• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Business Systems

Extracts from this document...

Introduction

Business Systems Adapting sales and marketing strategies (global opportunities, sales management); Having an efficient and productive marketing plan is essential to all businesses. In sales and marketing they make new products for selling and they make sure that they keep hold on the existing customers. If the product is selling very well then the business can go worldwide with that particular product instead of just selling it locally. This will give the business a significant advantage and the market share will increase rapidly as well. It is crucial that a business have a good customer relationship management (CRM). Target e-mails can be sent to existing customers about the new products so that they can sell quicker. It is very hard to target non-existing customers with the new products due to the fact that they will not know anything about the business or its services. This is one of the main thing as to why businesses try to keep hold of their existing customers. The only drawback for this is the fact that it will cost more money for all the e-commerce. Below are some examples how a business can adapt sales and marketing strategy: * Product testing (get feedback from new or existing customers in order to improve products and eventually increase the sales) ...read more.

Middle

. Secure funds transfer: Online money transfer is a well known concept nowadays. However, when security is the concern, very few online money transfers will qualify for this spot. What is secure online money transfer all about? It is all about incorporating the latest technologies that pertain to Internet security to make online money transfer solution that is rock solid. What does a particular organisation need to test the authenticity of a secured online money transfer solution? -Any secured online money transfer service should be able to deliver unmatched online money transfer solutions across a variety of platforms. A money transfer solution built to work only on Windows environment that fails to work on any other environment cannot be called secured, because it would easily be hacked outside windows environment. When selecting your online money transfer service provider, you should check out for the security options they offer. One of the most popular transfer systems is PayPal. PayPal is used by many organisations and it is said to be very secure to use as well. Overcoming these fears will have a positive benefit on cash flow of the organisation. SCM, logistics and integration with business partners: The changes in business that this has is the fact that it is easier to plan and control orders taken by customers using EDI instead of doing it manually i.e. ...read more.

Conclusion

This is a huge advantage and can increase the sales for a particular company dramatically. The customer can then have a look at the end result before actually purchasing the car. This gives the customer some kind of control which makes the person wanting to buy the product even more. The drawback of this is the fact that businesses needs to make sure that everything is working properly. If one thing goes wrong then the company will lose a lot of money. Another drawback is that employees can lose their jobs especially the middle man that take orders and process them. Reducing intermediation: Reducing intermediation is basically the term used to describe the number of businesses involved in a supply chain from raw materials supplier to finished product customer. It will basically bypass shops as customers can directly deal with the manufacturing if they have any queries for any products they buy from the manufactures. I.T deals with customers and removes the middle man that works for example for the help and support team or the team that take customer orders. Using technology in a business, you are basically getting rid of the middle man to robots. For instance, if a machine stops working and the company does not have any backup i.e. the middle man, the business can lose money because wasting time is losing a lot of money for companies. ?? ?? ?? ?? Adrico Studenic 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    Hardware and Network issues in e-commerce

    5 star(s)

    Finally security can play a heavy hand on the budget. As mentioned before, there are some major security issues associated with broadband. The larger the business, the more complex security systems they require, this equals higher costs. This will probably involve calling in consultants to evaluate and produce the required security measures.

  2. Analysis of market, environmental forces, competitors, marketing mix and consumer implementation.

    New entrants, like Microsoft, which wants to release their PC-technology-based Xbox earlier this year, will have a hard time to overcome the barrier of entry imposed on this market. In the last years, many other promising systems failed at the same task - for instance Amiga CD32, Neo Geo and Atari Jaguar.

  1. Designing a booking system for an Estate Agent.

    In total the database should include four tables. The client requires: * Details of the client: This will need to include the name of the client that is visiting. A register system: Miss/Mr/Mrs, First Name, Surname, Contact Details, Email * Negotiator Names: This will be a Drop down menu with

  2. ICT Security Report

    * Obstruct the communication media between the intended users and the victim so that they can no longer communicate adequately. However, a DoS attack may not be the main element in a service attack. They may be used as a component, though it may be a large part of the attack.

  1. Project Plan Forecast

    formal: Video conferencing between Thailand and China Oral Informal: individual and group discussion in each country Regularly-scheduled team meetings (3/weeks); and as needed 9 Integration Test Stage Apr 1, 2008 Apr 30, 2008 Project manager, Programmer, and Technical team Written Formal: software report and documents describing the process Oral formal:

  2. The business that I am going to study called 'Sangeet Videos'

    IPO's Input Process Output Personal Details Personal Details Surname Surname Forename Forename Invoice Invoice Price list Price list Customer list Customer list Result Result DFDs Workbook Set Up Main Menu Invoice Customer List Price list Pivot Table Chart Coding Test Strategy for Sangeet Videos I will test all the complex

  1. Database Design

    By doing so, a window popped up like this From here I could choose any command for the button I want. For example if I wanted to find a record, I would click on the Record Navigation category, then from the actions section I would click on Find Record.

  2. In the U.K there has been a major push for the introduction of national ...

    be placed on a microchip inside of the card to be used for proof of identity at the National Health Service, for instance. The card holder would then be asked to both swipe their card through a card-reader and place the same fingerprint that is in digital form on the card, onto a scanner.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work