Tuesday, December 24, 2019
The Statistical Method Used in the Analysis of the Two Markets, Classi Statistics Project
Essays on The Statistical Method Used in the Analysis of the Two Markets, Classification of the Variables Used in the Analysis Statistics Project The paper ââ¬Å"The Statistical Method Used in the Analysis of the Two Markets, Classification of the Variables Used in the Analysisâ⬠is aà forceful version of statistics project on marketing. This paper discusses the differences and similarities between the friendly market characteristics and circle K. it uses descriptive data in explaining the market characteristics. Some of the major descriptive statistics elements used include;MeanMedianMaximumMinimumStandard deviationSkewnessKurtosisJarque-BeraProbabilitySumSum Sq. Dev1.1Nominal variables include;Sex that is;Malefemale1.2Ordinal, variableFriendlyNo one1.3Interval variableHurryBargain1.4Ratio scalesCashWorkQuickCommute circle1.5Descriptive statisticsà BERGAINCASHCIRCLEKCOMMUTEDWELLFRIENDLYHURRYKNOWNEQUICKSEXWORKà Meanà 2.842105à 2.157895à 0.631579à 0.631579à 1.631579à 0.631579à 1.526316à 2.368421à 1.894737à 1.631579à 1.684211à Medianà 3.000000à 2.000000à 1.000000à 1.000000à 2.000000à 1.000000à 1.000000à 3.000000à 2.000000à 2.000000à 1.000000à Maximumà 3.000000à 3.000000à 1.000000à 1.000000à 2.000000à 1.000000à 3.000000à 3.000000à 3.000000à 2.000000à 3.000000à Minimumà 2.000000à 1.000000à 0.000000à 0.000000à 1.000000à 0.000000à 1.000000à 1.000000à 0.000000à 1.000000à 1.000000à Std. Dev.à 0.374634à 0.764719à 0.495595à 0.495595à 0.495595à 0.495595à 0.696692à 0.830698à 0.737468à 0.495595à 0.820070à Skewness-1.876388-0.263044-0.545545-0.545545-0.545545-0.545545à 0.917354-0.764584-0.695391-0.545545à 0.627845à Kurtosisà 4.520833à 1.837400à 1.297619à 1.297619à 1.297619à 1.297619à 2.633256à 1.951953à 3.824315à 1.297619à 1.845180à à à à à à à à à à à à à 12.98038à 1.289155à 3.236790à 3.236790à 3.236790à 3.236790à 2.771351à 2.720766à 2.069235à 3.236790à 2.304041à Probabilityà 0.001518à 0.524884à 0.198217à 0.198217à 0.198217à 0.198217à 0.250155à 0.256563à 0.355362à 0.198217à 0.315998à à à à à à à à à à à à à Sumà 54.00000à 41.00000à 12.00000à 12.00000à 31.00000à 12.00000à 29.00000à 45.00000à 36.00000à 31.00000à 32.00000à Sum Sq. Dev.à 2.526316à 10.52632à 4.421053à 4.421053à 4.421053à 4.421053à 8.736842à 12.42105à 9.789474à 4.421053à 12.10526à à à à à à à à à à à à à Observationsà 19à 19à 19à 19à 19à 19à 19à 19à 19à 19à 192.Customer characteristicsDo Friendly Market and Circle K have the same customers?Both the Friendly market and Circle K market have different customers as they comprise both male and female with the same age sex and group. From table 1.0 the probability of Circle customers going to shopping is 0.00151 and that of the friendly market is 0.198217 showing that the possibility or stack up the rate of friendly customers is more predictable compared to those of the Circle market.3.Demographic characteristicsWhat is the demographic profile associated with Friendly Marketââ¬â¢s customers?The friendly markets are composed of both women and men. The mean of both sexes is 1.631579 giving a chance that both genders must have been in equal proportion. The standard deviation is 0.495595 showing the level of dispersion of the two groups of the markets.4. What is the demographic profile associated with Circle Kââ¬â¢s customersThe demographic profile of the Circle Kââ¬â¢ customers is mainly composed of both sexes at an equal level. The dwelling of the customers is from a middle background similar to those of friendly markets. Both work but at the different levels are presented on the above graphs.4.1. Customer lifestyleWhat is the lifestyle profile associated with Friendly Marketââ¬â¢s customers?Individual lifestyle is reflected in the way an individual way of thinking, acting, and feeling. The buying patterns, the sp ending pattern and the nature of work one does. The customers of the friendly market are characterized by a high spending lifestyle comprising. The mean spending is 0.631579 which shows average lifestyle spending while the maximum and minimum are 1 .0 and 0.0 respectively while the median gives 1.0. This shows a high end spending patterns within friendly market customers.5.ConclusionThroughout the analysis, one common characteristic of both markets is that they are composed of high-end spending individuals which have common characteristics. This is well captured in the skewness of the data and the kurtosis. The demographic patterns are similar to the equal number of males and females purchasing the two markets product.
