Mba-Fp6004 Assessment 5-1

In: Business and Management

Submitted By remyred28
Words 2692
Pages 11
Strategy Recommendation for Barnes & Noble
MBA-FP6004
Strategy Recommendation Paper
Capella University
2015

Introduction
Today the power of the Internet and social media as it pertains to companies is immense. A great strategy to harness the power of both can be the difference between one company’s failure and another’s success. The following essay will first begin by giving a brief introduction and history on Barnes & Noble, Incorporated. Second, existing technologies that exist that management should consider with regard to the Internet and social media will be discussed. Third, an in depth look into how Barnes & Noble is currently utilizing the Internet and social media will be shown, as well as, how their competitors in the same industry are using these tools. Fourth, a SWOT analysis for Barnes & Noble using the Internet and social media will be discussed. Also, the implications discovered in the analysis and how they will affect the future of the business will be explained. Fifth, the ethical impacts that come with the use of these tools will be examined and how they may impact the future of the company. Sixth, an assessment of the use of the Internet and social media will be given as they pertain to the global environment and demographics. Finally, a thoughtful business strategy will be given along with recommendations that Barnes & Noble should consider in moving forward with their Internet and social media use.
Barnes & Noble Background
While attending New York University in the 1960s, Leonard Riggio saw an opportunity to better serve students while working at the school’s bookstore. He decided to open a store in the Greenwich Village neighborhood in 1965 called Student Book Exchange (SBX). The store gained quick popularity and was known for its selection, service and knowledgeable staff. In a decade, the store…...

Similar Documents

Mba Strategy - 5 Forces

...software is an example of a product with very high switching costs. Once a company has installed SAP’s ERP system, for example, the costs of moving to a new vendor are astronomical Industry structure drives competition and profitability, not whether an industry is emerging or mature, high tech or low tech, regulated or unregulated. Barriers to entry. Entry barriers are advantages that incumbents have relative to new entrants. There are seven major sources: 1. Supply-side economies of scale. These economies arise when firms that produce at larger volumes enjoy lower costs per unit because they can spread fixed costs over more units, employ more efficient technology, or command better terms from suppliers. Supply-side scale economies deter entry by forcing the aspiring entrant either to come into the industry on a large scale, which requires dislodging entrenched competitors, or to accept a cost disadvantage. Scale economies can be found in virtually every activity in the value chain; which ones are most important varies by industry.1 In microprocessors, incumbents such as Intel are protected by scale economies in research, chip fabrication, and consumer marketing. For lawn care companies like Scotts Miracle-Gro, the most important scale economies are found in the supply chain and media advertising. In smallpackage delivery, economies of scale arise in national logistical systems and information technology. 2. Demand-side benefits of scale. These benefits, also known as network......

Words: 11133 - Pages: 45

Mba 580 Week 1

...University of Phoenix MBA/580 '' Strategies for a Competitive Advantage Instructor: William Wider Mission, Vision, and Values Week 1 January 14, 2009 Mission, Vision, and Values: A-Z Wireless The company originally opened its doors January 2, 1992 operating under the name of Southern California Telecommunication Distributors, Inc. (SCTD), (A-Z Wireless, 2009). SCTD target market initially consisted of small cellular resellers in Southern California that did not have the buying power to purchase the most popular name brand phones such as Motorola, Nokia, Ericsson, Audiovox, LG and Samsung, in an affordable manner. James Walters, founder of SCTD, realized that the demand for cell phones was extremely high and logistically there was a supply chain gap between international manufactures and resellers (Walters, personal communication, January, 13, 2009). Only a few companies existed nationally in the role of distributor, and James wanted to be amongst the first in Southern California. Uncovering this unsaturated market niche afforded SCTD to grow its business from a small region wholesaler to a nationwide reseller. From 1992 to 1997, SCTD had grown to become a company that imported cell phones and accessories from various countries, and serviced customers on both a national and global platform (A-Z Wireless, 2009. A-Z Wireless is a small business organization in the wireless......

Words: 1114 - Pages: 5

Week 5 Assessment

...Lab #7 Assessment Questions 1. The Routing and Remote Access Services are need in Windows Server 2008 to provide remote access to clients. This service is important in a corporate environment because there is the potential to have several hundred or thousands of clients to manage and the IT personnel to support that many computer is limited and unable to provide hands on service to every client. 2. The IP host range for the remote VPN client pool is 172.30.0.250 through 172.30.0.252. 3. There are two encryption setting available from the remote access server, Microsoft Encrypted Authentication version 2 (MS-CHAPv2) and Microsoft Encrypted Authentication (MS-CHAP). MS-CHAPv2 is more secure and the best option to use but MS-CHAP does offer backwards compatibility. 4. During a Remote access session the client is only asked to provide it’s credentials once. This is an example of milt-factor authentication because the knowledge factor and the inherence factor used in the authentication of the user. 5. Strong encryption is important for both authentication and communication protocols because this is the connection used to communicate with the remote server. The weaker the authentication and communication protocol is then you are making it easier for unwanted user to gain access to your network. 6. MS Windows Server 2008 authentication protocols are EAP, MS-CHAPv2, MS-CHAP, and PAP. EAP is the strongest security by providing the most......

