you an idea that will help revolutionize
the accounting process at Kudler Fine Foods. Upon its
implementation, Kudler Fine foods will be able to easily
manage its portfolio of accounts and analyze all of its data, all
at a moment’s notice. The ability to access reports, on a
annually, bi-annually, quarterly, or any time therein, is
completely up to the individual. The financial benefits will be
instantaneous to the company.
One of the key benefits Kudler Fine Foods will gain will be the
ability to handle all the raw data that you did not have command
of before. This new system not only allows you to improve
your financial strategies, but you can also increase your
management potential by forecasting future investments. By
prompting these new strategies, you are able to access areas of
information not easily accessible before, like cash flow and
asset management, just to name a few. How can we achieve
this level of satisfaction in one software product? Let’s take a
look at some of the key features that are built in to the
accounting software package.
Key Features
· Software Compatible – The software is fully integrated with
the most popular of software technologies. It will work with
the Microsoft Office Suite of applications seamlessly. This will
allow Kudler Fine Foods to be able to integrate reports into
documents, spreadsheets, or emails without any technical
issues.
· Cross-Department Integration – The software is not sterilized
to accounting only, but is distributed to all departments. This
means the accounting software tracks the inventory and
purchasing departments, as well as, the general accounting
department.
· Business Intelligence – Kudler Fine Foods has access to
endless amounts of raw data. This data can be turned into
charts and graphs, at a moment’s notice. Access the general
ledgers information, create a business presentation, and create
the best critical decision possible.
· More Budgetary Control – With built-in tools, like general
ledgers, cash management, fixed asset management, and
financial forecasting, you are in control of your financial
corporate assets. Knowing where your company is heading,
financially, allows executive managers to take directive control
and direct the company in a manner that they were not able to
before.
This is but a mere sample of what you can expect from this
extraordinary software. No matter how much Kudler Fine
Foods grows in the coming years, this software will grow with
the company. It allows for a high amount of scalability, which
means as the company grows and expands, so does the
software’s abilities. Another excellent advantage of the
software would be the integration of all the departments within
Kudler Fine Foods. The ability to seamlessly swap data
between departments, at a moment’s notice, ensures that the
communication lines will always be open between departments.
The beauty of this product is that within the first six months of
ownership, it will have paid for itself. In the first three months,
you will be able to view reports that you would not have ever
been able to access. You will be able to access reports,
customizable to your own specifications. If you have concerns
with supporting the software, a minimal IT department can
support the software, as well as, the accounting software
developers will be there 24/7. It does not take an extraordinary
amount of extra care to support the software, internally. If you
already have an IT staff, they can be trained to support the
software.
I believe that with all the advances this accounting software
has, Kudler Fine Foods will be tough competitor to beat. With
the insight that this accounting package gives, the scalability
potential the software offers, and the potential to make Kudler
Fine Foods a global market leader, utilizing this software
package should be priority one.
If you have any questions, or concerns, please feel free to
contact my office.
References
Bourgoin, A. (2010, April). 7 Things to Consider Before Buying
Small Business Accounting Software. Retrieved from
http://www.smallbizskills.com/small-business-tips/7-things-to-
consider-before-buying-small-business-accounting-software/
Business-Software.com. (2012). 6 Factors to Consider When
Buying Accounting Software. Retrieved from
http://www.business-software.com/article/6-factors-to-consider-
when-buying-accounting-software/
Journal Officiel. (2012, March). What do you consider before
purchasing accounting software for small business. Retrieved
from http://journalofficielniger.org/what-do-you-consider-
before-purchasing-accounting-software-for-small-businesses/
Nickels, W. G., McHugh, J. M., & McHugh, S. M. (2010).
Understanding Business (9th ed.). New York, NY: McGraw-Hill
Irwin.
Wasserman, E. (2009, December). How to Choose Business
Accounting Software. Retrieved from
http://www.inc.com/guides/choosing-accounting-software.html
Top of Form
Bottom of Form
Top of Form
Running head: KUDLER ACCOUNTING SYSTEM
1
Kudler Accounting System
BSA 310
Week 3/BSA 310 Week 3 DQ 1 (Accounting System Today and
Earlier).docx
Accounting systems are a little different than they were when I
was growing up. I learned them to be little elderly ladies taking
care of simple bookkeeping. Today, the role has changed
dramatically. Accounting systems are now a major role within a
company's environment. The systems are able to take raw
information and converting that information into usable data.
They can then use that data to forecast how well and what the
business can do in the future. Individual departments are able
to run reports, from the company databases, and find out how
they can improve their bottom line. These systems also manage
customer data, as well as, all the corresponding financial
information as well..
Without the incorporation of complex IT systems, the majority
of these accounting systems would not be possible. Without the
use of high speed networks, the people in the individual
departments would not be able to receive the information in a
timely manner. The same could be said for the efficiencies of
databases and mainframes/servers. The efficiencies at which
databases, and the hardware that these systems run on, not to
mention the level of expertise that takes to maintain them, are
amazing. Without these technologies on hand, we would not
have the modern accounting systems that we know today.
Accounting systems are a little different than they were when I
was growing up.
I learned them
to be little elderly ladies taking care of simple bookkeeping.
Today, the role has changed
dramatically.
Accounting systems are now a major role within a
company's environment.
The
systems are able to take raw information and converting that
information into usable data.
They
can then use that data to forecast how well and what the
business can do in the future.
Individual
departments are able to run rep
orts, from the company databases, and find out how they can
improve their bottom line.
These systems also manage customer data, as well as, all the
corresponding financial information as well..
Without the incorporation of complex IT systems, the majorit
y of these accounting systems
would not be possible.
Without the use of high speed networks, the people in the
individual
departments would not be able to receive the information in a
timely manner.
The same could be
said for the efficiencies of database
s and mainframes/servers.
The efficiencies at which
databases, and the hardware that these systems run on, not to
mention the level of expertise that
takes to maintain them, are amazing.
Without these technologies on hand, we would not have
the modern ac
counting systems that we know today.
Week 3/BSA 310 Week 3 DQ 2 (Accounting System to Interact,
or Integrate, With the Other Systems).docx
The reason why you would want an accounting system to
interact, or integrate, with the other systems, within a business,
would be because of the enormous potential gains that could be
gained from it. An accounting system, by itself, is a powerful
item, but to have it integrated with the logistical side of your
business lets you analyze what is coming and going from your
warehouses, and at what cost. How much labor is going into
each of the shifts? Where can some of the fat be trimmed to
make things run smoother? Are there room for improvements?
These are all valuable questions that can be answered with the
data that can be received by integrating systems together. Not
everything can be gained by viewing it alone, but if you
integrate your software packages together, you can gain so
much more knowledge.
The same goes for your other departments. You can analyze
your labor costs, your office product needs. Are you paying too
much for your paper products? Where can you save money?
Analyzing the data is a good way to utilize the information.
You can have your accounting system be a standalone device,
but why waste its true potential?
The reason why you would want an accounting system to
interact, or integrate, with the other
systems, within a business, would be because of the enormous
potential gains that could be
gained from it.
An accounting system, by itself, is a powerful item, bu
t to have it integrated with
the logistical side of your business lets you analyze what is
coming and going from your
warehouses, and at what cost.
How much labor is going into each of the shifts?
Where can
some of the fat be trimmed to make things run s
moother?
Are there room for improvements?
These are all valuable questions that can be answered with the
data that can be received by
integrating systems together.
Not everything can be gained by viewing it alone, but if you
integrate your software pack
ages together, you can gain so much more knowledge.
The same goes for your other departments.
You can analyze your labor costs, your office
product needs.
Are you paying too much for your paper products?
Where can you save money?
Analyzing the data
is a good way to utilize the information.
You can have your accounting
system be a standalone device, but why waste its true potential?
Week 3/BSA 310 Week 3 Summary.docx
In the third installment, the students got to learn a little more
in-depth about the accounting aspects of a business. I really
enjoyed learning about the intricacies of keeping a business
alive. Also, learning the major role's in business was very
enlightening. Learning who the internal and external decision
makers were, in the company, solidified how I view the roles.
Understanding that CEO's and managers are the internal
decision makers and investors and stockholders are the external
decision makers. The third item I learned about this week
would be learning about the difference between stocks and
bonds. I have always wondered what exactly made up the
difference. When you buy stock, you are buying an actual piece
of the company, or taking ownership in the company. Whereas
when you buy a bond, you are not buying part of a company, but
you are buying part of a credit in which the company will pay
you for investing into the company, without actually owning a
part of the company.
Future trends will be a little more difficult to predict. With the
economy a shaky as it is, it will be difficult to predict a solid
performing accounting system. We need something that will
forecast data efficiently, while lifting our economy out of the
slump we can been in for these so many years. I hope someone
can figure out a revolutionary algorithm that will transform the
accounting world in time to save us while I am still alive.
In the third installment, the students got to learn a little more in
-
depth about the accounting
aspects of a business.
I really enjoyed learning about the intricacies of keeping a
business alive.
Also, learning the major role's
in business was very enlightening.
Learning who the internal and
external decision makers were, in the company, solidified how I
view the roles.
Understanding
that CEO's and managers are the internal decision makers and
investors and stockholders are th
e
external decision makers.
The third item I learned about this week would be learning
about the
difference between stocks and bonds.