Monday, December 16, 2019
Virgin Blue Free Essays
VIRGIN BLUE UNDERSTANDING EXTERNAL ENVIRONMENT 1. Attractiveness of the Industry 1a. Identify the industry, product segments and value chain The industry is the Australian airline industry (global). We will write a custom essay sample on Virgin Blue or any similar topic only for you Order Now Core activities cover providing travel services to leisure travellers in Australia and overseas, including flights, travel insurance, holiday packaged deals, and freight business. Products segments including ? Business travel? 57. 1% of industry revenue ? full-fare ? business government travellers ? growth of video conference (-) impact on growth unit value of sale/pax double leisure travel fare ? Leisure travel? 29. 4% of industry revenue ? low-fare ? leisure travellers ? price is an important factor and strong driver for growth ? high cost incurred for flight changes ? Freight and other? 13. 5% of industry revenue ? freight transport, time sensitive high value to weight item charges on excess baggages, late fee,etcâ⬠¦ 1b. What is the current life cycle of the industry? The Australian airline industry is at the mature stage of its life cycle. This is demonstrated by the low average growth rate of the production, and the low airline operating margins around 2 percent over the last five years. Declining fares in the leisure travel segment due to strong competition have combined with increasing costs to lower profitability over this period. Yield management is critical to profitability due to high fixed costs involved in operating a flight, that is, the marginal cost of passenger on a flight is very low, so having a plane full, with as many full-fare passengers as possible, is important to maximise profitability. Over recent years, there has been consolidation, brand transformation in the industry and more services been introduced to attract higher yield customers. This is evidence of a low growth environment, wherein the industry is at the mature stage of its life cycle, the organisation focus is on efficiency, cost control, and market segment. 1c. What have been the key issues affecting historical industry growth? What was their impact? Key issues influencing historical industry growth using TEMPLES model FactorIssuesNature of Impact ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- +/ =/ -) Technology? The growth of video conference- Negative has had a slightly negative impact on growth in this segmenting recent ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- years Economy? Threat of the uncertainties of the global financial- Nega tive crisis, changing interest rate and fierce competition ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- from low-cost carriers in its domestic market Market? the low density of population and the size of Aus+ Positive Air travel in Australia is somewhat of necessary ? Declining fair in the leisure travel segment due to- Negative Strong competition have combined with increasing costs to lower profitability over this period; fierce competition from low-cost carriers in its domestic ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- markets Politics? Being restricted in the ability to expand overseas due ââ¬â Negative to Singapore Airlineââ¬â¢s right to veto the use of the Virgin ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Blue name internationally. SIA had the power to block ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Virgin Australisââ¬â¢s brand due to 49% stake in Virgin Atlantic ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- hat SIA acquired in 1999 Law ââ¬âââ¬â ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Environment? With a launch of the first real low-cost arline in+ Positive Australia, one class of ticket and minimal on-board, complementary service, there had been strong growth in the 2000s in market for travel for leisure, encourage ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Australians to take more holidays and air travels Society? low density of population and size of Australia+ Positive ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Air travel is somewhat necessary Overall+ Positive 1d. What are the key issues that will affect future industry growth? What are their likely impact and the overall assessment of the industryââ¬â¢s future growth? Future growth for the overall industry is assessed as positive (although it will be at a lower rate than historically growth) Key issues influencing future industry growth FactorIssuesNature of impactAssessment of (+/ =/ -)impact on future Industry growth ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- (Low/Med/High) Technology? The growth of video conferenceNegativeLow as had a slightly negative impact on growth in this segmenting recent ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- years Economy? Threat of the uncertainties of the global Negative Low Financial crisis, changing interest rate and fierce competition from low-cost carriers in ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- its domestic market Markets? Threat of new entrances present theNegativeLow Possibility the firms will enter industry And diminish the industry return by passing along value to buyers in form of lower price and raising cost of competition the alliance with SIA was one of thePositiveMedium several that Virgin had formed in building ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- its international network Politic? the alliance with SIA was one of PositiveMedium several that Virgin had formed in building its international network, allow Virgin to offer global flight coverge, epscially South-east asia and China, attractive to International business and leisure ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â ââ¬â- travellers Legal ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Environment? Along with alliance with SIA, there have beenPositiveMedium forged alliances with other international airlines such as Etihad, Air NZ, and US giant Delta Air Line to give business travellers an attractive overseas ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- and flequent flyer network Society? the airline developed and preserved its PositiveMedium culture by spending a lot of resources on recruiting the right people to serve its leisure customers and providing a culture and conditions that retain good ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- people Overall ImpactPositiveMedium In conclusion, the future industry growth is assessed as Low to Medium 1e. What have been the key issues affecting historical profitability? What was their impact? Industry revenue was estimated to be $14. 5 billion in 2012, with its main business being the transportation of passengers and freight on scheduled routes within Australia. Approximately 86% of the industry revenue is generated from airline ticket sales. The business travel segment is accounted for 57. 1% of industry revenue in 2012, while leisure travel segment is 29. 4% and freight and other are 13. 