Example Of Essay On Marketing Study Guide
Type of paper: Essay
Topic: Business, Products, Cryptography, Company, Pricing, Encryption, Strategy, Commerce
Pages: 2
Words: 550
Published: 2021/02/09
Niche Marketing
Pros
it helps the owner of a business gain more profit for being able to segment the population who needs their product (in4review.com., 2015).
Cons
It is ineffective if the company wants the product to be known worldwide since the owners are just catering to a small portion of the market (in4review.com., 2015).
Single Brand Strategy
Pros
Enables a company to maintain quality level of all products
It is not very expensive since only one product is being advertised.
It will increase profit of the company as it focuses on one brand of product.
Cons
If one product cauused a failure, all the brands will be negatively affected since they are marketed as one (Trehan & Trehan, 2010).
Direct Selling
Pros
Increased chances chance of reaching out to the consumers by personally talking to them.
Cons
It is applicable only to a well-established company a huge capital is required in order to be able to compensate the work of the direct sellers.
Pricing
Pros of Penetration Pricing
when a company continues to provide a good quality of product, the customers will still continue to buy their products even if the price is increased.
Cons of Penetration Pricing
Its effectiveness is only for a limited time since the company should ensure profit from selling of the products.
Pros of Premium Pricing
It can be effectively employed by a company that offers a unique product
It can lead to higher revenues, especially when the company is entering a new market (Richard, 2015).
Cons of Premium Pricing
It may also cause a loss on the part of the company since there’s a possibility that customers will not patronize the product due to the high price (Richards, 2015).
Advertising
Pros
It can reach a larger portion of the market, allowing the company to easily obtain customer feedback regarding the product.
Cons
Since it is a common way of marketing, if the product being advertised is not unique, then it may not be noticed by the consumers.
Public Relations
Pros
It provides consumers with enough information about the product through the use of media.
Cons
Since news do not have a big impact on other types of audiences, the marketing initiative may not reach its target audience.
References
In4Review.com., 2015. Niche Marketing. Retried from
http://www.in4review.com/niche_marketing_pros_and_cons.htm
Lilyquist, M. (2015). What is direct selling? Retrieved from .
http://homebusiness.about.com/od/homebusinessglossar1/g/What-Is-Direct-Selling.htm
Oliver, S. (2010). Public relations strategy. UK, London: Kogan Page Ltd.
OCR. Org. (2015). Pricing strategies in business. Retrieved from
http://www.ocr.org.uk/Images/122802-unit-05-pricing-strategies-in-business-teacher-instructions.pdf
Richards, L., (2015). Different types of pricing strategy. Retrieved from
http://smallbusiness.chron.com/different-types-pricing-strategy-4688.html
Trehan, S. & Trehan, B.,(2010). Advertising and sales management. New Delhi: VK Enterprises
Troymarketingblog. (2015). Methods of promotion. Retrieved from
troysmarketingblog.blogspot.com/2012/05/7-main-types-of-promotion.html
References
Advanced encryption standard (AES). (2012). Retrieved from
http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard
Atreya, M. (2003, January). Introduction to password based encryption. Retrieved from
http://www.eetimes.com/electrical-engineers/education-training/tech-
papers/4134121/Introduction-to-Password-Based-Encryption
Basic concepts in data encryption: Key-based encryption. (1999). Retrieved from
http://library.thinkquest.org/27158/concept2_1.html
Conrad, E. (n.d.). Types of cryptographic attacks. Retrieved from http://www.giac.org/cissp-
papers/57.pdf
Data encryption standard (DES). (2012). Retrieved from
http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard
IBM. (n.d.). E-commerce security: Attacks and preventive strategies. Retrieved from
http://www.ibm.com/developerworks/library/co-0504_mckegney/index.html
MacVittie, L. (1999, April 19). Cryptographic accelerators provide quick encryption. Retrieved
OWASP. (2012, February 26). Guide to cryptography. Retrieved from
https://www.owasp.org/index.php/Guide_to_Cryptography
What is cryptography? (2012). Retrieved from http://www.wisegeek.org/what-is-
cryptography.htm
What makes a good password good. (2012). Retrieved from
http://www.practicallynetworked.com/sharing/good_passwords.htm
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA