Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Problem: Zipcar was an answer for customers who want to rent a car for a few hours in their home city, rather than for a few days from a traditional rental agency. Car reservations were for a specific pick-up time and location around the city, often in neighborhoods so the customers need only to walk to pick up their reserved car. Customers applied for a Zipcard, which enabled them to reserve a car online and unlock their car when they arrive at the car's location. The company operated with a very small staff compared to traditional rental agencies. Very little human interaction was required between the customer and Zipcar for a transaction. A customer reserved a car online, entered into the reserved car by waving the RFID-enabled Zipcard against the card reader mounted behind the windshield on the driver side, returned the car to the same location, and was billed on the credit card already on file. The customer could check all rental records and print receipts from the online reservation system. The system also had a color-coded time chart showing availability and location of all rental cars in the vicinity. This transparent information exchange allows a customer to pick the car he or she wants, if available, or delay the reservation until the car was returned by another customer.

Zipcar also created and installed a GPS-enabled wireless device in each car, which allowed members to find and reserve a nearest vehicle using a cell phone. Customers also can use an iPhone or Android app on their iPhone or Android mobile device to find and reserve a Zipcar on a 24/7 basis. Zipcar sends text alerts near the end of the rental period and customers can text back if they want to extend their rental time. All the cars were outfitted with patented wireless technology. Their proprietary IT platform carried information flow between customers, vehicles, and the company. It was used to monitor car security, fulfill reservations, record hourly usage, and maintain mileage information. It also relayed vital technical information such as battery voltage and fuel level. It even informed the central system if a customer forgot to turn off headlights, which can quickly drain battery power. This business model provided unique advantages over traditional car rentals.

The customer did not have to stand in line or fill out papers to rent a car. The customer knew exactly which make and model he or she would be getting. Unlike most off-airport rental agency locations, which were only open during business hours, Zipcar locations were open 24 hours. The Zipcar rates also included the cost of gas and insurance, as well as reserved parking spots at some locations. Additionally, the company used social networking technologies to develop an online community of Zipcar members-Zipsters. It encouraged Zipsters to talk about their Ziptrips (i.e., share their personal experiences with Zipcar). Thus, information technology was not only the key enabler of this business model but also was a facilitator in creating a buzz and encouraging community development around the concept. Zipcar changed the rules of the rental car industry by bringing the new Web 2.0 mind-set of focusing on automation, customer empowerment, transparency, and community. Zipcar has been very successful, with over 200,000 paying members and renting over 5,000 vehicles in 50 markets in the United States, Canada, and the United Kingdom.

Discussion Questions: 1. Analyze the business model of Zipcar using Porter's five forces model.

2. Discuss the synergy between the business strategy of Zipcar and information technology.

3. What network effects are part of the strategy of Zipcar? How do they add value?

4. As the CEO of Zipcar, where is your most threatening competition? What would you do to sustain a competitive advantage?

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M92709589

Have any Question?


Related Questions in Business Management

In class today we were speaking about importance of

In class today we were speaking about importance of adopting active listening importance of adopting active listening in the performance of their duties and responsibilities.

Penetration testing is a technique used to identify

Penetration testing is a technique used to identify security weaknesses in your network. Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

What is the american association of airport executives what

What is the American Association of Airport Executives? What are the requirements for membership for those currently employed in airport management? You may wish to view the following web site: www.AAAE.org/ by clicking ...

Auburn creed i believe that this is a practical world and

Auburn Creed: I believe that this is a practical world and that I can count only on what I earn. Therefore, I believe in work, hard work. I believe in education, which gives me the knowledge to work wisely and trains my ...

What techniques are used in weka to deal with the

What techniques are used in WEKA to deal with the continuous versus discrete attribute issue in the case of C4.5 (J48) and MLP?

What could an organisation do to encourage workers to

What could an organisation do to encourage workers to participate in an implementation process?

How does a fundraiser use donor motivations to increase

How does a fundraiser use donor motivations to increase fundraising effectiveness? What is your opinion on why so much of the money given to charity comes from people who are not wealthy-what is their motivation?

1nbspsignificance of the study describe the research

1.  Significance of the study . Describe the research questions targeted to be addressed in Article 1, 2 and their significance. 2.  Method of data collection . Describe the methods used in data collection and their appr ...

Quantitative analysis for managerswhat does it mean to be

Quantitative Analysis for Managers What does it mean to be risk averse or risk neutral? How important is it to evaluate risk and to evaluate how sensitive to risk any business, personal, or academic decision you have mad ...

The original table isnbspstu-maj-adv sid fid majorfd

The original table is  STU-Maj-Adv (SID, FID, Major) FD: FID Major (each faculty specializes only one major) (SID, Major) and (SID, FID) are all candidate keys (CK) assuming a student can have multiple majors. A student ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As