5%. Airline operating margins are relatively low, averaging around 2% over the last five years. Declining fares in the leisure travel segment due to strong competition have combined with increasing costs to lower profitability over the period. Using Porterââ¬â¢s five forces model, we can review the factors affecting historical profitability, it can be concluded that industryââ¬â¢s rivalry has increased. This is the result of many factors including: ? Threat of new entrance is low due the barrier of entry high. Capital requirements required to enter the airline industry. High fixed cost in operating the fly. The power of suppliers has been high due to limited number of service options available in business travellers segments such as proving access to hundreds of destination and business lounges around the world, offering high quality catering and other on-board service like newspapers magazine in premium class cabins, car hire and hotel reservation services. ? The increasing power of buyersââ¬â¢ buyers due to the price sensitivity of consumers (low price) and the search for best deal available, as well as air travel in Australia is somewhat of a necessity, given the size of Autralian and the low density of population. The increasing impact of substitutes such as alternative services like video conference maintaining low-cost services ? Industry rivalry is high: Jetstar, QALââ¬â¢s low cost airline, was introduced in 2004 in response to Virgin Blueââ¬â¢s success in the industry and the loss of market share away from Qantasââ¬â¢s full-fare service to the low-fare carrier; Jetstar is a low-cost carrier targeting low-fare leisure travellers; The airline industry growth is average and as it is easy for buyers to switch between the airline companies, depending on price. Thus rivalry is increased. Furthermore, the high fixed cost create opportunity for the airline companies to have price wars to compete each other, the great market share of Qantas will kill Virgin Australia at last. Porterââ¬â¢s competitive model Airline industry Potential New entrants Airline club loungesForeign carriers Priority ticketingRegional carriers Priority check-in High quality catering Newspaper ; magazine Hire car ; hotel reservationIndustry Rivalry Bargaining power of buyers Bargaining power of suppliers Qantas Jetstar Alternative services Business travellers Subsitute products ; services Video conferenceLeisure travellers Freight ; other, tour packages 1f. What are the key issues that will affect future industry profitability? What is their likely impact and the overall assessment of the industryââ¬â¢s future profitability? Attracting higher yielding corporate and government customers has been a key driver of improving the industry profitability. Yield management is critical to profitability due to high fixed costs involved in operating a flight ââ¬â that is, the marginal cost of a passenger on a flight is very low, so having a plane full, with as many full-fare passengers as possible, is important to maximise profitability. Also, in order to improve profitability, the major competitors in the industry (Jetstar, Qantas, Virgin) have become vertically integrated. Strategic airline alliance been introduced. Qantas and Malaysia airline negotiated an agreement for access markets in Asia and code-sharing. SIA and Virgin formed an alliance, allowed SIA customers access to Virgin Australiaââ¬â¢ s domestic airline airportââ¬â¢s lounges. This partnership, along with Virginsââ¬â¢ other alliance, would allow Virgin to offer global flight coverage, attractive to international business and leisure travellers. The key factors influencing the future profitability of the industry can be summarised as follows: ? Positive factors include ? Forming alliance has allowed Virgin to offer global flight coverage, attract more international business and leisure travellers ? introducing a premium ââ¬â valued service ? develop new lounge ââ¬â product enhancement ? introduce new uniform and new menu ââ¬â product enhancement ? Negative factors include ? Strong competition in the industry between major companies as growth slow and more emphasis is placed on maintaining or increasing market share with price becoming a key factor. Potential entrance of other new low-cost carriers. The future profitability of the industry will continue to be medium. 1g. Who are the industryââ¬â¢s key competitors? What are their strengths and weaknesses? In 2012, the industry is dominated by two airlines, Qantas Airways Ltd and Virgin ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬ââ⬠âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- CompetitorValueStrengthWeaknessRelative ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Propositionproposition Qantas Airways Ltd? Fully integrated? Highest market? Less focus on? Strong ? Accounting for 65%shareleisure travellers share of industry? Dominates business evenue in 2012segment ? More services offered such as full service, ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- low cost, regional Virgin ? Fully integrated? Second highest? No coverage? Strong ? Accounting for 17. 2 %? Strong presencein regional share of industryin leisure market revenue in 2012? Offer services in full service and low ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- cost service Others? Accounting for 17. 8%? private charter ? group of small? Weak share of industrypassenger flights orcompanies revenue in 2012freight operation UNDERSTANDING EXTERNAL ENVIRONMENT 2. Summarise the strategic position of Virgin Blue 2a. Who are Virgin Blueââ¬â¢s key stakeholders, what are their objectives and are their objectives aligned with Virgin Blueââ¬â¢s strategic goals? As stated in the section on ââ¬Å"Game change program- a new strategic direction for Virgin in Australiaâ⬠, Virgin regard itself as number one position in the leisure segment and maintaining its low-cost focus. Its state strategic goals are as follows: ? Growing its share of the Australian business travel segment from 10% to 20% ? Establishing a ââ¬Ëvirtualââ¬â¢ global network through strategic airline alliances ? Ensuring capacity was closely aligned to profitability ? Maintaining a strong presence in the leisure market ? Enhancing its brand in Australia and overseas markets There are numerous stakeholders (individuals/groups that have interest in the business or corporate strategy of the organisation) in relation to Virgin Blue. An analysis of the objectives of each of these stakeholders and the alignment of these objectives with Virginââ¬â¢s strategic goals as follow ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Who are theWhat do they seek to receive fromIs Virgin Blue delivering against their stakeholders? he organisation? expectation? John Borghetti? Launching ââ¬Å"Game Changeâ⬠program? Yes, the transformation of Virgin (CEO)with the vision to be the airline of has been well on the way and choice for Australian business and attract numbers of business leisure travellersleisure travelles ? Rein vent the company as a full-service? No, still not yet take over Qantas brand by