Week 1/BSA 310 Material Week 1.docx
System Inventory
BSA/310 Version 7
1
University of Phoenix Material
System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory
Option 2: General IT System InventoryOption 1: Virtual Organization System Inventory
Select one of the following Virtual Organizations:
Smith Systems Consulting
Huffman Trucking
Kudler Fine Foods
Complete the following chart, filling in information for each system used at that Virtual Organization. Add rows to the chart as necessary.
System Name
Brief Description
Department to Use the System
Purpose of the System
Connects With
Development Details
Option 2: General IT System Inventory
Complete the following chart, filling in information for each system. Add rows to the chart as necessary.
Industry or Business Type
System Name
Brief Description
Target Departments
Purpose
Would Connect With
System Inventory
BSA/310
Version
7
1
University of Phoenix Material
System Inventory
Select
and complete
one of the following
assignments:
Option 1: Virtual
Organization System Inventory
Option 2: General IT System Inventory
Option 1
:
Virtual Organization
System Inventory
Select
one of the following Virtual Organizations:
·
Smith Systems Consulting
·
Huffman Trucking
·
Kudler Fine Foods
Complete
the
following
chart, filling in information for
each system used at that
Virtual
Organization. Add rows to the chart as necessary.
System
Name
Brief
Description
Department
to
U
se
the
System
Purpose
of
the
System
Connects
With
Development
Details
Week 1/BSA 310 Week 1 DQ 2 (Business Analysis).docx
When businesses do not include analysis, or they skip the analysis portion of project, they think they are adding precious time to the project for other items, but they are really just shooting themselves in the foot. By not taking the proper precautions and scoping out the project guidelines ahead of time, they will often fall flat, or even worse, miss their deadlines by missing something in the project. The other catastrophe are projects that are planned for too long. If something is planned for too long, it will end up in development hell, and will make everyone unhappy. Clients will wonder where their product has gone, budgetary concerns will creep in, and management concerns will trickle down to lower management staff.
By taking the time to do a project the right way, the first time, everything will work out for the best. Remember the old saying, "If you fail to plan, you are planning to fail."
When businesses do not include analysis, or they skip the analysis portion of project, they think
they are adding precious time to the project for other items, but they are really just shooting
themselves in the foot.
By not taking the proper precautions
and scoping out the project
guidelines ahead of time, they will often fall flat, or even wors.
Measures of Dispersion and Variability: Range, QD, AD and SD
Week 1BSA 310 Material Week 1.docxSystem InventoryBSA310 V.docx
1. Week 1/BSA 310 Material Week 1.docx
System Inventory
BSA/310 Version 7
1
University of Phoenix Material
System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory
Option 2: General IT System InventoryOption 1: Virtual
Organization System Inventory
Select one of the following Virtual Organizations:
Smith Systems Consulting
Huffman Trucking
Kudler Fine Foods
Complete the following chart, filling in information for each
system used at that Virtual Organization. Add rows to the chart
as necessary.
System Name
Brief Description
Department to Use the System
Purpose of the System
Connects With
Development Details
2. Option 2: General IT System Inventory
Complete the following chart, filling in information for each
system. Add rows to the chart as necessary.
Industry or Business Type
System Name
Brief Description
Target Departments
Purpose
Would Connect With
System Inventory
3. BSA/310
Version
7
1
University of Phoenix Material
System Inventory
Select
and complete
one of the following
assignments:
Option 1: Virtual
Organization System Inventory
Option 2: General IT System Inventory
Option 1
:
Virtual Organization
System Inventory
Select
4. one of the following Virtual Organizations:
·
Smith Systems Consulting
·
Huffman Trucking
·
Kudler Fine Foods
Complete
the
following
chart, filling in information for
each system used at that
Virtual
Organization. Add rows to the chart as necessary.
System
Name
Brief
Description
Department
5. to
U
se
the
System
Purpose
of
the
System
Connects
With
Development
Details
Week 1/BSA 310 Week 1 DQ 2 (Business Analysis).docx
When businesses do not include analysis, or they skip the
analysis portion of project, they think they are adding precious
time to the project for other items, but they are really just
shooting themselves in the foot. By not taking the proper
precautions and scoping out the project guidelines ahead of
time, they will often fall flat, or even worse, miss their
deadlines by missing something in the project. The other
catastrophe are projects that are planned for too long. If
something is planned for too long, it will end up in development
hell, and will make everyone unhappy. Clients will wonder
where their product has gone, budgetary concerns will creep in,
and management concerns will trickle down to lower
management staff.
6. By taking the time to do a project the right way, the first time,
everything will work out for the best. Remember the old
saying, "If you fail to plan, you are planning to fail."
When businesses do not include analysis, or they skip the
analysis portion of project, they think
they are adding precious time to the project for other items, but
they are really just shooting
themselves in the foot.
By not taking the proper precautions
and scoping out the project
guidelines ahead of time, they will often fall flat, or even
worse, miss their deadlines by missing
something in the project.
The other catastrophe are projects that are planned for too long.
If
something is planned for too lo
ng, it will end up in development hell, and will make everyone
unhappy.
Clients will wonder where their product has gone, budgetary
concerns will creep in,
and management concerns will trickle down to lower
management staff.
By taking the time to do a
7. project the right way, the first time, everything will work out
for the
best.
Remember the old saying, "If you fail to plan, you are planning
to fail."
Week 1/BSA 310 Week 1 DQ1 (Discovery Phase).docx
During the "discovery" phase of the system build is when you
would find all the information you would need for the
requirements on the build. There are several "discoveries" that
you will find: The Objective, Scope, Business Activities, and
Functional and Informational Requirements. The four
discoveries will lead you down the path of business analysis and
provide you with the information that will allow your to fulfill
your business objectives. This process is also know as the
Elicitation Process. By discovering who, or what, your
objectives are going to be,or achieve; with this, you will have a
starting point. The next step would be to ask questions that
figure out that impacts the project will have on others. What
will the project have in it, or not have in it. You must define
exactly what the project is going to have in it, at this stage of
development. Next, we will look at what Activities the project
will start. This is a good time to get teams together and start
bouncing ideas off each other. To get ideas flowing and to have
those ideas put down on paper. No idea can be considered too
"stupid", because ideas can be branched off one another to
create better ideas. These sessions can be very productive.
Also, research teams can be utilized during this time, as well.
Now, we need to find the functional requirements of the
project. By making a list of all the items needed on the project,
you can gather all the functional items needed for the project.
The final portion is Data requirements. All this means is
looking for informational requirements. This is basically a
8. document level activity. Document all processes that happened
through the process.
During the "discovery" phase of the system build is when you
would find all the information you
would need for the requirements on the build.
