You are on page 1of 12

EMPOWERMENT TECHNOLOGIES

Key Features of Web 2.0


Information and Communications Technology 1. Folksonomy - It allows users to categorize and
- It deals with the use of different communication classify/arrange information using freely chosen
technologies such as mobile phones, the Internet, keywords. (Twitter, Instagram, Facebook)
etc. to locate, save, send, and edit information. 2. Rich User Experience - Content is dynamic and
responsive to the user’s input. In the case of social
“C” reflects the important role that computers now networking sites, when logged on, your account is
play in communications. used to modify what you see on their website.
The “S” at the end of communications, is a term 3. User Participation - The owner of the website is
that predates computer technology and was originally not the only one who can put content. Others can
associated with Morse code, radio, and often abbreviated place the content of their own through comments,
to “comms.” reviews, and evaluations.
4. Software as a Service - Users will subscribe to
ICT in the Philippines software only when needed rather than purchasing
- The Philippines is called the “ICT hub of Asia” them.
because of the huge growth of ICT-related jobs 5. Mass Participation - It is a diverse information
around the country. sharing through universal web access. Since most
users can use the Internet, Web 2.0’s content is
Time magazines declared Makati City, based on people from various cultures.
Philippines-Rank 1 as the “Selfiest” City around the 6. Long Tail - services that are offered on demand
world, and Rank 9 is Cebu City. rather than on a one-time purchase.

WWW (World Wide Web) Web 3.