altering its low-cost, no-frillsbusiness market model to take market share from Qantas ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- in the higher-margin, business market Board including: Roger Linderman? new management team, formed to? Yes, its chase growth in business (General manager)take on Qantas, particularly in thesegment, but not yet take over Jane McKeoncompetition for business travellerQantas (running governmentââ¬â¢s relation team) Hope Antzoutlatos (head of domestic ; International network Operations) Will Owens (Heads of yield Management) Hans Hulsbosch? develop the airlineââ¬â¢s economy ;? Yes, have been attractive to (Creative director)business class cabins to attract numbers of business travellers ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- Business traveller segment Employees? Secure employment prospect? Yes, as its chase growth in the family based, teamwork,business segment, it has to ensure ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- respect and funlow turnover and maintain culture Singapore Airline? SIA and Virgon form an airline? yes, the agreement between SIA alliance, allow the use of Virgin Ausand Virgin has allowed SIA customer Band overseas. Virgin able to build to use Virginââ¬â¢s domestic network its international network, and alsowith just one ticket allow two allows SIA customer access to Virginairline gold member to access to Australiaââ¬â¢s domestic networkVirginââ¬â¢s domestic airlineââ¬â¢s airport ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- ounge 2b. What business strategy is Virgin Blue supposed to have been pursuing and has this in fact been the case? The five questions (5Qs) approach is used to understand Virgin Blueââ¬â¢s stated business strategy Business strategy usingExamples of how Virgin has been pursuing this stated ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- 5Qs approachbusiness strategy ? D oes Virgin Blue want to growthVirgin blue wants to grow. We can see from their new vision profitability? ââ¬Å"to be the airline choice for Australian business and leisure Travellersâ⬠. And its targeting to grow the share in business travel segment from 10% ââ¬â 20%. The airline alliance strategy to establish it built its international alliance network in Asia as it is a critical market for Virgin ? What products/services will Virginleisure travel segment maintaing its low-cost; Virgin Blue Blue provide? began offering a premium economy fare, reinvent itself as a full service brand by altering its low-cost, no-frills model to take market share from Qantas in the higher margin, business market; developed its passenger lounges, introduced a loyalty reward scheme, ââ¬ËVelocity Rewardsââ¬â¢, and offered the first Web check-in service in Australia. In what market will Virgin BlueGeographic market ââ¬â Australia domestic airline, global flight operate? coverage after Virgin formed alloances with Singapre Airlines Customer market ââ¬â business traveller, leisure traveller, freight and other include travel insurance, and formed a new venture with ZUJI, an online travel company. ? What generic strategy will VirginGeneric strategy ââ¬â lo w cost leadership (no-frills models) adopt? -;Differentiation: take market share from Qantas in the igher margin, business market (full-service model). ? what is the position in the insutryVirgin Blue had grown through expanding its leisure travel does Virgin Blue plan to hold? segment, and growing low-fare passenger numbers to hold the number one position in the leisure segment and maintaining its low cost focus; By 2010, Virgin had about 10 per cent of business travellers and an approximate 30 per cent of all domestic air travellers; Growing its share of the Australian business travel segment from 10 per cent to 20 per cent. SWOT ANALYSIS Identify the capabilities of the organisation in the context of the competitive environment, using SWOT analysis ? Strength: Virgin Blue had grown through expanding its leisure travel segment, and growing low-fare passenger numbers to hold the number one position in the leisure segment and maintaining its low cost focus. _ Virgin had formed alliances with Singapore Airlines in building its international network _ Borghetti was a former QAL executive who was appointed CEO and MD of Virgin in 2010. He quickly established a new management team capable of taking on Qantas, particularly in the competition for business travellers, by recruiting some highly experienced ex-Qantas staff including: Roger Lindeman as General Manager Service Experience; Jane McKeon, to run Virginââ¬â¢s government relations team; Hope Antzoulatos as head of domestic and international network operations; and Will Owens as head of yield management. ? Weakness: Qantas has 65% of industry revenue in 2012 but Virgin only has 17. % and no regional offered compete with Qantas; Qantas dominates the business segment. _ Unprofitable routes in New Zealand and to destinations including Fiji, Phuket and South Africa, high costs in maintaining its four brands, and confusion in the market between the brands. ? Opportunities: Acquire 20% of market share in market sector _ brand transformation reduce the cost of advertising and less confuse customer _ expand alliance with SIA to enter Asia market, broaden its offering by adding more services to enter the business segment and attract higher yield customers ? Threats: fierce competition from low-cost carries in its domestic market; Jetstar would have in capturing part of the leisure market _ Declining fares in the leisure travel segment due to strong competition have combined with increasing costs to lower profitability over this period. EVALUATION OF STRATEGIC OPTION ? Competitive advantage Benefits:yes, to sustain growth and profitability Valued by customers_ maybe not as people perceived Qantas as leading provider for business segment _ have to be careful not losing loyalty customers External consistency Industryââ¬â¢s life cycle:Fits well ââ¬â moves to more competituve environment TEMPLESto respond to the external environment particular social cultural factors and economy factors ââ¬â fit well to maintain profit Profit well with the changes in external environment where more competitive from low cost Jetstar and profit due to pressure on price, to sustain growth profitability by capturing more market sharee in business se gment ? Internal consistency Revenue costrevenue increased by capturing more in business segment Cost reduced by consolidating into one brand Not implementmore difficult to complete in the industry because of competition Reputation riskculture issues Loyal customer * Consistent in term of growth and sustainability But not consistent with the current culture and balance low cost leisure and business segment ? Internal consistency Capabilities:experience management team from Qantas Capitalcan be quite costly to reposition itself and do it property Strong culture in family oriented can be quite difficult for business market How to cite Virgin Blue, Papers
Sunday, December 8, 2019
Acid test ratio vs current ratio free essay sample