There are several "discoveries" that you will find:
The Objective, Scope, Business Activities, and Functional and
Informational Requirements.
The
four discoveries will lead you down the path of business
analysis and provide you with the
information that will allow your to fulfill your business
objectives.
This process is also know as
the Elicitation Process.
By di
scovering who, or what, your objectives are going to be,or
achieve;
with this, you will have a starting point.
The next step would be to ask questions that figure out
that impacts the project will have on others.
What will the project have in it, or not
9. have in it.
You must define exactly what the project is going to have in it,
at this stage of development.
Next, we will look at what Activities the project will start.
This is a good time to get teams
together and start bouncing ideas off each other.
To get ideas flowing and to have those ideas
put down on paper.
No idea can be considered too "stupid", because ideas can be
branched off
one another to create better ideas.
These sessions can be very productive.
Also, research teams
can be utilized du
ring this time, as well.
Now, we need to find the functional requirements of
the project.
10. By making a list of all the items needed on the project, you can
gather all the
functional items needed for the project.
The final portion is Data requirements.
All this means is
looking for informational requirements.
This is basically a document level activity.
Document
all processes that happened through the process.
Week 1/BSA 310 Week 1 Individual Assignment System
Inventory (General IT System Inventry) .docx
System Inventory
BSA/310 Version 7
1
University of Phoenix Material
System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory
Option 2: General IT System InventoryOption 2: General IT
System Inventory
Complete the following chart, filling in information for each
11. system. Add rows to the chart as necessary.
Industry or Business Type
System Name
Brief Description
Target Departments
Purpose
Would Connect With
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Management Support System
A portion of Management Information Systems derived of a set
of questions and answers, for the intended purpose of
generating business analysis.
Any management level of a company
To convert raw data into comprehensible, usable data.
Anyone wanting to edge out the competition
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Management Information Systems
The system in which internal and external data is collected and
distributed in an organized manner, in which a company can
process the information.
Any management level of a company
Centralized repository of stored data, to be processed into a
utilized form
Anyone wanting to edge out the competition
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Decision Support Systems
A computerized system that collects data, analyzes it, and
makes conclusions
Any management level of a company
To give management a hand in making decisions by applying
rules to the acquired data and getting conclusions based on
those rules.
12. Managers needing help making business decisions
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Operation Support Systems
Encompasses the Transaction Processing System and the
Process Control System
Non-managerial staff
As the name implies, it is the operational portion of a company
The “guts” of a company: the sales force, warehouse, inventory,
payroll, etc.
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Transaction Processing Systems
A system used to process transactions, usually credit cards.
Office employees
A system that allows for the storing and retrieving of
transactions.
Sales people, office personal
If a company wants to get a legitimate “leg up” on the
competition, they would want to look into this type of system.
Process Control Systems
An amount of raw data, that is gathered and then transformed
into more useable data
Used in conjunction with Operations Support System
Takes raw data and converts it into more legible information
The Operational Support System
System Inventory
BSA/310
Version
7
13. 1
University of Phoenix Material
System Inventory
Select
and complete
one of the following
assignments:
Option 1: Virtual
Organization System Inventory
Option 2: General IT System Inventory
Option 2:
General IT System Inventory
Complete
the
following
chart, filling in information for each system. Add rows to the
chart as necessary.
Industry
15. of
Management
Information
Systems derived
of a set of
questions and
answers, for the
intended purpose
of generating
business analysis.
Any
management
level of a
company
To convert raw
data into
comprehensible,
usable data.
Anyone
wanting to
edge out the
competition
Week 1/BSA 310 Week 1 Individual Assignment - System
Inventory (Virtual Organization System Inventory).docx
System Inventory
BSA/310 Version 7
1
University of Phoenix Material
16. System Inventory
Select and complete one of the following assignments:
Option 1: Virtual Organization System Inventory
Option 2: General IT System InventoryOption 1: Virtual
Organization System Inventory
Select one of the following Virtual Organizations:
Smith Systems Consulting
Huffman Trucking
Kudler Fine Foods
Complete the following chart, filling in information for each
system used at that Virtual Organization. Add rows to the chart
as necessary.
System Name
Brief Description
Department to Use the System
Purpose of the System
Connects With
Development Details
Novell 4.11 Server for POS
Point of Sale Server running Novell Operating System 4.11 for
the individual POS machines
Finance and Accounting
To log the transactions of all the Point of Sale machines and
keeps track of sales.
Banking Institutions, Accounting and Finance Department
POS PII WIN9x
(4) Point of Sale computers running Windows 9x operating
systems and Pentium II computers
Finance and Accounting
17. Enters the orders of the customers at the time of purchase. To
process monetary transactions to banking institutions
Main server (Novell 4.11 Server for POS)
UPS-Standalone
Uninterruptable Power Supply.
Information Technology
Standalone device in case of loss of power, your servers have
time to shut down
Main Servers
PII 64mg RAM WIN 9x w/Office 97 (Server)XLS Inventory
Spreadsheet
Inventory Server, running Windows 9x, with 64MB RAM and
Office 97
Finance and Accounting
Keeps inventory up to date. Able to run reports, with the GL
codes, Inventory name, Summary of the Item, and the amount of
the item.
Point of Sale Server, Sales and Marketing
PII w NT Server IIS4 Winfax Pro Built in Modem and CDROM
Main Intranet/Internet Server. Pentium II running Windows NT
All departments
This is the main server that everyone connects to. Its primary
purpose is to run the website for external and internal
customers.
Everyone
W. Clay Mundy IIIMay 6, 2012 BSA 310
18. System Inventory
BSA/310
Version
7
1
W. Clay Mundy III
May 6, 2012 BSA 310
University of Phoenix Material
System Inventory
Select
and complete
one of the following
assignments:
Option 1: Virtual
Organization System Inventory
Option 2: General IT System Inventory
Option 1
:
Virtual Organization
19. System Inventory
Select
one of the following Virtual Organizations:
·
Smith Systems Consulting
·
Huffman Trucking
·
Kudler Fine Foods
Complete
the
following
chart, filling in information for
each system used at that
Virtual
Organization. Add rows to the chart as necessary.
System
Name
20. Brief
Description
Department
to
U
se
the
System
Purpose
of
the
System
Connects
With
Development
Details
Week 1/BSA 310 Week 1 Summary.docx
One of the main important lessons I learned was what a system
was and the different types there were. Businesses are able to
use the two main types of systems, part of the Management
Information Systems, to help with the overall business process.
By utilizing the TPS, DSS, and other systems, businesses are
able to get an upper hand by compressing raw data into a more
useable form, a form that can be interpreted into many different
ways and separated into different departments.
