Wednesday, May 6, 2020

Case Study A Customer Centric Company Essay - 1700 Words

A Customer-Centric Company Amazon.com Incorporated is company whose retail business is done exclusively online, formally known as electronic commerce or e-commerce. It was the book category that first caught the attention of founder Jeff Bezos, who realized that a Web store could offer more book inventory than an actual shop could offer (Cuneo, 2000). The idea was born and Amazon, a customer-centric company was created. Customer-centric is an approach that allows businesses to drive profits and gain competitive advantage by providing a positive customer experience not only at the point of sale, but also, after the sale (What is customer-centric, n.d.). This American company is headquartered in Seattle, Washington and was founded by Jeff Bezos in 1995 (amazon.com). Jeff Bezos is a visionary who saw the opportunity to use technology as a platform for retail purchasing, originally books, but soon expanding into nearly any item imaginable that could be shipped (Cuneo, 2000). Mr. Be zos named his company after the world’s longest river, and today, it is easy to see that Amazon’s success and market niche, appears to be flowing abundantly, and streaming excellent customer service. While Amazon operates in North America, e-commerce stemming from the Amazon.com extensions were designed specifically for Australia, Brazil, Canada, China, France, Germany, India, Italy, Japan, Mexico, Netherlands, Spain, United Kingdom and the United states. AccessingShow MoreRelatedDifferent Definitions Of Marking Orientation And Its Relation On Consumer Centric Approach1638 Words   |  7 Pagesvarious definitions of marking orientation and its relation toa consumer centric approach. Production, product and sales orientations will be discussed with a focus on product orientation and its relation to the Japanese market. The new form of consumer centric approach to the market orientation, based on the internet with a focus on information tracking done by companies will be assessed. The various ways in which companies approach consumer centricity with be discussed, with the focus on two keyRead MoreBest Buy Uncovers Angels in the Market Case Study1353 Words   |  6 Pagesthe Market Case Summary: Best Buy specializes in a variety of products that focus on making life easier and more fun for consumers, by educating customers on the features and benefits of technology and entertainment products. While Best Buy has 1,200 retail stores across the United States it operates in a highly competitive market. To cope with this competitive market Best Buy specializes in collecting data from its stores to discover what its customers want and need. The company developed aRead MoreAmazons Business Model: A Case Study1449 Words   |  6 Pagesï » ¿Amazon: A Case Study Features of Amazons Strategy Amazon understood firsthand that the competitive advantage of a company originates immediately from how distinctive the organizations resources and competencies are. Amazon is able to both engage in production at a lower cost and generate a superior product at a standard cost. This is accomplished mostly via Amazons strategy of having a wide variety of goods and competitive pricing. Customers know they can find basic products at slashed pricesRead MoreBest Buy Case Study Essay1127 Words   |  5 PagesBest Buy Case Study 1 Best Buy Case Study Tiffany Antoine Empire State College Best Buy Case Study 2 Abstract Best Buy is one of the worlds largest and most diversified retailers of home office products, consumer electronics, and entertainment softwareRead MoreMarketing Functions Of Marketing And Marketing1229 Words   |  5 Pagesgrading amongst other things (Makloof and Sundberg, 2006). In business a market function acts in respect to the corporate marketing, strategic marketing, field marketing and analysis. Furthermore the relevance of this measure, is also evident in the case of product management and marketing (Kono, 2004). Relevance of marketing functions Typically a market function in business influences the consumer orientation for the organization, and contribute towards the organizational performance (Makloof andRead MoreEssay on Marketing Decisions and Business Strategy1077 Words   |  5 Pagesbecause they aren’t executed well. Things that are supposed to happen don’t happen.† A successful business strategy can help companies effectively execute and stay ahead of the competition. Maintaining strategic direction and relentlessly executing - rather than reacting to competitive conditions - is the most consistent route to success. Along with a successful strategy, a company needs to focus its culture and align it with employees. Aligning the right people in the right roles with the right strategyRead MoreAnalysis of the Cincom Corporate Culture1337 Words   |  5 Pages Introduction Cincom Systems is a privately held software company with over 700 employees, operating in 17 countries, across five product divisions. The company founder and CEO is still actively running the company, and is a former top IBM sales executive who has created a culture that is many ways resembles his former employer. The Cincom corporate culture is tightly interwoven to the core concepts of achievement and customer centric marketing and selling. Selling on value, which is a core valueRead MoreFords E-Commerce Strategy1680 Words   |  7 Pagesinterface among customers, dealers, vendors and even competitors. The SWOT analysis was studied for the development the strategy, as well as the chances of success of such strategy. With Fords desire to shift from ‘dealer-centric selling to ‘consumer-centric selling, we looked at the typical characteristics of online customers and how dealers could reinvent themselves to remain relevant in the changing automotive industry. The quest of Fo rds goal to become the worlds leading consumer company that providesRead MoreCommunications Is A Service Provider With Multiple Business Segments941 Words   |  4 Pagesa service provider with multiple business segments. The key line of their business include internet, mobile, landline and cable TV services. Currently company operates its four key lines of business individually (Multiple sales systems, databases and customer service centers). According to the building shared services at RR communications case study there are two main problems RR communications facing. The first one is no central IT system and the second problem is corporate politics. Company’s viceRead MoreThe Innovation Of Procurement Of Marico Company Using Enterprise Mobility Strategy Essay1366 Words   |  6 PagesCASE STUDY INNOVATION IN PROCUREMENT IN MARICO COMPANY USING ENTERPRISE MOBILITY STRATEGY (Mrinalini Shah , Nilanjan Chattopadhyay , (2014) Purpose: To study how innovation in procurement process under changing environment helps â€Å"Marico† improve information flow across supply chain with cost reduction with enterprise mobility management. Method: The method adopted here is Mobile Enterprise Strategy that brings in changes and benefits in Marico, which is one of the largest players in Indian

