Premium Essay

First Internet Reliable Bank Discussion Questions

In:

Submitted By oakmm16
Words 436
Pages 2
1. Even though the complete survey is not included in the case, summarize how the closed-ended and open-ended questions provided valuable customer insight for FIR.

The closed ended responses, when matched with customer demographics, confirmed that FIR customers were generally typical of internet banking customers. Most had high speed internet connections, were men, and were in medium to high socioeconomic categories and many were in technical occupations. In general the open ended questions support three main points,

The potential users still have a need for traditional banking services. One of them being mail deposits, another is access to a local ATM. Security is a concern even among sophisticated users. (Respondents 3 and 137) The big concern is the lack of security with the customers receiving phishing-type emails from hackers which can lead to identity theft. There is also a concern to small businesses that they do not have a big enough protection policy when it comes to identity theft/hackers.

The existing user base is happy with the convenience and the quality of service. Based on the surveys, the respondents believe FIR is simple and easy to use when viewing and paying bills.

2. What customer segments are targeted by FIR? On what issues should FIR focus in order to build relationships with its varied customer segments?
The customer segments that are targeted by FIR are customers who are innovation-minded, busy and technologically advanced. This assessment is generally supported by the survey date and their success. Additionally a 2004 survey found that customers were generally more experienced in using the internet, male and higher socioeconomic status. The case gives us two clues in the survey data that I find interesting and useful for the bank to focus attention. Internet connected men no longer out numbered women.

Similar Documents

Premium Essay

Audit Evidence

...CHAPTER 4 AUDIT EVIDENCE AND AUDIT DOCUMENTATION Answers to Review Questions 4-1 Auditors typically divide the financial statements into components or segments in order to make the audit more manageable. A component can be a financial statement account or a business (transaction) process. This approach allows the auditor to gather evidence by examining the processing of related transactions through the accounting system from their origin to their ultimate disposition in the accounting journals and ledgers. Thus, the auditor can examine an accounting transaction from the time it is initiated by the entity until its final recording in the financial statement accounts. 4-2 The financial statements contain management's assertions about the various financial statement components. The auditor tests management’s assertions by conducting audit procedures that provide evidence on whether each relevant assertion is supported. The results from applying audit procedures provide the evidence that supports the fair presentation of management’s assertions and the auditor's report (see Figure 4-1). 4-3 Assertions about classes of transactions and events for the period under audit: Assertion Definition Occurrence Transactions and events that have been recorded have occurred and pertain to the entity (sometime referred to as validity). Completeness All transactions and events that should have been recorded have been recorded. Authorization All transactions and events have...

Words: 3411 - Pages: 14

Premium Essay

Introduction to Market Research: First Direct Case Study

...marketing decisions for first direct. Carrying on from this I will be suggesting how different methods are appropriate to enable first direct to revitalise its brand relaunch and evaluating the businesses market research. Marketing is a management process which is responsible for identifying, anticipating and satisfying consumer requirements profitably. To satisfy consumer needs is to make sure the consumer gets what they want. You do this through market research. The first stage of market research is to plan it also called the ‘MR process; .Define the problem .Define research objectives .Choose data sources .Choose research methods .Set budgets and deadlines .Undertake research .Analysis and evaluate Choosing the research is what I am focusing on today. There are four main sources of research, qualitative, quantitative, primary and secondary. Primary research Primary research is new information obtained by an organisation first hand from using their own resources and collecting their own data to answer specific issues or questions. The method can involve observation, experimentations, surveys, focus groups, interviews, field trials and panels. Surveys are one of the most frequently used methods of market research, there are four common ways of conducting a survey, via post, email, face to face and over the phone. The survey allows a careful study of a specific topic questioning consumers and gaining their opinion, it will involve a sequence of questions which may be in the...

Words: 2568 - Pages: 11

Premium Essay

Computer Cthics

...possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: * 1. The individual's own personal code. * 2. Any informal code of ethical conduct that exists in the work place. * 3. Exposure to formal codes of ethics.[2] Contents   [hide]  * 1 Foundation * 2 History * 3 Internet Privacy * 4 Internet Control * 5 Computer Reliability * 6 Identifying issues * 7 Some questions in computer ethics * 8...

