Types of Retailers

Total Page:16

File Type:pdf, Size:1020Kb

Load more

LLev2899x_ch02_034-065.inddev2899x_ch02_034-065.indd PagePage 3434 8/2/138/2/13 2:322:32 AMAM f-494f-494 //202/MH01986/Lev2899x_disk1of1/007802899x/Lev2899x_pagefiles202/MH01986/Lev2899x_disk1of1/007802899x/Lev2899x_pagefiles Types of Retailers EXECUTIVE BRIEFING Debbie Ferree, Vice Chairman and Chief Merchant, DSW Inc. Math was always my favorite subject in school and retail. In 2004, I was promoted to president and chief came quite naturally to me, so it was no surprise that merchandising officer of DSW and we took the I entered college with the goal to become a college company public in 2005. math professor, but my passion for fashion and love To implement this new concept, we developed for business and retail caused me to change my career strategic partnerships with the leading designer aspirations and transfer to the college of business. brands in footwear. These vendors were focused on Before joining DSW (Designer Shoe Warehouse), I selling their brands through the department store worked in senior management positions for a variety channel and were initially skeptical about the new of retailers, which gave me broad experience in differ- business model. The new model had many advan- ent channels of distribution and business models: tages and financial benefits: when they sold to DSW, May Company and Burdines/Federated Department there would be no extra charges such as advertising Stores—department stores; Ross Dress for Less— allowances or vendor chargebacks, and no renego- discount stores; and Harris Company—specialty retail. tiations on prices at the end of the season or mer- In 1997, I joined DSW, a true off-price retailer, of- chandise returns. Through collaboration and the fering customers an assortment of end-of-season, development of financial and strategic plans that closeout merchandise at deeply discounted prices. would support mutually profitable growth for both The department store landscape was changing rapidly parties, we aligned on a plan that today generates and dramatically, where point-of-service discounting over $2 billion in sales revenue in over 375 stores, was the norm and customers were confused about an e-commerce business, and provides a long-term the price they paid for a product. This created an plan for continued growth. opportunity in DSW to architect a new “hybrid” busi- The pillars of our success are a breathtaking as- ness model that would provide a very different sortment of on-trend merchandise, simple conve- shopping experience for the customer: an assortment nience, and irresistible value. We are using social of current, on-trend, in-season, fashion merchandise media to create a community of shoe lovers who are from well-known national brands at fair, everyday loyal to our offerings, and regularly inform their value (EDV) in an open-sell, attractive environment. friends about the new additions to our assortment This would define a new direction for the future in and about their shopping experience in our stores LLev2899x_ch02_034-065.inddev2899x_ch02_034-065.indd PagePage 3535 8/5/138/5/13 9:059:05 PMPM f-494f-494 //202/MH01986/Lev2899x_disk1of1/007802899x/Lev2899x_pagefiles202/MH01986/Lev2899x_disk1of1/007802899x/Lev2899x_pagefiles CHAPTER 2 LEARNING OBJECTIVES LO1 List the different characteristics that LO4 Explain the differences between service define retailers. and merchandise retailers. LO2 Categorize the various types of food LO5 Illustrate the types of ownership for retailers. retail firms. LO3 Identify the various types of general merchandise retailers. and on our website. Our fan page is a place where DSW’s aspiration is to become “America’s Favorite shoe lovers can hang out and talk about shoes. We Place for Shoes” and “America’s Favorite Place to stimulate interaction between our over two million Work.” We have a strong culture that incorporates followers by presenting what our followers think of our core values—humility, accountability, collabora- new styles, thanking them for their suggestions, tion, and passion—into a fun environment that answering their questions promptly, and running stretches talent, supports individual development, fun trivia contests with free pairs of shoes as prizes. and provides a rewarding career experience! ou want to have a good cup of coffee in the morning, not instant, but you don’t want to bother with grinding coffee beans, boiling water, pouring it Ythrough ground coffee in a filter, and waiting. Think of all the different retailers that could help you satisfy this need. You could get your cup of brewed coffee from the drive-through window at the local Starbucks, or you could decide to buy an automatic coffeemaker with a timer so that your coffee will be ready when you wake up. You could purchase the coffeemaker