21. I also enjoyed reading about the integration of the
improvements made in the supply chain operations, with the
help of IT. By involving the infrastructure of the entire IT
department, as well as other departments, the company is able
to maximize the Enterprise Resource Planning relationships.
Supply chain management has became a very large part of
businesses, and if you want to have a successful company,
integrating ERP and supply chains better be part of it.
Understanding how the intricacies of how IT really affects a
business can be interesting. With all the separate departments
of IT, all working together, if one department fails, it can be
devastating to a company. If a company were to lose the
database functionality, the accounting, sales, warehouse, and
inventory could take a hit.
Once you get all the requirements from the customer, you can
start to plan out the project. With the requirements in hand, you
should be able to get an idea of how many people you will need
for the project, roughly the amount of time you need, and how
much time you are going to need for planning. After you get all
this information, you can carefully plan out how much it will
cost. If you have a budget, you can filter that into the
equation. As long as you take each step, one at a time, you
should have no problem with the project.
One of the main important lessons I learned was what a system
was and the different types there
were.
Businesses are able to use the two main types of systems, part
of the Management
Information Systems, to help with the overall business process.
22. By util
izing the TPS, DSS, and
other systems, businesses are able to get an upper hand by
compressing raw data into a more
useable form, a form that can be interpreted into many different
ways and separated into different
departments.
I also enjoyed reading ab
out the integration of the improvements made in the supply
chain
operations, with the help of IT.
By involving the infrastructure of the entire IT department, as
well as other departments, the company is able to maximize the
Enterprise Resource Planning
relationships.
Supply chain management has became a very large part of
businesses, and if you
want to have a successful company, integrating ERP and supply
chains better be part of it.
Understanding how the intricacies of how IT really affects a
business
can be interesting.
23. With
all the separate departments of IT, all working together, if one
department fails, it can be
devastating to a company.
If a company were to lose the database functionality, the
accounting,
sales, warehouse, and inventory could t
ake a hit.
Once you get all the requirements from the customer, you can
start to plan out the project.
With
the requirements in hand, you should be able to get an idea of
how many people you will need
for the project, roughly the amount of time you nee
d, and how much time you are going to need
for planning.
After you get all this information, you can carefully plan out
how much it will
cost.
If you have a budget, you can filter that into the equation.
As long as you take each step,
24. one at a time, you
should have no problem with the project.
Week 2/BSA 310 Week 2 Summary.docx
This week, learning about how businesses are moving more
from a mobility environment than from a desktop environment.
There are many security concerns when it comes to mobile
devices, as security software and hardware have not caught up
with the technology. IT departments are having to scramble to
figure out the best ways to protect themselves from the mobile
and tablet based devices. Also, we learned how unscrupulous
people can take advantage of others by cold calling individuals
and trying to get information out of them. We found of that
through the methods called phishing and pharming, illegal
enterprises can set up website's that look identical to real
website's for the sole purpose of gaining your personal
information. By sending out emails with links in them, and
some unsuspecting person clicks on that link, they can be
transported to these mirror website's. Lastly, learning how
businesses should take security more into consideration, as
without it, the entire company can be taken down. As the
saying goes, "Loose lips sink ships." Someone who does not
follow protocols and does not keep company information to
themselves can cause great harm to the company. Securing
information should be on the forefront of every company, not
just the IT departments.
This week, learning about how businesses are moving more
from a mobility environment than
from a desktop environment.
There are many security concerns when it comes to mobile
devices, as security software and hardware have not caught up
25. with the technolog
y.
IT
departments are having to scramble to figure out the best ways
to protect themselves from the
mobile and tablet based devices.
Also, we learned how unscrupulous people can take advantage
of others by cold calling individuals and trying to get infor
mation out of them.
We found of that
through the methods called phishing and pharming, illegal
enterprises can set up website's that
look identical to real website's for the sole purpose of gaining
your personal information.
By
sending out emails with li
nks in them, and some unsuspecting person clicks on that link,
they can
be transported to these mirror website's.
Lastly, learning how businesses should take security
more into consideration, as without it, the entire company can
be taken down.
As the sa
ying
26. goes, "Loose lips sink ships."
Someone who does not follow protocols and does not keep
company information to themselves can cause great harm to the
company.
Securing information
should be on the forefront of every company, not just the IT
departmen
ts.
Week 2/BSA 310 Week 2 (Kudler Fine Foods Frequent
Shopper Program 1) Riverpoint Writer.docx
Kudler Fine Foods - Frequent Shopper Program
W. Clay Mundy III
BSA 310
5/13/2012
Running head: KUDLER FINE FOODS - FREQUENT
SHOPPER PROGRAM
1
KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM
2
27. Kudler Fine Foods - Frequent Shopper Program
If you are from the La Jolla, Del Mar, or Encinitas area, then
you have to be familiar with the gourmet food store of Kudler
Fine Foods (hereby known as Kudler). Kudler has been able to
evolve into such a fine establishment by building its business
model off of a strong customer service base. By keeping their
customer relationships “priority-one”, they were able to explode
onto the market, gaining a valuable foothold in the gourmet
food market. With their exponential growth so far, they are
expected to branch out much further into California. One of the
ways Kudler expects to meet the customer expectations, and
satisfaction requirements, will be to implement an e-commerce
aspect into their existing website. Kudler’s customer service
believes that this will be a cornerstone of the next level of the
companies success.Order Process
Under the current order system, Kudler utilizes an ordinary
logistical order process; everything is done by hand.
Running
head: KUDLER FINE FOODS
-
FREQUENT SHOPPER PROGRAM
1
28. Kudler Fine Foods
-
Frequent Shopper Program
W. Clay Mundy III
BSA 310
5/13/2012
Week 2/BSA 310 Week 2 (Kudler Fine Foods Frequent
Shopper Program II).docx
Kudler Fine Foods - Frequent Shopper Program
BSA 310
Running head: KUDLER FINE FOODS - FREQUENT
SHOPPER PROGRAM
1
KUDLER FINE FOODS - FREQUENT SHOPPER PROGRAM
6
Kudler Fine Foods - Frequent Shopper Program
Kudler Fine Foods wants to create a frequent shopper program
to help their customers by rewarding them, but also wanting
29. them to be protected by malicious entities that might want to do
them harm. In developing a Frequent Shopper Program, Kudler
Fine Foods (hereby known as Kudler) will need to implement,
and adhere, to strict policies and guidelines that will protect the
patrons that shop at the establishments of Kudler. We can also
use different modeling structures to find what kind of Frequent
Shopper Program works best for Kudler. By contacting an
outside agency, such as Management Science Associates, Inc.,
(MSA) we are able to look at data that will tell us the
demographics of who is going to be utilizing the program. The
MSA can show Kudler different pricing analysis, the average
customer lifetime value and how they would consume, their
purchasing behavior, brand forecasting, and all the while,
maintaining the highest level of personal privacy. (Management
Science Associates, Inc, 2012)
Privacy is always on the forefront of any company’s mind,
especially when it involves their customers. When you are
collecting data on a customer, they should get the feeling that
you are their protector, and you are not there to abuse them or
their information. This is why Kudler will put safeguards in
place to protect their customers. There are no true market
standards to protect Kudler’s customers, so Kudler will have to
devise their own methods and means to protect their customers.