I have always wondered what exactly made up the
difference.
When you buy stock, you are buying an actual piece of the c
ompany, or taking
ownership in the company. Whereas when you buy a bond, you
are not buying part of a
company, but you are buying part of a credit in which the
company will pay you for investing
into the company, without actually owning a part of the compa
ny.
Future trends will be a little more difficult to predict.
With the economy a shaky as it is, it will
be difficult to predict a solid performing accounting system.
We need something that will
forecast data efficiently, while lifting our economy out o
f the slump we can been in for these so
many years.
I hope someone can figure out a revolutionary algorithm that
will transform the
accounting world in time to save us while I am still alive.
Week 4/BSA 310 Week 4 ( McBride Marketing Paper -
Individual).docx
McBride Marketing Plan
BSA 310
Running head: RHIORDAN MARKETING PLAN
1
MCBRIDE MARKETING PLAN
3
McBride Marketing Plan
McBride Financial Services is an exponentially growing
financial and mortgage services company, with five current
locations, in five states, and a planned expansion of another
three locations in the coming future. McBride Financial
believes in being upfront with their service charges, to garner
the customer’s trust, and show the customer they do not offer
any hidden costs. They also offer a speedy application process,
as to allow the customer ample time to search for the house they
want, instead of the hassle of waiting for their paperwork to go
through. McBride Financial has geared their company to be as
customer-centric as possible.
Marketing Plan
When developing a marketing plan, for McBride Financial, we
have to look at which areas we want to explore. Under
McBride’s current marketing plan, they have already planned to
hit the current route of, “Local TV ads, Local newspapers,
Informational handouts at airports and major tourist attractions,
Local radio, and Local realtors,” but this hits only a local
source (Virtual Organizations Portal, 2011). To be able to
target a much larger audience, we need to think on a much
larger scale.
Whenever the advertisements are run, there needs to be an
attention to detail to the website address given. This will give
people instant access to the website. Having an email address,
on the advertisements, as well as the website, will give people
the opportunity to ask questions, if they have any. This is
where other marketing plans have failed, in the past. In the old
days, there was no way for anyone to market 24 hours a day, 7
days a week; now companies are able to. This allows for more
exposure into the company. Your online presence will give you
the market exposure that McBride Financial wants. Now, you
need to gain exposure to your website, from online.
You can garner more attention, online, by buying ad-space from
other realtor websites. Online advertising can be a cheaper way
to advertise than print, or television. There is less hassle
involved, when developing and online campaign, and once it is
completed, you can use it over and over again; you do not have
to reprint it or have to pay for supplies. In 2001, the average
cost of a banner advertisement (an advertisement that was
located at the top of a website, usually), ranged from $5 to $68
(McCabe, 2001).
Placing a banner ad, or any time of advertisement, with an
online entity, can gain McBride a ton of recognition. For
example, according to Realtor.com’s website, they have 13.7
million people visit their site every month. (Move, Inc, 2012)
With this kind of traffic, you may have to pay a higher amount
for advertising, but it may be worth it in the long run. But, then
again, would it be cheaper to pay for an email campaign?
McBride Financial should also compare the cost of a banner-ad
campaign to that of an email marketing campaign. Purchasing a
list of e-mail leads, although frowned upon by the general
public, can be a cheaper solution to your marketing needs.
Otherwise known as email spam, getting a basic list of leads is a
good, clean way of getting your name out to the masses. This
should easily fall within the start-up budget of $50,000, or if
McBride wanted to advertise with an email campaign, they
could use their follow-up budget of $5,000 per month for this.
Target Markets
The target markets for these campaigns are going to fall within
a wide, but specific category. Within their business plan, they
specify that they want to target professionals, retirees, and
families that are purchasing their first or second homes. (Virtual
Organizations Portal, 2011) This is a pretty wide market, as it
almost covers anyone that is looking to purchase a home. The
good thing about this process is that McBride has narrowed
down the exact focus of their market, instead of floundering for
full attention of the whole market.
I would like to offer one alternative to their target audience: the
individual. It is true, that the professional worker would have
the monetary income to afford a new home, and a retiree would
also have a savings account/income for a new home, but to
exclude an individual, one that may have an alternative source
of income, may be unwise. This is a target audience that
McBride may not want to exclude. If the clientele that McBride
is looking to help consists of anyone that can pass a credit
check, and be able to pay the $1500 initial price, then this is a
segment that should not be overlooked.
Conclusion
McBride Financial now has the strategic advantage of taking
their business where they want to go. Advertising and
marketing your brand is not an easy process, but a necessary
process none the less. Once McBride gets their foothold on
their internet markets, they should not have any trouble
becoming the global dominators in the mortgage financial
markets.
References
Armstrong, G., & Kotler, P. (2011). Marketing: An
introduction (10th ed.). Boston, MA: Prentice Hall.
McCabe, B. (2001, September). Online Advertising: Costs vs.
Effectiveness. Retrieved from
http://images.forbes.com/fdc/mediaresourcecenter/documents/ge
rtner.pdf
Move, Inc. (2012). Media
Solution
s. Retrieved from
http://www.realtor.com/mediasolutions/ouraudience/keymeasure
s/
Virtual Organizations Portal. (2011). McBride Financial
Services. Retrieved from
https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/McB
ride/intranet/business-plan.html
Top of Form
Bottom of Form
Top of Form
·
·
Bottom of Form
· preferences
Document Viewer
Turnitin Originality Report
· Processed on: 26-May-2012 10:25 PM CDT
· ID: 251784064
· Word Count: 888
· Submitted: 1
McBride Marketing Paper By
Similarity Index
1%
What's this?
Similarity by Source
Internet Sources:
1%
Publications:
0%
Student Papers:
N/A
include quotedinclude bibliographyexclude small
matchesdownloadrefreshprint
mode:
1% match (Internet from 11/1/11)
http://www.thetimeshareblog.com
Running head: RHIORDAN MARKETING PLAN 1 McBride
Marketing Plan BSA 310 May 27, 2012 William Shuyler
McBride Marketing Plan McBride Financial Services is an
exponentially growing financial and mortgage services
company, with five current locations, in five states, and a
planned expansion of another three locations in the coming
future. McBride Financial believes in being upfront with their
service charges, to garner the customer’s trust, and show the
customer they do not offer any hidden costs. They also offer a
speedy application process, as to allow the customer ample time
to search for the house they want, instead of the hassle of
waiting for their paperwork to go through. McBride Financial
has geared their company to be as customer-centric as possible.
Marketing Plan When developing a marketing plan, for McBride
Financial, we have to look at which areas we want to explore.
Under McBride’s current marketing plan, they have already
planned to hit the current route of, “Local TV ads, Local
newspapers, Informational handouts at airports and major
tourist attractions, Local radio, and Local realtors,” but this hits
only a local source (Virtual Organizations Portal, 2011). To be
able to target a much larger audience, we need to think on a
much larger scale. Whenever the advertisements are run, there
needs to be an attention to detail to the website address given.
This will give people instant access to the website. Having an
email address, on the advertisements, as well as the website,
will give people the opportunity to ask questions, if they have
any. This is where other marketing plans have failed, in the
past. In the old days, there was no way for anyone to market 24
hours a day, 7 days a week; now companies are able to. This
allows for more exposure into the company. Your online
presence will give you the market exposure that McBride
Financial wants. Now, you need to gain exposure to your
website, from online. You can garner more attention, online, by
buying ad-space from other realtor websites. Online advertising
can be a cheaper way to advertise than print, or television.
There is less hassle involved, when developing and online
campaign, and once it is completed, you can use it over and
over again; you do not have to reprint it or have to pay for
supplies. In 2001, the average cost of a banner advertisement
(an advertisement that was located at the top of a website,
usually), ranged from $5 to $68 (McCabe, 2001). Placing a
banner ad, or any time of advertisement, with an online entity,
can gain McBride a ton of recognition. For example, according
to Realtor.com’s website, they have 13.7 million people visit
their site every month. (Move, Inc, 2012) With this kind of
traffic, you may have to pay a higher amount for advertising,
but it may be worth it in the long run. But, then again, would it
be cheaper to pay for an email campaign? McBride Financial
should also compare the cost of a banner-ad campaign to that of
an email marketing campaign. Purchasing a list of e-mail leads,
although frowned upon by the general public, can be a cheaper
solution to your marketing needs. Otherwise known as email
spam, getting a basic list of leads is a good, clean way of
getting your name out to the masses. This should easily fall
within the start-up budget of $50,000, or if McBride wanted to
advertise with an email campaign, they could use their follow-
up budget of $5,000 per month for this. Target Markets The
target markets for these campaigns are going to fall within a
wide, but specific category. Within their business plan, they
specify that they want to target professionals, retirees, and
families that are purchasing their first or second homes. (Virtual
Organizations Portal, 2011) This is a pretty wide market, as it
almost covers anyone that is looking to purchase a home. The
good thing about this process is that McBride has narrowed
down the exact focus of their market, instead of floundering for
full attention of the whole market. I would like to offer one
alternative to their target audience: the individual. It is true,
that the professional worker would have the monetary income to
afford a new home, and a retiree would also have a savings
account/income for a new home, but to exclude an individual,
one that may have an alternative source of income, may be
unwise. This is a target audience that McBride may not want to
exclude. If the clientele that McBride is looking to help consists
of anyone that can pass a credit check, and be able to pay the
$1500 initial price, then this is a segment that should not be
overlooked. Conclusion McBride Financial now has the
strategic advantage of taking their business where they want to
go. Advertising and marketing your brand is not an easy
process, but a necessary process none the less. Once McBride
gets their foothold on their internet markets, they should not
have any trouble becoming the global dominators in the
mortgage financial markets. References Armstrong, G., &
Kotler, P. (2011). Marketing: An introduction (10th ed.).
Boston, MA: Prentice Hall. McCabe, B. (2001, September).
Online Advertising: Costs vs. Effectiveness. Retrieved from
http://images.forbes.com/fdc/mediaresourcecenter/documents/ge
rtner.pdf Move, Inc. (2012). Media

