Wednesday, May 6, 2020
Business Information System and Brand Strategies
Question: Discuss about the Business Information System and Brand Strategies. Answer: Introduction: The August Online technology is a company producing the electronic gadgets and currently the company is producing the camera and the door bell with wifi camera and the smart locks. The company can make use of the various online platforms such as the social media and the web publishing and the discussion with the target market online so as to increase the sales of the product and hence the profitability. The company is intending to use the online platform where the customers would be assisted with the technological advice, which would give the customers an urge to buy the product (Tsimonis Dimitriadis, 2014). The target market of the company and its exposure can be increased. The usage of the online platform should build the loyal subscribers base and sell the products by gaining the trust and the loyalty. The company intended to make use of the social media as a tool to increase the sales must know that the target market are inclined towards using the platform. The market led approach is followed using the internet marketing (Stelzner, 2012). The company can automate word of mouth marketing by leveraging the social reviews. This would enable the customer to get the insight and gain the trust and hence increasing the product sales. The online community needs to be kept well and alive and this can be done by running the twitter questions and answers, which would increase the engagement. The several questions can be exchanged about the product and the related features. The best answer to the question can then be posted on the blog to enhance the customer base (Castronovo Huang, 2012). The products offered by the August Online company can be promoted through the launching of the website of the company and this is one of the parts of the marketing efforts. The company needs to monitor its target market internet usage pattern and the activities done online needs to be identified. The behavioral trend of the various categories of users in the target market would be identified by conducting the research online. The effective website incorporate the customer relationship management and would provide the platform to experience the brand (Kumar Mirchandani, 2012). The safety and the privacy of the product information can be posed to the security threats and thus making the company vulnerable to the security risks. This may happen due to the failure on the part of the company to cover the cyber security basics. If the company does not encrypt the data of the customers and the other relevant information then it would threat the privacy of the product and thus impacting the sales. The company lacking the sufficient and effective cyber security policy is exposed to the risk of network attacks and the security risks (McCrie, 2015). The company needs to fulfill the basic requirement of the securities and needs to guarantee about the confidentiality, integrity and the availability of the data. The security tools that would protect the product and its associated information are as follows: The company can make use of the tools to protect its website from getting hacked and this would be possible with the help of various security tools such as Qualys and Okta which would give the way to analyze any threat information along with the guidance of fixing the problems if there exists any such threats. These tools would also help in managing the logins across all the applications such as SAP, sales force, Google app, oracle, Box and many more if existing in the system (Kitchin, 2016). The software used by the company has to be updated regularly and the IP address and the website of the company can be kept secured using the proxy server. The company can rely on the virtual private network to access the various locations around the world. This would not allow the criminals to sniff the information about the product (Vacca, 2013). Reference and Bibliography: Banerjee, B., 2015.Fundamentals of Financial management. PHI Learning Pvt. Ltd.. Brigham, E. F. and Ehrhardt, M. C., 2013.Financial management: Theory practice. Cengage Learning. Brigham, E. F. and Houston, J. F., 2012.Fundamentals of financial management. Cengage Learning. Castronovo, C. and Huang, L., 2012. Social media in an alternative marketing communication model.Journal of Marketing Development and Competitiveness,6(1), 117. Ciampa, M., 2012.Security+ guide to network security fundamentals. Cengage Learning. Gupta, R. and Brooks, H., 2013.Using Social Media for Global Security. John Wiley Sons. Hull, J., 2012.Risk Management and Financial Institutions,+ Web Site(Vol. 733). John Wiley Sons. Jain, P. K., Singh, S. and Yadav, S. S., 2014.Financial management practices. Springer,. Kitchin, R., 2016. Getting smarter about smart cities: Improving data privacy and data security. Kramer, M. M., 2012. Financial advice and individual investor portfolio performance.Financial Management,41(2), 395-428. Kumar, V. and Mirchandani, R., 2012. Increasing the ROI of social media marketing.MIT Sloan Management Review,54(1), 55. Lasher, W. R., 2013.Practical financial management. Nelson Education.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.