Preview

MT219 Assignment Unit 6

Better Essays
Open Document
Open Document
1293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MT219 Assignment Unit 6
Marketing Research Plan Proposal U Drive Transport
Amy Burman
Kaplan University, MT219 Marketing
Professor Kathryn Kelly

Marketing Research Plan Proposal
Introduction
U Drive Transport (UDT) is headquartered in Chicago and is a car sharing business located in over 20 major city centers and employees over 500 people. UDT serves densely populated urban areas where consumers tend to feel burdened by owning a vehicle. Consumers are able to subscribe to UDT on a yearly basis, anywhere from 2-80 hours per month, or consumers can rent a car for a 2 hour minimum, a day, a week, or a month. UDT has dominated the US market as the premier car sharing business and is looking to expand into the global market.
Purpose Statement
Conducting secondary research, UDT marketing team has identified great growth potential in the global marketplace. They have also learned there is a way to create partnerships in other parts of the city, have electric or gas vehicles used in the northern hemisphere, place solar and electrical cars in Florida, Arizona, and California, and they can expand the number of recharging stations for their vehicles. The purpose of this marketing research plan proposal is to present the opportunities for collecting and analyzing data that will help UDT determine if they need to make an investment in the global marketplace (Lamb et al., 2014).
Marketing Research Process
The marketing research will help UDT’s business strategy, determine a market segment, and improve operations. Upon approval by Jenna, Marketing Manager, and Karl, Automotive Maintenance and Information Technology, this marketing research project will get a final budget and implementation. The proposal can then be implemented into the global market within one to two years.
Research Questions The following questions will inform UDT whether or not it would be a good investment to move into the global marketplace.
1. What international location would result in growth potential for



References: Canada Mortagage and Housing Corporation. Retrieved on November 23, 2014 from http://www.cmhc-schl.gc.ca/en/co/buho/sune/sune_005.cfm#CP_JUMP_98152 Enterprise Car Share. Retrieved on November 20, 2014 from http://www.enterprisecarshare.com/ Lamb, C. W., Hair, J. F., & McDaniel, C. (2014). MKTG7. Mason, OH: South-Western, Cengage. Livingin-canada. Retrieved on November 23, 2014 from http://www.livingin-canada.com/living-in-ottawa.html Ottawa Canada. Retrieved on November 23, 2014 from http://ottawa.ca/en Zipcar. Retrieved on November 20, 2014 from http://www.zipcar.com/

You May Also Find These Documents Helpful

  • Better Essays

    Mt 435 Unit 6 Assignment

    • 1125 Words
    • 5 Pages

    (01) Improved technology to increase efficiency and effectiveness throughout the plant. Without a doubt, old technology makes it harder for the manufacturing process and takes longer to get the products to the end user. A five year plan to update technology would be more cost effective and can address the technology issues on a predetermined plan over the five year term.…

    • 1125 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Mt435 Unit 3 Assignment

    • 1483 Words
    • 6 Pages

    Russell, R. Taylor, B. (2011). Operations Management: Creating Value along the Supply Chain, 7th Edition. Hoboken, New Jersey: John Wiley and Sons…

    • 1483 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Mt435 Unit 6 Assignment

    • 1155 Words
    • 5 Pages

    (03) Getting the plant up to code needs to be a short term goal, as they could be shut down since they are not up to US safety and environmental standards. The company cannot afford a shut down or huge fines for not being in compliance. The EPA offers many services that can help the company to get in compliance and to help the company stay in compliance also and the company needs to seek their help to ensure they are meeting the standards.…

    • 1155 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Then click ‘Decrypt/Verify’ to proceed. The procedure also includes entering the passphrase of the certificate.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 5050 Words
    • 21 Pages

    This is a rudimentary diagram representing the basic network that is employed in the Boston College Rochford Campus.…

    • 5050 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    The surveys were designed for three different targeted audiences, survey1 for IT professionals in the IT departments of SCT, CAS and DU, survey 2 for all users types such as staff, employees and students of SCT, CAS and DU from all departments and survey 3 designed for Vendors who are providing technologies to SCT, CAS and DU.…

    • 306 Words
    • 2 Pages
    Good Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Assignment

    • 303 Words
    • 2 Pages

    Unit 6 Assignment Shana Howell CE-240-01 Down Syndrome       Characteristics of this disability:…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lululemon Athletica

    • 4608 Words
    • 19 Pages

    - Whether the growth and expansion strategy of the company in the international markets would be successful.…

    • 4608 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Any public wireless hotspots, such as at restaurants, hotels, parks are not a good place to use any website that requires personal or financial information. When using an unsecure network, a hacker can easily get access to any webpage you access. They can access documents, pictures, bank information, your phone number, address, credit card information and passwords. Once the hacker has your username and password for one website they can try to log in as you on multiple other websites. This is why it is best to never use the same username and password on different websites. When you are connecting to a wireless network, if it does not ask you for a WEP, WPA, or WPA2 password, then your connection is not secure, meaning none of the data you access with be encrypted.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The most important concept in this week's reading was the Copyright laws. How the laws creation in fifteen century England where design to create a monopoly in book printing. Is surprising to read of their constant evolution in the United States since the Act of 1976 to become what they are now. Another thing is to be aware of how copyrights laws can adversely affect your projects if not doing in dept research of your content. In my case copyrights laws existence and their complexity makes it the most important concept of this week's reading.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays

Related Topics