Words: 346 - Pages: 2

Lab 5 Assessment Worksheet

...1. What are other available Password Policy options that could be enforced to improve security? Enforce password history, Maximum password age, Minimum password age, Minimum password length, Password must meet complexity requirements, & Store passwords using reversible encryption. 2. Is using the option to ‘Store passwords using reversible encryption’ a good security practice? Why or why not? As it stores passwords without encrypting them, it is not good practice because they will be stored in plain text. 3. When should you enable the option to ‘Store passwords using reversible encryption’? Only when using a program that requires it. 4. Why should you use the different password policy options available (with exception to storing the password using reversible encryption)? Enforce password history - Prevents users from creating a new password that is the same as their current password or a recently used password, Maximum password age - Sets the maximum number of days that a password is valid and after this number of days, the user will have to change the password Minimum password age - Sets the minimum number of days that must pass before a password can be changed Minimum password length - Specifies the fewest number of characters a password can have Password must meet complexity requirements - Requires that passwords: be at least six characters long/contain a combination of at least three of the following characters: uppercase letters,......

Words: 676 - Pages: 3

Assessment 1

...Risk review Candidate’s name | | Phone number | | Email address | | Date submitted | | Performance objective For this task you are required to determine the risk context associated with establishing a new business outlet, within the existing business structure. They will be required to review internal and external environment factors and liaise with all stakeholders to generate a list of risks. Assessment description For the case study provided with this Assessment Task, you are required to review risk management processes and determine scope and objectives, taking into account stakeholder input and both internal and external environmental factors affecting the organisation. With the information gathered, you are to identify risks and present this to relevant parties for feedback. Page numbers in blue denote the appropriate section of the Student Workbook which you should refer to when necessary. ------------------------------------------------- Case Study: Business plan (excerpt) MacVille business plan FY 2011/12 Mission MacVille cafes serve competitively priced, high quality coffee and gourmet food in a safe and comfortable cafe-style environment. Our friendly, well-trained staff provides superior customer service. Vision MacVille aims to deliver our valued customers the very best cafe-going experience. In three years, the business will have established a presence across Queensland and NSW, with the opening of additional cafes. ...

Words: 4699 - Pages: 19

Is3230 Lab 5 Assessment

...Lab 5 Assessment | 1. They are a. Password b. Token c. Shared secret 2. Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process 3. Remote Access servers, Authentication servers, and Logical IDS 4. Network should be both connected and secured physically and remotely in order to avoid unauthorized access to the system. The three are the computer has authorized access. Computer settings must be in compliance with the security standards, and the user having authorization access. 5. NAC Systems implement network security policy at the network access point relatively than the client (endpoint) operating system. Reliant on the system architecture and configuration, NAC systems can deliver physical port security or logical port/access security. NAC systems necessitate authentication for both the endpoint and user before the network access point forwards traffic for that client 6. PKI refers to a framework of programs, data standards, communication protocols, policies, and cryptographic mechanisms. The PKI infrastructure delivers for the generation, production, spreading, control, accounting and obliteration of public key certificates. PKI offers a selection of facilities containing issuance of digital certificates to individual users and servers, end-user enrollment software, assimilation with......

Words: 468 - Pages: 2

Assessment 1

...------------------------------------------------- | 1. You can use surveys, such as email surveys, paper surveys and internet surveys. 2. You can use suggestion boxes.3. You could hold focus groups. | | a) Internal customers ☐ b) External customers ☐ Suggestion boxes can generate good ideas from the customers, however they do require maintenance, such as follow-ups in order to make the customers feel valued after they have made their suggestion. The suggestion boxes should be placed in the store where customers have easy access to them | The 5 components are:*Problem identification*Research in to product or service solutions*Evaluation of alternatives*Purchase/use*Post purchase/useThe general process described varies from customer to customer, depending on their different needs and individual characteristics. Every customer is different, to some degree. The idea that, even though individual customers vary from each other, in respect to some personal attributes, consumers act in similar ways with respect to their decision-making and purchasing behaviour. It is this idea that the science of the marketing of products and of services depends on. | 1. Cost (Price) The product was highly overpriced, as I could have gone somewhere else and bought a similar product for cheaper. | 2. Quality The quality was not what I expected, given the sales persons sales pitch. | 3. Time (Delivery) I was given a turnaround time of a few days and ended up......