Kudler is not only legally bound to protect their customers, but
also ethically bound as well. Whenever a business takes in
information on someone, and stores it in a database, that
company is legally and ethically bound to protect that customer.
When that information goes into that database, no matter how
seemingly harmless, it must always be protected. The IT
security must be regarded in the highest of standards so that the
data stored within our computer databanks will be protected.
(Britz, 2000)
When the customers are filling out the paperwork, for their
Kudler Shopper cards, they will have the option to accept, or
decline, the program. The program will describe what legal
steps the company plans to do in order to protect them. They
30. can always decide whether or not to participate. We will
reiterate, numerous times, that their personal information will
be secured and not sold to a third party, and is only used for our
marketing purposes only. By letting the customer know, up
front, what information we will be sharing, why we need certain
information, and how we will be using that information, will be
paramount to our success with our customers. The more upfront
we are with them, the more they will trust us. We will also
ensure that all information, entered into our databases, will be
encrypted and all data will be secure.
With all of our security in place, customers lined up, and
frequent shoppers ready to go, what does this mean for our
owners of the company? According to the Food Management
Institute, if a retail establishment has a frequent shopper
program, 90% of their customers utilize this system. (Food
Management Institute, 2008) With an implementation of a
program, customers get a feeling that they are getting a valued
service, where we could implement automatic coupon
deductions, point-reward systems, or even donations to
charities. By give the impression that they are getting value,
they will increase the amount of times they visit Kudler. At the
same time, we gain value with every purchase they make. Each
of their purchases are tracked, and entered, into a database.
Within that database, we are able to start tracking what people
are buying, at what time of the year they are buying, and how
much they are buying.
Another aspect of the program will allow us to help prevent
waste. We may be purchasing too much of a particular product,
or a particular product may be staying on the shelf and never
selling. The frequent shopper program will not only tell us
what is being sold, but more importantly, will tell us what is not
being sold. We will also be able to improve our efficiency
between our suppliers. By being able to track what is being
sold and what is being wasted, we can achieve a much more
accurate inventory count. Having this program fits in all win-
win scenarios for Kudler Fine Foods.
31. The last step, in the entire equation, will be the training of our
employees. They will need to know that their professionalism
will be key in keeping this system alive. They are the ones that
are on the front lines. These are the individuals that meet and
greet our customers. Training them to know the privacy rules,
to know the new security procedures, and to know the legal and
ethical steps they need to take to ensure that the customer’s data
is protected is paramount to keeping this organization at the
highest levels it has always had. Kudler has always prided
itself in having outstanding customer service capabilities. We
want to prove ourselves worthy once again.
References
Britz, J. J. (July, 2000). Technology as a Threat to Privacy:
Ethical Challenges to the Information Profession. Retrieved
from http://web.simmons.edu/~chen/nit/NIT%2796/96-025-
Britz.html
Food Management Institute. (April, 2008). New FMI Report
Shows Food Retailers Using Technology to Remain Competitive
and Meet Consumer Needs. Retrieved from
http://www.fmi.org/news-room/news-
archive/view/2008/04/22/new-fmi-report-shows-food-retailers-
using-technology-to-remain-competitive-and-meet-consumer-
needs
Management Science Associates, Inc. (2012). Frequent Shopper.
Retrieved from
http://www.msa.com/analysis/consumer/frequent.htm
Plagiarism Checker
Top of Form
Bottom of Form
Top of Form
·
·
32. Bottom of Form
· preferences
· help
Document Viewer
Turnitin Originality Report
· Processed on: 13-May-2012 2:29 PM CDT
· ID: 249178768
· Word Count: 928
· Submitted: 1
Similarity Index
3%
What's this?
Similarity by Source
Internet Sources:
3%
Publications:
2%
Student Papers:
N/A
include quotedinclude bibliographyexclude small
matchesdownloadrefreshprint
mode:
1% match (Internet from 6/16/11)
http://www.antiessays.com
1% match (Internet from 4/10/12)
http://www.papercamp.com
Running head: KUDLER FINE FOODS - FREQUENT
SHOPPER PROGRAM 1 Kudler Fine Foods - Frequent Shopper
ProgramBSA 310 May 12, 2010 William Schuyler Kudler Fine
Foods - Frequent Shopper Program Kudler Fine Foods wants to
create a frequent shopper program to help their customers by
rewarding them, but also wanting them to be protected by
malicious entities that might want to do them harm. In
developing a Frequent Shopper Program, Kudler Fine Foods
(hereby known as Kudler) will need to implement, and adhere,
33. to strict policies and guidelines that will protect the patrons that
shop at the establishments of Kudler. We can also use different
modeling structures to find what kind of Frequent Shopper
Program works best for Kudler. By contacting an outside
agency, such as Management Science Associates, Inc., (MSA)
we are able to look at data that will tell us the demographics of
who is going to be utilizing the program. The MSA can show
Kudler different pricing analysis, the average customer lifetime
value and how they would consume, their purchasing behavior,
brand forecasting, and all the while, maintaining the highest
level of personal privacy. (Management Science Associates, Inc,
2012) Privacy is always on the forefront of any company’s
mind, especially when it involves their customers. When you
are collecting data on a customer, they should get the feeling
that you are their protector, and you are not there to abuse them
or their information. This is why Kudler will put safeguards in
place to protect their customers. There are no true market
standards to protect Kudler’s customers, so Kudler will have to
devise their own methods and means to protect their customers.
Kudler is not only legally bound to protect their customers, but
also ethically bound as well. Whenever a business takes in
information on someone, and stores it in a database, that
company is legally and ethically bound to protect that customer.
When that information goes into that database, no matter how
seemingly harmless, it must always be protected. The IT
security must be regarded in the highest of standards so that the
data stored within our computer databanks will be protected.
(Britz, 2000) When the customers are filling out the paperwork,
for their Kudler Shopper cards, they will have the option to
accept, or decline, the program. The program will describe what
legal steps the company plans to do in order to protect them.
