You are on page 1of 18

INTERNATIONAL SCHOOL OF BUSINESS AND

MEDIA

MARKETING MANAGEMENT

TOPIC:- HOW TO NAME A BRAND

FACULTY:- PROF. AJAY RAMDASI

GROUP NAME:- “FIFTHGEAR STRATEGISTS”

CLASS SECTION - B
GROUP MEMBERS: -
HARSH SIROHI – N20233036
SOURABH PANDEY – M20231130
ANURAG NAYAK-N20231013
MEGHA MITTAL-M20232122
VEDIKA PUROHIT- N20233043
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to all those who contributed to the successful
completion of this assignment. Their support, insights, and dedication have been invaluable
throughout the entire process.
First and foremost, we extend our deepest appreciation to Prof. Ajay Ramdasi for their invaluable
guidance, support, and mentorship throughout the completion of this marketing assignment. Their
expertise and insights have significantly contributed to my understanding of the subject matter, and I
am truly appreciative of their dedication to fostering our academic growth.
I would also like to extend my thanks to my fellow group members. Our collaborative efforts and
teamwork have played a crucial role in the successful completion of this assignment. The exchange of
ideas and combined efforts have led to a comprehensive and well-rounded submission.
Thank you to all those who contributed, directly or indirectly, to this endeavour. Your collective
efforts have been indispensable, and we are truly grateful for your involvement.

Sincerely,
FIFTHGEAR STRATEGIST

ABSTRACT
FIFTHGEAR STRATEGISTS is a dynamic and innovative brand name that embodies the concept of
taking your business to the next level. Our strategies are designed to propel your business forward,
providing you with the tools and guidance needed to achieve your goals. Whether it's developing a
comprehensive marketing plan, optimising your operations, or enhancing your customer experience,
FIFTHGEAR STRATEGISTS is here to support you every step of the way. Let us help you navigate
the competitive landscape and drive your business towards success.

FifthGear Strategists is a comprehensive consulting firm specialising in providing strategic solutions


and guidance to businesses across various industries. The name "FifthGear" symbolises the idea of
propelling businesses forward, accelerating growth, and achieving peak performance. The core
philosophy of FIFTHGEAR STRATEGISTS is to assist organisations in navigating complex
challenges and reaching their maximum potential by offering tailored strategies and innovative
approaches.

FIFTHGEAR STRATEGISTS is all about turbocharging your business! We offer a range of services
including strategic planning, market research, brand development, and digital marketing. Our team of
experts will work closely with you to understand your unique needs and create tailored strategies that
will give your business the competitive edge. With FIFTHGEAR STRATEGISTS, you can expect
innovative solutions, measurable results, and a partner who is dedicated to your success. Let's shift
into high gear and take your business to new heights!

INTRODUCTION

In today's dynamic and competitive business landscape, brand identity plays a pivotal role in shaping
consumer perceptions and influencing purchasing decisions. Recognizing this significance, our
marketing research Assignment delves into the strategic aspects of brand naming with a focus on the
brand name "FIFTHGEAR STRATEGISTS".
The brand name is often the first point of contact between a company and its target audience,
encapsulating the essence of its offerings, values, and market positioning. Our Assignment aims to
explore the intricacies of brand naming through a comprehensive analysis, leveraging both qualitative
and quantitative research methodologies.
Collaboratively undertaken by a team of five members, this research venture seeks to uncover the
underlying principles and strategies that drive effective brand naming. Our multifaceted team brings
together diverse perspectives and skills, enhancing the depth and breadth of our investigation.
Throughout the course of this Assignment, we will delve into various key areas:

1. Significance of Brand Names: We will examine the importance of brand names in building a
strong identity and fostering consumer loyalty. A well-chosen brand name can resonate with
target audiences, create differentiation, and establish a lasting emotional connection.
2. Consumer Perception and Association: Our research will delve into how consumers
perceive and associate with brand names. We will explore the psychological and emotional
factors that influence consumer preferences and the extent to which a brand name can impact
their purchasing behaviour.
3. Cultural and Linguistic Considerations: Brand naming often extends beyond linguistic
barriers. We will investigate how cultural nuances and linguistic aspects can shape the
appropriateness and effectiveness of a brand name in various markets.
4. Competitive Analysis: A comparative analysis of existing brands within the strategic
consulting sector will be conducted to discern patterns and best practices in brand naming.
This will provide insights into how "FIFTHGEAR STRATEGISTS" can strategically position
itself.
5. Strategies for Effective Brand Naming: Based on our findings, we will propose strategies
and guidelines for crafting an effective brand name. These insights will be applicable not only
to our hypothetical brand but also to businesses seeking to establish a memorable and
impactful brand identity.

As we embark on this research journey, our collective aim is to contribute valuable insights to the
realm of brand naming and strategic marketing. By examining the potential of "FIFTHGEAR
STRATEGISTS" as a case study, we hope to provide actionable recommendations that can assist
businesses in making informed decisions when selecting and crafting brand names.
With a passion for marketing excellence and a commitment to meticulous research, our team of five
members eagerly anticipates the unveiling of the strategic intricacies that lie behind a compelling and
resonant brand name.
Stay tuned for the revelations that lie ahead.

WHAT IS A BRAND NAME?


A brand name is the specific word or combination of words that represents a product, company, or
service. It serves as the primary identifier and helps consumers recognize and differentiate the brand
from others in the market. A well-crafted brand name is memorable, easy to pronounce, and reflects
the brand's values, personality, and positioning. It plays a significant role in creating brand
recognition, building trust, and establishing a strong presence in the minds of consumers. A brand
name can evoke emotions, convey meaning, and leave a lasting impression, contributing to the overall
success and perception of the brand.
HOW TO NAME A BRAND?
Naming a brand is a crucial step in creating a strong and memorable identity.

Define Your Brand: Understand your brand's values, mission, target audience, and unique selling
points. A clear understanding will guide the naming process.

Brainstorm: Gather a team and brainstorm a wide range of ideas. Encourage creativity and don't
dismiss any idea initially – even seemingly unrelated ones could spark inspiration.

Conceptualize: Consider the emotions, messages, and imagery you want the name to convey. It
should resonate with your brand's essence.

Be Memorable: A good brand name is easy to remember and pronounce. Avoid overly complex or
tongue-twisting names.

Reflect Your Brand: The name should reflect your brand's personality, values, and what it stands for.
It should align with your target audience's perception.

Avoid Trends: While it's tempting to use trendy words, they can quickly become outdated. Aim for a
name that will remain relevant over time.
Check Availability: Before falling in love with a name, check for domain name availability and
trademark conflicts. You don't want legal or online presence issues down the road.

Simplicity is Key: Keep the name concise and easy to spell. Avoid long and complex names that
might be hard to remember or type.

Test the Name: Share the potential names with a small group of people from your target audience.
Get feedback on how they perceive the name and if it resonates with them.

Cultural Sensitivity: Ensure the name doesn't have any negative connotations or cultural
misunderstandings in your target markets.

Scalability: Consider if the name will still make sense as your brand grows and potentially expands
into new markets or product lines.

Domain and Social Media Handles: Check if the desired domain name and social media handles are
available. Consistency across online platforms is important.

Legal Considerations: Consult legal experts to ensure the name isn't trademarked by someone else.
It's important to avoid legal disputes.

Visual Appeal: Imagine how the name will look in various fonts and styles. Does it have visual
appeal and flexibility for logos and branding?
Get Feedback: Once you've narrowed down your options, seek feedback from a diverse group of
people, including colleagues, potential customers, and industry peers.

Trust Your Instincts: Ultimately, go with a name that resonates and aligns with a brand vision. Trust
your instincts while considering feedback and research.