- an interconnected system of public web pages - also called Semantic Web
accessible through the Internet. It was invented by
Sir Tim Berners-Lee in 1989. Semantics – the ability of Web technologies to understand
- Web pages are what make up the world wide web. and interpret human-generated content.
Web 1.0 The aim of Web 3.0 is to have machines understand
- are static and not interactive. You can’t post the user’s preferences to be able to deliver web content
comments or create an account. specifically targeting the user.
Examples of Websites in Web 1.0 The Internet can predict the best possible answers
Web 2.0 to your question by “learning from your previous
- allows the user to interact with the page known as choices”.
the dynamic page; instead of just reading a page,
the user may be able to comment or create a user Several problems of Web 3.0
account. 1. Compatibility - HTML files and current web
- The dynamic page refers to the web pages that browsers could not support Web 3.0.
are affected by user input or preference. 2. Security - The user’s security is also questioned
since the machine is saving his or her preferences.
Web 2.0 term used to describe the present 3. Vastness - The World Wide Web already contains
generation of the World Wide Web that concentrates on its billions of web pages.
capability of providing people the means to collaborate 4. Vagueness - Certain words are imprecise. The
and share information online. words “old” and “small” would depend on the
Darcy DiNucci, an information architecture user.
consultant, coined the term Web 2.0 in her 5. Logic - since machines use logic, there are certain
1999 article, “Fragmented Future”. limitations for a computer to be able to predict
The term was popularized by Tim O’Reilly and what the user is referring to at a given time.
Dale Dougherty at the O’Reilly Media
Web 2.0 Conference in late 2004 (TechTarget, 2015). Trends in ICT
1. Convergence - the combination of two or more d. Windows Phone OS – a closed source and
entities of technologies to create a new single proprietary operating system developed by
device. Example: Using a smartphone to create Microsoft.
word documents that were previously can only e. Symbian – the original smartphone OS; used by
created using a desktop computer. Nokia devices.
2. Social Media - a website, application, or online f. WebOS – originally used in smartphones; now
channel that enables web users to create, used in smart TVs.
co-create, modify, and exchange user-generated g. Windows Mobile - developed by Microsoft for
content. smartphones and pocket PCs.
Six types of Social Media
a. Social Networks – These are sites that allow you 5. Assistive Media - It is a nonprofit service designed
to connect with other people with the same to help people who have visual and reading
interests or background. Once the user creates impairments.
his/her account, he/she can set up a profile, add
people, share content, etc. (Facebook and Cyber Citizen
Google+) - utilizes technology in an appropriate manner
b. Bookmarking Sites– These are sites that allow including etiquette, communication, education,
you to store and manage links to various websites access, commerce, responsibility, rights, safety,
and resources. Most of these sites allow you to and security.
create a tag and easily share them.
(StumbleUpon/Pinterest) Ways to be cyber aware
c. Social News – These are sites that allow users to a. Cell phones - “Sexting” is a term used to describe
post their news items or links to other news inappropriate photos or texts sent via cell phones
sources. The users can also comment on the post Cell phone history options allow you to view past
and comments may also be ranked. (Reddit and callers and messages. Although the history can be
Digg) deleted, contact your cell phone provider for any
d. Media Sharing – These are sites that allow you to other options available. Geotagging allows users
upload and share media content like images, to note where they are located in a smartphone
music, and video. (Flickr, Youtube, and photo.
Instagram) b. Cyberbullying - involves the use of technologies
e. Microblogging – These are sites that focus on to display behavior that harms another. Through
short updates from the user. Those that subscribed email, instant messaging, text messaging, and
to the user will be able to receive these updates. social networking sites, hurtful messages can be
(Twitter and Plurk) posted and shared.
f. Blogs and Forums – These websites allow users c. Ethics - Plagiarism is the use of another work as
to post their content. Other users can comment on your own. On the internet, all materials are
the said topic. (Blogger, WordPress, and Tumblr) copyrighted unless stated otherwise. Such
materials include, but are not limited to, images,
3. Mobile Technologies - The popularity of music, text, and videos.