They can always decide whether or not to participate. We will
reiterate, numerous times, that their personal information will
be secured and not sold to a third party, and is only used for our
marketing purposes only. By letting the customer know, up
front, what information we will be sharing, why we need certain
34. information, and how we will be using that information, will be
paramount to our success with our customers. The more upfront
we are with them, the more they will trust us. We will also
ensure that all information, entered into our databases, will be
encrypted and all data will be secure. With all of our security in
place, customers lined up, and frequent shoppers ready to go,
what does this mean for our owners of the company? According
to the Food Management Institute, if a retail establishment has a
frequent shopper program, 90% of their customers utilize this
system. (Food Management Institute, 2008) With an
implementation of a program, customers get a feeling that they
are getting a valued service, where we could implement
automatic coupon deductions, point-reward systems, or even
donations to charities. By give the impression that they are
getting value, they will increase the amount of times they visit
Kudler. At the same time, we gain value with every purchase
they make. Each of their purchases are tracked, and entered,
into a database. Within that database, we are able to start
tracking what people are buying, at what time of the year they
are buying, and how much they are buying. Another aspect of
the program will allow us to help prevent waste. We may be
purchasing too much of a particular product, or a particular
product may be staying on the shelf and never selling. The
frequent shopper program will not only tell us what is being
sold, but more importantly, will tell us what is not being sold.
We will also be able to improve our efficiency between our
suppliers. By being able to track what is being sold and what is
being wasted, we can achieve a much more accurate inventory
count. Having this program fits in all win-win scenarios for
Kudler Fine Foods. The last step, in the entire equation, will be
the training of our employees. They will need to know that their
professionalism will be key in keeping this system alive. They
are the ones that are on the front lines. These are the individuals
that meet and greet our customers. Training them to know the
privacy rules, to know the new security procedures, and to know
the legal and ethical steps they need to take to ensure that the
35. customer’s data is protected is paramount to keeping this
organization at the highest levels it has always had. Kudler has
always prided itself in having outstanding customer service
capabilities. We want to prove ourselves worthy once again.
References Britz, J. J. (July, 2000). Technology as a Threat to
Privacy: Ethical Challenges to the Information Profession.
Retrieved from http://web.simmons.edu/~chen/nit/NIT'96/96-
025- Britz.html Food Management Institute. (April, 2008). New
FMI Report Shows Food Retailers Using Technology to Remain
Competitive and Meet Consumer Needs. Retrieved from
http://www.fmi.org/news-room/news-
archive/view/2008/04/22/new-fmi-report-shows- food-retailers-
using-technology-to-remain-competitive-and-meet-consumer-
needs Management Science Associates, Inc. (2012). Frequent
Shopper. Retrieved from
http://www.msa.com/analysis/consumer/frequent.htm KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 2 KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 3 KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 4 KUDLER
FINE FOODS - FREQUENT SHOPPER PROGRAM 5
Running head: KUDLER FINE FOODS
-
FREQUENT
SHOPPER PROGRAM
1
36. Kudler Fine Foods
-
Frequent Shopper Program
BSA 310
Week 2/BSA 310 Week 2 DQ 1 (Security Of Data).docx
Usually, a company puts a ton of money into the security of its
data, but forgets that the biggest security flaws it has is its
every day employee, walking in and out, on a daily basis.
Without giving employees proper training, they may not know
how dangerous that they are leaving their offices, or their entire
workspace. When I worked for a school system, they trained us
to, the IT staff, to always lock our computers, even if we only
got up from our desks for a moment. Even if it meant we were
walking over to get something from the printer, we needed to
lock the computer. That way, nothing could ever be done from
our computers and all the burden was left to us. If something
happened from our computers, it was our fault, unless there was
an outside breach.
Teaching employees that they have a responsibility to the
company to keep their data protected is paramount. People can
be easily tricked into giving up information, even in basic
conversation with one another. If you do not know who is
around you, you can tell something private and give out
secrets. This is why you should always keep company secrets to
yourself and only discuss them with appropriate personnel.
Teaching this early on, to the employees, will keep the chance
of information getting out.
37. Usually, a company puts a ton of money into the security of its
data, but forgets that the biggest
security flaws
it has is its every day employee, walking in and out, on a daily
basis.
Without
giving employees proper training, they may not know how
dangerous that they are leaving their
offices, or their entire workspace.
When I worked for a school system, they tra
ined us to, the IT
staff, to always lock our computers, even if we only got up from
our desks for a moment.
Even
if it meant we were walking over to get something from the
printer, we needed to lock the
computer.
That way, nothing could ever be done from
our computers and all the burden was left
to us.
If something happened from our computers, it was our fault,
unless there was an outside
breach.
38. Teaching employees that they have a responsibility to the
company to keep their data protected is
paramount.
People can be easily tricked into giving up information, even in
basic conversation
with one another.
If you do not know who is around you, you can tell something
private and
give out secrets.
This is why you should always keep company secrets to yours
elf and only
discuss them with appropriate personnel.
Teaching this early on, to the employees, will keep the
chance of information getting out.
Week 2/BSA 310 Week 2 DQ 2 (Phishing and Pharming
Security).docx
Phishing is a method of where an non-legitimate source will try
and get information from someone, either by providing a link to
a site or to a bogus site. This is usually a way to see if there
are legitimate email addresses or not. Pharming utilizes the
same technology as Phishing, but may take you to a copy of a
banking site (IE PayPal) and ask you for your login ID and
password. When you login, it may say your login ID has failed
and you need to re-verify who you are. When you do this, you
39. are actually giving your information to someone else, instead of
the target you intended. Spoofing is very popular with the
Nigerian Scam. Where someone makes someone believe that
you have won a ton of money, but you need to send them
money, and your information first.
The best way to help your employees from not getting involved
with any of this type of trouble, is to teach them to not open
anything from an email. If they get an email from a "trusted"
source, always open a browser themselves, and go to the source
manually. This way, there is no middleman. If you use the
shortcut, it puts all the power in the hands of the email sender.
This is how I keep myself safe in my own emails.
Phishing is a method of where an non
-
legitimate source will try and get information from
someone, either by providing a link to a site or to a bogus site.
This is usually a way to see if
there are legitimate email addresses or not.
Pharming
utilizes the same technology as Phishing,
but may take you to a copy of a banking site (IE PayPal) and
ask you for your login ID and
password.
When you login, it may say your login ID has failed and you
need to re
-
verify who
40. you are.
When you do this, y
ou are actually giving your information to someone else, instead
of
the target you intended. Spoofing is very popular with the
Nigerian Scam.
Where someone
makes someone believe that you have won a ton of money, but
you need to send them money,
and your i
nformation first.
The best way to help your employees from not getting involved
with any of this type of trouble,
is to teach them to not open anything from an email.
If they get an email from a "trusted" source,
always open a browser themselves, and go
to the source manually.
This way, there is no
middleman.