More Related Content

Similar to Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx

THE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR SUCCESSFUL DIVESTITURE
THE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR  SUCCESSFUL DIVESTITURETHE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR  SUCCESSFUL DIVESTITURE
THE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR SUCCESSFUL DIVESTITUREAbhishek Sood
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design DecisionsRikki Wright
 
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs AnalysisSage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs AnalysisSage Construction and Real Estate
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirementshapy
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
The Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfThe Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfarwholesalelors
 
1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdfarccreation001
 
Regression and correlation
Regression and correlationRegression and correlation
Regression and correlationVrushaliSolanke
 
Running Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docx
Running Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docxRunning Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docx
Running Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docxsusanschei
 
Five things you need to know about your users before you deploy business inte...
Five things you need to know about your users before you deploy business inte...Five things you need to know about your users before you deploy business inte...
Five things you need to know about your users before you deploy business inte...Nuno Fraga Coelho
 
Xamtrex consulting ems benefits document
Xamtrex consulting ems benefits documentXamtrex consulting ems benefits document
Xamtrex consulting ems benefits documentSHYAM DIXIT
 
Quality Assurance, Testing, And Implementation
Quality Assurance, Testing, And ImplementationQuality Assurance, Testing, And Implementation
Quality Assurance, Testing, And ImplementationKristen Wilson
 
Business Analyst Interview Questions with Answers
Business Analyst Interview Questions with AnswersBusiness Analyst Interview Questions with Answers
Business Analyst Interview Questions with AnswersMaria FutureThoughts
 
12 important questions when starting bpm projects
12 important questions when starting bpm projects12 important questions when starting bpm projects
12 important questions when starting bpm projectsDr. Janne Ohtonen
 
Business process mapping
Business process mappingBusiness process mapping
Business process mappingDAVIS THOMAS
 
Ais 150715071434-lva1-app6891
Ais 150715071434-lva1-app6891Ais 150715071434-lva1-app6891
Ais 150715071434-lva1-app6891Bandri Nikhil
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)raszky
 

Similar to Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx (20)

THE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR SUCCESSFUL DIVESTITURE
THE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR  SUCCESSFUL DIVESTITURETHE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR  SUCCESSFUL DIVESTITURE
THE CIO PLAYBOOK NINE STEPS CIOS MUST TAKE FOR SUCCESSFUL DIVESTITURE
 
Questions On Technical Design Decisions
Questions On Technical Design DecisionsQuestions On Technical Design Decisions
Questions On Technical Design Decisions
 
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs AnalysisSage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
The Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdfThe Systems Development Life Cycle Moderate and large firms with uni.pdf
The Systems Development Life Cycle Moderate and large firms with uni.pdf
 
1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf
 
Regression and correlation
Regression and correlationRegression and correlation
Regression and correlation
 
Running Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docx
Running Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docxRunning Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docx
Running Head DECISION SUPPORT SYSTEM PLAN 1DECISION SUPPORT.docx
 
Visualizing Your Data Through Dashboards
Visualizing Your Data Through Dashboards Visualizing Your Data Through Dashboards
Visualizing Your Data Through Dashboards
 
Five things you need to know about your users before you deploy business inte...
Five things you need to know about your users before you deploy business inte...Five things you need to know about your users before you deploy business inte...
Five things you need to know about your users before you deploy business inte...
 
Xamtrex consulting ems benefits document
Xamtrex consulting ems benefits documentXamtrex consulting ems benefits document
Xamtrex consulting ems benefits document
 
Bsa 411 preview full class
Bsa 411 preview full classBsa 411 preview full class
Bsa 411 preview full class
 
Quality Assurance, Testing, And Implementation
Quality Assurance, Testing, And ImplementationQuality Assurance, Testing, And Implementation
Quality Assurance, Testing, And Implementation
 
Business Analyst Interview Questions with Answers
Business Analyst Interview Questions with AnswersBusiness Analyst Interview Questions with Answers
Business Analyst Interview Questions with Answers
 
12 important questions when starting bpm projects
12 important questions when starting bpm projects12 important questions when starting bpm projects
12 important questions when starting bpm projects
 
Business process mapping
Business process mappingBusiness process mapping
Business process mapping
 
Ais 150715071434-lva1-app6891
Ais 150715071434-lva1-app6891Ais 150715071434-lva1-app6891
Ais 150715071434-lva1-app6891
 
Ais
AisAis
Ais
 
CS 414 (IT Project Management)
CS 414 (IT Project Management)CS 414 (IT Project Management)
CS 414 (IT Project Management)
 

More from melbruce90096

`Do assignments as detailed outNO WIKI for referncesPlease m.docx
`Do assignments as detailed outNO WIKI for referncesPlease m.docx`Do assignments as detailed outNO WIKI for referncesPlease m.docx
`Do assignments as detailed outNO WIKI for referncesPlease m.docxmelbruce90096
 
_____1.On July 9, Sheb Company sells goods on credit to .docx
_____1.On July 9, Sheb Company sells goods on credit to .docx_____1.On July 9, Sheb Company sells goods on credit to .docx
_____1.On July 9, Sheb Company sells goods on credit to .docxmelbruce90096
 
[removed]eltomate  Son rojos y se sirven (they are serv.docx
[removed]eltomate  Son rojos y se sirven (they are serv.docx[removed]eltomate  Son rojos y se sirven (they are serv.docx
[removed]eltomate  Son rojos y se sirven (they are serv.docxmelbruce90096
 
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docx
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docx[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docx
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docxmelbruce90096
 
[removed]1.Which of the following processes addresses when to sp.docx
[removed]1.Which of the following processes addresses when to sp.docx[removed]1.Which of the following processes addresses when to sp.docx
[removed]1.Which of the following processes addresses when to sp.docxmelbruce90096
 
Your paper should be a literary essay in which you present a combina.docx
Your paper should be a literary essay in which you present a combina.docxYour paper should be a literary essay in which you present a combina.docx
Your paper should be a literary essay in which you present a combina.docxmelbruce90096
 
[removed]1.Photographs are an important source of data because t.docx
[removed]1.Photographs are an important source of data because t.docx[removed]1.Photographs are an important source of data because t.docx
[removed]1.Photographs are an important source of data because t.docxmelbruce90096
 
Your paper should address the following questionsWhen you hear th.docx
Your paper should address the following questionsWhen you hear th.docxYour paper should address the following questionsWhen you hear th.docx
Your paper should address the following questionsWhen you hear th.docxmelbruce90096
 
Your Final Project from this course will enable you to compare cultu.docx
Your Final Project from this course will enable you to compare cultu.docxYour Final Project from this course will enable you to compare cultu.docx
Your Final Project from this course will enable you to compare cultu.docxmelbruce90096
 
Your Final Paper is to be a comprehensive research study on one of t.docx
Your Final Paper is to be a comprehensive research study on one of t.docxYour Final Paper is to be a comprehensive research study on one of t.docx
Your Final Paper is to be a comprehensive research study on one of t.docxmelbruce90096
 
Your director is not aware of the involvement of the Department of H.docx
Your director is not aware of the involvement of the Department of H.docxYour director is not aware of the involvement of the Department of H.docx
Your director is not aware of the involvement of the Department of H.docxmelbruce90096
 
YOull need to know The purpose of this research is to focus atte.docx
YOull need to know The purpose of this research is to focus atte.docxYOull need to know The purpose of this research is to focus atte.docx
YOull need to know The purpose of this research is to focus atte.docxmelbruce90096
 
Your draft should establish and develop a single thesis [or co.docx
Your draft should establish and develop a single thesis [or co.docxYour draft should establish and develop a single thesis [or co.docx
Your draft should establish and develop a single thesis [or co.docxmelbruce90096
 
Your company has just hired your foreign friend to work in a middle-.docx
Your company has just hired your foreign friend to work in a middle-.docxYour company has just hired your foreign friend to work in a middle-.docx
Your company has just hired your foreign friend to work in a middle-.docxmelbruce90096
 
Your boss has asked you to write a Project Management Plan. Your pla.docx
Your boss has asked you to write a Project Management Plan. Your pla.docxYour boss has asked you to write a Project Management Plan. Your pla.docx
Your boss has asked you to write a Project Management Plan. Your pla.docxmelbruce90096
 
Your boss has chosen you to give a presentation to a number of forei.docx
Your boss has chosen you to give a presentation to a number of forei.docxYour boss has chosen you to give a presentation to a number of forei.docx
Your boss has chosen you to give a presentation to a number of forei.docxmelbruce90096
 
your assignment is to submit a presentation on Native-American liter.docx
your assignment is to submit a presentation on Native-American liter.docxyour assignment is to submit a presentation on Native-American liter.docx
your assignment is to submit a presentation on Native-American liter.docxmelbruce90096
 
Your assignment is to report on TWO cultural experience visits y.docx
Your assignment is to report on TWO cultural experience visits y.docxYour assignment is to report on TWO cultural experience visits y.docx
Your assignment is to report on TWO cultural experience visits y.docxmelbruce90096
 
your article must be a research article You can tell it is a researc.docx
your article must be a research article You can tell it is a researc.docxyour article must be a research article You can tell it is a researc.docx
your article must be a research article You can tell it is a researc.docxmelbruce90096
 
Your administrator has come to you for information for a present.docx
Your administrator has come to you for information for a present.docxYour administrator has come to you for information for a present.docx
Your administrator has come to you for information for a present.docxmelbruce90096
 

More from melbruce90096 (20)

`Do assignments as detailed outNO WIKI for referncesPlease m.docx
`Do assignments as detailed outNO WIKI for referncesPlease m.docx`Do assignments as detailed outNO WIKI for referncesPlease m.docx
`Do assignments as detailed outNO WIKI for referncesPlease m.docx
 
_____1.On July 9, Sheb Company sells goods on credit to .docx
_____1.On July 9, Sheb Company sells goods on credit to .docx_____1.On July 9, Sheb Company sells goods on credit to .docx
_____1.On July 9, Sheb Company sells goods on credit to .docx
 
[removed]eltomate  Son rojos y se sirven (they are serv.docx
[removed]eltomate  Son rojos y se sirven (they are serv.docx[removed]eltomate  Son rojos y se sirven (they are serv.docx
[removed]eltomate  Son rojos y se sirven (they are serv.docx
 
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docx
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docx[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docx
[u07d2] Unit 7 Discussion 2Conflict and ChangeResourcesDiscuss.docx
 
[removed]1.Which of the following processes addresses when to sp.docx
[removed]1.Which of the following processes addresses when to sp.docx[removed]1.Which of the following processes addresses when to sp.docx
[removed]1.Which of the following processes addresses when to sp.docx
 
Your paper should be a literary essay in which you present a combina.docx
Your paper should be a literary essay in which you present a combina.docxYour paper should be a literary essay in which you present a combina.docx
Your paper should be a literary essay in which you present a combina.docx
 
