Full Bloom Business Analysis

Improved Essays
The use of technology can significantly save costs and improve products quality in an organisation, which can help Full Bloom.

Full Bloom operate in a very competitive business environment, competing not only with other florist shops but also with supermarkets and convenience stores. In addition, they have to deal with the threat of substitute products such as trendier technological gifts or other cheaper kinds of gifts that can be mass produced at a lower cost. A strategy that can help Full Bloom accomplish their vision while addressing their competitors and challenges is using competiveness advantage. Competiveness advantage is the ability of the organisation to sell goods and services better than its competitors.

In my discussion forum for week 2, The strategy that best suits the owners desire at Full Bloom is the operational effectiveness. The operational effectiveness refers to doing the same thing as competitors but doing it more efficiently, and this can benefit Carmel and Debbie as they aren't the only florists in the area as they compete with supermarkets and convenience
…show more content…
Why do they come? What do they like? What do they wish was better? What are the most popular types of floral arrangement? The best data collection methods to reach their customer base is to interview their customers, observe them in the store or to make the customers undertake a survey, in store or online. (Data collection techniques, 2014).
Carmel and Debbie also have to think about privacy and ethical issues. They want to use their information systems to track the customer’s buying habits, as many shopping organisations do this to track their customers buying habits, but they need to protect their customer’s data and their privacy, and Carmel and Debbie can do this by using passwords, encryptions and firewalls to protect their customer’s data. (Information security controls,

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In Alexandra Alter’s expository editorial the subject of privacy, and especially its relation to data collection is a controversial topic that has the power to polarize people. This article highlights how a previously solitary act of reading is evolving into something that can be tracked and analysed. The author’s thesis focuses on reading, when done electronically, has become an invasion of privacy. This article also presents the idea that reader-user data and it’s analysis is very profitable for publishers and e-book companies.…

    • 94 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The company known for is high end handbags started to experience the effect declining profits. Coach profits began declining due to department stores such as Macy’s closing many of their stores which sell Coach products. Outlet stores also cause a hit to the profits, offering clearance and high discounted items. This inspired the company to branch out. Recently, the Coach company purchased one of their competitors, the company of Kate Spade.…

    • 209 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Troy Bud Production will employ two concepts to create then maintain its competitive advantage. The first competitive advantage that Troy Bud Production will employ is low overhead cost. The office of Troy Bud Production will be in Troy’s home because there is not an immediate need for a commercial office, which working out of Troy’s home will allow him to work around the clock. Troy Bud Production second competitive advantage is maintains a low count of artist(s) signing.…

    • 222 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The outcome is the creation of the BLOOM Café and demonstration of the use of the network. The use of CPER and patient centered outcomes research frameworks allow us to create a network focused on the identified needs of patients, community members, healthcare providers, and policy makers. Our main outcome involves engaging a variety of members including those representing underresourced communities, minorities, and others traditionally underrepresented in research. The ability to assemble a robust network of potential BLOOM users and super-users to address community health needs. The process of quantifying and identifying best practices for engagement over social media allows us to translate the success we had with our current social media…

    • 145 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    There has been an increased interest and knowledge in relation to privacy rights and issues. The reason for this is that they are a fundamental right which ensures the personhood of individuals by allowing them to control who has access to personal information about them. Privacy issues are also of importance because it helps individuals avoid unwanted intrusions in their personal dealings. Consequently, for the reason that privacy is such a complex concept, there have been ongoing concerns and discussions in relation to the legal concept of privacy rights. Various theorists have provided their interpretation of privacy which includes an understanding of how privacy rights should be defined as well as what they should protect.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Neespresso Case Study

    • 750 Words
    • 3 Pages

    Figure 1.5: value propositions Source: Kotler & Armstrong (2010, 238-240) MORE-FOR-MORE The first possible value proposition is the more-for-more proposition. A brand that opts to use this proposition will be capable to justify an upper price by providing clients with a top level of reimbursements in their product. MORE-FOR-THE-SAME The subsequent proposition is the more-for-the-same option, that provides a buyer more benefits while charges them the equivalent price.…

    • 750 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Privacy Amendment (Enhancing Privacy Protection) Act 2012 (Amending Act) brings significant impacts on the way businesses operate in regards to personal information and customer data, as statutory bodies attempt to combat challenges they face in the technological age. The legislation sets out new, more cohesive privacy protection principles and new credit reporting provisions for companies to follow. (Public Accountant, 2014) Companies that fail to operate within the legal boundaries face harsh penalties ‘including enforceable undertakings or fines of up to $1.7 million per infringement.’ (Francis 2014) These new provisions and principles are both time and resource consuming for businesses and could place pressure on those who have since found themselves to be non-compliant.…

    • 1507 Words
    • 7 Pages
    Improved Essays