If you use the shortcut, it puts all the power in the hands of the
email sender.
This
41. is how I keep myself safe in my own emails.
Week 3/BSA 310 Week 3 (Kudler Accounting System)
Accounting System.docx
Kudler Accounting System
BSA 310
Running head: KUDLER ACCOUNTING SYSTEM
1
KUDLER ACCOUNTING SYSTEM
5
Kudler Accounting System
To the Executives of Kudler Fine Foods,
Today, I introduce to you an idea that will help revolutionize
the accounting process at Kudler Fine Foods. Upon its
implementation, Kudler Fine foods will be able to easily
manage its portfolio of accounts and analyze all of its data, all
at a moment’s notice. The ability to access reports, on a
annually, bi-annually, quarterly, or any time therein, is
completely up to the individual. The financial benefits will be
instantaneous to the company.
One of the key benefits Kudler Fine Foods will gain will be the
ability to handle all the raw data that you did not have command
of before. This new system not only allows you to improve
your financial strategies, but you can also increase your
42. management potential by forecasting future investments. By
prompting these new strategies, you are able to access areas of
information not easily accessible before, like cash flow and
asset management, just to name a few. How can we achieve
this level of satisfaction in one software product? Let’s take a
look at some of the key features that are built in to the
accounting software package.
Key Features
· Software Compatible – The software is fully integrated with
the most popular of software technologies. It will work with
the Microsoft Office Suite of applications seamlessly. This will
allow Kudler Fine Foods to be able to integrate reports into
documents, spreadsheets, or emails without any technical
issues.
· Cross-Department Integration – The software is not sterilized
to accounting only, but is distributed to all departments. This
means the accounting software tracks the inventory and
purchasing departments, as well as, the general accounting
department.
· Business Intelligence – Kudler Fine Foods has access to
endless amounts of raw data. This data can be turned into
charts and graphs, at a moment’s notice. Access the general
ledgers information, create a business presentation, and create
the best critical decision possible.
· More Budgetary Control – With built-in tools, like general
ledgers, cash management, fixed asset management, and
financial forecasting, you are in control of your financial
corporate assets. Knowing where your company is heading,
financially, allows executive managers to take directive control
and direct the company in a manner that they were not able to
before.
This is but a mere sample of what you can expect from this
extraordinary software. No matter how much Kudler Fine
Foods grows in the coming years, this software will grow with
the company. It allows for a high amount of scalability, which
means as the company grows and expands, so does the
43. software’s abilities. Another excellent advantage of the
software would be the integration of all the departments within
Kudler Fine Foods. The ability to seamlessly swap data
between departments, at a moment’s notice, ensures that the
communication lines will always be open between departments.
The beauty of this product is that within the first six months of
ownership, it will have paid for itself. In the first three months,
you will be able to view reports that you would not have ever
been able to access. You will be able to access reports,
customizable to your own specifications. If you have concerns
with supporting the software, a minimal IT department can
support the software, as well as, the accounting software
developers will be there 24/7. It does not take an extraordinary
amount of extra care to support the software, internally. If you
already have an IT staff, they can be trained to support the
software.
I believe that with all the advances this accounting software
has, Kudler Fine Foods will be tough competitor to beat. With
the insight that this accounting package gives, the scalability
potential the software offers, and the potential to make Kudler
Fine Foods a global market leader, utilizing this software
package should be priority one.
If you have any questions, or concerns, please feel free to
contact my office.
References
Bourgoin, A. (2010, April). 7 Things to Consider Before Buying
Small Business Accounting Software. Retrieved from
http://www.smallbizskills.com/small-business-tips/7-things-to-
consider-before-buying-small-business-accounting-software/
Business-Software.com. (2012). 6 Factors to Consider When
44. Buying Accounting Software. Retrieved from
http://www.business-software.com/article/6-factors-to-consider-
when-buying-accounting-software/
Journal Officiel. (2012, March). What do you consider before
purchasing accounting software for small business. Retrieved
from http://journalofficielniger.org/what-do-you-consider-
before-purchasing-accounting-software-for-small-businesses/
Nickels, W. G., McHugh, J. M., & McHugh, S. M. (2010).
Understanding Business (9th ed.). New York, NY: McGraw-Hill
Irwin.
Wasserman, E. (2009, December). How to Choose Business
Accounting Software. Retrieved from
http://www.inc.com/guides/choosing-accounting-software.html
Top of Form
Bottom of Form
Top of Form
Running head: KUDLER ACCOUNTING SYSTEM
1
Kudler Accounting System
BSA 310
Week 3/BSA 310 Week 3 DQ 1 (Accounting System Today and
45. Earlier).docx
Accounting systems are a little different than they were when I
was growing up. I learned them to be little elderly ladies taking
care of simple bookkeeping. Today, the role has changed
dramatically. Accounting systems are now a major role within a
company's environment. The systems are able to take raw
information and converting that information into usable data.
They can then use that data to forecast how well and what the
business can do in the future. Individual departments are able
to run reports, from the company databases, and find out how
they can improve their bottom line. These systems also manage
customer data, as well as, all the corresponding financial
information as well..
Without the incorporation of complex IT systems, the majority
of these accounting systems would not be possible. Without the
use of high speed networks, the people in the individual
departments would not be able to receive the information in a
timely manner. The same could be said for the efficiencies of
databases and mainframes/servers. The efficiencies at which
databases, and the hardware that these systems run on, not to
mention the level of expertise that takes to maintain them, are
amazing. Without these technologies on hand, we would not
have the modern accounting systems that we know today.
Accounting systems are a little different than they were when I
was growing up.
I learned them
to be little elderly ladies taking care of simple bookkeeping.
Today, the role has changed
dramatically.
46. Accounting systems are now a major role within a
company's environment.
The
systems are able to take raw information and converting that
information into usable data.
They
can then use that data to forecast how well and what the
business can do in the future.
Individual
departments are able to run rep
orts, from the company databases, and find out how they can
improve their bottom line.
These systems also manage customer data, as well as, all the
corresponding financial information as well..
Without the incorporation of complex IT systems, the majorit
y of these accounting systems
would not be possible.
Without the use of high speed networks, the people in the
individual
departments would not be able to receive the information in a
timely manner.
47. The same could be
said for the efficiencies of database
s and mainframes/servers.
The efficiencies at which
databases, and the hardware that these systems run on, not to
mention the level of expertise that
takes to maintain them, are amazing.
Without these technologies on hand, we would not have
the modern ac
counting systems that we know today.