Here are some ways how strategies helps in marketing:


1. Understanding Customer Behaviour
Marketing professionals may monitor customer interactions, behaviour, and preferences
across a variety of channels thanks to analytics technologies. This information aids in
comprehending what consumers want, their problems, and how they interact with brands.

2. Targeting and segmentation:


By examining consumer data, marketers can divide their target market into several groups
according to their demographics, interests, and behaviours. This segmentation enables
individualised and targeted marketing campaigns, which boost client satisfaction and
conversion rates.

3. Measuring Campaign Effectiveness:


Analytics helps marketers evaluate the success of their marketing campaigns. By tracking key
performance indicators (KPIs) such as click-through rates, conversion rates, and return on
investment (ROI), they can determine which campaigns are effective and which ones need
improvement.

4. Optimising Marketing Strategies:


With analytics, marketers can A/B test different marketing elements like ad copies, landing
pages, and call-to-action buttons. This data-driven approach helps in optimising marketing
strategies for better results.

Why FIFTHGEAR STRATEGISTS?


The article “Business Strategy and Cybersecurity Breaches” is Written by Li, Tianpei & Walton,
Stephanie
The name ‘FIFTHGEAR STRATEGIST’ has been chosen for our group to convey the idea of a new
and innovative way of thinking or approaching things. It suggests a shift in perspective or a change in
the conventional way of doing things, which might align with the goals or values of our group. It's
also a term that can be interpreted in various ways, allowing for flexibility and creativity in how our
group is perceived.
"FIFTHGEAR STRATEGISTS" is a brand name that evokes a sense of speed, precision, and forward
momentum. Just as a vehicle shifts into FIFTHGEAR for optimal performance, our brand signifies a
strategic approach that propels businesses toward their goals with agility and efficiency. Here's a
breakdown of why "FIFTHGEAR STRATEGISTS" was chosen:
 Dynamic Energy: The term "FIFTHGEAR" suggests a higher level of energy and
acceleration. It symbolises progress, innovation, and an unwavering drive to achieve
exceptional results. This energy is reflected in our strategic approach to helping businesses
thrive in competitive landscapes.

 Strategic Excellence: The term "Strategists" underscores our core competency in strategic
planning and consulting. It communicates our role as experts who guide businesses through
complex challenges, enabling them to make informed decisions and navigate their journeys
effectively.

 Memorability: The combination of "FIFTHGEAR" and "Strategists" creates a distinctive and
memorable brand name. It's a fusion of action and intellect, making it easy for clients and
stakeholders to remember and associate with our services.
 Market Positioning: The brand name positions us as leaders in strategic thinking and
execution. It conveys that we operate at the highest level of proficiency, delivering solutions
that are both innovative and results-oriented.

 Metaphorical Depth: The concept of gears shifting to higher levels serves as a metaphor for
growth and advancement. This imagery aligns with our commitment to propelling businesses
forward, optimising their potential at every stage.

 Versatility: "FIFTHGEAR STRATEGISTS" has a versatile quality that accommodates a
wide range of industries and sectors. Whether it's finance, technology, healthcare, or any
other field, the brand name resonates with the pursuit of excellence and progress.

 Visual Potential: The brand name can inspire creative and visually impactful branding
elements. The idea of gears in motion can be translated into a compelling logo and visual
identity, reinforcing the brand's essence.

LITERATURE REVIEW AND STRATEGIES AND CYBERSECURITY

ABSTRACTS

This study examines whether a firm's business strategy is an underlying determinant of cybersecurity
breach likelihood. Based on organisational theory, firm strategy can focus on innovation or efficiency,
with innovative strategy firms being more likely to have weaker, decentralised control systems,
multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the
Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is
associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it
is unclear whether strategic IT policy formation is impounded into a firm's strategy or can be
impacted by individual executives and non strategy firm characteristics. We find that IT
understanding at the executive or firm level can affect the relationship between strategy and breach
likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating
firms' cybersecurity activities.