Words: 757 - Pages: 4

It255P Lab 5 Assessment

...JOHN A. BROOKS LAB ASSESSMENT LAB 5 LAB Assessment Questions & Answers 1. What is the purpose of the address resolution protocol (ARP)? (A).ARP converts IP addresses to Ethernet addresses. 2. What is the purpose of the dynamic host control protocol (DHCP)? (A) Dynamic Host Configuration Protocol (DHCP) is a method for assigning Internet Protocol (IP) addresses permanently or temporarily to individual computers in an organization's network. 3. What was the DHCP allocated source IP host address for the “Student” VM and Target VM? (A)172.30.0.4 - Student VM; 172.30.0.8 – Target VM 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? Source: 172.30.0.2 (A)Target: 172.30.0.8 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? (A) Yes, 8 packets. 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? (A)The three-way handshake is needed to establish a reliable connection. The handshake allows the server and client to agree on properties that provide for security as well as reliability. 7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet? 8. During the instructor’s Telnet session to LAN Switch 1 and LAN Switch 2, what was the captured terminal......

Words: 359 - Pages: 2

Mba 1

...PART: TWO Answer Q.1 Career planning is the process by which one selects career goals and the way to reach those goals. In HRM major focus is on assisting the employees achieve a better personal goal and the opportunities that are realistically available in the organization. Objectives of Career planning in Industry • Attract and retain talent by offering careers, not jobs • Using Human resouses effectively and achieve greater productivity • Reduce employee turn over • Improve employee morale and motivation So we can understand that employee is important for every organization, and their career planning is must. Since every employee has desire to grow , he feels highly motivated when the organization shows him a clear path as to how he can meet this personal ambition while trying to realize corporate goals. When reorganization doesn’t come in time for meritorious performance and a certain amount of confusion prevails in minds of employees whether they are part of organization, with a chance to grow or not, they look outside resulting in job attrition. So, the absence of a career plan is going to make a big difference to both the employees’ and the organization. When employees do not get the right breaks at a right time, their morale will be low and they are always on their toes trying to find escape routes. This scenario of high turnover is not in benefit of any organization. Therefore in each organization should try to put their career plans in place and......

Words: 293 - Pages: 2

Assessment #1

...Pamela G. Branham Economics Assessment #1 I am pursuing an Associate’s degree in the Administrative Professional program at NWTC. I have worked in this field about 10 years and enjoy it very much. I recently moved to Green Bay, WI 4 years ago October 30th of this year. I have had the hardest time finding a job in this field here without my associate’s degree regardless of my experience. This is why I decided to come back to school. My economic cost is working part time 36 hours a week most likely making 9 dollars an hour without my degree. I would be making about 15,500 dollars a year. My school loans are about 10,000 a year and I plan to be in school for three years adding up to 30,000 for three year of. I would not be able to work full time because I am a single mother of two my youngest is just starting school. My son will start school full time in two year and that is when I will I go back to work full time. My opportunity cost is 47,000 a year (Labor, 2012) with my degree and experience. There are many skills need to be an administrative professional here are a couple I feel is a must technology skills, communication skills, organizational skills, and time management skills. To acquire these necessary skills you must be educated in the area rather it be school or training classes. There are many position I could peruse with this degree for example the front office of a school, in a daycare, a cooperate office. Almost every business has a specific person who......

Words: 440 - Pages: 2

Chapter 5 Assessment

...Lab #4 - Assessment Worksheet Performing a Qualitative Risk Assessment for an IT Infrastructure Course Name and Number: CYBS 221 1001 Student Name: Kendall Watson Instructor Name: Dave Anderson Lab Due Date: September 20, 2015 at 11:59pm Overview In this lab, you defined the purpose of an IT risk assessment, you aligned identified risks, threats, and vulnerabilities to an IT risk assessment that encompasses the seven domains of a typical IT infrastructure, you classified the risks, threats, and vulnerabilities, and you prioritized them. Finally, you wrote an executive summary that addresses the risk assessment findings, risk assessment impact, and recommendations to remediate areas of noncompliance. Lab Assessment Questions & Answers 1. What is an IT risk assessment's goal or objective? Click here to enter text. The goal is to define how the risk to the system will be managed, controlled, and monitored. 2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure? A qualitative assessment is based on opinion than actual fact, and IT risk assessments need to be based on a quantitative analysis. 3. What was your rationale in assigning a "1" risk impact/risk factor value of "Critical" to an identified risk, threat, or vulnerability? The critical needs to be mitigated immediately. 4. After you had assigned the "1," "2," and "3" risk impact/risk factor values to the identified risks, threats, and......