[removed]1.Photographs are an important source of data because t.docx
[removed]1.Photographs are an important source of data because t.docx[removed]1.Photographs are an important source of data because t.docx
[removed]1.Photographs are an important source of data because t.docx
 
Your paper should address the following questionsWhen you hear th.docx
Your paper should address the following questionsWhen you hear th.docxYour paper should address the following questionsWhen you hear th.docx
Your paper should address the following questionsWhen you hear th.docx
 
Your Final Project from this course will enable you to compare cultu.docx
Your Final Project from this course will enable you to compare cultu.docxYour Final Project from this course will enable you to compare cultu.docx
Your Final Project from this course will enable you to compare cultu.docx
 
Your Final Paper is to be a comprehensive research study on one of t.docx
Your Final Paper is to be a comprehensive research study on one of t.docxYour Final Paper is to be a comprehensive research study on one of t.docx
Your Final Paper is to be a comprehensive research study on one of t.docx
 
Your director is not aware of the involvement of the Department of H.docx
Your director is not aware of the involvement of the Department of H.docxYour director is not aware of the involvement of the Department of H.docx
Your director is not aware of the involvement of the Department of H.docx
 
YOull need to know The purpose of this research is to focus atte.docx
YOull need to know The purpose of this research is to focus atte.docxYOull need to know The purpose of this research is to focus atte.docx
YOull need to know The purpose of this research is to focus atte.docx
 
Your draft should establish and develop a single thesis [or co.docx
Your draft should establish and develop a single thesis [or co.docxYour draft should establish and develop a single thesis [or co.docx
Your draft should establish and develop a single thesis [or co.docx
 
Your company has just hired your foreign friend to work in a middle-.docx
Your company has just hired your foreign friend to work in a middle-.docxYour company has just hired your foreign friend to work in a middle-.docx
Your company has just hired your foreign friend to work in a middle-.docx
 
Your boss has asked you to write a Project Management Plan. Your pla.docx
Your boss has asked you to write a Project Management Plan. Your pla.docxYour boss has asked you to write a Project Management Plan. Your pla.docx
Your boss has asked you to write a Project Management Plan. Your pla.docx
 
Your boss has chosen you to give a presentation to a number of forei.docx
Your boss has chosen you to give a presentation to a number of forei.docxYour boss has chosen you to give a presentation to a number of forei.docx
Your boss has chosen you to give a presentation to a number of forei.docx
 
your assignment is to submit a presentation on Native-American liter.docx
your assignment is to submit a presentation on Native-American liter.docxyour assignment is to submit a presentation on Native-American liter.docx
your assignment is to submit a presentation on Native-American liter.docx
 
Your assignment is to report on TWO cultural experience visits y.docx
Your assignment is to report on TWO cultural experience visits y.docxYour assignment is to report on TWO cultural experience visits y.docx
Your assignment is to report on TWO cultural experience visits y.docx
 
your article must be a research article You can tell it is a researc.docx
your article must be a research article You can tell it is a researc.docxyour article must be a research article You can tell it is a researc.docx
your article must be a research article You can tell it is a researc.docx
 
Your administrator has come to you for information for a present.docx
Your administrator has come to you for information for a present.docxYour administrator has come to you for information for a present.docx
Your administrator has come to you for information for a present.docx
 

