Sunday, May 17, 2020
Internet customer acquisition strategy at Bankinter
Consumer relationship management: Case study Bankinter Remco Wezepoel 14/10/2013 Which channel (8700, alliances, e-collaborators) performs better for the bank, and why? And what acquision strategy would you recommend to Bankinter? What actions should be taken by Ana Peralta? In order to choose the best consumer acquisition strategy for Bankinter it is necessary to look at the profitability of the customers. It is nice to have a lot of customers, but this does not really make sense when these customers ensure your company with losses. It is important to look at the profitability of customers in the long-term. Based on exhibit 11 in the article, it is possible to calculate the average consumer equity. As you can see in appendix 1,â⬠¦show more contentâ⬠¦Transactions were done from the Bankinter site, so it was hard for competitors to get expertise in their online system. More insight in customer behavior, so ability to analyze the customers properly. In my opinion, the strategy of the company is smart and adopting to current developments. With the growth of the internet it was a must (and a missed chance if there was not) to focus on this medium. Bankinter did that with the alliances. While the alliances resulted in more new customers, the price was quite high, the brand was too much hidden and the competitors copied the banksââ¬â¢ strategy. So Bankinter started with the e-collaborations. These high-traffic-websites approach collaborations generated even more customers (exhibit 1 in the article). These customers were attracted by providing them with incentives. This e-collaborations approach resulted in lowered customer acquisition costs and made it possible to set up a proper consumer relationship management system, which provided the company with insight in the behavior of the customers. According to the case, the changes which the bank has made generated new customers with a higher customer equity. However, the overall strategy is a little unclear to me. Besides that, nothing is said about the performances of the competitors at the same moment in time. Were they also gaining in their customers? Or did they lose customers? And if so, was this because of the changes which Bankinter made or did they wentShow MoreRelatedBankinter analysis1629 Words à |à 7 Pagesï » ¿BANKINTER INTRODUCTION TARGET Intro: The case begins with Ana Peralta,(Director of the Internet Network at Bankinter) analyzing the success of Bankinterââ¬â¢s foray into e-banking through a progressive portalization strategy executed through E-collaborator. This approach was a great success for the Bank nearly doubling the number of new clients with lower costs involved. Riding on this positivity, their stock doubled within a month! There was no doubt that the success of the internet businessRead MoreNissan Strategic Management Report3777 Words à |à 16 Pageswe can see Nissans market share is shown in the figure below. 2.1 GENERAL ENVIROMENT 2.1.1 SWOT ANALYSIS According to Grant, M.(2002), the allocation of the external and the internal factors of a company is commonly used for analyzing business strategies. The SWOT analysis (strengths-weaknesses-opportunities-threats) intends to point out the most important external and internal factors that are essential for the organization to accomplish their objectives. This analysis groups important information
Wednesday, May 6, 2020
Analysis Of The Book The - 979 Words
Selection 3: Page 199 ââ¬â Book Six Concerning this tragedy, however, the sober mind can comfort itself with the solace that this and earlier examples of their valor will live on in the world and that their death, whereby their errors were swept away through the fervent faith, has won the martyrââ¬â¢s crown. They fought, and, that no one of them should die without retaliating, each made a pile of corpses around himself; but, even so, the number of assailants did not diminish, for it was recruited from the horde. The Turks killed the horses, which, tough not able to gallop, were nevertheless of value in carrying the heavy armor, and the mail-clad Franks, now on foot, were overwhelmed among the thick-pressing enemy as if they were drowned in the sea; they were separated one from another, spilling the vitals from their defenseless bodies. During this engagement the king lost his small but renowned royal guard keeping a stout heart, however, he nimbly and bravely scaled a rock by making use of some tree roots which God had provided for his safety. There is substantial stock put in horses by western knights. Not only do they provide a tactical advantage on the battlefield but they are also major status symbols. During the First Crusade, the heavy horses proved to be a decisive advantage, routing rival Muslim armies with heavy charges. By the beginning of the Second Crusade, the Turkish leaders have seen this tactic and are adjusting to it. As Odo describes, the Turks are targetingShow MoreRelatedAnalysis Of The Book The 1147 Words à |à 5 Pagesbreak your parentsââ¬â¢ hearts?