.

Friday, December 27, 2019

Part A Positioning Strategy Of Taco Bell Essay - 1399 Words

Assessment Tacobell 2 Part A Positioning Strategy Taco Bell offers more than other fast food in terms of being distinct. Taco Bell has different ways of having fast food with thrilling and other substitutes. Taco Bell gives delicious also nutritious products at a price where everyone can afford it and that it is rational. It is a normal fast food chain, Taco Bell consists of convenience for people and deliver actual quality Mexican meals instead of imitation Mexican meals. Taco Bell meals have to be at a price where all income consumers can afford. They have to set prices in line with other bigger fast food joints. Taco Bell is unique compared to other fast food joints, giving people quality meals and also conventional authentic food. Taco Bell is a fast food joint, fast food means delivering quick meals to people. They will want to have a process of giving customers products within a certain timeframe and to give customer gratification. Justification for positioning strategy In the fast food industry with bigger competitors such as Burger King, KFC, McDonalds and Subway in New Zealand, they will be impotent against them, also the prices for the bigger fast food joints, they cannot match. Taco Bell will have to discover and recess the market place so that they can utilize and take them away to the brim. Positioning will be key for Taco Bell, as they will have to make their products unique from others and also different that makes them stand out in the current market. TacoShow MoreRelatedThe Fast Food Industry: Positioning and Competitive Advantage3275 Words   |  14 PagesFood Industry: Positioning and Competitive Advantage INTRODUCTION The fast food industry is an ever growing industry regardless of the concerns from many about the health and obesity risks. Despite these risks associated with fast food consumers continue to return indicating there is a high level of competition amongst several members of this industry. This paper will examine and discuss the five following major fast food restaurant chains: McDonald’s, Burger King, Wendy’s, Taco Bell, and Sonic. TheRead MoreThe Marketing Plan For The Business Plan858 Words   |  4 Pagesequally important to protect it and continue the development and positioning it in the market. Therefore, there are numerous models of communication plans, the firm should use the one they find appropriate for them. In essence communications plans have several disciplines that interrelated and in synergy would support the business plan can create an effective communication plan with results potentially beneficial to the positioning of the brand. These disciplines ar e: advertising, paid search, socialRead MoreReport of Transcom Beverage Bd1596 Words   |  7 Pagesa  corporate ideology.   1.2 Objective of the study: Broad objective: Marketing Mix(4 p ¶s) Analysis and Competitors Evaluation ´ Specific objectives:    †¢ To find the business portfolio of Transcom Food Beverage ltd. †¢ To know the marketing strategy of Transcom Food Beverage ltd. †¢ To find the pricing Transcom Food Beverage products. †¢ To find the Transcom Food Beverage ltd.communication system. †¢ To find the product of   Transcom Food Beverage in   last year †¢ To findRead MoreMarketing Plan of Mcdonald2838 Words   |  12 PagesCulture. †¢Separate cooking area and equipments. †¢Takes dietary concern-Burger King healthier Kids Club + Competitive Review In the UK, the main competition comes from Burger King, but in the USA, competitors also include Wendy s, Taco Bell and Subway. Burger King, often abbreviated as BK, is a global chain of hamburger fast food restaurants headquartered in unincorporated Miami-Dade County, Florida, United States. The company began in 1953 as Insta-Burger King, a Jacksonville, FloridaRead MoreChipotle Managerial Accounting3880 Words   |  16 PagesChipotle’s strategy is to solidify its reputation with this generation by promoting humane food sourcing and organic farming. Chipotle’s second value proposition, â€Å"Fast-Casual, Dinning† resonates with many consumers who are looking for quick, healthy, affordable meal options. By committing themselves to their customer’s time constraints, Chipotle is attracting and retaining people who do not mind paying about twice as much for a Chipotle meal as compared to a McDonalds or Taco Bell meal. Read MoreMarketing Concepts Of Chipotle Mexican Grill1823 Words   |  8 Pagesbusiness strategies, organizational structure, organizational culture, social responsibility, company policies and company leadership. These concepts will be used in the discussion of findings for this report. Chipotle Mexican Grill Company Overview Chipotle is a combination of fast food and casual dining restaurant that serves Mexican food. Chipotle opened its first restaurant in 1993 in Denver Colorado. It was founded by its CEO Steve Ells. It currently has 1,600 locations in different parts of UnitedRead MoreInfluence Of A Successful Administration1344 Words   |  6 Pagesallocation of resources, selection and promotion