Week 3/BSA 310 Week 3 DQ 2 (Accounting System to Interact,
or Integrate, With the Other Systems).docx
The reason why you would want an accounting system to
interact, or integrate, with the other systems, within a business,
would be because of the enormous potential gains that could be
gained from it. An accounting system, by itself, is a powerful
item, but to have it integrated with the logistical side of your
business lets you analyze what is coming and going from your
warehouses, and at what cost. How much labor is going into
each of the shifts? Where can some of the fat be trimmed to
make things run smoother? Are there room for improvements?
These are all valuable questions that can be answered with the
data that can be received by integrating systems together. Not
everything can be gained by viewing it alone, but if you
integrate your software packages together, you can gain so
much more knowledge.
The same goes for your other departments. You can analyze
your labor costs, your office product needs. Are you paying too
48. much for your paper products? Where can you save money?
Analyzing the data is a good way to utilize the information.
You can have your accounting system be a standalone device,
but why waste its true potential?
The reason why you would want an accounting system to
interact, or integrate, with the other
systems, within a business, would be because of the enormous
potential gains that could be
gained from it.
An accounting system, by itself, is a powerful item, bu
t to have it integrated with
the logistical side of your business lets you analyze what is
coming and going from your
warehouses, and at what cost.
How much labor is going into each of the shifts?
Where can
some of the fat be trimmed to make things run s
moother?
Are there room for improvements?
These are all valuable questions that can be answered with the
data that can be received by
integrating systems together.
Not everything can be gained by viewing it alone, but if you
49. integrate your software pack
ages together, you can gain so much more knowledge.
The same goes for your other departments.
You can analyze your labor costs, your office
product needs.
Are you paying too much for your paper products?
Where can you save money?
Analyzing the data
is a good way to utilize the information.
You can have your accounting
system be a standalone device, but why waste its true potential?
Week 3/BSA 310 Week 3 Summary.docx
In the third installment, the students got to learn a little more
in-depth about the accounting aspects of a business. I really
enjoyed learning about the intricacies of keeping a business
alive. Also, learning the major role's in business was very
enlightening. Learning who the internal and external decision
makers were, in the company, solidified how I view the roles.
Understanding that CEO's and managers are the internal
decision makers and investors and stockholders are the external
50. decision makers. The third item I learned about this week
would be learning about the difference between stocks and
bonds. I have always wondered what exactly made up the
difference. When you buy stock, you are buying an actual piece
of the company, or taking ownership in the company. Whereas
when you buy a bond, you are not buying part of a company, but
you are buying part of a credit in which the company will pay
you for investing into the company, without actually owning a
part of the company.
Future trends will be a little more difficult to predict. With the
economy a shaky as it is, it will be difficult to predict a solid
performing accounting system. We need something that will
forecast data efficiently, while lifting our economy out of the
slump we can been in for these so many years. I hope someone
can figure out a revolutionary algorithm that will transform the
accounting world in time to save us while I am still alive.
In the third installment, the students got to learn a little more in
-
depth about the accounting
aspects of a business.
I really enjoyed learning about the intricacies of keeping a
business alive.
Also, learning the major role's
in business was very enlightening.
Learning who the internal and
external decision makers were, in the company, solidified how I
view the roles.
51. Understanding
that CEO's and managers are the internal decision makers and
investors and stockholders are th
e
external decision makers.
The third item I learned about this week would be learning
about the
difference between stocks and bonds.
I have always wondered what exactly made up the
difference.
When you buy stock, you are buying an actual piece of the c
ompany, or taking
ownership in the company. Whereas when you buy a bond, you
are not buying part of a
company, but you are buying part of a credit in which the
company will pay you for investing
into the company, without actually owning a part of the compa
ny.
Future trends will be a little more difficult to predict.
With the economy a shaky as it is, it will
be difficult to predict a solid performing accounting system.
We need something that will
52. forecast data efficiently, while lifting our economy out o
f the slump we can been in for these so
many years.
I hope someone can figure out a revolutionary algorithm that
will transform the
accounting world in time to save us while I am still alive.
Week 4/BSA 310 Week 4 ( McBride Marketing Paper -
Individual).docx
McBride Marketing Plan
BSA 310
Running head: RHIORDAN MARKETING PLAN
1
MCBRIDE MARKETING PLAN
3
McBride Marketing Plan
McBride Financial Services is an exponentially growing
financial and mortgage services company, with five current
locations, in five states, and a planned expansion of another
three locations in the coming future. McBride Financial
believes in being upfront with their service charges, to garner
the customer’s trust, and show the customer they do not offer
53. any hidden costs. They also offer a speedy application process,
as to allow the customer ample time to search for the house they
want, instead of the hassle of waiting for their paperwork to go
through. McBride Financial has geared their company to be as
customer-centric as possible.
Marketing Plan
When developing a marketing plan, for McBride Financial, we
have to look at which areas we want to explore. Under
McBride’s current marketing plan, they have already planned to
hit the current route of, “Local TV ads, Local newspapers,
Informational handouts at airports and major tourist attractions,
Local radio, and Local realtors,” but this hits only a local
source (Virtual Organizations Portal, 2011). To be able to
target a much larger audience, we need to think on a much
larger scale.
Whenever the advertisements are run, there needs to be an
attention to detail to the website address given. This will give
people instant access to the website. Having an email address,
on the advertisements, as well as the website, will give people
the opportunity to ask questions, if they have any. This is
where other marketing plans have failed, in the past. In the old
days, there was no way for anyone to market 24 hours a day, 7
days a week; now companies are able to. This allows for more
exposure into the company. Your online presence will give you
the market exposure that McBride Financial wants. Now, you
need to gain exposure to your website, from online.
You can garner more attention, online, by buying ad-space from
other realtor websites. Online advertising can be a cheaper way
to advertise than print, or television. There is less hassle
involved, when developing and online campaign, and once it is
completed, you can use it over and over again; you do not have
to reprint it or have to pay for supplies. In 2001, the average
cost of a banner advertisement (an advertisement that was
located at the top of a website, usually), ranged from $5 to $68
(McCabe, 2001).
Placing a banner ad, or any time of advertisement, with an
54. online entity, can gain McBride a ton of recognition. For
example, according to Realtor.com’s website, they have 13.7
million people visit their site every month. (Move, Inc, 2012)
With this kind of traffic, you may have to pay a higher amount
for advertising, but it may be worth it in the long run. But, then
again, would it be cheaper to pay for an email campaign?
McBride Financial should also compare the cost of a banner-ad
campaign to that of an email marketing campaign. Purchasing a
list of e-mail leads, although frowned upon by the general
public, can be a cheaper solution to your marketing needs.
Otherwise known as email spam, getting a basic list of leads is a
good, clean way of getting your name out to the masses. This
should easily fall within the start-up budget of $50,000, or if
McBride wanted to advertise with an email campaign, they
could use their follow-up budget of $5,000 per month for this.