I. INTRODUCTION

A firm's business strategy guides a firm's operations and approach to technological changes ([24],
[25]). Cybersecurity is essential to a firm's strategy ([44]). As part of a firm's strategy, cybersecurity
activities can assist in not only reducing operational risks, but also enabling growth through agile
decisions that promote innovation and customer trust ([41]). However, it is unclear whether strategy,
as a firm-level characteristic reflecting an accumulation of firm decisions that typically persist beyond
individual actions ([45], [46]; [10]), impacts cybersecurity risks. Cybersecurity breaches reflect a
nonfinancial reporting outcome with significant economic consequences, with U.S. breaches having
the highest global per event cost of $9.05 million, taking an average of 287 days to identify and
contain ([50]). To a threat actor, a firm could appear as a better breach target than other firms due to
its strategy, which provides idiosyncratic information about a firm. As such, we examine the
following research question: Does a firm's strategy affect cybersecurity breach risk?

A move toward greater remote work and increasing customer and client concern surrounding digital
security underscores the importance of cybersecurity processes in keeping a firm's operations running
smoothly ([44]). Further, breaches can impact all firms. For instance, Robinhood, a stock trading and
investing application, recently disclosed a third-party breach affecting 7 million user records,
including personal information, such as email address, name, date of birth, and zip code ([53]).

Although Robinhood is an innovative, technology-focused firm, it still faced a breach. Strategy


affords an opportunity to investigate differences between firms incremental to financial reporting risk,
firm size, complexity, or other risk-based measures ([ 8]). In turn, strategy enables us to examine a
potential breach determinant distinct from component risk, executive characteristics, and firm
characteristics used to broadly classify firms previously investigated in cybersecurity research ([17];
[63]; [ 4]).
Of the three viable business strategies described by [45], [46]—prospector, analyzer, and defender—
firms with a prospector strategy seek to identify and exploit new products and market opportunities,
whereas firms with a defender strategy have an efficiency focus.[ 1] Analyzer firms share
characteristics with both prospectors and defenders. Although research based in organisational theory
broadly characterises prospectors as having greater organisational risk than other firms, such studies
focus on financial reporting and related disclosures

Within a cybersecurity setting, prospectors' focus on technological flexibility could result in these
firms being more likely to invest in cybersecurity-promoting technologies than other firms, reducing
breach risk. Likewise, defenders could be more attractive breach targets than other firms, as there is a
history of organisational stability and profitability, increasing breach risk. However, such factors may
not be influential enough to mitigate the duality between strategy and organisational risk. Prospector
firms' lack of lengthy technological commitments and decentralised control systems can promote
organisational instability, as through internal control material weaknesses ([45], [46]; [ 8]; [ 9]),
potentially increasing breach risk. Similarly, defender firms could have greater capabilities of
defending against breach attempts, reducing the likelihood of a successful breach. As such, although
all firms need to manage breach risk, we argue that prospector strategy firms face greater breach
likelihood than other firms.

As a firm's business strategy typically reflects persistent firm decisions, it is also unclear the extent to
which information technology (IT) awareness at the executive or firm level could impact the
relationship between strategy and breach likelihood. Based on organisational theory, distinct
differences in the approach to products and markets, control systems, technology use, and
organisational structure could result in IT savviness providing an additional benefit for prospector
strategy firms compared to defender firms ([45], [46]). At the executive level, CEOs and Chief
Financial Officers (CFOs) with greater IT expertise could be more apt at navigating the changing
cybersecurity landscape, resulting in reduced breach risk ([21]), regardless of the firm's strategy. We
further examine the extent to which other firm characteristics focusing on IT understanding, including
the presence of a Chief Information Officer (CIO), having a technology committee on the board of
directors, and operating in an IT-focused industry, affect the relationship between strategy and breach
likelihood. Affecting IT governance, such characteristics could assist a firm in navigating
cybersecurity risk originating due to both operational decisions and threat actors. In turn, there could
be a lower breach likelihood for prospector firms. However, the typically persistent nature of strategy
could overwhelm any individual executive or firm characteristic that could mitigate breach risk,
resulting in little change to breach likelihood.
We use a comprehensive measure of organisational business strategy that is generalizable across
industries from [ 8] to capture firm business strategy. To investigate the relationship between strategy
and breaches, we use a sample of 34,308 firm-year observations from 2005 to 2019, including 3,622
prospector firm-year observations and 1,283 defender firm-year observations. Based on organisational
theory and prior business strategy empirical research, we expect and find that prospector firms have
higher breach likelihood than defender firms. We find evidence that prospectors are associated with
greater breach likelihood using both discrete and dichotomous strategy measures. Results are robust to
entropy balancing at the first and second moments. Our results suggest that strategy can uniquely
impact breach risk, with prospector firms more likely to face a breach than other analyzer and
defender firms.