Words: 3631 - Pages: 15

Free Essay

Internet Security

...ABSTRACT The paper discusses the topics regarding, 1) Internet Frauds ;2) to analyze user’s satisfaction on internet security by using Secure Socket Layer (SSL); and 3) to make people aware of internet fraudsters. Six research questions were utilized in this study. This study examines whether secure socket layer and its certificate would protect online users from fraudsters while they browse websites. The six research questions are as follows: • Are there any security breaches occurring with the usage of SSL certified website? • Can we stop internet frauds by making people aware of it? • Is secure socket layer used in all websites? • Is Secure Socket Layer reliable? • Does Secure Socket Layer protect online users from fraudsters? • Are users satisfied with security provided by SSL authentication? TABLE OF CONTENTS ABSTRACT ii INTRODUCTION 1 Statement of Purpose and Problem 2 Principle Research Questions 3 Assumption of the study 3 Limitation of the Study 3 Definition of Terms 3 REVIEW OF LITERATURE 5 Internet 5 How SSL Works? 8 What is a “certificate” in SSL certificate? 8 What is an SSL certificate? 9 METHODOLOGY 11 Selection of subjects 11 Instrumentation 11 Method 13 ANALYSIS 15 REFERENCE i INTRODUCTION The term internet refers to prevalent network of networks connected on the Earth and the security provided to the networks in order to maintain confidentiality of the data is called Internet security. Network can be defined as a group of computers...

Words: 3516 - Pages: 15

Premium Essay

Convo

...INDIAN INSTITUTE OF MANAGEMENT CALCUTTA BEHAVIOURAL SCIENCE II (BS-102) (PGP-1 Compulsory Course) Term 2 – (September 16, 2013 – November 2, 2013) Instructors |Prof. Vidyanand Jha |Prof. Nimruji Prasad | |E 206, New Teaching Block |K 402, New Academic Block | |Ext: 519 |Ext: 721 | |vjha@iimcal.ac.in |nimruji@iimcal.ac.in | |Prof. Chetan Joshi |Prof. Devi Vijay | |K 406, New Academic Block |K408, New Academic Block | |Ext: 782 |Ext: 784 | |chetan@iimcal.ac.in |devivijay@iimcal.ac.in | COURSE OUTLINE Objective The course aims at building and further developing on the perspectives of why organizations exist and how they are designed to achieve their objectives. This course would require you to analyze and examine organizations around you...

Words: 1942 - Pages: 8

Premium Essay

Process Technology at Bank of America

...quality custom papers delivered on time PROCESS TECHNOLOGY AT BANK OF AMERICA Student’s name Code+ course name Professor’s name University name City, State Date Introduction Numerous technological advancements have happened in the service sector over recent years. The 21st century has brought about a widely inclusive convergence of processing, correspondences, data and learning. Such drastically changes the way we live, work and think. The development of rapid systems, combined with the falling expense of computing force, is making conceivable applications undreamed of before. Voice, information, and images might now be exchanged around the world over in small scale seconds. This blast of technology is changing the banking industry from paper and branch banks to digitized and organized banking services. Information Technology has effectively changed the internal bookkeeping and administration frameworks of banks. It is presently in a general sense changing the conveyance frameworks banks use to collaborate with their customers (Brennan 2011).  All over the world, banks are still attempting to locate a technological answer to meet the difficulties of a quickly evolving environment. It is clear that process technology is changing the banking industry for eternity. Banks with the capacity to invest and incorporate data technology will dominate in the very...

Words: 2351 - Pages: 10

Premium Essay

Brac Bank Internship Report

...Independent University, Bangladesh A Research Proposal on Factors Influencing the Adoption of Internet Banking Prepared By Shawkat Zaman ID: 1130260 An Internship Report Presented In Partial Fulfillment Of The Requirements of the Degree Bachelor of Business Administration INDEPENDENT UNIVERSITY, BANGLADESH JANUARY 2015 A Research Proposal on Factors Influencing the Adoption of Internet Banking Prepared By Shawkat Zaman ID: 1130260 Has been approved January 2015 _______________ Mr. Parvez Ahmed Sharif Lecturer School of Business Independent University, Bangladesh Letter of Transmittal Mr. Parvez Ahmed Sharif Department of MIS Faculty of Business Studies Independent University, Bangladesh. Subject: Letter regarding submission of Internship Report on Factors Influencing the Adoption of Internet Banking. Dear Sir, Here is the report on “Factors Influencing the Adoption of Internet Banking” you asked me to conduct on the beginning of the Internship. In this assignment, I have tried to focus some key aspects of Internet Banking Services. While preparing this report, I tried my level best to follow your instructions and the instructions that have given to me by my organization supervisor. I appreciate having this assignment. I prepared this assignment with sincerity and serious effort. Thank you for providing me the opportunity to prepare this. I am really grateful to you for giving me the scope to prepare this report...

