Professional Documents
Culture Documents
(2, 5, 6 and 7)
Learning Outcomes and Questions
Explain why competitive advantages are temporary along with the four key areas
of a SWOT analysis.
A competitive advantage is a feature of a product or service on which customers
place a greater value than they do on similar offerings from competitors.
Competitive advantages provide the same product or service either at a lower
price or with additional value that can fetch premium prices. Unfortunately,
competitive advantages are typically temporary because competitors often
quickly seek ways to duplicate them. In turn, organizations must develop a
strategy based on a new competitive advantage. Ways that companies duplicate
competitive advantages include acquiring the new technology, copying business
processes, and hiring away employees.
A SWOT analysis
opportunities, and threats to identify significant influences that work for or
against business strategies. Strengths and weaknesses originate inside an
organization, or internally. Opportunities and threats originate outside an
organization, or externally, and cannot always be anticipated or controlled
time you would not want to gain the insight of a SWOT analysis in business
.
4.
company want to
follow only one?
Porter has identified three generic business strategies for entering a new market:
(1) broad cost leadership
(2) broad differentiation
(3) focused strategy.
Broad strategies reach a large market segment, while focused strategies target a
niche or unique market with either cost leadership or differentiation. Trying to be
all things to all people is a recipe for disaster, since doing so makes it difficult to
project a consistent image to the entire marketplace. For this reason, Porter
suggests adopting only one of the three generic strategies.
satisfaction?
To identify these competitive advantages, Michael Porter created value chain
analysis, which views a firm as a series of business processes that each add value
to the product or service. Value chain analysis is a useful tool for determining how
to create the greatest possible value for customers. The goal of value chain
analysis is to identify processes in which the firm can add value for the customer
and create a competitive advantage for itself, with a cost advantage or product
primary value activities, and support value activities. When performing a value
chain analysis, a firm could survey customers about the extent to which they
believe each activity adds value to the product or service. This step generates
responses the firm can measure to describe how each activity adds (or reduces)
value. Then the competitive advantage decision for the firm is whether to (1)
target high value-adding activities to further enhance their value, (2) target low
value adding activities to increase their value, or (3) perform some combination of
the two.
Describe information security and the difference between hackers and viruses.
Information security is a broad term encompassing the protection of information
from accidental or intentional misuse by persons inside or outside an
organization. Information security is perhaps the most fundamental and critical of
all the technologies/disciplines an organization must have squarely in place to
execute its business strategy. Without solid security processes and procedures,
none of the other technologies can develop business advantages. Understanding
how to secure information systems is critical to keeping downtime to a minimum
and uptime to a maximum. Hackers and viruses are two of the hottest issues
currently facing information security. Hackers are experts in technology who use
their knowledge to break into computers and computer networks, either for
profit or simply for the challenge. A virus is software written with malicious intent
to cause annoyance or damage
As it becomes easier for people to copy everything from words and data to music
and video, the ethical issues surrounding copyright infringement and the violation
of intellectual property rights are consuming the EBusiness world. Technology
poses new challenges for our ethics the principles and standards that guide our
behavior toward other people.
7. What are the positive and negative effects associated with monitoring
employees?
The best path for an organization planning to engage in employee monitoring is
open communication including an employee monitoring policy stating explicitly
how, when, and where the company monitors its employees.
8. What is the relationship between hackers and viruses?
Hackers are experts in technology who use their knowledge to break into
computers and computer networks, either for profit or just motivated by the
challenge. Hackers spread viruses.
Explain the four primary traits that determine the value of information.
Information is data converted into a meaningful and useful context. Information
can tell an organization how its current operations are performing and help it
estimate and strategize about how future operations might perform. It is
important to understand the different levels, formats, and granularities of
information along with the four primary traits that help determine the value of
information, which include
(1) information type: transactional and analytical.
(2) information timeliness.
(3) information quality.
(4) information governance.
Why does a business need to be concerned with the quality of its data?
2.
6. What are the four primary traits that help determine the value of information?
The four primary traits of the value of information include
information type, information timeliness, information quality,and
information governance.
7.What is the difference between an entity and an attribute?
An entity stores information about a person, place, thing,
transaction, or event. An attribute includes the data elements
associated with an entity.
2. How does ETL help transfer data in and out of the data
warehouse?
ETL is a process that extracts the data from different source
systems, then transforms the data (like applying calculations,
concatenations, etc.) and finally loads the data into the Data
Warehouse system. Full form of ETL is Extract, Transform and
Load