of other leaders and role modeling. In most cases, Chief Executive Officer is considered as the most astounding positioning officer in an organization while the president is second in the hierarchy. However, in corporate administration and structure, numerous permutations can occur, so the parts of both CEO and the president may be diverse crosswise over different firms. Consequently, it is imperative to have a general comprehension of the professionalRead MoreThe Popularity Of The Fast Food Industry1316 Words   |  6 Pagesnourishment for both lunch and supper. This need is the thing that drove the amazing accomplishment of the early fast food goliaths, which took into account the family on the go. As the fast food industry started booming, they were the main source of part time job for teenagers. In late 1970’s, a staggering one out of eight US citizens were employed by McDonalds. In the mid-1970s as the nourishment business extended it turned out to be more aggressive setting off the Burger Wars of the 80s and 90sRead MoreEssay about Competition Among Fast Food Chains1639 Words   |  7 Pagessave their time, traveling cost. For the fast food chain companies, locating the branches to reach customer becomes a positioning strategy. CHANGING PREFRECE depended vastly on the fast food manus. For example we can mention about SALAD. Now salad was never considered as a part of fast food menu. But with the change of taste and preference, fast food chains like Windy, Taco Bell, and McDonald have introduced SALAD into their menus. This preference is not stopping only with salads. In 2002, McDonald’sRead MoreMarketing Analysis : Marketing Mix1682 Words   |  7 PagesMarketing Analysis: Marketing Mix is the set of tactical marketing tools that can be blended by an organization to establish strong positioning in the targeted market. An effective marketing program blends each marketing mix element into an integrated marketing program designed to achieve the company’s marketing objectives by delivering values to consumers. [1] Figure 1: Marketing activities covered under four P’s [2] Product: Quality: Coca Cola was formulated in 1886 by John Permberton, a pharmacist

Thursday, December 19, 2019

The Issue of the Commonwealths Spending Pattern - 2095 Words

Intro The issue of the Commonwealths spending power. The recent High Court decision of Williams’s v Commonwealth [2012] , saw the introduction of significant changes to this area, and the forthcoming Williams v Commonwealth No 2 , currently before the High Court, will likely see issue further developed. The debate surrounding this area has to do with the fact that in addition to the legislative heads of power in sections 51 and 52 of the constitution, there are a number of other constitutional provisions which the federal government has attempted to use as a source of Commonwealth spending power. The two most frequently cited examples being the section 81 Appropriations power and the section 61 Executive power. In considering both of these sections the High Court has come to the conclusion that the scope of the spending powers should be limited. This essay will argue the position that the High Court is justified in this approach and, with reference to the various principles of interpretation set out by the High Court and the notions of Federalism and Responsible Government, will show that limiting the Commonwealths spending powers, outside of the legislative heads of power and the grants power in section 96 is both constitutionally valid and necessary for the democratic process in Australia. The question is asked should the commonwealth be able to spend its money on anything it feels like – including – or should it be limited to expenditure on topics related toShow MoreRelatedThe Internet and Information System That Contribute to Competitive Advantage4381 Words   |  18 PagesAFF5200 ISSUES IN COMPETITIVE ADVANTAGE PROJECT I THE INTERNET AND INFORMATION SYSTEM THAT CONTRIBUTE TO COMPETITIVE ADVANTAGE PREPARED FOR Mr. Richard Laney By Wendy (20646836) Sara Prashanthi Ananthula (20107226) Kaushalya Abeysinghe (20139128) TABLE OF CONTENTS INTRODUCTION

Wednesday, December 11, 2019

Cyber Security and Its Challenges-Free-Samples -Myassignementhelp

Question: Write a Reflective Journal on Challenges in Cyber Security for Business. Answer: Introduction and Reflective Journal Scope Cyber security and its challenges for business are considered for two major and significant facts that are impactful on the business growth and fundamental aspects related to business processes and functional specifications of business operations included within the any business organization. In contrast with these facts, there are various important facts and consequences that are identified through the literature review and research proposal presorted on this particular research topic. This reflective journal is presenting and highlighting the impactful areas about this research topic with respect to fundamental consequences involved within the system architecture of business organizations that are mainly impacted by the cyber