smartphones and tablets has taken a major rise over d. Gaming - Online gaming provides the opportunity
the years. This is largely because of the devices’ to play games from a computer or another device,
capability to do tasks that were originally found in like a Wii or PlayStation. Some consoles have a
personal computers. social element, as users can play with anyone
Different types of mobile operating systems: from around the world. Chatting, IM, and other
a. iOS – used in Apple devices such as iPhone and social tools exist within these games.
iPad. e. Instant Messaging and Email - Instant
b. Android – an open-source OS developed by messaging (IM) allows users to correspond online
Google. Being open source means with others in real-time. IM can occur
mobile phone companies use this OS for free. through a mobile device or computer with internet
c. Blackberry OS – used in Blackberry devices. access. Similar to text messaging, IM lets users
correspond in brief text. Popular IM platforms include 10. Install and update antivirus software on your
iMessage and Meebo. computer. Use only one anti-virus software to
Email also allows users to interact online. avoid conflicts.
11. If you have Wi-Fi at home, make it a private
Follow the common email usage tips below. network by adding a password.
➢ Privacy – do not share your password with others. 12. Avoid downloading anything from untrusted
➢ Unknown – do not open emails or attachments websites.
from an unknown source. Block messages from 13. But the software does not use pirated ones.
unknown sources. 14. Do not reply to or click links from suspicious
➢ Unsubscribe – scroll to the bottom of the email emails.
and choose unsubscribe to be removed from the 15. Make Online Purchases from Secure Sites
list of unwanted emails.
Internet Threats
f. Social Networking - Social networking sites 1. Malware – or malicious software, is any program
provide a social atmosphere by allowing users to or file that is harmful to a computer user.
share personal information. Popular sites include Types of Malware:
Facebook, Google+, and Twitter with similar a. Virus - a malicious program designed to replicate
elements such as status updates, photo friend lists itself and transfer from one computer to another
or followers, chat, gaming, and messaging or (internet, local networks, FDs, CDs, etc.)
email. Most SNS like Facebook is intended for b. Worm - a malicious program that transfers from
those aged 13 and older. one computer to another by any type of means.
Ex. ILOVEYOU Worm - The malware originated
Online Safety and Security in the Pandacan neighborhood of Manila in the
Internet - defined as the information superhighway. This Philippines on May 5, 2000.
means that anyone has access to this highway, can place c. Trojan - a malicious program that disguises as a
information, and can grab that information. This is why useful program but once downloaded or installed,
social networking sites like Facebook continue to improve leaves your PC unprotected and allows hackers to
their security features. The threat of cybercrime is very get your information.
real. Whatever information we share today could affect d. Spyware - a program that runs in the background
our future. without you knowing it (thus called “spy”). It can
monitor what you are currently doing and typing
Tips to Stay Safe Online through keylogging.
1. Be mindful of what you share online and what site Keylogger – used to record keystrokes done by
you share it to. the user. This is done to steal their password or
2. Do not just accept terms and conditions; read any other sensitive information. The key logger
them. software typically uses a log file to store its
3. Know the security features of the social recording.
networking site you use. By keeping your profile e. Adware - a program designed to send you
private, search engines will not be able to scan advertisements, mostly as pop-ups.
your profile. f. Ransomware - or ransom software is a type of
4. Do not share your password with anyone. malicious software from cryptovirology that
5. Avoid logging in to public networks/Wi-Fi. threatens to publish the victim's data or
Browsing in “incognito (or private) mode will perpetually block access to it unless a ransom is
NOT protect you from hackers. paid.
6. Do not talk to strangers whether online or
face-to-face/ 2. Spam - an unwanted email mostly from bots or
7. Never post anything about a future vacation. It is advertisers. It can be used to send malware.
similar to posting, “Rob my house on this date.” 3. Phishing - its goal is to acquire sensitive personal
8. Add friends you know in real life. information like passwords and credit card details.
9. Avoid visiting untrusted websites.
This is done by sending you an email that will direct the
user to visit a fake
website and be asked to update his/her username,
password, credit card, or personal
information.