Words: 428 - Pages: 2

Self Assessment

...Self-assessment MBA FP6004 UNIT 1 January 21, 2015 Upon completion of the writing skills assessment I received an overall rating Of seven (7). The scoring breakdown rated the following categories: Focus and Meaning, which I scored a seven (7). Content and Development, which I scored a six (6). Organization, which I scored a six (6). Language Use and Style, which I scored seven (7) and Mechanics and Conventions, which I scored a seven (7). A score of 7 in a ranking system where a score of 6-8 indicates solid writing skills is one (1) away from excellent. My plan to improve my writing skills include the use of Purdue Owl and constant reference to APA formatting. Of course, no plan of performance improvement is complete without the inclusion of practice. I plan to utilize the turn it in tool to refine my writings with each assessment. I plan to write at least one paper a week to improve my writing skills. In my MBA courses writing skills will be an essential element in defining my success. I plan to read and comprehend the APA formatting and Purdue Owl writing guide. I plan to utilize the direction of both sources and implement those techniques in my writing assessments. I plan to critique my writing assessments utilizing the scoring guides and grading rubric provided through Capella in each unit of study for each course. My Excel assessment score was 19 out of 20 correct answers. I plan to review the Excel level 1, Formulas and Functions as well as,......

Words: 795 - Pages: 4

Mba-Fp6004 Chandasmith Assessment-1

...I am repeating this course.  I have not made any modifications to this assessment since I last took this course and would like my previous evaluation scores to be applied to this submission. Wonderlic Writing Assessment Chanda Smith ID: 2154854 In today’s workplace, there a many skills that are sought after and are needed in order to be successful. An individual will find areas that may need to grow and improve; however, I believe that there are skills that organizations are looking for across the board. The top skills that I will be expounding upon are the ability to be analytical, the ability to communicate effectively, the ability to be maintain a positive attitude, the ability to multitask and the ability to be a strong team player. Being analytical is crucial in any environment. It is inevitable that issues may arise in the work place and decisions need to be made to mitigate the issues. An individual needs to be able to determine the basic 5 W’s: what, when, who, where and why. After gathering information and assessing the situation, an individual should be able to work through the issue and determine ‘how’ to fix it. With knowing how to identify a problem and the ability to use the resources available, an individual will be a great asset to an organization. Being analytical is a skill that is extremely valuable and keeps an individual motivated and creates a sense of accomplishment. Being able to communicate......

Words: 897 - Pages: 4

Mba Assessment #1

...Today’s fast pace work environment, one must have several skills in order to be a top of the ladder employee. I have found that in my line of work these skills are what’s needed to be a triumphant employee: * Communicate well * Team player * Positive attitude * Self motivating * Time management * Self awareness * Integrity Communication is key in any work environment. I see communication not only being essential to the worker but also the whole business team. One cannot do their job effectively without proper communication. Communication provides motivation to the employee by giving clear expectations of their duties, how well they are performing their duties and providing constructive feedback on how to improve their performance. I believe communication also plays a role in the employees attitude. A well informed employee will have a better attitude than a less informed employee. In my organization when we have a major change happening and the employees are communicated to, they have a better attitude about the change vs. hearing about it after the fact. Recently, my team and I went through communication training. In this training it helped us recognize the different areas of communication and what we each of us could do to be a better communicator. Team Player is more than just a buzzword on your resume. A true team player has the best interest of the company but also has their best interest in their career. They are always coming up with......

Words: 520 - Pages: 3

Assessment 1

...Michael Ayala 5/12/12 Psych 1 Assessment 1 Essay In the the first example, the researcher used the experimental design in his study to examine how poeple respond to pictures of faces with different racial features. The experimental design is when the experimenter isolates and controls all the variables excpet one, he makes sure that variable is the only one causing the desired effect. The The independent variable, which is the variable that the researcher is manipulating, is computer program that he created that will randomly generate the faces as each subject comes in. In this study the researcher used random assignment as the the subject would come in the the room. Random assignment is went the experimental and control groups a non-systematic and randomized way. The way he did this is by not telling his research nor the subjects knew which order they were going in. The team of researchers that found that the more time students spend interacting with technology, the less empathy they show towards other by doing a correlation study. Since many students already use technology a lot this was would be easier to use. The students increased use of their devices is one variable and their lower empathy towards other is the second one making a negative correlation. A negative correlation is a correlation indicating that the variables simultaneous in opposite directions. The second......

Words: 258 - Pages: 2