security and its challenges. Reflective Journal Scope The scope of this reflective journal is presenting significant areas of research process that manages developmental aspects involved within best possible areas of research about cyber security issues in business sectors. The reflective journal will be capable of analyzing and funding the seriousness and impactful nature of the cyber security issues and problems introduced within the business sectors with respect to various arbitrary needs and demands of business cases and sectors. Critically and depth of learning reflections reflective analysis The study of various literatures has revealed to me that cyber security issues and their impactful circumstances are impacting on the business growth and developmental concerns. Therefore, in order to retrieve the consequences and functional disadvantages of cyber security and its issues impacting on the business sectors, I need to evaluate my research work done on two significant assignments (assignment 1 and assignment 2) for analyzing the impacts and harmful effects of cyber security and its disadvantages affecting the growth of business cases. I have studied the responsive and impactful situations involved within the business cases that are impacted for cyber security and its challenges. Evaluation of effectiveness and usefulness of the learning experiences The evaluation of the experiences is mainly based on the challenges and issues that are incurred for cyber security issues within the business sectors. I have noticed that cyber threat is becoming one increasing threat to the growth structure of business sectors. According to different researches done on this segment of research I consider the cyber security threats are most impacts risks involved within the development of business growth. I found that the business organizations are experiencing decreased growth issues and functional aspects as there are lack of security measures implemented within business organizations that impacts on the significant development of organizational performance depending on various factors, efficiency of technical knowledge of employee, proper security measures required for resolving security issues caused by cyber attacks etc. I have found the lack of technical knowledge about security perspectives for cyber attacks to be the most impactful cause for cyber attacks to business sectors. I feel the organizations should implement new standards and also should recruit new responsible heads for technical development of the organization. This experience have the value in guiding me for my future career development in the field of cyber security issue identification or any kind of recruitment process within different business sectors with respect to various fundamental aspects related to growth aspects of organizations and business cases. I think this experience is valuable enough for me in understanding the major causes and effects of cyber security issues incurred because of cyber attacks within business sectors or business cases. Usefulness of the learning processes The knowledge about cyber security aspects and consequences are important for my career and also increasing programs course knowledge within organizations. I found these learning useful for learning about ethical hackers, vulnerability analysis of software packages and fundamental issue analysis for security associate degree programs that are perfect for degree courses and functionality analysis for particular industry that is focusing on real world application on analysis for cyber security threats and capability analysis for graduate levels and master level programs. Completion of advanced level of training programs and security clearances for applications of cyber attacks in organizations are effective for me to be studied and learned while managing as well as developing my career. Description of the objectives in the learning process The learning process of me mainly consists of stages and functional steps that are incorporated within the research process for managing successful completion of the research process with respect to various objectives and aims of this considered research process. I learned the scopes for this research that states that ICT organizations are interested enough for understanding the gaps in identifying security gaps for cyber security threats involved within business cases. In addition to this, main objectives for this research I also have learned. I found the objective for this research to be the risks and functional aspects that are impacting on success of the project must have to be identified for resolving issues involved within organizations. Evaluation of the learning Evacuation of learning from my research work is important for managing significant development of functional areas of development within the research learning processes with respect to fundamental aspects involved within business sectors. In contrast with these facts, I have also identified that business learning process is important for managing cyber security aspects involved within any