Copyright Infringement
- It is the use of works protected by copyright law
without permission for a usage where such
permission is required.

Tips to avoid copyright infringement


1. Always assume that the work is copyrighted.
2. Do not copy, share or alter without seeking
permission.
3. Review and retain licensing agreements.
4. Consider buying content.
5. Give credit to the original author of the page or
information.

Online Research
Have you ever searched the internet for certain
information where the search engine returned a different
result?

Tips for conducting online research


1. Have a question in mind.
2. Narrow it down.
3. Advanced Search.
4. Look for a credible source.
5. Give Credit.
ORGANIZATION AND MANAGEMENT into one. And these are just a few of a manager's
roles.
Functions of Managers - In addition, managers' schedules are usually
Managers just don't go out and haphazardly
jam‐packed. Whether they're busy with employee
perform their responsibilities. Good managers discover
how to master five basic functions: planning, organizing, meetings, unexpected problems, or strategy
staffing, leading, and controlling. sessions, managers often find little spare time on
their calendars. (And that doesn't even include
● Planning: This step involves mapping out exactly responding to e‐mail!)
how to achieve a particular goal. Say, for - In his classic book, The Nature of Managerial
example, that the organization's goal is to improve Work, Henry Mintzberg describes a set of ten
company sales. The manager first needs to decide roles that a manager fills. These roles fall into
which steps are necessary to accomplish that goal. three categories:
These steps may include increasing advertising, ● Interpersonal: This role involves human
inventory, and sales staff. These necessary steps interaction.
are developed into a plan. When the plan is in ● Informational: This role involves the sharing
place, the manager can follow it to accomplish the and analyzing of information.
goal of improving company sales. ● Decisional: This role involves decision-making.
● Organizing: After a plan is in place, a manager
needs to organize her team and materials
according to her plan. Assigning work and Informational
granting authority are two important elements of 1. Monitor - Seek and receive information; scan
organizing. periodicals and reports; maintain personal contact
● Staffing: After a manager discerns his area's with stakeholders.
needs, he may decide to beef up his staffing by 2. Disseminator - Forward information to
recruiting, selecting, training, and developing organization members via memos, reports, and
phone calls.
employees. A manager in a large organization
3. Spokesperson - Transmit information to outsiders
often works with the company's human resources via reports, memos, and speeches.
department to accomplish this goal. Interpersonal
● Leading: A manager needs to do more than just 1. Figurehead - Perform ceremonial and symbolic
plan, organize, and staff her team to achieve a duties, such as greeting visitors and signing legal
goal. She must also lead. Leading involves documents.
motivating, communicating, guiding, and 2. Leader - Direct and motivate subordinates;
counsel and communicate with subordinates.
encouraging. It requires the manager to coach,
3. Liaison - Maintain information links both inside
assist, and problem-solve with employees.
and outside the organization via mail, phone calls,
● Controlling: After the other elements are in place, and meetings.
a manager's job is not finished. He needs to Decisional
continuously check results against goals and take 1. Entrepreneur - Initiate improvement projects;
any corrective actions necessary to make sure identify new ideas and delegate idea responsibility
that his area's plans remain on track. to others.
2. Disturbance handler - Take corrective action
during disputes or crises; resolve conflicts among
All managers at all levels of every organization
subordinates; adapt to environments.
perform these functions, but the amount of time a manager 3. Resource allocator - decide who gets resources;
spends on each one depends on both the level of prepare budgets; set schedules and determine
management and the specific organization. priorities.
4. Negotiator - Represent departing during
Roles Performed by Managers negotiations of union contracts, sales, purchases,
and budgets.
- A manager wears many hats. Not only is a
manager a team leader, but he or she is also a Skills of a manager
planner, organizer, cheerleader, coach, - Not everyone can be a manager. Certain skills, or
problem solver, and decision maker — all rolled abilities to translate knowledge into action that
results in desired performance, are required to Assembly of Collegiate Schools of Business (AACSB) is
help other employees become more productive. urging business schools to help their students develop.