Systems Documentation and Internal Controls †MyAssignmenthelp.com

Question: Discuss about the Systems Documentation and Internal Controls. Answer: Introduction: Motherboards and More Pty Ltd is a medium-sized organization in the industry of manufacturing computer parts like motherboards, graphics cards, microchips etc. The organization uses an ERP system to maintain its function for supply, manufacture and receiving data from other departments located in remote places. The orders of the company placed via email or phone call. The supply chain and manufacturing of the orders received from customers are picked by alphabetically and processed via various manufacturing and loading dock in an alphabetic order by customer name. The invoices will be generated after the shipment of the order so all the sales order is on credit for this organization. The company in the present case analysis is facing out certain internal control weaknesses in regards to control and other network related security. Internal control weaknesses There is some of the weakness found in the current system in order to the analysis of the organization revenue cycle. The invoice generated after the shipment of the order of the customers which affect the organization revenue because the invoice will be generated only for a number of orders that are delivered to customers, not the back order (Romney Steinbart, 2012). The orders of the customer are received by telephone or email so it is hard to maintain the email conversation for the specification provided by customers and amount of order given. There is a chance of errors while getting the details of customer and the order from email and process it for shipment if the volume of order in increased (Li, et. al., 2012). If frequent orders from the same customer occurred than it is hard to segregate the orders from the same customer. In the case of frequent orders, the shipment of orders given by another customer will get delayed due to the alphabetic sequence of the customer (Hammersley, et. al., 2008). Impact these weaknesses Generation of invoice for the shipped order makes all sales on credit which may lead to the money crises for the organization. Email conversation for frequent orders may lead to the mismatch of orders and the shipments because of the chance of errors that may occur while processing the order. The alphabetic sequence may lead delay of shipment of other customers that have less amount of order even ready to be shipped. Not only the operations task of the business is affected but also there is a great hamper on the reputation part associated with the group (Deumes Knechel, 2008). In order to process the orders effectively and efficiently received by the organization from its customer, there are some of the controls that may be implemented. An ODF (Order Description Form) should be created by the organization which includes all the details given by the customer for the order should be written briefly. Once the ODF is confirmed a minimum amount of the complete order should be paid by the customer by providing the customer an invoice of the complete order with an order The ODF should be shared by the customer in order to get the communication clear and effective so that customer will reconfirm before the order processed. Once the ODF is confirmed it should be shared with every department of the Motherboards and More Pty Ltd in order to get the proper direction for manufacturing till shipment. In addition to this technical security controls physical checks and verification system should be implanted to check the accuracy of system failure through virus attacks (Doyle, et. al., 2007). A brief overview of the Ransomware attack: A ransomware is a piece of code that executes in the older versions of Windows operating system. The primary task of ransomware is to encrypt the files of the user computer in order to process the demand of ransom against decrypting the same file without data loss. The ministry stated on its website that around 1000 computer has been infected by a malware but it has been localized (Luo Liao, 2007). The encryption of data into user computer is targeted mostly word files and excel sheets of the user computer. Ransomware encrypts all type of files into the user computer in which word and excel files are the most as the important data of the user has been stored in those files. An encryption key has been used by the installed exe of the ransomware in order to encrypt the files of the user computer. A researcher at Kaspersky lab explains the minimum demand of $300 after 2 Hours of the installation. The payment has been processed online which lead to the decryption key. The decryption key has been provided for the victim PC which results to decryption of files once the ransom has been paid (Kharraz, et. al., 2015). Protect the organization from a potential Ransomware attack In order to provide security from potential ransomware attacks, there are some of the solutions provided by existing researchers at various labs of antivirus industry. Enable On-Access Scanning: On-Access scanning is a feature provided by the security domain organization which leads to scan every file while accessing by the customer. On-Access feature scan every file for the potential ransomware signature even user is downloading a file from internet. Backup of data: The online and offline backup of data is the alternate solution to ransomware. Now, these days many security domain organizations are providing cloud space for ransomware protection to user data (Pathak Nanded, 2016). Firewall Protection: A firewall protection for the LAN of the organization so that if a PC is under attack it should not lead to infecting other computers. The firewall should be implemented with the rules of phishing website protection so that an exe should not even get downloaded into user PC (Sittig Singh, 2016). References Deumes, R., Knechel, W. R. (2008). Economic incentives for voluntary reporting on internal risk management and control systems.Auditing: A Journal of Practice Theory,27(1), 35-66. Doyle, J., Ge, W., McVay, S. (2007). Determinants of weaknesses in internal control over financial reporting.Journal of accounting and Economics,44(1), 193-223. Hammersley, J. S., Myers, L. A., Shakespeare, C. (2008). Market reactions to the disclosure of internal control weaknesses and to the characteristics of those weaknesses under Section 302 of the Sarbanes Oxley Act of 2002.Review of Accounting Studies,13(1), 141-165. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E. (2015, July). Cutting the gordian knot: A look under the hood of ransomware attacks. InInternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment(pp. 3-24). Springer, Cham. Li, C., Peters, G. F., Richardson, V. J., Watson, M. W. (2012). The consequences of information technology control weaknesses on management information systems: the case of SarbanesOxley internal control reports.Management Information Systems Quarterly,36(1), 179-203. Luo, X., Liao, Q. (2007). Awareness education as the key to ransomware prevention.Information Systems Security,16(4), 195-202. Pathak, D. P., Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing challenge.International Journal of Advanced Research in Computer Engineering Technology (IJARCET) Volume,5. Romney, M. B., Steinbart, P. J. (2012).Accounting information systems. Boston: Pearson. Sittig, D. F., Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks.Applied clinical informatics,7(2), 624.