professional organizations and functional areas of business cases. The business research is proved to be helpful for me as I have learned various consequences related to functional areas related to cyber security aspects and functionalities that make one business organizations weak. This aspect has made me concerned about the resolving process for the cyber security threats and functional problems. Explanation of learning process According to various papers that is had to study during this research process highlighted various significant aspects that can impact on the job profiles and career options when I will search for job in my career. The consequences helped me to discuss the functional aspects for managing important security threats related to cyber attacks and fundamental aspects involved within cyber attacks. The explanation of this research learning process is very important in order to retrieve the concerns for cyber attacks that can save organizations from losing their economic strength with respect to other considered organizations. From the point of view of my feelings about this research work, this is identified that the responses of respondents are analyzed with respect to critical concerns about cyber attacks within organizations and I can say that the organizations are more focused about these concerns for mitigating their issues. Application of the learning from research Applications of these learning are very important in my career for managing significant development in case of organizational development and prosperity. In contrast with these facts, there are various aspects that I have learned during this study or research work that made me aware of the security issues involved within business organizations. In contrast with these facts, there are various functional and innovative aspects that I have learned during this research that is helpful for my graduate and master level of studies that impacts on the development of functional aspects related to educational structures for organizations and business cases. Therefore, I think every organization should be aware of these considerations and they should also introduce new technological support for their organizational development with respect to functional aspects involved within different organizations with respect to their organizational objectives and aims involved within their structure of wor k culture. I also can conclude this thing that security framework for organizational development helps the organization in achieving more sustainability and also this helps them in earning profits for their functional development and growth. Conclusion This can be concluded that this reflective journal is presenting the significant and important facts about various critical situations that are caused by serious challenges of cyber security issues involved or being introduced within the business sectors with respect to various functional needs and demands of the business cases and fictional areas. This reflective journal is presenting the functional and fundamental issues and lessons learned from the entire research process. The reflective journal is nothing but the presentation of significant areas of learning that is collected while studying and conducting the research within specific areas or domains. Bibliography Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), pp.491-497. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Incio, P.R., 2014. Security issues in cloud environments: a survey.International Journal of Information Security,13(2), pp.113-170. Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2014. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(01), p.24. Jokar, P., Arianpoo, N. and Leung, V., 2016. A survey on security issues in smart grids.Security and Communication Networks,9(3), pp.262-273. Kim, D.Y., 2014. Cyber security issues imposed on nuclear power plants.Annals of Nuclear Energy,65, pp.141-143. Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home security: Issues, challenges and countermeasures.IEEE Communications Surveys Tutorials,16(4), pp.1933-1954. Kshetri, N., 2013. Cybercrime and cyber-security issues associated with China: some economic and institutional considerations.Electronic Commerce Research,13(1), pp.41-69. Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J. and Bertino, E., 2013. Collaboration in multicloud computing environments: Framework and security issues.Computer,46(2), pp.76-84. Stojmenovic, I. and Wen, S., 2014, September. The fog computing paradigm: Scenarios and security issues. InComputer Science and Information Systems (FedCSIS), 2014 Federated Conference on(pp. 1-8). IEEE. Stojmenovic, I., Wen, S., Huang, X. and Luan, H., 2016. An overview of fog computing and its security issues.Concurrency and Computation: Practice and Experience,28(10), pp.2991-3005. Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges.Computer Networks,57(5), pp.1344-1371. Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014. Cyber-physical security challenges in manufacturing systems.Manufacturing Letters,2(2), pp.74-77.