Words: 10549 - Pages: 43

Premium Essay

The Impact of Empowerment on Employee Effectiveness and Employee Responsiveness in Banking Sector

...A PROJECT REPORT ON The Impact of Empowerment on Employee Effectiveness and Employee Responsiveness in Banking sector of Mysore Submitted by Deeksha.B USN-4JC10MBA35 Submitted to VISVESVARAYA TECHNOLOGICAL UNIVERSITY, BELGAUM, INDIA In December 2011 In partial fulfillment of the requirements For the award of MASTER OF BUSINESS ADMINISTRATION Under the guidance of Mr Girish Baga Assistant Professor Sri Jayachamarajendra College Of Engineering, Mysore Sri Jayachamarajendra College Of Engineering JSS Technical Institutions Campus, Mysore 570006 Autonomous institution affiliated to Visvesvaraya Technological University DECLARATION I,Deeksha.B , USN 4JC10MBA35 a student of Master of Business Administration at Sri Jayachamarajendra College of Engineering, JSS Technical Institution Campus, Mysore, India hereby declare that this project report titled “The Impact of Empowerment on Employee Effectiveness and Employee Responsiveness” is a record of an original and independent work carried out by me during the period july to december in the 3rd semester of the course under the guidance of Mr. Girish Baga Master of Business Administration, Sri Jayachamarajendra College of Engineering, JSS Technical Institution Campus, Mysore, India submitted to Visvesvaraya Technological University, Belgaum, India, in partial fulfillment of the requirements for the award of Masters of Business Administration. I further declare that this project work and...

Words: 7048 - Pages: 29

Free Essay

Suttnkk

...Understand that every market has different demands & changes every few years 5. Analyse, "Position" and Modify Your Products 6. If You Fail To Plan, You Are Planning To Fail 7. Build A Network 8. Develop "Export Inquiries Handling Rules" 9. Negotiating Is An Art 10. Be Aware Of Frauds 11. Be Market- And Customer - Focused 12. Be Prepared To Meet Growing Demand 13. Be Prepared To Spend Time And Money 14. Make Decisions On A Commercial Ground 15. Don't Try Too Much At The Beginning And Don't Grow Too Fast Legal Notice Before You Export - Get Ready 1. Where to start? Build A Corporate International Image Your credibility is a key to your global success. Even if you run a small company, you should present yourself internationally as a solid and reliable potential partner. Some little changes and touches will add considerably to your global appearance. Adapt corporate stationery to your export activities - add international dial-up code and word "Australia" to contact details. Develop company logo Always sign out-coming correspondence indicating you job title, company name and contact details, for example: John Smith, Export Manager Australian Trading Company Pty. Ltd. 124 Deakin Avenue Mildura VIC 3502 Australia Phone: 61 3 502 6776 Facsimile: 61 3 502 7667 E-mail: export@export61.com.au Web: www.atc.com.au When talking to prospective buyers, don't say "I" - always say "We" and so on. Talk To Others Investigate if there is any government programs or other assistance available. Talk to...

Words: 3848 - Pages: 16

Premium Essay

Mis of Icic Bank

...MIS OF ICICI BANK Submitted by: Group 5 Roll No. 41 Dheeraj Manhas Roll No. 45 Piyush Chandan Roll No. 47 Ankisha Agarwal Roll No. 49 Yash Singhal Roll No. 51 Mohit Khamesra Submitted to: Prof. Susheel Chhabra ACKNOWLEDGEMENT We would like to express our deepest sense of gratitude to our project guide Prof. Susheel Chabbra, for his valuable guidance, inspiration and encouragement that we received from them throughout the course. Our efforts in accomplishing this project are a result of constant motivation and valuable learning imparted by him. We would also like to thank our family and friends & the professionals who extended their support and have been a source of encouragement and inspiration throughout the duration of this project. TABLE OF CONTENTS | Title | Page No. | 1 | Introduction | 1 | 2 | Overview of Financial MIS and Network diagrams | 8 | 3 | Information system ICICI bank | 12 | 4 | Organization Transaction processing system | 14 | 5 | ICICI CRM initiatives | 25 | 6 | Knowledge management at ICICI | 30 | 7 | Conclusion | 33 | 8 | References | 34 | ABLE OF CONTENTS 1.INTRODUCTION 1.1 MANAGEMENT INFORMATION SYSTEM Definition: A Management Information Systems (MIS) is * An integrated user machine system * For providing information * To support operations, management...

Words: 5780 - Pages: 24

Premium Essay

Research Methods for Strategic Managers to Aid in Decision Making

...Methods for Strategic Managers to Aid in Decision Making Abstract [P1] Managers can be trained to make better decisions. They also need a supportive environment where they won’t be unfairly criticised for making wrong decisions and will receive proper support from their colleague and superiors. A climate of criticism and fear stifles risk-taking and creativity; managers will respond by ‘playing it safe’ to minimise the risk of criticism which diminishes the business’ effectiveness in responding to market changes. It may also mean managers spend too much time trying to pass the blame around rather than getting on with running the business. The study is based on all-embracing research to assemble information from a variety of sources such as internet, interview and books. The research was conducting on the decision making in the different economic scenario data was collected and results were evaluated. Introduction [P1] [1.1] Some decisions are difficult because of the need to take into account how other people in the situation will respond to the decision that is taken. The analysis of such social decisions is more often treated under the label of game theory, rather than decision theory, though it involves the same mathematical methods. From the standpoint of game theory most of the problems treated in decision theory are one-player games (or the one player is viewed as playing against an impersonal background situation). In the emerging socio-cognitive engineering the research...