These skills fall under the following categories: 1. Leadership — ability to influence others to
1. Technical: This skill requires the ability to use a
perform tasks
special proficiency or expertise to perform
particular tasks. Accountants, engineers, market 2. Self‐objectivity — ability to evaluate yourself
researchers, and computer scientists, as examples, realistically
possess technical skills. Managers acquire these
3. Analytic thinking — ability to interpret and
skills initially through formal education and then
further develop them through training and job explain patterns in information
experience. Technical skills are most important at 4. Behavioral flexibility — ability to modify
lower levels of management.
2. Human: This skill demonstrates the ability to personal behavior to react objectively rather than
work well in cooperation with others. Human subjectively to accomplish organizational goals
skills emerge in the workplace as a spirit of trust,
5. Oral communication — ability to express ideas
enthusiasm, and genuine involvement in
interpersonal relationships. A manager with good clearly in words
human skills has a high degree of self‐awareness 6. Written communication — ability to express
and a capacity to understand or empathize with the
feelings of others. Some managers are naturally ideas clearly in writing
born with great human skills, while others 7. Personal impact — ability to create a good
improve their skills through classes or experience.
impression and instill confidence
No matter how human skills are acquired, they're
critical for all managers because of the highly 8. Resistance to stress — ability to perform under
interpersonal nature of managerial work. stressful conditions
3. Conceptual: This skill calls for the ability to
think analytically. Analytical skills enable 9. Tolerance for uncertainty — ability to perform
managers to break down problems into smaller in ambiguous situations
parts, see the relations among the parts, and
recognize the implications of any one problem for
“Factors that affect the Business environment”
others. As managers assume ever‐higher 1. External Factors
responsibilities in organizations, they must deal a. Economic environment - Economic
with more ambiguous problems that have factors throw light on the nature and
long‐term consequences. Again, managers may direction of the economy in which a firm
acquire these skills initially through formal operates.
education and then further develop them through b. Social and Cultural Environment - The
social factors that affect a firm include the
training and job experience. The higher the
values, attitudes, beliefs, opinions, and
management level, the more important conceptual lifestyles of persons in the firm’s external
skills become. environment, as developed from
demographic, cultural, religious,
Although all three categories contain skills educational, and ethnic conditioning.
essential for managers, their relative importance tends to c. Political Environment - Many political
vary by level of managerial responsibility. factors influence how managers formulate
and implement strategic direction.
Business and management educators are
d. Legal Environment - The legal
increasingly interested in helping people acquire technical, framework/regulatory environment is
human, and conceptual skills, and develop specific decided by the political party in power.
competencies, or specialized skills, that contribute to high The government, therefore, may legislate
performance in a management job. Following are some of on matters like wage fixation, managerial
the skills and personal characteristics that the American remuneration, safety and health at work,
location of plants, entry of multinationals,
price control, import-export policy, c. Finance - A business needs adequate
licensing policy, etc. funds in place in order for it to survive
e. Technological Environment - and grow successfully.
Technological factors represent major d. Current Technology - A business can use
opportunities and threats that must be new technology to ensure efficiency and
taken into account while formulating also boost its profile. Savings can be made
strategies. Technological breakthroughs by having staff use video conferencing
can dramatically influence an technology instead of traveling to
organization's products, services markets, meetings. By using smartphone and tablet
suppliers, distrib­utors, competitors, technology, staff can also work while
customers, manufacturing processes, away from the office.
marketing practices, and competitive “Planning Tools and Techniques”
position.
f. Natural Environment - The natural 1. P.E.S.T. (political, economic, social, and
environment comprising ecological, technological) - is a management method
geographical, and topographical factors whereby an organization can assess major external
(such as natural resources, weather, factors that influence its operation in order to
climate, location, etc.) are all relevant to become more competitive in the market. As
the business. Historically, Industries were described by the acronym, those four areas are
set up in places where natural resources central to this model.
were available in abundance. This has - The political aspect of PEST Analysis focuses on
created pockets of affluence, congestion, the areas in which government policy and/or
and pollution all at the same time. changes in legislation affect the economy, the
g. International Environment - specific industry, and the organization in question.
International developments can greatly - The economic portion of the analysis targets the
impact the ability of an organization to do key factors of interest and exchange rates,
business abroad. For example, economic growth, supply and demand, inflation,
fluctuations of the rupee against foreign and recession.
currencies influence the ability of an - The social factors that may be included in a PEST
Indian company to compete in global Analysis are demographics and age distribution,
markets. When the price of the rupee is cultural attitudes, and workplace and lifestyle
high against foreign currencies, Indian trends.
companies find it difficult to compete in - The technological component considers the
the international market. specific role and development of technologies
h. Task/Competitive/Operating within the sector and organization, as well as the
Environment - The task environment is wider uses, trends, and changes in technology.
that part of the external environment 2. S.W.O.T. - a compilation of your company's
consisting of specific outside forces with strengths, weaknesses, opportunities, and
which an organization interfaces in the threats. The primary objective of a SWOT
course of carrying out its operations. It analysis is to help organizations develop a full
consists of the factors in the awareness of all the factors involved in making a
organization’s immediate environment business decision
(micro-environment). - Strengths describe what an organization excels at
and what separates it from the competition: a
2. Internal Factors strong brand, loyal customer base, a strong
a. Corporate Culture - Corporate culture is balance sheet, unique technology, and so on.
normally defined as The way things are - Weaknesses stop an organization from
done around here. This means the way in performing at its optimum level. They are areas
which the attitudes, beliefs, values, and where the business needs to improve to remain
norms of the firm are visible and evident, competitive: a weak brand, higher-than-average
and shared by all employees in the turnover, high levels of debt, an inadequate supply
organization. chain, or lack of capital.
b. Staffing - Human resources relate to the - Opportunities refer to favorable external factors
people who work in a business that could give an organization a competitive
organization. The performance of a advantage. For example, if a country cuts tariffs, a
business is affected by the quality and car manufacturer can export its cars into a new
impact of the people who work for it. market, increasing sales and market share.
- Threats refer to factors that have the potential to
harm an organization. For example, a drought is a e. Persuasion- means that he can entice people to
threat to a wheat-producing company, as it may buy even if they don’t.
destroy or reduce crop yield. Other common
f. Planner- meaning he makes plan before doing
threats include things like rising costs for
materials, increasing competition, tight labor things and do not fail to monitor it.
supply, and so on. g. Risk-taker which means that he is willing to
gamble but he will calculate it first