We also find that the positive association between strategy and breach likelihood is impacted by IT
awareness at the executive and firm levels. Our results suggest that executive IT experience can assist
in mitigating an increase in breach risk due to having a prospector strategy. Further, we find that at the
firm level, greater IT savviness, either through having a technology committee on the board or
operating in an IT-intensive industry, can assist in alleviating an increase in breach likelihood for
firms with a prospector business strategy. Additional investigation suggests that the relationship
between strategy and breach likelihood is exacerbated by external pressures attributable to
diversification. At the executive level, CEO turnover also provides insight into the future breach
likelihood, as there could be new policies put into place with a new executive. In the year of CEO
change strategy does not appear to impact breach risk; however, breach risk is greater for prospector
firms if there is no turnover.

We make several contributions to the literature. First, we extend organisational theory within the
accounting literature by examining the relationship between the business strategy and an outcome,
breaches, that goes beyond clear financial reporting outcomes. Although breaches can have negative
economic costs that affect operations, financial reporting decisions, disclosures, and external
stakeholder perceptions ([63]), it is ultimately a nonfinancial outcome. Second, we add to the breach
literature by identifying strategy as a distinct breach determinant. The breach determinants literature
has focused on disclosure issues, such as industry ([ 4]) and proprietary information ([17]). Although
these studies provide important insights, they broadly categorise firms and do not capture potentially
useful firm-level information pertaining to breach risk. Third, we find that executive and firm IT
understanding can disrupt the relationship between strategy and breach likelihood, answering a call
for research from [63]. Since strategy largely persists across time and executives, our results indicate
that firms can at least partially address cybersecurity risk beyond a firm's overall strategic focus on
innovation or efficiency.

Practically, our study provides useful information to stakeholders, including investors, boards of
directors, auditors, and regulators. We provide information to investors interested in understanding a
firm's cybersecurity risk exposure by investigating the role of firm business strategy. A firm may
appear to a threat actor as a better breach target than other firms due to their strategy, increasing
investor exposure to cybersecurity risk. Although we do not recommend altering a firm's strategy,
boards can benefit from understanding their firms' overall cybersecurity risk and what actions can be
taken at the firm or executive level, such as increasing IT awareness, to reduce breach likelihood.
Auditors, who price breach risk into audit fees ([58]) and who levy higher fees to prospector strategy
firms ([ 8]) could also adjust their audit fee premium after considering the joint relationship between
their clients' strategy and breach risk. Firms with a prospector strategy could further benefit from
additional regulator guidance on cybersecurity risk disclosures, possibly including risk-management
strategies (e.g., [ 1], [ 2]). Increasing interest in cybersecurity activities, including the establishment of
a cybersecurity bureau in the U.S. State Department to deal with evolving challenges ([62]),
underscores the rising importance of cybersecurity risk to national security.
The remainder of the study is as follows. Section II reviews the related literature and develops our
hypotheses. Section III describes our research design, while Section IV describes the results. Section
V concludes.