Tuesday, December 3, 2019

Nike Companys Business Model

Executive Summary This report is supposed to explore how organizations manage their multiple relationships with key suppliers and business customers which is a critical strategic issue that faces all organizations. This is to be achieved by identifying one organization that is involved in such business-to business transactions and use it as an example on how it is involved in the various organization buying situations as well as what strategic relationships it can use on its suppliers and customers.Advertising We will write a custom report sample on Nike Company’s Business Model specifically for you for only $16.05 $11/page Learn More The report identified Nike Inc. an American company which was founded in 1962 by Philip H. as an importer of Japanese shoes, then known as Blue Ribbon Sports (BRS). It has over the years grown to have over 20, 000 outlets in 110 countries worldwide. The company deals in designing and marketing of sports footwear and apparels as well as selling its branded items. Most of its raw materials are imported from other firms outside the US which the company has contracted to provide the goods and services. As a result the company is involved in various buying situations with its suppliers. These include: Straight rebuy situation, which involves purchasing with the same specifications as the previous ones. Modified rebuy situation, which refers to purchases made but with adjustments compared to the previous one. Lastly there is new buy situation, which involves, purchasing which has new specifications meaning that no such purchase has been made by the organization. Nike Inc. is involved in all these buying situations either with its upstream business suppliers or with down stream business customers. Nike Inc. has a business model that describes how information flows between the company and its customers, suppliers and competitors. The model also shows how physical goods and services move between the par ties involved. The business model makes the suppliers and customers visible and as a result, it enables Nike Inc. to come up with measures that it can use to secure more value from customers and suppliers compared to its competitors. In order for Nike to be competitive it needs to identify attract and retain strategic suppliers and customers that will ensure that it realizes continuous growth in profits. Therefore this brings out the need for the company to formulate and implement supplier relationship management strategies and customer relation ship management strategies. Introduction Business-to-business relationships refer to transaction, collaboration other interactions trade between business ventures, whereby goods are exchanged not for consumption but for production of other goods and services or for the buyer to pass them to the end consumer.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Such businesses include transactions between a raw material supplier and a manufacturer, manufacturer and a whole-seller and lastly a whole-seller and a retailer. Nike Inc. features as one of those entities that are involved in business-to business transactions (Hutt Speh, 2010). The founder of the company was Philip K. Knights back in 1962. From then, the company has experienced tremendous growth to the level of becoming a market leader in athletic footwear. This is evidenced by its more than 20,000 stores in approximately 110 countries. These outlets are either wholly owned by the company, with a mix of independent distributors and some are licensees (Wikinvest, n.d). The manufacturing system of Nike products is done by independent contractors who are distributed globally. Nike is therefore involved in design, development and marketing. The company acquires raw materials such as Pet fiber used for making shoe material, shoe insole, shoe heel and shoe outer sole from Hsu J enn Enterprise Co.,Ltd. Sojitz corporation has provided import-export financing services to Nike since 1972 (Sojitz Corporation, n.d). Huang Jiang Nan Pao Resins supplies Nike with glue. Nike Inc. also supplies its products to other businesses downstream which include footwear designed for athletics, aquatic activities, football, golf and other sports. Nike gets logos from colleges and sports teams and markets its products using the customized logos. Using Nike brand name, the company also sells a line of performance equipments such electronic equipment bags, socks and many others. Some of the school teams provided for uniforms include base ball teams of University of Alabama, West Virginia, Oregon State, Florida and Virginia Tech. Also among the schools that have used Nikes products is the Jesuti High school (Zimber, 2010) Buying Situation The components of organizational buying behavior include making a decision to buy goods from one of the many available supplier and then proceed ing with the purchase. This buying process is characterized by various buying situations which include: Straight rebuy situation, whereby the purchasing department is mostly involved and it reorders the material based on information from the inventory control department. Here they look at the quotations from vendors in the approved list and the buyers seek the same specifications as for previous purchase. In Nike’s case the schools that have