at a discount store like Walmart or Target, a department store such as Macy’s, a drugstore like CVS, or a category specialist such as Best Buy. If you want to buy the coffeemaker without taking the time to visit a store, you could visit www.thefind.com , search for “coffee and espresso maker,” and review the details about 83,392 products sold by 5,485 retailers, ranging from Bed Bath & Beyond to Sur La Table to Newegg. All these retailers are competing against one another to satisfy your need for a hassle-free, good cup of coffee. Many are selling the same brands, but they offer dif- ferent services, prices, environments, and convenience. For example, if you want to LLev2899x_ch02_034-065.inddev2899x_ch02_034-065.indd PagePage 3636 8/2/138/2/13 2:322:32 AMAM f-494f-494 //202/MH01986/Lev2899x_disk1of1/007802899x/Lev2899x_pagefiles202/MH01986/Lev2899x_disk1of1/007802899x/Lev2899x_pagefiles 36 SECTION I The World of Retailing buy a low-priced, basic coffeemaker, you can go to a discount store. But if you are interested in a coffeemaker with more features and want to have someone explain the different features, you can visit a department store or a category specialist. To develop and implement a retail strategy, retailers need to understand the nature of competition in the retail marketplace. This chapter describes the differ- ent types of retailers and how they compete against one another by offering differ- ent benefits to consumers. These benefits are reflected in the nature of the retail mixes used by the retailers to satisfy customer needs: the types of merchandise and services offered, the degree to which their offerings emphasize services versus merchandise, and the prices charged. RETAILER CHARACTERISTICS LO1 The 1.1 million 1 retailers in the United States range from individual street ven- List the different dors selling hot dogs to multichannel retailers that offer thousands of products in characteristics that define their stores and through catalog and Internet channels. The different types of re- retailers. tailers offer unique benefits. The type of retailer a consumer chooses to patronize depends on the benefits the consumer is seeking. For example, if you are shopping for a gift, you might value the convenience of buying a shirt from a retailer’s Inter- net channel so the retailer will ship it to a friend in another city. Alternatively, you might prefer to buy a shirt from a local store when making a purchase for yourself so that you can try it on. You might go to a discount store to buy an inexpensive shirt for a camping trip or a sporting goods specialty store to buy a shirt with the insignia of your favorite football team. All these retailers survive and prosper because they satisfy a group of consum- ers’ needs more effectively than their competitors, and thus consumers patronize different retail types when they have different needs. As consumer needs and com- petition change, new retail formats are created and existing formats evolve. Many retailers also are broadening their assortments, which means that their offerings overlap and competition increases. At eBay Motors, for example, con- sumers can buy cars and motorcycles from thousands of individual sellers and es- tablished dealers. The eBay sellers compete with traditional automobile dealers that sell cars and motorcycles through conventional dealerships. In another example, office supply stores compete with warehouse clubs, supercenters, supermarkets, and convenience stores because they sell many of the same products. The most basic characteristic used to describe the different types of retailers is their retail mix, or the elements retailers use to satisfy their customers’ needs. Four elements of the retail mix are particularly useful for classifying retailers: the type of merchandise and/or services offered, the variety and assortment of mer- chandise offered, the level of customer service, and the price of the merchandise. Type of Merchandise The United States, Canada, and Mexico have developed a classification scheme, called the North American Industry Classification System (NAICS), to collect data on business activity in each country. Every business is assigned a hierarchical, six-digit code based on the type of products and services it sells. The first two digits identify the firm’s business sector, and the remaining four digits identify various subsectors. REFACT The classifications for retailers selling merchandise, based largely on the type Nearly 19 percent of all of merchandise sold, are illustrated in Exhibit 2–1. Merchandise retailers are in U.S. retail sales are for sectors 44 and 45. The next three digits provide a finer classification of merchan- motor vehicles and parts dise retailers. For example, retailers selling clothing and clothing
Recommended publications
  • Calendar No. 168