Business Strategy and Organisational Theory

Organisational theory assists in categorising firms and their associated business risks to develop a
better understanding of business strategy. [39] note that strategy influences operating complexity,
information asymmetry, environmental uncertainty, organisational structure, and product and market
mix. Reflecting how firms compete in their market environments, business strategy is a construct
distinct from piecemeal components of risk or other firm characteristics.

Therefore, business strategy affords an opportunity to examine a potential breach determinant distinct
from component risk, executive, and firm characteristics previously investigated in cybersecurity
research. [25], 6) argues that "the key dimension underlying the [strategy] typology is the rate at
which an organisation changes its products and markets." Strategy is not subject to sudden changes.
Rather, smaller incremental changes can occur relative to each viable strategy.

We follow the [45], [46] strategy typology with three viable business strategies along a continuum:
defenders, analyzers, and prospectors. Prospector strategy firms rapidly change their product market
risk using an innovation focus to be a market leader. Defender strategy firms, conversely, have a
narrow and stable product mix and have an efficiency focus. Analyzer strategy firms share aspects of
both prospectors and defenders.

Prospector strategy firms are innovative firms that seek to identify and exploit new products and
market opportunities ([45], [46]). These firms are thus more reliant on research and development
activities than other firms. Innovation can also be achieved by using multiple technologies. Although
innovative prospectors may invest in multiple technologies, the investments are flexible, enabling
firms to change rapidly. However, flexible investments do not promote efficiency.
Avoiding lengthy technology commitments further results in a low degree of mechanisation or
routinization that leverages the knowledge and skills of employees. Such diverse operations, in turn,
rely on decentralised control systems, which, coupled with fewer routines, could weaken internal
control processes (e.g., [ 9]). As such, there is generally greater organisational instability and
organisational risk than defender and analyzer firms.

Conversely, defender strategy firms maintain a narrow and stable product focus to compete on the
basis of price, service, or quality ([45], [46]). Defenders are focused on efficiency in the production
and distribution of goods and services. A narrow market focus through thoughtful and incremental
growth protects the finance and production functions. A defender strategy requires large technology
investments to improve mechanisation and routinization based on the knowledge and skills of
employees, including cost-efficient technology and continuous improvement. Unlike prospectors,
defenders require strict centralised control systems to ensure improved efficiency. Collectively, there
is greater organisational stability, gradual growth, consistent profitability, and less organisational risk
stemming from calculated decision making than prospector and analyzer firms ([ 9]).

Within accounting and management literatures, business strategy has been used to examine financial
reporting-related items, including accounting control systems ([57]), CEO bonus contracts ([34]),
budgetary use ([14]), accounting irregularities and auditor effort ([ 8]), and tax aggressiveness ([27]).
Additionally, strategy is a significant incremental predictor of internal control material weaknesses,
with prospector firms more likely to report a material weakness than other firms ([ 9]). Greater
organisational risk stemming from a prospector strategy also appears to affect financial reporting
disclosure decisions, including greater accounting conservatism ([30]) and less readable 10-K reports
with more negative and uncertainty tones than defender firms ([39]). Importantly, [ 8] find that
strategy as a composite measure is more than the sum of its parts. That is, business strategy provides
insights into firm operations incremental to financial reporting risk, firm size, complexity, or other
risk-based measures. [ 8] also note that the increase in prospector client audit fees relative to other
firms is not enough to fully mitigate underlying client riskiness. The results suggest that external
factors used to mitigate risk, such as increased auditor effort, may not be enough to counter client risk
attributable to strategy.