The Current ratio and the Acid-test ratio, both fall under the category of financial ratios.Ã These two ratios examine the capability of an organization to pay those creditors, whose debts are below the stipulated period of twelve months.Ã Such short-term debts usually consist of 30 or 60 days credit period.Ã Indeed under the two ratios the Current Liabilities are considered as the debt to be covered by the assets considered on the numerator of the ratio. The higher these ratios, the better are the financial position of the firm.Ã However, a number of factors have to be considered by both ratios before remarking on the financial position of the company.Ã For instance, one has to consider the nature of the business and the effect of seasonal variations before giving drastic conclusions.Ã In fact, such ratios are frequently examined by analyzing the financial position of the same organization over time or in relation to the industry average in which the firm operates. We will write a custom essay sample on Acid test ratio vs current ratio or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The main difference that lies between these ratios is the analyses of the liquidity of the current assets taken.Ã Under the current ratio, all the current assets of the firm are considered in the formula.Ã However, the acid-test ratio examines the assets that can be easily converted into cash in relation to the current liabilities of the firm.Ã As a result, the stock value, which is the least liquid asset, is deducted from the current assets in this ratio. Under these ratios, the short-term assets are divided by the current liabilities in order to see by how many times can such assets cover these liabilities.Ã For instance, if at the financial year ended 31st December 2006 a firm had a total current assets of $200,000, and the current liabilities added up to $100,000, the current ratio would be calculated as follows: This result indicates that the current assets of the firm can meet by two times as much the present current obligations of the organization.Ã The same principle applies for the acid-test ratio with the exception that stock is removed from the current assets as already stated in the previous paragraph.
Saturday, November 30, 2019
Information security in Small Scale Enterprises
Introduction Scientific innovations and inventions have led to technological advances; the technology has increasingly been adopted in businesses in different areas/processes; however, there are numerous threats brought by the use of technology.Advertising We will write a custom research paper sample on Information security in Small Scale Enterprises specifically for you for only $16.05 $11/page Learn More The affordability of computer and computer software has facilitated the use of technology in small-scale business; some of the most used technological advancements within an organization are information sharing systems, enterprise reporting programs, the Internet, and e-commerce. Employing technology in small-scale businesses opens them to myriad of problems; information security is the greatest threat (Wallace, Lin Cefaratti, 2011). This paper discusses how to secure small-scale business from technology related threats. Best information security syst em To have an elaborate information security within an organization, the management needs to develop a security policy; a security policy defines the use and accessibility of information in a company. When making a security policy, it should not be seen as an end user policy, however it should be ongoing and protection adhered to at every stage. An effective security policy provides five important services to the organizations, the services are: Access It offers the users a chance to receive and transmit data within the system while adhering to proper machine and data handling. Confidentiality The policy should respect privacy of information whether individual privacy or corporate privacy. Authentication The system should be efficient in transmitting of information that messages can be traced back with certainty.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Integrity The system should ensure tha t the message sent has not been changed or modified when in transit. No- repudiation The system should ensure that it keeps proper records of the sender and receiver of message, the time of the transmission and the information kept cannot be altered (Yayla Hu, 2011). The process should have a five working principle that the organization should look into, they are: Physical security and lock down all the technological assets When a small-scale business has embarked on securing its information, the initial stage is to regulate physical access of computer hardware like server, personal computers, and other networking and telecommunications equipment. The prevention is from human resources of the company and external users; access should be limited to those people with permission to access the machines. Some of the most common methods of physical security include lock and key, the use of passwords when opening the security rooms, use of fingerprints to limit the access to the computer systems rooms and the use of alarm systems to alert incase of trespass (Hulitt Vaughn, 2010). Physical security is not adequate in itself since the machines will have to be used at one point, a policy that elaborates on the best ,machine and data handling best practices should be implemented and staffs trained accordingly; such a training will assist the staffs have a clear understanding of why they need to protect information within their organization. Process and procedures security setups With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure regardless of who has an access to the system.Advertising We will write a custom research paper sample on Information security in Small Scale Enterprises specifically for you for only $16.05 $11/page Learn More The control of the Internet and i ntranet should be prioritized; creating firewalls that limit incoming and outgoing traffic will assist in monitoring and controlling the use of the tools. Fireworks is one of the most known effective methods of controlling internet and internet system, it is able to keep off unwanted messages within the system; however the system does not protect a system form virus and spywares. Since firewalls allow viruses and spywares to operate in the system, then a company should have an effective antivirus and antispyware software; the software should be up-to date and updated through the system without offering some dangers to the system. People with a certain negative intention develop viruses and thus strong anti-virus software should be maintained; the system adopted should be strong enough that can detect virus programs and block them from accessing the system. Small-scale businesses should not shy off from investing in expensive but effective security systems, since the market has some ant viruses that cannot be fully relied upon. Website management and protection One area that small-scale