    Calendar No. 168

    Calendar No. 168 110TH CONGRESS REPORT " ! 1st Session SENATE 110–70 PERSONAL DATA PRIVACY AND SECURITY ACT OF 2007 MAY 23, 2007.—Ordered to be printed Mr. LEAHY, from the Committee on Judiciary, submits the following R E P O R T together with ADDITIONAL VIEWS [To accompany S. 495] [Including cost estimate of the Congressional Budget Office] The Committee on the Judiciary, to which was referred the bill (S. 495), to prevent and mitigate identity theft, to ensure privacy, to provide notice of security breaches, and to enhance criminal pen- alties, law enforcement assistance, and other protections against security breaches, fraudulent access, and misuse of personally iden- tifiable information, reports favorably thereon with amendments, and recommends that the bill, with amendments, do pass. CONTENTS Page I. Purpose of the Personal Data Privacy and Security Act of 2007 ............... 2 II. History of the Bill and Committee Consideration ....................................... 7 III. Section-by-Section Summary of the Bill ...................................................... 10 IV. Cost Estimate ................................................................................................. 18 V. Regulatory Impact Evaluation ...................................................................... 25 VI. Conclusion ...................................................................................................... 25 VII. Additional Views ............................................................................................ 26 VIII. Changes in Existing Law Made by the Bill as Reported ............................ 32 59–010 VerDate Aug 31 2005 06:18 May 28, 2007 Jkt 059010 PO 00000 Frm 00001 Fmt 6659 Sfmt 6646 E:\HR\OC\SR070.XXX SR070 mstockstill on PROD1PC66 with HEARING 2 I. PURPOSE OF THE PERSONAL DATA PRIVACY AND SECURITY ACT OF 2007 A. SUMMARY Advanced technologies, combined with the realties of the post- 9/11 digital era, have created strong incentives and opportunities for collecting and selling personal information about ordinary Americans.
  • FISSEA Conference 2011 Presentation

    FISSEA Conference 2011 Presentation

    Securing the Weakest Link Instructor Jay Ferron CEHI, CISM, CISSP, CWSP, MCITP, MCT, MVP, NSA-IAM … [email protected] © 2010 Global Knowledge Training LLC. All rights reserved. Section Objectives After completing this section, you will be able to: Discuss the issue of social media in security Describe and show examples of phishing Show methods of discovering and processing online attacks © 2010 Global Knowledge Training LLC. All rights reserved. 2-2 Security Fundamentals Security Importance To protect your finances To protect your data To protect your country To protect your job To protect your way of life To protect your life © 2010 Global Knowledge Training LLC. All rights reserved. 1-3 Security Fundamentals Human Influence in Security “People are the underlying cause of the need for security.” Donn Parker, Fighting Computer Crime © 2010 Global Knowledge Training LLC. All rights reserved. 1-4 Vulnerabilities Social Engineering Dumpster diving and shoulder surfing Organizational charts, passwords, access codes, and log files Use of tools Google, Bing, Yahoo!, etc. www.learnwebskills.com/company www.whitepages.com Hoover’s, Inc. EDGAR Online, Inc. © 2010 Global Knowledge Training LLC. All rights reserved. 1-7 Demo © 2010 Global Knowledge Training LLC. All rights reserved. Discussion DoHow you manydo haveyou of connect children you have to at more thehome Internet than and one WhatDoHave you areyou useback youever encryption? upusing been your tohit data?computer? read by a yourHow virus? often?eHow-mail? often? ifcomputer(DSL, so, what cable, at ages? home?or dial-up)? © 2010 Global Knowledge Training LLC. All rights reserved. Social Media Types Social networking sites Blogging sites Facebook Xanga Twitter LiveJournal Video sharing Bookmarking sites YouTube Digg Photo sharing Flickr © 2010 Global Knowledge Training LLC.
  • A Chronology of Data Breaches

    A Chronology of Data Breaches

    A Chronology of Data Breaches Posted April 20, 2005 Updated August 17, 2007 DATE MADE PUBLIC NAME (Location) TYPE OF BREACH NUMBER OF RECORDS August 13, 2007 Pfizer/Axia Ltd. Axia Ltd. had notified Pfizer on June 14 of an incident in which two Pfizer laptops were stolen from a 950 (New York, NY) locked car. The laptops, which disappeared May 31 in Boston, included the names and Social Security 866-274-3891 numbers of health-care professionals who “were providing or considering providing contract services for Pfizer,” according to the letter. August 11, 2007 Providence Alaska Medical Center A laptop computer that contains the personal information of patients is missing. On the laptop there 250 (Anchorage, AL) maybe names, medical record numbers, dates of birth, patient diagnoses, Social Security numbers and (888) 387-3392. addresses. August 10, 2007 Loyola University A computer with the Social Security numbers of 58 hundred students was discarded before its hard drive 5,800 (Chicago, IL) was erased, forcing the school to warn students about potential identify theft. August 10, 2007 Legacy Health System A primary care physician practice has discovered the theft of $13,000 in cash and personal data for 747 (Portland, OR) patients. Patient receipts, credit card transaction slips and checks are also missing, in addition to Social (503) 445-9533 Security numbers and dates of birth for patients. August 8, 2007 Yale University Social Security numbers for over 10,000 current and former students, faculty and staff were 10,000 (New Haven, CT) compromised last month following the theft of two University computers August 7, 2007 Electronic Data Systems A former employee was arrested this week for allegedly trafficking in stolen identities she received 498 (Montgomery, AL) through her work with the company.
  • Ibm Ndustry Verview Etail Mss I O : R