Words: 3053 - Pages: 13

Free Essay

Hacking

...comes at a risk. Hacking is the risk that members of society must face. Hackers can find any information they wish to acquire, which puts information, such as finances and personal, at great risk. In order to understand how to prevent hacking, one must first understand what is at risk to be hacked and the way in which the act is done. Technology has become a constant part of every day life. People now manage their bank accounts, pay bills, deal with highly confidential information, and even personal information online. All these aspects of technology in daily life are a temptation to others throughout the internet. Those who find themselves tempted perform the task of hacking, which leaves others and their personal information vulnerable. This paper will discuss society’s reliance of technology in all aspects of life; thereby, leaving personal information vulnerable. Also being discussed will be information hackers find tempting, the steps that some take to hack into systems allowing them access to normally unavailable information and the steps that can be used to help prevent hacking from occurring. Method In the task of preventing hackers from gaining access to information that could be harmful to the individual, you must first understand what information is at risk and how hackers perform the task of hacking. In order to do this, I had to research what systems/files are at risk to be hacked and the way in which hackers perform the task of hacking. By assessing these factors...

Words: 2876 - Pages: 12

Free Essay

Crowd Funding

...participating in various forms of crowdfunding initiatives, we know little about the motivations that drive the crowd to invest in start-ups via crowdfunding. In literature, there are ongoing calls to investigate this phenomenon since it is expected that motives for investing in start-ups via crowdfunding differ from motives for engaging in other forms of crowdsourcing initiatives. Against this background, this research aims at investigating why crowdfundees fund start-ups. In this research paper we build on related literature to theoretically develop a research model and plan to validate this model with an empirical survey on an equity-based crowdfunding platform specialized on start-up funding. By giving concrete answers to the research questions, this research has been able to build deeper understanding of the crowd’s motivation for investing in start-ups. Chapter 1: Introduction: Financial capital represents a necessary ingredient for entrepreneurial survival, growth and success. In order to support their growth,...

Words: 3816 - Pages: 16

Premium Essay

Contract Creation and Management Assignment

...Contract Creation and Management Assignment In this paper I will give my analysis of the issues presented in the Contract Creation and Management simulation. Within the paper I will provide contractual resolutions that will offer the development of a plan that will defuse possible contractual disputes. Citizen Schwartz will be given rapid and economical dispute resolution options, while Span Systems will be given the resources to recoup a significant business relationship following a contractual dispute. In the simulation Span Systems, a small software company has been hired by a large well-known German bank, Citizen Schwarz AG. Citizen Schwarz has always been amongst the leaders in their industry and to stay atop of the industry, the company has hired Span Systems to develop custom software for the bank. The development of this new software will be the largest, most important project that the small software company has acquired in its existence. The two companies have reached a contractual agreement that is legally valid and contains all of the elements critical for making the contract binding and enforceable. A written agreement containing specific details of the promises made by Span Systems for providing the software package and outlining the demands of Citizen Schwarz for the components of the software, expectations of delivery and price for the sum $6 million has been accepted by both parties. Eight months into the project, there were several concerns...

Words: 1059 - Pages: 5

Premium Essay

Auditing Eilifsen Solutions Manual

...CHAPTER 1 AN INTRODUCTION TO ASSURANCE AND FINANCIAL STATEMENT AUDITING Answers to Review Questions 1-1 The study of auditing is more conceptual in nature compared to other accounting courses. Rather than focusing on learning the rules, techniques, and computations required to prepare financial statements, auditing emphasizes learning a framework of analytical and logical skills to evaluate the relevance and reliability of the systems and processes responsible for financial information, as well as the information itself. To be successful, students must learn the framework and then learn to use logic and common sense in applying auditing concepts to various circumstances and situations. Understanding auditing can improve the decision making ability of consultants, business managers, and accountants by providing a framework for evaluating the usefulness and reliability of information. 1-2 There is a demand for auditing in a free-market economy because the agency relationship between an absentee owner and a manager produces a natural conflict of interest due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring. The empirical evidence suggests auditing was demanded prior to government regulation such as statutory audit requirements. Additionally, many private companies and other entities not subject...

Words: 26005 - Pages: 105