Target Markets
The target markets for these campaigns are going to fall within
a wide, but specific category. Within their business plan, they
specify that they want to target professionals, retirees, and
families that are purchasing their first or second homes. (Virtual
Organizations Portal, 2011) This is a pretty wide market, as it
almost covers anyone that is looking to purchase a home. The
good thing about this process is that McBride has narrowed
down the exact focus of their market, instead of floundering for
full attention of the whole market.
I would like to offer one alternative to their target audience: the
individual. It is true, that the professional worker would have
the monetary income to afford a new home, and a retiree would
also have a savings account/income for a new home, but to
exclude an individual, one that may have an alternative source
of income, may be unwise. This is a target audience that
McBride may not want to exclude. If the clientele that McBride
is looking to help consists of anyone that can pass a credit
check, and be able to pay the $1500 initial price, then this is a
segment that should not be overlooked.
Conclusion
55. McBride Financial now has the strategic advantage of taking
their business where they want to go. Advertising and
marketing your brand is not an easy process, but a necessary
process none the less. Once McBride gets their foothold on
their internet markets, they should not have any trouble
becoming the global dominators in the mortgage financial
markets.
References
Armstrong, G., & Kotler, P. (2011). Marketing: An
introduction (10th ed.). Boston, MA: Prentice Hall.
McCabe, B. (2001, September). Online Advertising: Costs vs.
Effectiveness. Retrieved from
http://images.forbes.com/fdc/mediaresourcecenter/documents/ge
rtner.pdf
Move, Inc. (2012). Media
Solution
s. Retrieved from
http://www.realtor.com/mediasolutions/ouraudience/keymeasure
s/
Virtual Organizations Portal. (2011). McBride Financial
Services. Retrieved from
https://ecampus.phoenix.edu/secure/aapd/cist/vop/Business/McB
ride/intranet/business-plan.html
Top of Form
Bottom of Form
56. Top of Form
·
·
Bottom of Form
· preferences
Document Viewer
Turnitin Originality Report
· Processed on: 26-May-2012 10:25 PM CDT
· ID: 251784064
· Word Count: 888
· Submitted: 1
McBride Marketing Paper By
Similarity Index
1%
What's this?
Similarity by Source
Internet Sources:
1%
Publications:
0%
Student Papers:
N/A
include quotedinclude bibliographyexclude small
matchesdownloadrefreshprint
57. mode:
1% match (Internet from 11/1/11)
http://www.thetimeshareblog.com
Running head: RHIORDAN MARKETING PLAN 1 McBride
Marketing Plan BSA 310 May 27, 2012 William Shuyler
McBride Marketing Plan McBride Financial Services is an
exponentially growing financial and mortgage services
company, with five current locations, in five states, and a
planned expansion of another three locations in the coming
future. McBride Financial believes in being upfront with their
service charges, to garner the customer’s trust, and show the
customer they do not offer any hidden costs. They also offer a
speedy application process, as to allow the customer ample time
to search for the house they want, instead of the hassle of
waiting for their paperwork to go through. McBride Financial
has geared their company to be as customer-centric as possible.
Marketing Plan When developing a marketing plan, for McBride
Financial, we have to look at which areas we want to explore.
Under McBride’s current marketing plan, they have already
planned to hit the current route of, “Local TV ads, Local
newspapers, Informational handouts at airports and major
tourist attractions, Local radio, and Local realtors,” but this hits
only a local source (Virtual Organizations Portal, 2011). To be
able to target a much larger audience, we need to think on a
much larger scale. Whenever the advertisements are run, there
58. needs to be an attention to detail to the website address given.
This will give people instant access to the website. Having an
email address, on the advertisements, as well as the website,
will give people the opportunity to ask questions, if they have
any. This is where other marketing plans have failed, in the
past. In the old days, there was no way for anyone to market 24
hours a day, 7 days a week; now companies are able to. This
allows for more exposure into the company. Your online
presence will give you the market exposure that McBride
Financial wants. Now, you need to gain exposure to your
website, from online. You can garner more attention, online, by
buying ad-space from other realtor websites. Online advertising
can be a cheaper way to advertise than print, or television.
There is less hassle involved, when developing and online
campaign, and once it is completed, you can use it over and
over again; you do not have to reprint it or have to pay for
supplies. In 2001, the average cost of a banner advertisement
(an advertisement that was located at the top of a website,
usually), ranged from $5 to $68 (McCabe, 2001). Placing a
banner ad, or any time of advertisement, with an online entity,
can gain McBride a ton of recognition. For example, according
to Realtor.com’s website, they have 13.7 million people visit
their site every month. (Move, Inc, 2012) With this kind of
traffic, you may have to pay a higher amount for advertising,
but it may be worth it in the long run. But, then again, would it
59. be cheaper to pay for an email campaign? McBride Financial
should also compare the cost of a banner-ad campaign to that of
an email marketing campaign. Purchasing a list of e-mail leads,
although frowned upon by the general public, can be a cheaper
solution to your marketing needs. Otherwise known as email
spam, getting a basic list of leads is a good, clean way of
getting your name out to the masses. This should easily fall
within the start-up budget of $50,000, or if McBride wanted to
advertise with an email campaign, they could use their follow-
up budget of $5,000 per month for this. Target Markets The
target markets for these campaigns are going to fall within a
wide, but specific category. Within their business plan, they
specify that they want to target professionals, retirees, and
families that are purchasing their first or second homes. (Virtual
Organizations Portal, 2011) This is a pretty wide market, as it
almost covers anyone that is looking to purchase a home. The
good thing about this process is that McBride has narrowed
down the exact focus of their market, instead of floundering for
full attention of the whole market. I would like to offer one
alternative to their target audience: the individual. It is true,
that the professional worker would have the monetary income to
afford a new home, and a retiree would also have a savings
account/income for a new home, but to exclude an individual,
one that may have an alternative source of income, may be
unwise. This is a target audience that McBride may not want to
60. exclude. If the clientele that McBride is looking to help consists
of anyone that can pass a credit check, and be able to pay the
$1500 initial price, then this is a segment that should not be
overlooked. Conclusion McBride Financial now has the
strategic advantage of taking their business where they want to
go. Advertising and marketing your brand is not an easy
process, but a necessary process none the less. Once McBride
gets their foothold on their internet markets, they should not
have any trouble becoming the global dominators in the
mortgage financial markets. References Armstrong, G., &
Kotler, P. (2011). Marketing: An introduction (10th ed.).
Boston, MA: Prentice Hall. McCabe, B. (2001, September).
Online Advertising: Costs vs. Effectiveness. Retrieved from
http://images.forbes.com/fdc/mediaresourcecenter/documents/ge
rtner.pdf Move, Inc. (2012). Media