businesses communicate with the outside world is through their websites. It is through the sites that they offer some information and access right of outsiders to their company information. To ensure that data is secure a company must establish ways to protect information that is contained in its website; the approach is seen as an internal and external approach. Internal in the fact that the information offered should be limited and the one meant for public consumption and external in that it protects external users from accessing some information about the company. The kind of data that it posts over the internet should be vetted; information has many users for various reasons, any information posted should target a certain user and the behavior as a result should be speculated. If information is likely to hurt the organization, then it is better not offered, some users of inf ormation for the loss of a company include competitors and people will ill motives. There should be a specific class of people mandated with the role of uploading information in the website; the power to upload information should not be vested in one person, however a team of web-managers should be developed.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More The web master should have the exclusive rights to upload information only after the team has deliberated and seen the move as appropriate. This will require restriction to servers and main computer room (the approach to restriction has been discussed earlier). Another important yet ignored task of web management team is withdraw of information and alteration of information posted in the website. The same staff should be mandated with the task of withdrawing any information that may have gotten to their website either through malice or through mistake before it has tarnished the name of a company (Wibowo Batra, 2010). Using genuine and up-to date software and hardware Technological advancement has made it possible to have some systems that are secure and those that can handle some basic information threats. For example having software that have timeouts when not used can assist a company to secure information that could be accessed when a system is running. In the market, there is the option of buying software/hardware then install security measures and other systems that come with an inbuilt security system. Systems that come with security set-ups are referred to as managed security services or software-as-a-service (SaaS); they come with a warranty that they will secure information for a certain period if used effectively. Small-scale businesses should use such systems since they offer more security and fallback in case they collapse. Alternatively, the developers of the systems are mostly large companies with the resources of developing an effective system; this small-scale business will relatively pay low for quality service (Veiga Eloff, 2007). Upgrading companyââ¬â¢s software is another thing that can assist a company keeps away people from accessing some crucial information; for example, an operating system like Windows keeps updating its software to offer better services and protection against some threats. Technology is changing day by day and th us a company should maintain a strong information and technology team that can keep the company with the pace of computer world (CAIN, 2010). Hacking can be prevented by ensuring that softwareââ¬â¢s adopted by a company are complex in their design but user friendly; hackers have use other software that run parallel to the original software to get information about a company; however using genuine and well developed software can keep them away. This will assist a company to keep away hackers. Many are the times that a system is hacked by information and technology people who have worked with the system and thus know how it operates. To prevent this there should be a responsibility oath enforceable in court taken by information and technology experts leaving and getting into an organization. Secondly, there should be not one center of power; no one should fully understand a system in operation. Checks and balances should be set (Aggeliki, Spyros, Costas Stefanos, 2010). Have data back-up systems To the extremes, information can be lost due to some unavoidable situation; small-scale businesses should have backup systems that will assist them retrieve back information that has been lost. The backup systems are kept in a different station other than the place of operation. Incase data as lost, and then they are used as a fallback. Technology has today reached to a level that lost data can be recovered by use of data recovery tools, though they would require a prior registration; a company should invest in such kind of technologies (Batra, 2007). Employeeââ¬â¢s awareness and internal processes control One of the potential areas that information security issues can emerge from is staffs with malice or some who are innocent or ignorant. Managers should ensure that they have programs that train their staffs on the need to have high information security. Other than training, the management should have policies that facilitate the adherence of security of informat ion (Puhakainen Siponen, 2010).. Some of the operations that employees put in the system may be dangerous to the system; there are times that flash disks have been used to transfer information form the company to other places, or employees downloading softwareââ¬â¢s or installing some software in company computers. This leads to threat of information. To prevent employees from using external gadgets to get information, the management should block the use of USB cable networks, or if they must be used, the crucial information may be formatted to be read-only such that employees will not be able to get the information. Some systems that can be used to manage the access and transfer of information from computer within an organization; they include Windows Registry software which limits the access and transfer of information without authentication (Peltier, 2002). When an employee want to download or install some programs in the system; there should be proper approval and the need f or the proposed software be defined. When the system has been installed, the management should vet and scrutinize it for any threats it is likely to bring to the company. The Information and technology department should be guided by integrity and have the capacity that it can make the system work with optimal security. They have the expertise of creating security policies like the use of passwords and limiting access to computers at individual level. Alternatively, they should register computers under the name of the user thus incase of anything done using the computer, they can trace back. This approach is a psychological or threatening approach where employees will shy off from misusing their computers in the fear that they will be detected and punished if there is a leakage of information via their computers. This increases reliability and employees fee more