contracted to purchase team uniforms fall in this category, particularly because many a times they only need to renew their contracts with the company to continue with the product as previously specified (Hutt Speh, 2010).Advertising We will write a custom report sample on Nike Company’s Business Model specifically for you for only $16.05 $11/page Learn More There is Modified rebuy situation whereby the organization seeks to buy the same products but with adjustments compared to the previous specifica tions. The modifications can be on the actual products and services or the delivery system. In this buying situation the executive as well as the purchasing department are involved. Nike also has the ability to enhance its inclusion by seeking for more suppliers as well as enhancing the available vendors in terms of their delivery systems among other technical issues. This buying situation applies to Nike Company when it wants to reorder materials it has been using, however it wants that adjustments be made on the supplies. For instance if Nike orders for Pet fiber from Hsu Jenn Enterprise Co. Ltd, however with a different delivery system for example through air as opposed to previous means of water transport. The supplying company may consider if it can meet the new requirements if not, then Nike Inc. will be forced to seek services of other suppliers (Hutt Speh, 2010). This situation can also apply to licensees’ retail stores in different countries who can bargain for adju stments in delivery methods or packaging methods. If the purchase of a product is a first time situation, then it is referred to as new task buying scenario. This situation is characterized by stages which include; awareness, interest for offerings of each potential supplier, and subsequently they are evaluated, tried and finally adopted. Suppliers are then approved in to the list based on price competitiveness. A product’s cost as well as its value of consumption may influence the number of executives thereof to be higher. This buying situation can apply to a new professional team that wants to buy sports wear whereby it will consider suppliers of such products that include Nike and its competitors. It will then evaluate them and eventually sign a contract with the company that meets its requirements who will start supplying them with the sports wear (Hutt Speh, 2010). Nike can also be in a new task buy situation, whereby it might need a new type of glue products therefore it will identify suppliers of such products including Huang Jiang Nan Pao Resins. On evaluation and trial of their products it will settle on one supplier and hence enter into a contract with that supplier to deliver that product (Hutt Speh, 2010).Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Source: Tompkin (2001) Business model showing the relationship between Nike Inc. and its suppliers, customers and competitors. Note: The broken lines indicate the supply of physical products and services The continuous lines indicate the flow of information between parties (Tompkin, 2001 ) Business models There are two main information systems in the business model. The first one labeled A represents an information system shared between Nike Inc. its competitors and their suppliers. Therefore if Nike wants to get information about its suppliers, then it contacts that system and the same case applies to its competitors. On the other hand the suppliers can also get information about the organizations they are to supply through the same information system. Likewise Nike can order products and make payment communications to its suppliers through the same system. There is another information system labeled B, which represents the flow of information between the focal firm (Nike Inc.), i ts competitors and their customers both current and potential. Through the system Nike can obtain information about its customers. Likewise its competitors such as Adidas can also obtain information amount customers it is serving or those it intends to serve as well as those served by its competitors. It is also important to note that information flow can to any direction, showing that all that al the organizations in the model can share information between each other (Geunes, Pardalos Romeijn, 2002). Customers in this market can also obtain information about Nike and other organizations that supply them. At the same time Nike and its competitors can exchange information with their customers such as order reports from customers and payment reports to the customers. In addition, Nike and its competitors can share information between them on how to form strategic partnerships. The model also shows how organizations can supply each other with goods and services. The suppliers can eith er supply their raw materials and other products to the focal firm (Nike Inc.) or to its competitors. This means that Nike and its competitors have access to these suppliers. For example Sojitz Corporation of America can either provide import-export financing services to Nike Inc. through channel labeled 2 or to Adidas (Nike’s competitor) through channel labeled 1. The same case applies to the second supplier whereby it can supply to Nike through channel labeled 3 and to Reebok through channel labeled 4 (Geunes, Pardalos Romeijn, 2002). On the other hand, Nike and its competitors