ENTREPRENEURSHIP
2. Environmental Factor
1. political/government factor
Entrepreneurship is defined as the art of observing 2. legal system
correct practices in 3. economic and social condition
managing and operating a self-owned wealth-creating 4. market situation
business enterprise by 5. Climate
providing goods and services that are valuable to
customers. Common Competencies in Entrepreneurship
1. Decisive- an entrepreneur must be firm in making
decisions.
Relevance of Entrepreneurship to an organization 2. Communicator- an entrepreneur must have
1. Development of Managerial capabilities- convincing power.
2. Creation of Organizations- 3. Leader-an entrepreneur an entrepreneur must
3. Improving the standard of living- have the charisma to be obeyed by his employees
4. Means of economic development- 4. Opportunity seeker- an entrepreneur must have
the ability to be the first to see business chances.
Entrepreneur - was derived from the French verb 5. Proactive- controlling a situation by making
enterprendre, which means “to undertake” This is things to happen or by preparing for possible
pinpointing those who ”undertake” the risk of the future problems.
enterprise. 6. Risk Taker- they have the courage to pursue what
Entrepreneurship - the process by which the enterprise is are their business ideas.
created by an entrepreneur. 7. Innovative- the entrepreneurs have big business
ideas and they do not stop improving and thinking
Entrepreneurs are innovators, willing to take risks of new worthwhile ideas for their business
and generate new ideas to make unique and profitable
solutions to present-day problems. Core Competencies in Entrepreneurship
1. Economic and dynamic activity-
Basic Concepts in Entrepreneurship Entrepreneurship is an economic activity because
1. Entrepreneurship is the primary generator of it involves the creation and operation of an
economic growth. enterprise with a view to creating value or wealth
2. It is important to understand how the economy by ensuring optimum utilization of limited
works for the entrepreneur to be successful. resources.
2. Innovative- Entrepreneurs constantly look for
Factors Affecting Entrepreneurship new ideas, thus he needs to be creative.
1. Personality Factors
3. Profit Potential- meaning the entrepreneur can be
a. Initiative- which means doing things even before
compensated by his profit coming from the
being told
operation.
b. Proactive-which means he can classify
4. Risk bearing –meaning the entrepreneur needs to
opportunities and seize them.
gamble but is wise enough to offset the risk
c. Problem Solver- which means he can retain good
relations with other people
Career Opportunities of Entrepreneurship
d. Perseverance-meaning he will pursue things to
get done regardless of challenges
1. Business Consultant- serves as professional The physical environment includes Climate, Natural
advisor and helps serve businesses and companies resources, and Wildlife.
2. Teacher - a graduate of entrep can use his
knowledge of teaching 2. The Societal environment includes various forces
3. Researcher - a person who carries out academic like;
or scientific research by an enterprise a. Political forces - includes all the laws, rules, and
4. Sales - in entrepreneurial sales, you need to regulations that govern business practices as well
persuade a prospect to buy the service/product you as the permits, approvals, and licenses necessary
are selling to operate the business.
5. Business Reporter - gather and analyze facts b. Economic forces - such as income level and
about businesses that are trustworthy employment rate.
c. Sociocultural forces - customs, lifestyles, and
Types of Entrepreneurs values that characterize a society.
1. Innovative entrepreneurs - are those who always d. Technological environment - New inventions
make new things by thinking of new ideas. and technology innovations
2. Imitating - are those who don't create new things
but only follow the ideas of other entrepreneurs. The industry environment of the business includes
3. Fabian Entrepreneurs - are those skeptical. They Competitors, Customers, Creditors, Employees,
don't initiate but follow only after they are Government, and Suppliers.
satisfied