accountable of the information they have (Asai Hakizabera, 2010). When a small-scale company has decided to implement a se curity policy, some procedure and processes that it must consider are: Know your attackers Before the best strategy has been rolled out, the most important issue to realize is to know the possible sources of information threats; when the attackers are known, as well as they operated, then the company can be in a better position be able to maintain high security system. The approach to security that the company should take is dictated by the tread of the approach and the intent that the information hackers have (Kantardzic, 2002). Determine the pain thresholds With the nature and the tread of the attackers, the system that will be used should be there to frustrate the attackers; determining how long the attackers can go is of importance since the company will develop the strategy that frustrates attackers and probably limits their attempt in the future (Hennie, Lynette Tjaart, 2010). Research of the best method With an understanding of the situation and the attackers to burr from th e system, a company needs to develop alternatives available for the task. The alternatives may be commercial software or sometimes need to restructure the internal controls within the organization. In whichever the situation, a company should aim at implementing the best security approach at its disposal. Some of the potential areas that need to be looked into are Social engineering, internal information control policies, and the vulnerability of the system and the integrity of a companyââ¬â¢s employees (Hill, 2009). Rolling out, controlling, monitoring and reinforcing When the best approach has been recognized, then the company should come-up with a rolling out plan, it should be appreciated that developing security systems is like any other change within an organization that need to be strategically planned. The involvement of management in controlling and monitoring is called for (Dhillon, 2007). Conclusion Technology has brought numerous advantages in small-scale businesses; however, it exposes them to information security threats. Data and information held by a company is an intangible asset, thus should be secured and protected; however, some companies have had their private information lost or accessed by unauthorized users. Information management team has the role of establishing an effective information security strategy that looks into internal and external information threats. References Aggeliki T., Spyros, K., Costas, L. Stefanos, G. (2010). A security standardsââ¬â¢ framework to facilitate best practicesââ¬â¢ awareness and conformity. Information Management Computer Security, 18(5), 350-365. Asai, T. Hakizabera, A. (2010). Human-related problems of information security in East African cross-cultural environments. Information Management Computer Security, 18(5), 328-338. Batra, M. (2007). The dark side of international business. Competition Forum, 5, 306-314. CAIN, A. A. (2010). Information Security a Top Priority. Internal Auditor, 6 7(1), 17. Dhillon, G. (2007). Principles of Information Systems Security: text and cases. NY: John Wiley Sons. Hennie, K., Lynette, D. Tjaart, S. (2010). A vocabulary test to assess information security awareness. Information Management Computer Security, 18(5), 316-327. Hill, C.W. (2009). Global business today. New York, NY: McGraw-Hill. Hulitt, E., Vaughn, R. (2010). Information system security compliance to FISMA standard: a quantitative measure. Telecommunication Systems, 45(2-3), 139-152. Kantardzic, M. (2002). Data mining: Concepts, models, methods and algorithms. New York: J. Wiley. Peltier, R. (2002). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL: Auerbach publications. Puhakainen, P., Siponen, M. (2010). Improving Employeesââ¬â¢ Compliance Through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34(4), 767-A4. Wallace, L., Lin, H., Cefaratti, M. (2011 ). Information Security and Sarbanes-Oxley Compliance: An Exploratory Study. Journal of Information Systems, 25(1), 185-211. Wibowo, K., Batra, M.(2010). Information Insecurity in the Globalization Era: Threats, Governance, and Survivability. Competition Forum, 8(1), 111-120. Veiga, A.D. Eloff, J.H. (2007). An information security governance framework. Information Systems Management, 24, 361 ââ¬â 372. Yayla, A., Hu, Q. (2011). The impact of information security events on the stock value of firms: the effect of contingency factors. Journal of Information Technology, 26(1), 60-77. This research paper on Information security in Small Scale Enterprises was written and submitted by user Lady Deathstrike to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Tuesday, November 26, 2019
Free Essays on Animal Cruelty
Animal Cruelty Having a household pet can be both rewarding and inspiring. Because household pets are domesticated, they depend on their owner to provide a safe haven for them. When one decides to have a household pet, a great deal of responsibility needs to be taken to provide food, water, shelter and medical attention for the animal. Pets are voiceless and defenseless. They share the world with us, and it is our responsibility to care for the them. Regrettably, some animals become victim to human violence and abuse. Cruelty or abuse is when a person knowingly or intentionally deprives an animal of food, water or medical care, and maliciously tortures, mutilates, or kills the animal [HSUS 1]. Greater awareness is needed in order to help prevent the unnecessary abuse of animals. The majority of the American household family has at least one pet. Under normal circumstances, these loyal and loving animals are often treated as a member of the family. On the flip side, if the pet lives within a violent household like domestic abuse and drug and alcohol abuse, chances are that the animal too has become victim to human abuse. Animals that are living in this type of violent environment are in great danger because they are powerless. Situations like this often go unreported because animals cannot speak up for themselves. According to Dr. John New, "Each year four million women are abused by a husband or boyfriend. Approximately half of those women have animals, (and) half of those with animals say that the animals are abused or killedâ⬠[Covington]. Recently, a great awareness has surfaced between the link of domestic human violence and animal cruelty. The Humane Society of the U.S. (HSUS) is one of the largest organizations fighting for the humane treatment of animals and raising awareness in defense of animals that are victims of domestic abuse. Every year, the HSUS releases a report of animal cruelty cases. The most recent ... Free Essays on Animal Cruelty Free Essays on Animal Cruelty Rabbits immobilized in wooden stocks with ulcers in their eyes; baby seals being clubbed over the head, and the infamous shock treatment. Broach the subject with an individual and odds are that they have witnessed footage of one or all of the aforementioned practices and are appalled by the