Recently uploaded

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx

  • 1. Week 1/BSA 310 Material Week 1.docx System Inventory BSA/310 Version 7 1 University of Phoenix Material System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System InventoryOption 1: Virtual Organization System Inventory Select one of the following Virtual Organizations: Smith Systems Consulting Huffman Trucking Kudler Fine Foods Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary. System Name Brief Description Department to Use the System Purpose of the System Connects With Development Details
  • 2. Option 2: General IT System Inventory Complete the following chart, filling in information for each system. Add rows to the chart as necessary. Industry or Business Type System Name Brief Description Target Departments Purpose Would Connect With System Inventory
  • 3. BSA/310 Version 7 1 University of Phoenix Material System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System Inventory Option 1 : Virtual Organization System Inventory Select
  • 4. one of the following Virtual Organizations: · Smith Systems Consulting · Huffman Trucking · Kudler Fine Foods Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary. System Name Brief Description Department
  • 5. to U se the System Purpose of the System Connects With Development Details Week 1/BSA 310 Week 1 DQ 2 (Business Analysis).docx When businesses do not include analysis, or they skip the analysis portion of project, they think they are adding precious time to the project for other items, but they are really just shooting themselves in the foot. By not taking the proper precautions and scoping out the project guidelines ahead of time, they will often fall flat, or even worse, miss their deadlines by missing something in the project. The other catastrophe are projects that are planned for too long. If something is planned for too long, it will end up in development hell, and will make everyone unhappy. Clients will wonder where their product has gone, budgetary concerns will creep in, and management concerns will trickle down to lower management staff.
  • 6. By taking the time to do a project the right way, the first time, everything will work out for the best. Remember the old saying, "If you fail to plan, you are planning to fail." When businesses do not include analysis, or they skip the analysis portion of project, they think they are adding precious time to the project for other items, but they are really just shooting themselves in the foot. By not taking the proper precautions and scoping out the project guidelines ahead of time, they will often fall flat, or even worse, miss their deadlines by missing something in the project. The other catastrophe are projects that are planned for too long. If something is planned for too lo ng, it will end up in development hell, and will make everyone unhappy. Clients will wonder where their product has gone, budgetary concerns will creep in, and management concerns will trickle down to lower management staff. By taking the time to do a
  • 7. project the right way, the first time, everything will work out for the best. Remember the old saying, "If you fail to plan, you are planning to fail." Week 1/BSA 310 Week 1 DQ1 (Discovery Phase).docx During the "discovery" phase of the system build is when you would find all the information you would need for the requirements on the build. There are several "discoveries" that you will find: The Objective, Scope, Business Activities, and Functional and Informational Requirements. The four discoveries will lead you down the path of business analysis and provide you with the information that will allow your to fulfill your business objectives. This process is also know as the Elicitation Process. By discovering who, or what, your objectives are going to be,or achieve; with this, you will have a starting point. The next step would be to ask questions that figure out that impacts the project will have on others. What will the project have in it, or not have in it. You must define exactly what the project is going to have in it, at this stage of development. Next, we will look at what Activities the project will start. This is a good time to get teams together and start bouncing ideas off each other. To get ideas flowing and to have those ideas put down on paper. No idea can be considered too "stupid", because ideas can be branched off one another to create better ideas. These sessions can be very productive. Also, research teams can be utilized during this time, as well. Now, we need to find the functional requirements of the project. By making a list of all the items needed on the project, you can gather all the functional items needed for the project. The final portion is Data requirements. All this means is looking for informational requirements. This is basically a
  • 8. document level activity. Document all processes that happened through the process. During the "discovery" phase of the system build is when you would find all the information you would need for the requirements on the build. There are several "discoveries" that you will find: The Objective, Scope, Business Activities, and Functional and Informational Requirements. The four discoveries will lead you down the path of business analysis and provide you with the information that will allow your to fulfill your business objectives. This process is also know as the Elicitation Process. By di scovering who, or what, your objectives are going to be,or achieve; with this, you will have a starting point. The next step would be to ask questions that figure out that impacts the project will have on others. What will the project have in it, or not
  • 9. have in it. You must define exactly what the project is going to have in it, at this stage of development. Next, we will look at what Activities the project will start. This is a good time to get teams together and start bouncing ideas off each other. To get ideas flowing and to have those ideas put down on paper. No idea can be considered too "stupid", because ideas can be branched off one another to create better ideas. These sessions can be very productive. Also, research teams can be utilized du ring this time, as well. Now, we need to find the functional requirements of the project.
  • 10. By making a list of all the items needed on the project, you can gather all the functional items needed for the project. The final portion is Data requirements. All this means is looking for informational requirements. This is basically a document level activity. Document all processes that happened through the process. Week 1/BSA 310 Week 1 Individual Assignment System Inventory (General IT System Inventry) .docx System Inventory BSA/310 Version 7 1 University of Phoenix Material System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System InventoryOption 2: General IT System Inventory Complete the following chart, filling in information for each
  • 11. system. Add rows to the chart as necessary. Industry or Business Type System Name Brief Description Target Departments Purpose Would Connect With If a company wants to get a legitimate “leg up” on the competition, they would want to look into this type of system. Management Support System A portion of Management Information Systems derived of a set of questions and answers, for the intended purpose of generating business analysis. Any management level of a company To convert raw data into comprehensible, usable data. Anyone wanting to edge out the competition If a company wants to get a legitimate “leg up” on the competition, they would want to look into this type of system. Management Information Systems The system in which internal and external data is collected and distributed in an organized manner, in which a company can process the information. Any management level of a company Centralized repository of stored data, to be processed into a utilized form Anyone wanting to edge out the competition If a company wants to get a legitimate “leg up” on the competition, they would want to look into this type of system. Decision Support Systems A computerized system that collects data, analyzes it, and makes conclusions Any management level of a company To give management a hand in making decisions by applying rules to the acquired data and getting conclusions based on those rules.
  • 12. Managers needing help making business decisions If a company wants to get a legitimate “leg up” on the competition, they would want to look into this type of system. Operation Support Systems Encompasses the Transaction Processing System and the Process Control System Non-managerial staff As the name implies, it is the operational portion of a company The “guts” of a company: the sales force, warehouse, inventory, payroll, etc. If a company wants to get a legitimate “leg up” on the competition, they would want to look into this type of system. Transaction Processing Systems A system used to process transactions, usually credit cards. Office employees A system that allows for the storing and retrieving of transactions. Sales people, office personal If a company wants to get a legitimate “leg up” on the competition, they would want to look into this type of system. Process Control Systems An amount of raw data, that is gathered and then transformed into more useable data Used in conjunction with Operations Support System Takes raw data and converts it into more legible information The Operational Support System System Inventory BSA/310 Version 7
  • 13. 1 University of Phoenix Material System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System Inventory Option 2: General IT System Inventory Complete the following chart, filling in information for each system. Add rows to the chart as necessary. Industry
  • 14. or Business T ype System Name Brief Description Target Departments Purpose Would Connect With If a company wants to get a legitimate “leg up” on the competition, they would want to look into this type of system. Management Support System A portion
  • 15. of Management Information Systems derived of a set of questions and answers, for the intended purpose of generating business analysis. Any management level of a company To convert raw data into comprehensible, usable data. Anyone wanting to edge out the competition Week 1/BSA 310 Week 1 Individual Assignment - System Inventory (Virtual Organization System Inventory).docx System Inventory BSA/310 Version 7 1 University of Phoenix Material
  • 16. System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System InventoryOption 1: Virtual Organization System Inventory Select one of the following Virtual Organizations: Smith Systems Consulting Huffman Trucking Kudler Fine Foods Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary. System Name Brief Description Department to Use the System Purpose of the System Connects With Development Details Novell 4.11 Server for POS Point of Sale Server running Novell Operating System 4.11 for the individual POS machines Finance and Accounting To log the transactions of all the Point of Sale machines and keeps track of sales. Banking Institutions, Accounting and Finance Department POS PII WIN9x (4) Point of Sale computers running Windows 9x operating systems and Pentium II computers Finance and Accounting
  • 17. Enters the orders of the customers at the time of purchase. To process monetary transactions to banking institutions Main server (Novell 4.11 Server for POS) UPS-Standalone Uninterruptable Power Supply. Information Technology Standalone device in case of loss of power, your servers have time to shut down Main Servers PII 64mg RAM WIN 9x w/Office 97 (Server)XLS Inventory Spreadsheet Inventory Server, running Windows 9x, with 64MB RAM and Office 97 Finance and Accounting Keeps inventory up to date. Able to run reports, with the GL codes, Inventory name, Summary of the Item, and the amount of the item. Point of Sale Server, Sales and Marketing PII w NT Server IIS4 Winfax Pro Built in Modem and CDROM Main Intranet/Internet Server. Pentium II running Windows NT All departments This is the main server that everyone connects to. Its primary purpose is to run the website for external and internal customers. Everyone W. Clay Mundy IIIMay 6, 2012 BSA 310
  • 18. System Inventory BSA/310 Version 7 1 W. Clay Mundy III May 6, 2012 BSA 310 University of Phoenix Material System Inventory Select and complete one of the following assignments: Option 1: Virtual Organization System Inventory Option 2: General IT System Inventory Option 1 : Virtual Organization
  • 19. System Inventory Select one of the following Virtual Organizations: · Smith Systems Consulting · Huffman Trucking · Kudler Fine Foods Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary. System Name
  • 20. Brief Description Department to U se the System Purpose of the System Connects With Development Details Week 1/BSA 310 Week 1 Summary.docx One of the main important lessons I learned was what a system was and the different types there were. Businesses are able to use the two main types of systems, part of the Management Information Systems, to help with the overall business process. By utilizing the TPS, DSS, and other systems, businesses are able to get an upper hand by compressing raw data into a more useable form, a form that can be interpreted into many different ways and separated into different departments.
  • 21. I also enjoyed reading about the integration of the improvements made in the supply chain operations, with the help of IT. By involving the infrastructure of the entire IT department, as well as other departments, the company is able to maximize the Enterprise Resource Planning relationships. Supply chain management has became a very large part of businesses, and if you want to have a successful company, integrating ERP and supply chains better be part of it. Understanding how the intricacies of how IT really affects a business can be interesting. With all the separate departments of IT, all working together, if one department fails, it can be devastating to a company. If a company were to lose the database functionality, the accounting, sales, warehouse, and inventory could take a hit. Once you get all the requirements from the customer, you can start to plan out the project. With the requirements in hand, you should be able to get an idea of how many people you will need for the project, roughly the amount of time you need, and how much time you are going to need for planning. After you get all this information, you can carefully plan out how much it will cost. If you have a budget, you can filter that into the equation. As long as you take each step, one at a time, you should have no problem with the project. One of the main important lessons I learned was what a system was and the different types there were. Businesses are able to use the two main types of systems, part of the Management Information Systems, to help with the overall business process.
  • 22. By util izing the TPS, DSS, and other systems, businesses are able to get an upper hand by compressing raw data into a more useable form, a form that can be interpreted into many different ways and separated into different departments. I also enjoyed reading ab out the integration of the improvements made in the supply chain operations, with the help of IT. By involving the infrastructure of the entire IT department, as well as other departments, the company is able to maximize the Enterprise Resource Planning relationships. Supply chain management has became a very large part of businesses, and if you want to have a successful company, integrating ERP and supply chains better be part of it. Understanding how the intricacies of how IT really affects a business can be interesting.