4. Drone entrepreneurs - are those who live on the 2. Technological discovery and advancement - a
labor of others. They are die-hard conservatives person with entrepreneurial interest sees the
even ready to suffer the loss of business. possibility of business opportunities in any new
5. Social entrepreneurs - are those who initiate discovery or because of the use of the latest
changes in various fields such as education, technology.
health, human rights, environment, and enterprise 3. Government’s thrust, programs, and policies -
development. The priorities, projects, programs, and policies of the
government are also good sources of ideas.
Essentials in Entrepreneur’s Opportunity Seeking 4. People’s interests - The interests, hobbies, and
These are the basic foundation that the entrepreneur must preferences of people are a rich source of
have in seeking opportunities: entrepreneurial ideas.
5. Past experiences - the expertise and skills
1. Entrepreneurial mind frame - this allows the developed by a person who has worked in a particular
entrepreneur to see things in a very positive and field may lead to the opening of related business
optimistic way in the midst of a difficult situation enterprises
2. Entrepreneurial heart flame - Entrepreneurs are
driven by passion, they are attracted to discover Forces of Competition Model
satisfaction in the act and process of discovery. - It is also known as the “five forces of
3. Entrepreneurial gut game - this refers to the competition,” An industry environment is a
ability of the entrepreneur to be intuitive. This is competitive environment.
also known as intuition. Competition – it is the act or process of trying to get or
win something
Sources of opportunities
1. Changes in the environment - Entrepreneurial Five forces competing within the industry:
ideas arise when changes happen in the external 1. Buyers - The buyers are the one that pays cash in
environment. exchange for your goods and services.
- External environment - refers to the physical The threat of its bargaining power will be less if the
environment, societal environment, and industry following factors notice:
environment where the business operates. a. There are several suppliers available in the market.
b. The buyer has the potential for backward integration.
c. The cost of switching the supplier is minimal. c. Substitute products are not readily available in the
d. The product represents a high percentage of the buyer’s market
cost. d. The switching cost is very high.
e. The buyer purchases large portions of the seller’s e. The product or service is unique
product or services.
Recognize and Understand the Market
2. Potential New Entrants - A new entrant is defined as
the one who enters something. Value Proposition (VP) is a business or marketing
This gives a threat to the business. This can be noticed if statement that summarizes why a consumer should buy a
there is the presence of the following factors: company's product or use its service. In creating Value
a. Substantial capital requirement Proposition, entrepreneurs will consider the basic
b. Strict government policy. elements:
c. Difficulty in accessing distribution channels.
d. Economies of scale. • Target Customer • Needs/opportunity • Name of the
e. High cost of product differentiation. product • Name of the enterprise/company
f. High switching cost
Unique selling proposition (USP) refers to how you sell
3. Rivalry among Existing Firms - Rivalry is a state or your product or services to your customer.
situation in which people or groups are competing with Tips for the entrepreneur on how to create an effective
each other. unique selling proposition to the target customers:
The intensity of rivalry among existing firms is • Identify and rank the uniqueness of the product or
characterized by the following factors: services character
a. Diversity of rivals. • Very Specific
b. Number of competing firms. • Keep it short and simple (KISS
c. Characteristics of the products or services.
d. Increased capacity. Unique Value Proposition and Value Proposition are the
e. Amount of fixed costs. two most famous tools used to explain why prospect
f. Rate of industry growth. customers buy each product and service.