can also supply products and services to their customers, Nike can supply sports wear to Jesuit high school through channel labeled 7 and to the Oregon State University through channel labeled 6. On the same note Nike’s competitors can also supply to their customers whereby if Adidas had Jesuit high school as its customer then it can supply it through channel 8 while Reebok can supply Oregon State University through channel labeled 5. Therefore Nike Inc. can form strategic partnerships with its competitors that will maximize the value they obtain from their suppliers. On the other hand the same firms can still make strategic partnerships that will enable them to serve their customers effectively. On the contrary they information systems also present potential threats to Nike from its competitors. Particularly because through the shared system both Nike Inc. and its competitors can have access to the same suppliers and customers. Therefore this calls on Nike to put up strategic measures that ensures that it maintains valuable relations with its suppliers and customers. The information system also presents Nike with a vast of information about the market. For instance when it intends to make purchases the company can get information about the various suppliers from the system. For example if Nike is in a new task buy situation, it can obtain information about the qualitie s available from each supplier, the prices they each charge for the product or service even before it contacts them. All these information can be obtained from information system labeled A. The suppliers also can evaluate the qualities of Nike and this will help them to consider whether they will accept an order from Nike. In addition when Nike Identifies one of the suppliers as the most preferred suppliers, then they will communicate between each other and share information on technical capacity, quality standards price offers and period of contract before signing supply contracts and agreeing on payment. Therefore the above business model is effective because it makes use of the whole supply chain and the web. This model provides a platform for a company to share or use procurement data directly as well as simultaneously all along the supply chain. In addition each company can react to information independently hence enabling free flow of material. On the other hand the model offe rs visibility to each company in the supply chain and therefore each of them can opt for independent action or they can as a group collectively takes action. As a result suppliers are not squeezed to offer the lowest prices as there can be independent transactions between two companies (Tompkin, 2001). Customer Relationship Management strategies In a business-to-business relationship, customers who are organizations go through a process to get a supplier who will provide them with products and services. Therefore companies that want to serve such organizational customers should invest in relationship management strategies in order to identify, attract as well as retain the most valuable customers that enable the business to maintain a profitable growth. Particularly because in the current competitive world, such customers are hard to secure and competitive advantage through improved performance in service delivery as well as responsiveness to customer needs. These relationship strat egies can either be positive in that they reward loyalty or they can be positive whereby, they penalize customers who want to shift (Buttle, 2008). First, there is customer value proposition, whereby Nike determines the products and services that Jesuit high school athletes needs today and in the future. As a result Nike should offer some value that will be beyond what the school expects, hence this will act as an incentive as the school will compare what it gets from the relationship. Secondly, differentiation can also be a key strategy that Nike Inc. can use to attract and retain customers, whereby the company asses the products and services offered by competitors and what the company needs to be providing hence develops products that have clear different and beneficial attributes from competitors. The two above strategies while determining the products and needs of customers should put in to consideration the markets that these customers serve as this is their main objective. Thi rdly Nike should strive to have to increase the profitability of its customers, like for Jesuit high school whereby Nike can strive to increase the amount of supplies it provides to the school. This will make it hard for the school to change to another supplier as it will involve a lot of costs (Hutt Speh, 2010). Fourthly, Nike can personalize the relationship whereby it provides customized services and products. This includes providing a whole set of performance equipments to Jesuit high school that fit specifically to their needs. They can also seek information from the school on its requirements and seek to meet them. For instance, if it provides sports equipments that can only be used with products from Nike Inc. only and have the school’s name and colors displayed company. The company can also give special offers to the customers during the low seasons so that in the high season when competitors are seeking for customers, Nike’s loyal customers will be under