  • 23. With all the separate departments of IT, all working together, if one department fails, it can be devastating to a company. If a company were to lose the database functionality, the accounting, sales, warehouse, and inventory could t ake a hit. Once you get all the requirements from the customer, you can start to plan out the project. With the requirements in hand, you should be able to get an idea of how many people you will need for the project, roughly the amount of time you nee d, and how much time you are going to need for planning. After you get all this information, you can carefully plan out how much it will cost. If you have a budget, you can filter that into the equation. As long as you take each step,
  • 24. one at a time, you should have no problem with the project. Week 2/BSA 310 Week 2 Summary.docx This week, learning about how businesses are moving more from a mobility environment than from a desktop environment. There are many security concerns when it comes to mobile devices, as security software and hardware have not caught up with the technology. IT departments are having to scramble to figure out the best ways to protect themselves from the mobile and tablet based devices. Also, we learned how unscrupulous people can take advantage of others by cold calling individuals and trying to get information out of them. We found of that through the methods called phishing and pharming, illegal enterprises can set up website's that look identical to real website's for the sole purpose of gaining your personal information. By sending out emails with links in them, and some unsuspecting person clicks on that link, they can be transported to these mirror website's. Lastly, learning how businesses should take security more into consideration, as without it, the entire company can be taken down. As the saying goes, "Loose lips sink ships." Someone who does not follow protocols and does not keep company information to themselves can cause great harm to the company. Securing information should be on the forefront of every company, not just the IT departments. This week, learning about how businesses are moving more from a mobility environment than from a desktop environment. There are many security concerns when it comes to mobile devices, as security software and hardware have not caught up
  • 25. with the technolog y. IT departments are having to scramble to figure out the best ways to protect themselves from the mobile and tablet based devices. Also, we learned how unscrupulous people can take advantage of others by cold calling individuals and trying to get infor mation out of them. We found of that through the methods called phishing and pharming, illegal enterprises can set up website's that look identical to real website's for the sole purpose of gaining your personal information. By sending out emails with li nks in them, and some unsuspecting person clicks on that link, they can be transported to these mirror website's. Lastly, learning how businesses should take security more into consideration, as without it, the entire company can be taken down. As the sa ying
  • 26. goes, "Loose lips sink ships." Someone who does not follow protocols and does not keep company information to themselves can cause great harm to the company. Securing information should be on the forefront of every company, not just the IT departmen ts. Week 2/BSA 310 Week 2 (Kudler Fine Foods Frequent Shopper Program 1) Riverpoint Writer.docx Kudler Fine Foods - Frequent Shopper Program W. Clay Mundy III BSA 310 5/13/2012 Running head: KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 1 KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 2
  • 27. Kudler Fine Foods - Frequent Shopper Program If you are from the La Jolla, Del Mar, or Encinitas area, then you have to be familiar with the gourmet food store of Kudler Fine Foods (hereby known as Kudler). Kudler has been able to evolve into such a fine establishment by building its business model off of a strong customer service base. By keeping their customer relationships “priority-one”, they were able to explode onto the market, gaining a valuable foothold in the gourmet food market. With their exponential growth so far, they are expected to branch out much further into California. One of the ways Kudler expects to meet the customer expectations, and satisfaction requirements, will be to implement an e-commerce aspect into their existing website. Kudler’s customer service believes that this will be a cornerstone of the next level of the companies success.Order Process Under the current order system, Kudler utilizes an ordinary logistical order process; everything is done by hand. Running head: KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 1
  • 28. Kudler Fine Foods - Frequent Shopper Program W. Clay Mundy III BSA 310 5/13/2012 Week 2/BSA 310 Week 2 (Kudler Fine Foods Frequent Shopper Program II).docx Kudler Fine Foods - Frequent Shopper Program BSA 310 Running head: KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 1 KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 6 Kudler Fine Foods - Frequent Shopper Program Kudler Fine Foods wants to create a frequent shopper program to help their customers by rewarding them, but also wanting
  • 29. them to be protected by malicious entities that might want to do them harm. In developing a Frequent Shopper Program, Kudler Fine Foods (hereby known as Kudler) will need to implement, and adhere, to strict policies and guidelines that will protect the patrons that shop at the establishments of Kudler. We can also use different modeling structures to find what kind of Frequent Shopper Program works best for Kudler. By contacting an outside agency, such as Management Science Associates, Inc., (MSA) we are able to look at data that will tell us the demographics of who is going to be utilizing the program. The MSA can show Kudler different pricing analysis, the average customer lifetime value and how they would consume, their purchasing behavior, brand forecasting, and all the while, maintaining the highest level of personal privacy. (Management Science Associates, Inc, 2012) Privacy is always on the forefront of any company’s mind, especially when it involves their customers. When you are collecting data on a customer, they should get the feeling that you are their protector, and you are not there to abuse them or their information. This is why Kudler will put safeguards in place to protect their customers. There are no true market standards to protect Kudler’s customers, so Kudler will have to devise their own methods and means to protect their customers. Kudler is not only legally bound to protect their customers, but also ethically bound as well. Whenever a business takes in information on someone, and stores it in a database, that company is legally and ethically bound to protect that customer. When that information goes into that database, no matter how seemingly harmless, it must always be protected. The IT security must be regarded in the highest of standards so that the data stored within our computer databanks will be protected. (Britz, 2000) When the customers are filling out the paperwork, for their Kudler Shopper cards, they will have the option to accept, or decline, the program. The program will describe what legal steps the company plans to do in order to protect them. They
  • 30. can always decide whether or not to participate. We will reiterate, numerous times, that their personal information will be secured and not sold to a third party, and is only used for our marketing purposes only. By letting the customer know, up front, what information we will be sharing, why we need certain information, and how we will be using that information, will be paramount to our success with our customers. The more upfront we are with them, the more they will trust us. We will also ensure that all information, entered into our databases, will be encrypted and all data will be secure. With all of our security in place, customers lined up, and frequent shoppers ready to go, what does this mean for our owners of the company? According to the Food Management Institute, if a retail establishment has a frequent shopper program, 90% of their customers utilize this system. (Food Management Institute, 2008) With an implementation of a program, customers get a feeling that they are getting a valued service, where we could implement automatic coupon deductions, point-reward systems, or even donations to charities. By give the impression that they are getting value, they will increase the amount of times they visit Kudler. At the same time, we gain value with every purchase they make. Each of their purchases are tracked, and entered, into a database. Within that database, we are able to start tracking what people are buying, at what time of the year they are buying, and how much they are buying. Another aspect of the program will allow us to help prevent waste. We may be purchasing too much of a particular product, or a particular product may be staying on the shelf and never selling. The frequent shopper program will not only tell us what is being sold, but more importantly, will tell us what is not being sold. We will also be able to improve our efficiency between our suppliers. By being able to track what is being sold and what is being wasted, we can achieve a much more accurate inventory count. Having this program fits in all win- win scenarios for Kudler Fine Foods.
  • 31. The last step, in the entire equation, will be the training of our employees. They will need to know that their professionalism will be key in keeping this system alive. They are the ones that are on the front lines. These are the individuals that meet and greet our customers. Training them to know the privacy rules, to know the new security procedures, and to know the legal and ethical steps they need to take to ensure that the customer’s data is protected is paramount to keeping this organization at the highest levels it has always had. Kudler has always prided itself in having outstanding customer service capabilities. We want to prove ourselves worthy once again. References Britz, J. J. (July, 2000). Technology as a Threat to Privacy: Ethical Challenges to the Information Profession. Retrieved from http://web.simmons.edu/~chen/nit/NIT%2796/96-025- Britz.html Food Management Institute. (April, 2008). New FMI Report Shows Food Retailers Using Technology to Remain Competitive and Meet Consumer Needs. Retrieved from http://www.fmi.org/news-room/news- archive/view/2008/04/22/new-fmi-report-shows-food-retailers- using-technology-to-remain-competitive-and-meet-consumer- needs Management Science Associates, Inc. (2012). Frequent Shopper. Retrieved from http://www.msa.com/analysis/consumer/frequent.htm Plagiarism Checker Top of Form Bottom of Form Top of Form · ·
  • 32. Bottom of Form · preferences · help Document Viewer Turnitin Originality Report · Processed on: 13-May-2012 2:29 PM CDT · ID: 249178768 · Word Count: 928 · Submitted: 1 Similarity Index 3% What's this? Similarity by Source Internet Sources: 3% Publications: 2% Student Papers: N/A include quotedinclude bibliographyexclude small matchesdownloadrefreshprint mode: 1% match (Internet from 6/16/11) http://www.antiessays.com 1% match (Internet from 4/10/12) http://www.papercamp.com Running head: KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 1 Kudler Fine Foods - Frequent Shopper ProgramBSA 310 May 12, 2010 William Schuyler Kudler Fine Foods - Frequent Shopper Program Kudler Fine Foods wants to create a frequent shopper program to help their customers by rewarding them, but also wanting them to be protected by malicious entities that might want to do them harm. In developing a Frequent Shopper Program, Kudler Fine Foods (hereby known as Kudler) will need to implement, and adhere,
  • 33. to strict policies and guidelines that will protect the patrons that shop at the establishments of Kudler. We can also use different modeling structures to find what kind of Frequent Shopper Program works best for Kudler. By contacting an outside agency, such as Management Science Associates, Inc., (MSA) we are able to look at data that will tell us the demographics of who is going to be utilizing the program. The MSA can show Kudler different pricing analysis, the average customer lifetime value and how they would consume, their purchasing behavior, brand forecasting, and all the while, maintaining the highest level of personal privacy. (Management Science Associates, Inc, 2012) Privacy is always on the forefront of any company’s mind, especially when it involves their customers. When you are collecting data on a customer, they should get the feeling that you are their protector, and you are not there to abuse them or their information. This is why Kudler will put safeguards in place to protect their customers. There are no true market standards to protect Kudler’s customers, so Kudler will have to devise their own methods and means to protect their customers. Kudler is not only legally bound to protect their customers, but also ethically bound as well. Whenever a business takes in information on someone, and stores it in a database, that company is legally and ethically bound to protect that customer. When that information goes into that database, no matter how seemingly harmless, it must always be protected. The IT security must be regarded in the highest of standards so that the data stored within our computer databanks will be protected. (Britz, 2000) When the customers are filling out the paperwork, for their Kudler Shopper cards, they will have the option to accept, or decline, the program. The program will describe what legal steps the company plans to do in order to protect them. They can always decide whether or not to participate. We will reiterate, numerous times, that their personal information will be secured and not sold to a third party, and is only used for our marketing purposes only. By letting the customer know, up front, what information we will be sharing, why we need certain
  • 34. information, and how we will be using that information, will be paramount to our success with our customers. The more upfront we are with them, the more they will trust us. We will also ensure that all information, entered into our databases, will be encrypted and all data will be secure. With all of our security in place, customers lined up, and frequent shoppers ready to go, what does this mean for our owners of the company? According to the Food Management Institute, if a retail establishment has a frequent shopper program, 90% of their customers utilize this system. (Food Management Institute, 2008) With an implementation of a program, customers get a feeling that they are getting a valued service, where we could implement automatic coupon deductions, point-reward systems, or even donations to charities. By give the impression that they are getting value, they will increase the amount of times they visit Kudler. At the same time, we gain value with every purchase they make. Each of their purchases are tracked, and entered, into a database. Within that database, we are able to start tracking what people are buying, at what time of the year they are buying, and how much they are buying. Another aspect of the program will allow us to help prevent waste. We may be purchasing too much of a particular product, or a particular product may be staying on the shelf and never selling. The frequent shopper program will not only tell us what is being sold, but more importantly, will tell us what is not being sold. We will also be able to improve our efficiency between our suppliers. By being able to track what is being sold and what is being wasted, we can achieve a much more accurate inventory count. Having this program fits in all win-win scenarios for Kudler Fine Foods. The last step, in the entire equation, will be the training of our employees. They will need to know that their professionalism will be key in keeping this system alive. They are the ones that are on the front lines. These are the individuals that meet and greet our customers. Training them to know the privacy rules, to know the new security procedures, and to know the legal and ethical steps they need to take to ensure that the