ââ¬â¢ This passage from Deranged Marriage is about Sushila Das, the author, and her decision to not follow in the family tradition of arranged marriage and her parentsââ¬â¢ reaction. This is one of the most important passages in the book as this is when Das decides to turn her life around and live how she wants it, hopefully with her parents blessing. Dasââ¬â¢s intention with this piece was like her memoir to take her stand against aspect s in Indian culture, this was her final foot downRead MoreAnalysis Of The Book The Book Of Scriptures 1181 Words à |à 5 PagesAnthropomorphism, likewise alluded to as exemplification or prosopopeia, is the attribution of human qualities to lifeless, creatures, powers of nature, and others. Scriptural humanoid attribution is when human qualities are anticipated on God. The Book of scriptures has cases of God alluding to himself in human terms and the scriptural scholars alluding to God in human terms - the design being to portray God in wording more justifiable to people. Without humanoid attribution, since God is undetectableRead MoreAnalysis Of The Book The 1183 Words à |à 5 PagesDing upon the instruction of Lord Wenhui. ââ¬Å"With each touch of his hand, heave of his shoulder, step of his feet, thrust of his knee ââ¬â whop! Whish! ââ¬â He wielded his knife with a whoosh, and every move was in rhythmâ⬠(Zhuangzi). Zhuangzi work is a major book, which revolves around an indistinguishable scope which Xunzi failed to encounter. In any case, the work is much more assorted and disarranged than the Xunzi and its real thoughts substantially harder to abridge. In this segment, we will attempt toRead MoreAnalysis Of The Book The Essay1484 Words à |à 6 PagesCatholic household was brought to salvation by a friend at the age of eighteen. He has been involved in ministry since 1977 and published his first book in 1994. Mahoney and his wife, Carolyn, have four kids and currently reside in Gaithersburg, Maryland. Summary of Content In the introduction Mahaney prepares the reader about how intense this book is going to be. He explains how the cross is our everything. He tells us that we shouldnââ¬â¢t be looking for different ways or methods to get close to GodRead MoreBook Analysis743 Words à |à 3 Pagesheadline that clearly foreshadows the content. It reads: ââ¬Å"Change Lives with your Gift. Donate Now.â⬠So that it follows Redishââ¬â¢s guidelines for a well-formed headline, it is of medium length and uses a clear call to action. As Redish points out in her book, one way that medium length headlines works for a website is that it should be, ââ¬Å"questions, statements, or calls to action that resonate with your site visitorsâ⬠(3209). The headline first suggests your ability to change lives with your monetary giftRead MoreAnalysis Of The Book The 955 Words à |à 4 PagesDamien walked over to Alexandria in the Amity compound and laid a hand on her shoulder. She turned around. Oh, hey. sh e said. Yeah, hey. I m thinking of joining the Erudite s side. he said. What? Why? she asked, staring at him with a puzzled expression on her face. I feel that the Erudite are correct. The Abnegation should be gone. Also, you should come with me. he said. What the hell is wrong with you? she asked. I know what s right and wrong, Lex. Damien said, glaring at her. NoRead MoreAnalysis Of The Book A 1410 Words à |à 6 Pagesdrawn in the book, the family has the same color of skin even though the parents are different cultures and the main character is mixed. There were no different skin colors. b) This book fit in level 1: A contributions approach because the book talks about food in two cultures. The book also has recipes of some of the food that was mention in the story. According to Gopalakrishnan (2011), level 1 is when books ae about holiday, food, festivals and other cultural elements. This book was about foodRead MoreAnalysis Of The Book The Essay1509 Words à |à 7 Pages Anthony Green Mr. Hyde English II Pre-AP, Period 7 7 March 2016 UnSouled Neal Shusterman SETTING As the adventures continue from the previous book, UnSouled first starts off with Connor and Lev running into a bit of trouble trying to get to their destination, but where they are headed to is actually a who rather than a what. The two boys develop a stronger bond as they are stuck in multiple life or death situations. In a whole other conflict, Risa Ward, the ambivalentRead MoreAnalysis Of The Book The Essay1122 Words à |à 5 PagesCallum shouldered his sack, eyes focused on the back of the man before him, trying not to think about the ache in his feet, the soreness of his back, the grime that layered his body. ââ¬Å"Just keep marching, keep movingâ⬠Callum repeated in his head like a mantra. Callum could see in the distance beyond the trees the faint outlines of green hills. Hills that he last remembered were bathed in red and flesh. Over a year has passed since the First Battle of Bull Run and so much as changed since then. WithRead MoreAnalysis Of The Book The 1538 Words à |à 7 PagesSitting back in his chair Yi Xing took a deep breath and stared at his monitor with a smile on his face happy with the work he had done. Today, Yi Xing finished memorizing everything in Naruto going from jutsus to character descriptions, bloodlines and so on. This was the only thing that he had focused on the entire year, he had not gone to school, he had rarely eaten or used the restroom, he only took a shower once every three months, he had leeched off of his parentââ¬â¢s money, why? Just because
ACS Code of Ethical Business Conduct
Question: Discuss about the ACS Code of Ethical Business Conduct. Answer: Introduction: On March 2017, The 52 GB Dun and Bradstreet database which is comprised of 33.6 million records which are exposed. Troy hunt is the cyber-security researcher who studied the database dilemma. The database is comprised of the personnel information of the employees, such as names, job title, job responsibilities, e-mail addresses, and phone numbers (Suciu, 2017). The aim of this hacking is to target the customers through e-mail addresses or to get confidential information of the organization. From the research, t has been found that no highly sensitive data is exposed. More than 1,000,000 employees information was exposed in the scenario of hacking. The databases are organized for the storing, gathering, and manipulating the data for bringing revolution in the retrieval of the information. The key responsibility is to maintain the confidentiality of the information stored in the database (Silen, 2011). The ethics is defined as the acceptable behaviour of the individual therefore, When the individual behaviour is unacceptable than the doings of the person comes under the category of unethical activities. The issues which are associated with the loss of data are controlling and accessing of confidential information, misusing of data and information, exposure of privacy, legal issues, social issues, accuracy of the data is lost, loss of trust, and others. ACS code of conduct: The responsibility of every individual is to follow code of ethics for the smooth functioning of the organization (Cowie, 2014). The ethical conduct brings the feeling of loyalty, honesty, and impartiality among employees. The table below shows the description of ethical code which helps in improving the positivity in the employees and helps to overcome the situation of ethical dilemma: Particular Description Priorities The priority helps in preserving the flow of information in continuity of computing services. The integrity and security of the information system should be preserved. The conflicts between client and employees should be minimised The connection of communication should be developed between employees Competence The operational and functional need of the client should be fulfilled by providing good quality product and services to them Value of money should be provided Development of standards and rules Acceptance of work responsibility Interest in the activities Honesty The product and services should be suitable to the client Skills and knowledge should not be misinterpreted Unbiased and objective opinions should be raised Realistic estimation of the project control Credit of work should be given Social Implication Health and safety measures should be promoted at the work place Privacy of the people should not be affected Fair treatment of the employees Personal satisfaction, control, and competence should be raised Professional development The knowledge and skills should be upgraded The awareness of relationship with the community Professional development Computing profession The professional opinions of the employees should be raised Dishonesty should be avoided at the work place Enhancing the reputation of the company Implication of ethical issues: Practicing of codes of ethics in the curriculum helps in overcoming the problem of hacking and other ethical issues at work place because the code of ethics built the feeling of honesty, loyalty, impartiality, friendly behaviour among employees which in turn helps in minimising the chaos among the individuals. The principles help in improving the quality of life by contributing the feeling of well-being in human (Tollen, 2016). The individual restrict themselves from harming others which minimised the unethical activities like loss of confidential information, loss of property, unwanted activities in working environment, and others. The ethical codes help in designing and development of social activities in employees. Honesty and trust are the pillars of avoiding chaos at the work place. The feeling of discrimination can be overcome in the individual and raises the feeling of coordination among employees (Shacklett, 2013). The privacy of the individual should not be disturbed at work place. The professional competence helps in developing skills and knowledge of the individual. The privacy and freedom of the individual should not be disturbed because it can affect the performance of the individual. The feeling of harming others can be raised. The security system should be indulged with the confidential database which brings feeling of trust and satisfaction in the employees. Only the necessary private information of the individual should be collected (Warren, 2014). After using the confidential information, it should be destroyed to prevent leakage of information in the future. The security measure should be taken into consideration to preserve the accessibility and manipulation of the information. The purpose of collecting private information should be clear to the employees which help in raising the feeling of trust in the individual. The safeguard system should be accompanied with the confidential database (Reynolds, 2015). The implementation of ethical laws in the curriculum of the individual helps in increasing the productivity of the organization and minimization of conflict at the working place. Tools and technologies should be used to monitor the performance of the employees. The figure below shows the ethical responsibility of the employees at the work place: Conclusion: The step should be taken forward to preserve the right to privacy of the employees at the work place. The security measure should be taken into consideration to preserve the accessibility and manipulation of the information. Honesty and trust are the pillars of avoiding chaos at the work place. The exercising of ethics in the curriculum helps in overcoming the situation of ethical dilemma. The ethical guidelines should be followed to preserve the information of the individual because it helps in building the feeling of loyalty and togetherness in the employees. References: Cowie, R. (2014).Ethical issues in affecting computing (1st ed.). Retrieved from https://people.ict.usc.edu/~gratch/CSCI534/Readings/OHAC-14-Ethics.pdf Reynolds, G. (2015).Ethical in information technology (1st ed.). Retrieved from https://lms.uop.edu.jo/lms/pluginfile.php/5921/block_html/content/material.pdf Shacklett, K. (2013).ACS code of ethical business conduct (1st ed.). Retrieved from https://corpdocs.msci.com/ethics/eth_12962.pdf Silen, M. (2011).Encountering ethical problem and moral distress (1st ed.). Retrieved from https://hj.diva-portal.org/smash/get/diva2:450421/FULLTEXT02.pdf Suciu, M. (2017).Dun and bradstreet marketing database exposed (1st ed.). Retrieved from https://www.technewsworld.com/story/84387.html Tollen, A. (2016).ACM code of ethics and professional conduct (1st ed.). Retrieved from https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct Warren, E. (2014).Legal ethical and professional issues in information security (1st ed.). Retrieved from https://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf
Subscribe to:
Comments (Atom)