Saturday, February 22, 2020

Implementation of a Customer Relation Management System (CRM) in B2B Term Paper

Implementation of a Customer Relation Management System (CRM) in B2B with the example of Aviation business - Term Paper Example Therefore, airline organisations need to develop new methods to manage the customer relationship in order to enhance customer loyalty and income. The impacts of global economic downturn along with the terrorist attack of 9/11 have severely impacted on the aviation business. The airline companies concentrate on operational developments in order to minimise expenses without ignoring the demand of customers. Customer relationship has nurtured for aviation companies to maintain competitive advantage and productivity in the long-run. The customer relationship management (CRM) has become a tool for aviation companies for managing good association with the customers (Boland & et. al., 2002). The paper explains the CRM system in B2B business with concentration on aviation business. B2B allows one business to interrelate with other business. The developing technologies have enabled businesses to apply CRM system in B2B. The chief resemblance between B2B and CRM is that they both work on onlin e platform. Therefore, developing and implementing CRM strategy on the basis of B2B model can result in low managerial expenses, well-organised marketing promotion and improved customer receptiveness. By using CRM in B2B, aviation organisations can increase the reach of customers and lessen the expenses of quality management (Zeng & et. al., 2003). The paper describes how CRM can be conducted in B2B aviation organisation. The objective of the paper is to understand various aspects of CRM in aviation organisations concerning designing, implementation and procedure which must be considered in order to get positive results. 2. The Strategy 2.1 Design CRM Strategy Several organisations pursue expensive CRM initiatives without considering the challenges and the expenses involved in them. Therefore, they are unable to get the benefits of CRM. IT and CRM managers are responsible for economic reasoning in order to make sure that CRM plans get appropriate funding. Aviation organisations must realise that CRM is a business strategy with underlying technology and it necessitates huge spending of money in software, hardware, communication, consultation and employee training. Objectives of CRM The major objective of CRM is to enhance the level of customer satisfaction. The task of CRM is not only providing technological support to the business, but it also acts as marketing philosophy for organisations. The â€Å"one-to-one† marketing system which has appeared in present days, proposes organisations to be more prosperous if they focus on gaining and preserving a portion of every customer, rather than a portion of entire market. In this context, information technology i.e. CRM can become an enabling aspect for organisations. With the improvements in technological innovations and the emergence of internet, CRM has become powerful enough to forecast the behaviours of customers, develop value–added functions, reinforce the brand image and develop customer support functions. CRM is a technology empowered business approach whereby organisations influence increased customer information in order to establish commercial relationships, on the basis of optimisation of value provided to the customers. Customer satisfaction through implementation of CRM can be achieved by lessening of cost of services, development of

Wednesday, February 5, 2020

IPSec and Cryptography Research Paper Example | Topics and Well Written Essays - 1250 words

IPSec and Cryptography - Research Paper Example IPsec is very vital since it offers numerous solutions to virtual private Networking (VPN), by giving communication security against untrusted network like the internet. Cryptography refers to the change of plaintext information into a coded form. The aim of cryptography is to offer the necessary security and frontier access to private information. This paper offers a clear discussion of the major functions of IPsec in relation to the cryptographic functions employed by the protocol suite during the packet exchange process. The paper further discusses the limitations of the IPsec in relation to the used algorithms and attacks against IPsec. Functions of IPsec There are numerous functions that the IPsec performs. First, the IPsec is used for data confidentiality. The function is achieved by the IP sec sender encrypting the data packets prior to sending them to another network. The second function is data integrity. This requires the IPsec receiver to authenticate the data packets rece ived from the IPsec sender in order to guarantee the safety of the received data packets. The third function of IPsec is data authentication. This enables the IP sec receiver to confirm the origin of the sent IPsec packets, although the success of this function relies on the data service. The replay function is the fourth function played by the IPSec (Pachghare, 2009). In the execution of this function the IP sec receiver is capable of sensing and eliminating the repeated packets. The above services are offered at the IP layer, thus they can be employed at any upper layer protocol. Such as TCP, UDP, and ICMP, just to mention a few. The IP DOI is also responsible for the provision of the IP compression; this is achieved through the encryption that is done in the IPsec. This hinders sufficient compression by the lower protocol layers (Elkelany, 2002). At the IP layer, the IPsec offers the necessary security that allows the system to choose the suitable security protocols, establish th e algorithms to be employed for the task and reorganize the cryptographic keys needed to offer the application. IPsec are capable of providing sufficient security to more than one path between a protection gateway and host (Pachghare, 2009). IP sec can establish the areas that are susceptible to attacks, thus providing the necessary security. This is achieved by configuring admission lists that are further interfaced in the crypto map sets (Pachghare, 2009). At this point the traffic may be chosen in basing on the origin and destination. There can be several users on a particular traffic, and at the same time the crypto map set might have several admission lists. In order to guarantee the security, a specific sequence must be employed when searching the crypto maps. The traffic usually tries to match the packet in order to gain admittance. When packet gain admittance to a specific data list, the corresponding crypto map is marked as Cisco and the required connections made. IPsec is usually activated whenever the crypto connection is marked as ipsec-isakmp. In the absence of the SA that the IPsec can use to provide the protection to the affected routes, the Internet Key Exchnage (IKE) is usually used to discuss with the secluded users in order to come up with the required IP sec to facilitate the smooth streaming of information. The discussions are usually based on the data specified in the crypto m