cruelty. Appalled yes, willing to stand up and voice their thoughts... not often. There is one significant reason for this unwillingness by some to stand up for the rights of our fellow inhabitants of this planet, personal convenience. We are systematically cutting down the last forest that provides their shelter to farm cattle; we dump toxic chemicals and sewage into the waters in which they live; we wear the tusks of the last few of their species on our arms, and we pour cosmetic products into their eyes, rectums or vaginas to determine the harmful effects they might cause on humans, even though the physiological differentiation between humans and the animals they use is durastic. On a daily bas is most people do not see their own degree of unintentional support towards this global dilemma, but when compiled on paper one must question how mankind can, with conscience, commit these acts which shame us as human beings. Animals possess the same kinds of feelings and emotions as human beings, and without anesthesia, they are subjected to the pain as well. Mankind often fails to give animals the respect and rights they deserve, they are treated as lifeless, unfeeling scientific specimens and items that we may manipulate at our own convenience and for vanity's sake. Laboratory research involving animals is cruel and merciless treatment of helpless creatures. No law requires that cosmetics and household products be tested on animals. Nevertheless, by six o'clock this evening, hundreds of animals will have had their eyes, skin or gastrointestinal systems unnecessarily burned or destroyed (Sequoia, 27). Two of the most famous animal tests are the Draize, or ... Free Essays on Animal Cruelty Animal Cruelty Having a household pet can be both rewarding and inspiring. Because household pets are domesticated, they depend on their owner to provide a safe haven for them. When one decides to have a household pet, a great deal of responsibility needs to be taken to provide food, water, shelter and medical attention for the animal. Pets are voiceless and defenseless. They share the world with us, and it is our responsibility to care for the them. Regrettably, some animals become victim to human violence and abuse. Cruelty or abuse is when a person knowingly or intentionally deprives an animal of food, water or medical care, and maliciously tortures, mutilates, or kills the animal [HSUS 1]. Greater awareness is needed in order to help prevent the unnecessary abuse of animals. The majority of the American household family has at least one pet. Under normal circumstances, these loyal and loving animals are often treated as a member of the family. On the flip side, if the pet lives within a violent household like domestic abuse and drug and alcohol abuse, chances are that the animal too has become victim to human abuse. Animals that are living in this type of violent environment are in great danger because they are powerless. Situations like this often go unreported because animals cannot speak up for themselves. According to Dr. John New, "Each year four million women are abused by a husband or boyfriend. Approximately half of those women have animals, (and) half of those with animals say that the animals are abused or killedâ⬠[Covington]. Recently, a great awareness has surfaced between the link of domestic human violence and animal cruelty. The Humane Society of the U.S. (HSUS) is one of the largest organizations fighting for the humane treatment of animals and raising awareness in defense of animals that are victims of domestic abuse. Every year, the HSUS releases a report of animal cruelty cases. The most recent ...
Friday, November 22, 2019
Cover Critique #1 with Mark Ecob
Cover Critique #1 with Mark Ecob Cover Critique #1 with Mark Ecob We are very excited to bring you the highlights from our firstà Reedsy Live Chat, which as promised will be a regular feature in the coming months.à Every live chat features one professional from the Reedsy marketplace hosting an interactive session that includes among other things free advice on topics like editing, book design, and marketing.We started things off with our first Cover Critique, a big thanks to the terrific Mark Ecob for an informative session.Mark runs his own design studioà and specialises in book cover design. He has worked with large publishing houses likeà Penguin, Little, Brown and Amazon, as well as independents such as Faber and Icon. Since 2012 he has been Associate Art Director for Unbound, the London based crowd-funding publisher.à His work has been recognised three times by the Design Art Directors Association (DAD), and exhibited at the Hay Literary Festival 2012.For those of you who missed it, we've compiled a brief recap. However, we strongl y recommend you watch the videos. And if you want to take part in our next Cover Critique, with Jake Clark, remember to send your covers in advance to covers@reedsy.com.Cover Critiqueà with Mark Ecob - Part 1Just click on the image below to watch the video!
Thursday, November 21, 2019
Ethically Bound and Legally Speaking -Discussion Essay
Ethically Bound and Legally Speaking -Discussion - Essay Example The medical team did what they could to save the life of the patient. The patient emerged from surgery alive but was clearly going to have a very low quality of life if he lived long. Hours after the surgery, the patient developed complications and was clearly experiencing excruciating pain in different parts of his body. I realized that the patient was not going to live long. His condition deteriorated by the minute in spite of the efforts that the medical team were applying. Meanwhile the costs associated with his care continued to soar even as his quality of life dwindled and level of pain increased. The temptation to turn off the life support machines was high if not to save the patient from the pain he was suffering then to save his family from incurring additional costs for his care. He was going to die shortly; within a few days or weeks at the most anyway. I was torn between applying the principles of beneficence and nonmaleficence. The principle of nonmaleficence dictates that clinicians should do no harm to their patients (Aveyard, 2004). On the other hand, the principle of beneficence dictates that clinicians act in the best interest of the patient such as by taking action to prevent physical harm or pain (Aveyard, 2004). By switching off the life support machines, I would save the patient the agony he was going through as a result of his injuries and low quality of life. On the other hand, I would seem to have done the patient harm by switching off the machines. In the end, I decided to go by the latter. We opted to do the best we could to make the patient feel less pain even as he approached his death naturally. I believe the stand that I took was appropriate especially considering my strong belief in the sanctity of life. The alternative action would have been to switch off the machines and save the patient from having to endure so much pain. This perhaps
Subscribe to:
Posts (Atom)