  • 35. customer’s data is protected is paramount to keeping this organization at the highest levels it has always had. Kudler has always prided itself in having outstanding customer service capabilities. We want to prove ourselves worthy once again. References Britz, J. J. (July, 2000). Technology as a Threat to Privacy: Ethical Challenges to the Information Profession. Retrieved from http://web.simmons.edu/~chen/nit/NIT'96/96- 025- Britz.html Food Management Institute. (April, 2008). New FMI Report Shows Food Retailers Using Technology to Remain Competitive and Meet Consumer Needs. Retrieved from http://www.fmi.org/news-room/news- archive/view/2008/04/22/new-fmi-report-shows- food-retailers- using-technology-to-remain-competitive-and-meet-consumer- needs Management Science Associates, Inc. (2012). Frequent Shopper. Retrieved from http://www.msa.com/analysis/consumer/frequent.htm KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 2 KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 3 KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 4 KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 5 Running head: KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM 1
  • 36. Kudler Fine Foods - Frequent Shopper Program BSA 310 Week 2/BSA 310 Week 2 DQ 1 (Security Of Data).docx Usually, a company puts a ton of money into the security of its data, but forgets that the biggest security flaws it has is its every day employee, walking in and out, on a daily basis. Without giving employees proper training, they may not know how dangerous that they are leaving their offices, or their entire workspace. When I worked for a school system, they trained us to, the IT staff, to always lock our computers, even if we only got up from our desks for a moment. Even if it meant we were walking over to get something from the printer, we needed to lock the computer. That way, nothing could ever be done from our computers and all the burden was left to us. If something happened from our computers, it was our fault, unless there was an outside breach. Teaching employees that they have a responsibility to the company to keep their data protected is paramount. People can be easily tricked into giving up information, even in basic conversation with one another. If you do not know who is around you, you can tell something private and give out secrets. This is why you should always keep company secrets to yourself and only discuss them with appropriate personnel. Teaching this early on, to the employees, will keep the chance of information getting out.
  • 37. Usually, a company puts a ton of money into the security of its data, but forgets that the biggest security flaws it has is its every day employee, walking in and out, on a daily basis. Without giving employees proper training, they may not know how dangerous that they are leaving their offices, or their entire workspace. When I worked for a school system, they tra ined us to, the IT staff, to always lock our computers, even if we only got up from our desks for a moment. Even if it meant we were walking over to get something from the printer, we needed to lock the computer. That way, nothing could ever be done from our computers and all the burden was left to us. If something happened from our computers, it was our fault, unless there was an outside breach.
  • 38. Teaching employees that they have a responsibility to the company to keep their data protected is paramount. People can be easily tricked into giving up information, even in basic conversation with one another. If you do not know who is around you, you can tell something private and give out secrets. This is why you should always keep company secrets to yours elf and only discuss them with appropriate personnel. Teaching this early on, to the employees, will keep the chance of information getting out. Week 2/BSA 310 Week 2 DQ 2 (Phishing and Pharming Security).docx Phishing is a method of where an non-legitimate source will try and get information from someone, either by providing a link to a site or to a bogus site. This is usually a way to see if there are legitimate email addresses or not. Pharming utilizes the same technology as Phishing, but may take you to a copy of a banking site (IE PayPal) and ask you for your login ID and password. When you login, it may say your login ID has failed and you need to re-verify who you are. When you do this, you
  • 39. are actually giving your information to someone else, instead of the target you intended. Spoofing is very popular with the Nigerian Scam. Where someone makes someone believe that you have won a ton of money, but you need to send them money, and your information first. The best way to help your employees from not getting involved with any of this type of trouble, is to teach them to not open anything from an email. If they get an email from a "trusted" source, always open a browser themselves, and go to the source manually. This way, there is no middleman. If you use the shortcut, it puts all the power in the hands of the email sender. This is how I keep myself safe in my own emails. Phishing is a method of where an non - legitimate source will try and get information from someone, either by providing a link to a site or to a bogus site. This is usually a way to see if there are legitimate email addresses or not. Pharming utilizes the same technology as Phishing, but may take you to a copy of a banking site (IE PayPal) and ask you for your login ID and password. When you login, it may say your login ID has failed and you need to re - verify who
  • 40. you are. When you do this, y ou are actually giving your information to someone else, instead of the target you intended. Spoofing is very popular with the Nigerian Scam. Where someone makes someone believe that you have won a ton of money, but you need to send them money, and your i nformation first. The best way to help your employees from not getting involved with any of this type of trouble, is to teach them to not open anything from an email. If they get an email from a "trusted" source, always open a browser themselves, and go to the source manually. This way, there is no middleman. If you use the shortcut, it puts all the power in the hands of the email sender. This
  • 41. is how I keep myself safe in my own emails. Week 3/BSA 310 Week 3 (Kudler Accounting System) Accounting System.docx Kudler Accounting System BSA 310 Running head: KUDLER ACCOUNTING SYSTEM 1 KUDLER ACCOUNTING SYSTEM 5 Kudler Accounting System To the Executives of Kudler Fine Foods, Today, I introduce to you an idea that will help revolutionize the accounting process at Kudler Fine Foods. Upon its implementation, Kudler Fine foods will be able to easily manage its portfolio of accounts and analyze all of its data, all at a moment’s notice. The ability to access reports, on a annually, bi-annually, quarterly, or any time therein, is completely up to the individual. The financial benefits will be instantaneous to the company. One of the key benefits Kudler Fine Foods will gain will be the ability to handle all the raw data that you did not have command of before. This new system not only allows you to improve your financial strategies, but you can also increase your
  • 42. management potential by forecasting future investments. By prompting these new strategies, you are able to access areas of information not easily accessible before, like cash flow and asset management, just to name a few. How can we achieve this level of satisfaction in one software product? Let’s take a look at some of the key features that are built in to the accounting software package. Key Features · Software Compatible – The software is fully integrated with the most popular of software technologies. It will work with the Microsoft Office Suite of applications seamlessly. This will allow Kudler Fine Foods to be able to integrate reports into documents, spreadsheets, or emails without any technical issues. · Cross-Department Integration – The software is not sterilized to accounting only, but is distributed to all departments. This means the accounting software tracks the inventory and purchasing departments, as well as, the general accounting department. · Business Intelligence – Kudler Fine Foods has access to endless amounts of raw data. This data can be turned into charts and graphs, at a moment’s notice. Access the general ledgers information, create a business presentation, and create the best critical decision possible. · More Budgetary Control – With built-in tools, like general ledgers, cash management, fixed asset management, and financial forecasting, you are in control of your financial corporate assets. Knowing where your company is heading, financially, allows executive managers to take directive control and direct the company in a manner that they were not able to before. This is but a mere sample of what you can expect from this extraordinary software. No matter how much Kudler Fine Foods grows in the coming years, this software will grow with the company. It allows for a high amount of scalability, which means as the company grows and expands, so does the
  • 43. software’s abilities. Another excellent advantage of the software would be the integration of all the departments within Kudler Fine Foods. The ability to seamlessly swap data between departments, at a moment’s notice, ensures that the communication lines will always be open between departments. The beauty of this product is that within the first six months of ownership, it will have paid for itself. In the first three months, you will be able to view reports that you would not have ever been able to access. You will be able to access reports, customizable to your own specifications. If you have concerns with supporting the software, a minimal IT department can support the software, as well as, the accounting software developers will be there 24/7. It does not take an extraordinary amount of extra care to support the software, internally. If you already have an IT staff, they can be trained to support the software. I believe that with all the advances this accounting software has, Kudler Fine Foods will be tough competitor to beat. With the insight that this accounting package gives, the scalability potential the software offers, and the potential to make Kudler Fine Foods a global market leader, utilizing this software package should be priority one. If you have any questions, or concerns, please feel free to contact my office. References Bourgoin, A. (2010, April). 7 Things to Consider Before Buying Small Business Accounting Software. Retrieved from http://www.smallbizskills.com/small-business-tips/7-things-to- consider-before-buying-small-business-accounting-software/ Business-Software.com. (2012). 6 Factors to Consider When
  • 44. Buying Accounting Software. Retrieved from http://www.business-software.com/article/6-factors-to-consider- when-buying-accounting-software/ Journal Officiel. (2012, March). What do you consider before purchasing accounting software for small business. Retrieved from http://journalofficielniger.org/what-do-you-consider- before-purchasing-accounting-software-for-small-businesses/ Nickels, W. G., McHugh, J. M., & McHugh, S. M. (2010). Understanding Business (9th ed.). New York, NY: McGraw-Hill Irwin. Wasserman, E. (2009, December). How to Choose Business Accounting Software. Retrieved from http://www.inc.com/guides/choosing-accounting-software.html Top of Form Bottom of Form Top of Form Running head: KUDLER ACCOUNTING SYSTEM 1 Kudler Accounting System BSA 310 Week 3/BSA 310 Week 3 DQ 1 (Accounting System Today and
  • 45. Earlier).docx Accounting systems are a little different than they were when I was growing up. I learned them to be little elderly ladies taking care of simple bookkeeping. Today, the role has changed dramatically. Accounting systems are now a major role within a company's environment. The systems are able to take raw information and converting that information into usable data. They can then use that data to forecast how well and what the business can do in the future. Individual departments are able to run reports, from the company databases, and find out how they can improve their bottom line. These systems also manage customer data, as well as, all the corresponding financial information as well.. Without the incorporation of complex IT systems, the majority of these accounting systems would not be possible. Without the use of high speed networks, the people in the individual departments would not be able to receive the information in a timely manner. The same could be said for the efficiencies of databases and mainframes/servers. The efficiencies at which databases, and the hardware that these systems run on, not to mention the level of expertise that takes to maintain them, are amazing. Without these technologies on hand, we would not have the modern accounting systems that we know today. Accounting systems are a little different than they were when I was growing up. I learned them to be little elderly ladies taking care of simple bookkeeping. Today, the role has changed dramatically.
  • 46. Accounting systems are now a major role within a company's environment. The systems are able to take raw information and converting that information into usable data. They can then use that data to forecast how well and what the business can do in the future. Individual departments are able to run rep orts, from the company databases, and find out how they can improve their bottom line. These systems also manage customer data, as well as, all the corresponding financial information as well.. Without the incorporation of complex IT systems, the majorit y of these accounting systems would not be possible. Without the use of high speed networks, the people in the individual departments would not be able to receive the information in a timely manner.
  • 47. The same could be said for the efficiencies of database s and mainframes/servers. The efficiencies at which databases, and the hardware that these systems run on, not to mention the level of expertise that takes to maintain them, are amazing. Without these technologies on hand, we would not have the modern ac counting systems that we know today. Week 3/BSA 310 Week 3 DQ 2 (Accounting System to Interact, or Integrate, With the Other Systems).docx The reason why you would want an accounting system to interact, or integrate, with the other systems, within a business, would be because of the enormous potential gains that could be gained from it. An accounting system, by itself, is a powerful item, but to have it integrated with the logistical side of your business lets you analyze what is coming and going from your warehouses, and at what cost. How much labor is going into each of the shifts? Where can some of the fat be trimmed to make things run smoother? Are there room for improvements? These are all valuable questions that can be answered with the data that can be received by integrating systems together. Not everything can be gained by viewing it alone, but if you integrate your software packages together, you can gain so much more knowledge. The same goes for your other departments. You can analyze your labor costs, your office product needs. Are you paying too