4. Substitute Products - Substitute means anything that A. Target Market


takes the place or function of another. Market Targeting is a sage in the market identification
A substitute product can give a big threat to the industry process that aims to determine the buyers with common
environment if the following factors are noticed: needs and characteristics. Prospect customers are a
market segment that entrepreneurial ventures intend to
a. Switching cost is low. serve.
b. Preferences and tastes of the customers easily change.
c. Product differentiation is highly noticeable Commonly used methods for segmenting the market
d. The quality of substitute products dramatically 1. Geographic segmentation – the total market is
improves. divided according to geographical location.
e. The price of substitute product is substantially lower - Variable to consider
a. Climate
5. Suppliers - the Suppliers are the ones that provides b. Dominant ethnic group
something that is needed or wanted. c. Culture
The intensity of the threat is strong in this kind of d. Density (either rural or urban)
competitive force in the industry. This can be noticed if
there is the presence of the following factors: 2. Demographic Segmentation – divided based
consumers.
a. The supplier has the ability for forwarding integration. Variable to consider
b. Suppliers in the industry are few, but the sales volume is a. Gender
high. b. Age
c. Income Tips for gathering Data
d. Occupation ➢ Organize collected data as soon as it is available
e. Education ➢ Know what message you want to get across and
f. Religion then collect data that is relevant to the message.
g. Ethnic group ➢ Collect more data
h. Family size ➢ Create more data
➢ Regularly run experiments or collect data
3. Psychological Segmentation- divided in terms of ➢ Challenge your assumptions
customers' thoughts and beliefs. ➢ Set reasonable expectations
Variable to consider. ➢ Take note of interesting or significant data
a. Needs and wants
b. Attitudes Surveys - are the most common way to gather primary
c. Social class research with the use of questionnaires or interview
d. Personality traits schedules.
e. Knowledge and awareness of - Keep it as simple as possible.
f. Brand concept - Make sure it is clearly appealing and easy to read.
g. Lifestyle - Cluster or block-related questions.
- Move from complex questions to more specific
4. Behavioral Segmentation- divided according to questions.
customers' behavior patterns as they interact with a - Make sure questions are concise and easily
company. understood
Variable to consider - Avoid questions that are difficult to answer.
a. Perceptions - Make sure any response scales used are consistent
b. Knowledge with categories that are mutually exclusive.
c. Reaction
d. Benefits Interview - one of the most reliable and credible ways of
e. Loyalty getting relevant information from target customers. It is
f. Responses typically done in person between the
researcher/entrepreneur and a respondent where the
B. Customer Requirements researcher asks pertinent questions that will give
There can be two types of customer requirements: significant pieces of information about the problem that he
1. Service Requirement - Intangible thing or will solve.
product that is not able to be touched but
customers can feel the fulfillment. 1. Personal interviews are the traditional method of
2. Output Requirement - Tangible things or things conducting an interview. It allows the researcher
that can be seen. Characteristic specifications that to establish relationships with potential
a consumer expects to be fulfilled in the product. participants and therefore gain their cooperation.
It generates the highest response rates in survey
C. Market Size research. They also allow the researcher to clarify
Entrepreneurs’ most critical task is to calculate the indefinite answers and when necessary, seek
market size and the potential value that the market has for follow-up information.
their startup business. 2. Telephone interviews are less expensive and less
It is the approximate number of sellers and buyers time-consuming, but the disadvantages are that the
in a particular market. response rate is not as high as the face-to-face
interview, but considerably higher than the mailed
Market Research questionnaire.
DATA COLLECTION is the most valuable tool of
any type of research study. Inaccurate data collection may Focus Group Discussion (FGD) - is an excellent method
cause mistakes and ultimately lead to invalid results. for generating and screening ideas and concepts. It can be
a moderated group interview and brainstorming sessions
that provide information on the user's needs and behaviors.

The following are considerations in the use of focus group


discussions in market research:
- The length of the session is between 90 and 120
minutes.
- Usually, conduct focus groups discussion with 8 to
10 participants per group.
- Assign an expert moderator/facilitator who can
manage group dynamics.
- Use a semi-structure or open-format discussion
- Strive for consistency in the group’s composition

You might also like