its control as a result of contracts signed during the low season. For example Nike Inc. can give a discount to Jesuit high school to order for sports wear way before the season starts. As a result when the season starts and all other competitors are seeking customers, the high school will have been tied to the company (Buttle, 2008). Supplier Relationship Management strategies Supply relationship management refers to a comprehensive way of managing entities interactions with those companies that provide it with goods and services it uses. Its main objective is to streamline and make attain effectiveness in the processes between an entity and its suppliers. Any company that wants to be competitive in the current business world should therefore put in place strategies that ensure the company identify, attracts and retains suppliers that provide maximum value. Just like the customer relationship management strategies, the suppliers relationship management strategies can also have positive and negative measures. Positive strategies refers to those strategies that reward the suppliers for being loyal while negative ones refer to those that penalize suppliers if they choose to stop supplying(Sandra Ala, 2009). First, Nike Company can seek to have increased share of business with its supplier, hence in the event that the company wants to stop supplying then it will risk losing a significantly large amount of business. For instance if Huang Jiang Nan Pao Resins Ltd that supplies glue to Nike Inc. has half of its revenue sales from Nike then it will be hard for the company to change loyalty as it will end up losing a lot of business. Secondly, there is promotion of long-term relationships with the supplier, which involves dropping the less valuable suppliers and concentrating on the most valuable. It involves signing a long-term contract that ensures that the supplier is tied to the company hence guaranteed loyalty. For example Nike can sign a five year contract to be su pplied with glue products from Huang Jiang Nan Pao Resins Ltd, therefore for those five years the suppliers loyalty will be guaranteed (Sandra Ala, 2009). Thirdly, provisions of supporting services to the supplier, whereby Nike can provide services to the glue supplier to help them easen their supply work. For example the supplier can be supported with research services whereby Nike does research on its products use and effectiveness and hence provides its supplier with information that will promote its effective production and help in risk mitigation for mutual gain of both parties. Another strategy is for the company to enhance the process of getting goods and services. This result in reduction of costs and a subsequent increase in profits for the supplier, hence the supplier will be attracted to stick to customers that he is receiving extra value. The efficiency can be achieved by implementing Supplier Relationship Management technology. Lastly, Nike Inc. can form a partnership with its glue supplier, whereby they can create a community for the SRMs consisting of employees from both parties who include supplier performance managers, account Managers and Supply Chain Consultants who can contribute knowledge and come up with ways of generating revenue for both organizations by venturing in to out of contract business opportunities (Sandra Ala, 2009). Conclusion It is apparent that Nike Inc has implemented effective relationship management strategies with its customers who have supplied its products around the world hence enabling it to secure and maintain the position of a global leader in sports footwear. In addition its strategies with the suppliers seem to be effective as some of them have dealt with the company for over ten years. The buying behavior of an organization is a process that has different stages. Each buying situation will involve different numbers of the executive members depending on the cost involved, furthermore there are various buying situations based on whether there are variations from the previous purchase. It also comes out that there are different models for businesses to use, however each organization has an appropriate model that befits it. But also the introduction of business-to-business e-commerce has greatly revolutionized the traditional paradigms. Bibliography Buttle, F. (2008) Customer relationship management. Burlington, MA: Butterworth-Heinemann. Geunes, J. Pardalos, P. M. and Romeijn, H. E. (2002). Supply chain management: models, applications, and research directions. Dordrecht, Netherlands: Khluwer Academic Publishers. Hutt, M. D and Speh, T. W. (2009). Business marketing management: B2B. Mason, OH: Cengage Learning. Sandra, P. and Ala, M. (2009). Supply Chain Development within Volvo Penta Chain – Development through Supplier Relationship Improvement. Web. Sojitz Corporation (n.d.). Consumer Lifestyle Business Division: Major Business Activities (n.d). Web. Tompkins, J. A. (2001). Futur e Ca pable Company: What Manufacturing Leaders Need to Do Today to Succeed Tomorrow. Tompkins Press. Wikinvest, NIKE. (n.d). Web. Zimber, K. (n.d.). University corporate sponsorship becomes a business objective. April, 16 2010. Web. This report on Nike Company’s Business Model was written and submitted by user Skyla Whitaker to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.