  • 48. much for your paper products? Where can you save money? Analyzing the data is a good way to utilize the information. You can have your accounting system be a standalone device, but why waste its true potential? The reason why you would want an accounting system to interact, or integrate, with the other systems, within a business, would be because of the enormous potential gains that could be gained from it. An accounting system, by itself, is a powerful item, bu t to have it integrated with the logistical side of your business lets you analyze what is coming and going from your warehouses, and at what cost. How much labor is going into each of the shifts? Where can some of the fat be trimmed to make things run s moother? Are there room for improvements? These are all valuable questions that can be answered with the data that can be received by integrating systems together. Not everything can be gained by viewing it alone, but if you
  • 49. integrate your software pack ages together, you can gain so much more knowledge. The same goes for your other departments. You can analyze your labor costs, your office product needs. Are you paying too much for your paper products? Where can you save money? Analyzing the data is a good way to utilize the information. You can have your accounting system be a standalone device, but why waste its true potential? Week 3/BSA 310 Week 3 Summary.docx In the third installment, the students got to learn a little more in-depth about the accounting aspects of a business. I really enjoyed learning about the intricacies of keeping a business alive. Also, learning the major role's in business was very enlightening. Learning who the internal and external decision makers were, in the company, solidified how I view the roles. Understanding that CEO's and managers are the internal decision makers and investors and stockholders are the external
  • 50. decision makers. The third item I learned about this week would be learning about the difference between stocks and bonds. I have always wondered what exactly made up the difference. When you buy stock, you are buying an actual piece of the company, or taking ownership in the company. Whereas when you buy a bond, you are not buying part of a company, but you are buying part of a credit in which the company will pay you for investing into the company, without actually owning a part of the company. Future trends will be a little more difficult to predict. With the economy a shaky as it is, it will be difficult to predict a solid performing accounting system. We need something that will forecast data efficiently, while lifting our economy out of the slump we can been in for these so many years. I hope someone can figure out a revolutionary algorithm that will transform the accounting world in time to save us while I am still alive. In the third installment, the students got to learn a little more in - depth about the accounting aspects of a business. I really enjoyed learning about the intricacies of keeping a business alive. Also, learning the major role's in business was very enlightening. Learning who the internal and external decision makers were, in the company, solidified how I view the roles.
  • 51. Understanding that CEO's and managers are the internal decision makers and investors and stockholders are th e external decision makers. The third item I learned about this week would be learning about the difference between stocks and bonds. I have always wondered what exactly made up the difference. When you buy stock, you are buying an actual piece of the c ompany, or taking ownership in the company. Whereas when you buy a bond, you are not buying part of a company, but you are buying part of a credit in which the company will pay you for investing into the company, without actually owning a part of the compa ny. Future trends will be a little more difficult to predict. With the economy a shaky as it is, it will be difficult to predict a solid performing accounting system. We need something that will
  • 52. forecast data efficiently, while lifting our economy out o f the slump we can been in for these so many years. I hope someone can figure out a revolutionary algorithm that will transform the accounting world in time to save us while I am still alive. Week 4/BSA 310 Week 4 ( McBride Marketing Paper - Individual).docx McBride Marketing Plan BSA 310 Running head: RHIORDAN MARKETING PLAN 1 MCBRIDE MARKETING PLAN 3 McBride Marketing Plan McBride Financial Services is an exponentially growing financial and mortgage services company, with five current locations, in five states, and a planned expansion of another three locations in the coming future. McBride Financial believes in being upfront with their service charges, to garner the customer’s trust, and show the customer they do not offer
  • 53. any hidden costs. They also offer a speedy application process, as to allow the customer ample time to search for the house they want, instead of the hassle of waiting for their paperwork to go through. McBride Financial has geared their company to be as customer-centric as possible. Marketing Plan When developing a marketing plan, for McBride Financial, we have to look at which areas we want to explore. Under McBride’s current marketing plan, they have already planned to hit the current route of, “Local TV ads, Local newspapers, Informational handouts at airports and major tourist attractions, Local radio, and Local realtors,” but this hits only a local source (Virtual Organizations Portal, 2011). To be able to target a much larger audience, we need to think on a much larger scale. Whenever the advertisements are run, there needs to be an attention to detail to the website address given. This will give people instant access to the website. Having an email address, on the advertisements, as well as the website, will give people the opportunity to ask questions, if they have any. This is where other marketing plans have failed, in the past. In the old days, there was no way for anyone to market 24 hours a day, 7 days a week; now companies are able to. This allows for more exposure into the company. Your online presence will give you the market exposure that McBride Financial wants. Now, you need to gain exposure to your website, from online. You can garner more attention, online, by buying ad-space from other realtor websites. Online advertising can be a cheaper way to advertise than print, or television. There is less hassle involved, when developing and online campaign, and once it is completed, you can use it over and over again; you do not have to reprint it or have to pay for supplies. In 2001, the average cost of a banner advertisement (an advertisement that was located at the top of a website, usually), ranged from $5 to $68 (McCabe, 2001). Placing a banner ad, or any time of advertisement, with an
  • 54. online entity, can gain McBride a ton of recognition. For example, according to Realtor.com’s website, they have 13.7 million people visit their site every month. (Move, Inc, 2012) With this kind of traffic, you may have to pay a higher amount for advertising, but it may be worth it in the long run. But, then again, would it be cheaper to pay for an email campaign? McBride Financial should also compare the cost of a banner-ad campaign to that of an email marketing campaign. Purchasing a list of e-mail leads, although frowned upon by the general public, can be a cheaper solution to your marketing needs. Otherwise known as email spam, getting a basic list of leads is a good, clean way of getting your name out to the masses. This should easily fall within the start-up budget of $50,000, or if McBride wanted to advertise with an email campaign, they could use their follow-up budget of $5,000 per month for this. Target Markets The target markets for these campaigns are going to fall within a wide, but specific category. Within their business plan, they specify that they want to target professionals, retirees, and families that are purchasing their first or second homes. (Virtual Organizations Portal, 2011) This is a pretty wide market, as it almost covers anyone that is looking to purchase a home. The good thing about this process is that McBride has narrowed down the exact focus of their market, instead of floundering for full attention of the whole market. I would like to offer one alternative to their target audience: the individual. It is true, that the professional worker would have the monetary income to afford a new home, and a retiree would also have a savings account/income for a new home, but to exclude an individual, one that may have an alternative source of income, may be unwise. This is a target audience that McBride may not want to exclude. If the clientele that McBride is looking to help consists of anyone that can pass a credit check, and be able to pay the $1500 initial price, then this is a segment that should not be overlooked. Conclusion
  • 55. McBride Financial now has the strategic advantage of taking their business where they want to go. Advertising and marketing your brand is not an easy process, but a necessary process none the less. Once McBride gets their foothold on their internet markets, they should not have any trouble becoming the global dominators in the mortgage financial markets. References Armstrong, G., & Kotler, P. (2011). Marketing: An introduction (10th ed.). Boston, MA: Prentice Hall. McCabe, B. (2001, September). Online Advertising: Costs vs. Effectiveness. Retrieved from http://images.forbes.com/fdc/mediaresourcecenter/documents/ge rtner.pdf Move, Inc. (2012). Media Solution s. Retrieved from http://www.realtor.com/mediasolutions/ouraudience/keymeasure s/ Virtual Organizations Portal. (2011). McBride Financial Services. Retrieved from https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/McB ride/intranet/business-plan.html Top of Form Bottom of Form
  • 56. Top of Form · · Bottom of Form · preferences Document Viewer Turnitin Originality Report · Processed on: 26-May-2012 10:25 PM CDT · ID: 251784064 · Word Count: 888 · Submitted: 1 McBride Marketing Paper By Similarity Index 1% What's this? Similarity by Source Internet Sources: 1% Publications: 0% Student Papers: N/A include quotedinclude bibliographyexclude small matchesdownloadrefreshprint
  • 57. mode: 1% match (Internet from 11/1/11) http://www.thetimeshareblog.com Running head: RHIORDAN MARKETING PLAN 1 McBride Marketing Plan BSA 310 May 27, 2012 William Shuyler McBride Marketing Plan McBride Financial Services is an exponentially growing financial and mortgage services company, with five current locations, in five states, and a planned expansion of another three locations in the coming future. McBride Financial believes in being upfront with their service charges, to garner the customer’s trust, and show the customer they do not offer any hidden costs. They also offer a speedy application process, as to allow the customer ample time to search for the house they want, instead of the hassle of waiting for their paperwork to go through. McBride Financial has geared their company to be as customer-centric as possible. Marketing Plan When developing a marketing plan, for McBride Financial, we have to look at which areas we want to explore. Under McBride’s current marketing plan, they have already planned to hit the current route of, “Local TV ads, Local newspapers, Informational handouts at airports and major tourist attractions, Local radio, and Local realtors,” but this hits only a local source (Virtual Organizations Portal, 2011). To be able to target a much larger audience, we need to think on a much larger scale. Whenever the advertisements are run, there
  • 58. needs to be an attention to detail to the website address given. This will give people instant access to the website. Having an email address, on the advertisements, as well as the website, will give people the opportunity to ask questions, if they have any. This is where other marketing plans have failed, in the past. In the old days, there was no way for anyone to market 24 hours a day, 7 days a week; now companies are able to. This allows for more exposure into the company. Your online presence will give you the market exposure that McBride Financial wants. Now, you need to gain exposure to your website, from online. You can garner more attention, online, by buying ad-space from other realtor websites. Online advertising can be a cheaper way to advertise than print, or television. There is less hassle involved, when developing and online campaign, and once it is completed, you can use it over and over again; you do not have to reprint it or have to pay for supplies. In 2001, the average cost of a banner advertisement (an advertisement that was located at the top of a website, usually), ranged from $5 to $68 (McCabe, 2001). Placing a banner ad, or any time of advertisement, with an online entity, can gain McBride a ton of recognition. For example, according to Realtor.com’s website, they have 13.7 million people visit their site every month. (Move, Inc, 2012) With this kind of traffic, you may have to pay a higher amount for advertising, but it may be worth it in the long run. But, then again, would it
  • 59. be cheaper to pay for an email campaign? McBride Financial should also compare the cost of a banner-ad campaign to that of an email marketing campaign. Purchasing a list of e-mail leads, although frowned upon by the general public, can be a cheaper solution to your marketing needs. Otherwise known as email spam, getting a basic list of leads is a good, clean way of getting your name out to the masses. This should easily fall within the start-up budget of $50,000, or if McBride wanted to advertise with an email campaign, they could use their follow- up budget of $5,000 per month for this. Target Markets The target markets for these campaigns are going to fall within a wide, but specific category. Within their business plan, they specify that they want to target professionals, retirees, and families that are purchasing their first or second homes. (Virtual Organizations Portal, 2011) This is a pretty wide market, as it almost covers anyone that is looking to purchase a home. The good thing about this process is that McBride has narrowed down the exact focus of their market, instead of floundering for full attention of the whole market. I would like to offer one alternative to their target audience: the individual. It is true, that the professional worker would have the monetary income to afford a new home, and a retiree would also have a savings account/income for a new home, but to exclude an individual, one that may have an alternative source of income, may be unwise. This is a target audience that McBride may not want to
  • 60. exclude. If the clientele that McBride is looking to help consists of anyone that can pass a credit check, and be able to pay the $1500 initial price, then this is a segment that should not be overlooked. Conclusion McBride Financial now has the strategic advantage of taking their business where they want to go. Advertising and marketing your brand is not an easy process, but a necessary process none the less. Once McBride gets their foothold on their internet markets, they should not have any trouble becoming the global dominators in the mortgage financial markets. References Armstrong, G., & Kotler, P. (2011). Marketing: An introduction (10th ed.). Boston, MA: Prentice Hall. McCabe, B. (2001, September). Online Advertising: Costs vs. Effectiveness. Retrieved from http://images.forbes.com/fdc/mediaresourcecenter/documents/ge rtner.pdf Move, Inc. (2012). Media