    Ibm Ndustry Verview Etail Mss I O : R

    ii IBM NDUSTRY VERVIEW ETAIL MSS I O : R RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: JANUARY 06, 2015 BY: DAVID MCMILLEN, SENIOR THREAT RESEARCHER ©Copyright IBM Corporation 2015. All rights reserved. IBM and the IBM logo are trademarks or registered trademarks of IBM Corporation in the United States, other countries or both. Other company, product or service names may be trademarks or service marks of others. iii TABLE OF CONTENTS EXECUTIVE OVERVIEW ....................................................................................................................................... 1 MAJOR RETAIL DATA BREACHES ......................................................................................................................... 1 METHODS OF RETAIL DATA LOSS ........................................................................................................................ 4 METHODS OF ATTACK ........................................................................................................................................ 6 COMMAND INJECTION ...................................................................................................................................................... 6 SHELLSHOCK ................................................................................................................................................................... 6 POPULAR POS MALWARE ................................................................................................................................................
  • Twitter Equity Firm Value CS4624: Multimedia, Hypertext, and Information Access Blacksburg, VA 24061 5/8/2018 Client: Ziqian Song Instructor: Dr

    Twitter Equity Firm Value CS4624: Multimedia, Hypertext, and Information Access Blacksburg, VA 24061 5/8/2018 Client: Ziqian Song Instructor: Dr

    Twitter Equity Firm Value CS4624: Multimedia, Hypertext, and Information Access BlacksburG, VA 24061 5/8/2018 Client: Ziqian SonG Instructor: Dr. Edward A. Fox By: Nathaniel Guinn, Christian Wiskur, Erik AGren, Jacob Smith, and Rohan Rane 1 Table of Contents Table of Figures .................................................................................................................................................................2 Table of Tables ...................................................................................................................................................................3 1. Executive Summary ......................................................................................................................................................4 2. Introduction ...................................................................................................................................................................5 3. Requirements ................................................................................................................................................................5 4. Design ..............................................................................................................................................................................6 4.1 High Level Design ............................................................................................................................................................................................ 6 4.2 Twitter
  • The State of IT Security from a Confidentiality- Focused Perspective and the Role of IT Risk Management

    The State of IT Security from a Confidentiality- Focused Perspective and the Role of IT Risk Management

    University of Piraeus Faculty of Digital Systems Department of Security of Digital Systems The state of IT Security from a confidentiality- focused perspective and the role of IT Risk Management MASTER THESIS Submitted to: Prof. Dr. Günther Pernul and Prof.Dr. Sokratis Katsikas Mentoring: Michael Weber Submitted on 26th of February 2015 Submitted by: Myrsini Athinaiou Dr.-Gessler-Straße 15b 93051 Regensburg (Germany) matriculation number. 1718030 University of Regensburg Faculty of Business, Economics and Management Information Systems Department of Information Systems Prof. Dr. Günther Pernul The state of IT Security from a confidentiality- focused perspective and the role of IT Risk Management MASTER THESIS Submitted to: Prof. Dr. Günther Pernul Mentoring: Michael Weber Submitted on 26th of February 2015 Submitted by: Myrsini Athinaiou Dr.-Gessler-Straße 15b 93051 Regensburg (Germany) matriculation number. 1718030 Abstract I Abstract Information security is important for corporations. Decisions regarding security involve uncertainties, complexities related to various scientific and technological disciplines, and adverse impacts on business prosperity and goals. Risk management methodologies are widely accepted and used to increase the efficiency and effectiveness of information security, according to the priorities and limited resources of each firm. The common belief is that risk management offers a framework which summarizes scientific judgment and can be used to support decisions regarding the security of information. Still, every year and even on a daily bases, enterprises worldwide are reporting lost or stolen data and also suffer the various consequences. Legal penalties, diminishing reputation, lost costumers, financial losses are some of the most referenced examples. As risk management is used in the field of information security, it has been considered not only as a strengthening element but also as an opening.