Although the extant strategy literature finds that strategy reflects a unique facet of business risk, with
prospector strategy firms having greater inherent risk than defender firms, nonfinancial outcomes
have not been investigated. Ex ante, it is unclear whether the relationship between strategy and
organisational risk will persist when examining breaches. As a part of a firm's activities, cybersecurity
needs to be embedded throughout the business ecosystem ([41]). Within a cybersecurity setting,
strategy can possibly delineate firms that are more likely to face a breach than other firms. Compared
to other firms, prospectors invest in multiple technologies, increasing the likelihood of investing in
technology that promotes a firm's cybersecurity activities. Additional attention to cybersecurity
activities could lower the likelihood of a successful breach. Further, prospectors report higher audit
fees, which could not only reflect greater auditor response to organisational risk ([ 8]), but also
additional attention to cybersecurity ([38]), which could lower cybersecurity risk. Defenders, in
contrast, are more established firms with a history of profitability ([45], [46]), increasing a firm's
financial attractiveness to a threat actor as a breach target. Similarly, defender firms report more
litigious tone language in their 10-K reports than other firms ([39]), reflecting greater external risk.

Nevertheless, such actions may not be enough to counter the overarching relationship between
strategy and organisational risk. For instance, prospector reliance on novel, multiple technologies is
associated with a greater likelihood of reporting an internal control material weakness ([ 9]). Such use
of multiple technologies could also result in superficial investments compared to analyzer and
defender firms, increasing breach likelihood, as [ 3] find that only substantial IT investments are
associated with a reduction in breach risk.

Comparatively, the centralised control systems, routinization, deep technology investments, and
cautious growth actions undertaken by defender firms could reduce cybersecurity risk exposure,
despite the firms being perceived as lucrative breach targets. Compared to defender and analyzer
firms, greater use of uncertainty reporting language by prospector firms could reflect rapid changes, a
less-detailed cybersecurity strategy, and fewer substantive cybersecurity investments. In turn,
organisational instability could negatively affect a firm's overall IT governance focus.
As such, prospector strategy firms could have greater cybersecurity risk than both analyzer and
defender firms.

Organisational risk differences can manifest in prospector firms facing greater breach risk than other
firms, even though individual actions could affect cybersecurity activities. Therefore, our first
hypothesis predicts a positive relationship between prospector business strategy and cybersecurity
breach likelihood

FIFTHGEAR STRATEGISTS BY WHICH STRATEGIST HELPS


BUSINESS TO GROW
Mergers and Acquisitions (M&A): Look for new companies that can grow or supplement your
current product line. You can acquire access to new markets, technology, clientele, and skills by
acquiring or combining with these companies. To ensure success, M&A activities need
comprehensive due diligence and integration strategy.
Strategic Alliances and Partnerships: Work together with other businesses to take use of their
assets and strengths. Partnerships can result in merged product offerings, common distribution
networks, and cooperative marketing initiatives, giving both parties easier access to new markets and
consumers.

Franchising or licensing your brand and operations to entrepreneurs who want to launch their own
firms if your company model is replicable and scalable. This enables you to grow quickly with little
financial input, while profiting from continuous royalties and franchise/licence payments.

Global Expansion: Look for ways to expand your company into foreign markets. This may entail
exporting your goods, forming partnerships locally, or establishing subsidiaries abroad. It might be
difficult to adapt your company to other cultures and laws, so careful market research and planning
are crucial.

Adopt cutting-edge technology to improve your goods, services, and business processes, such as
blockchain, artificial intelligence, and the Internet of Things (IoT). Technological progress can
provide businesses a competitive edge, increase productivity, and develop new revenue streams.

METHODOLOGY FOR FIFTHGEAR STRATEGIST

Authors: Pueo, Marcos1 (AUTHOR) mpueo@unizar.es


Santolaria, Jorge2 (AUTHOR)
Acero, Raquel2 (AUTHOR)
Sierra-Pérez, Jorge2 (AUTHOR)

Source: International Journal of Production Research. Jul2020, Vol. 58 Issue 14,


p4306-4324. 19p. 5 Colour Photographs, 10 Diagrams.

Document Type: Article

Subject Terms: *Small business


*Teams in the workplace

Abstract: Investment in the productive systems of small and medium-sized enterprises (SMEs) in the
manufacturing sector is usually quite limited.

For this reason, normal practice is to apply minor developments internally or upgrade equipment as it becomes
obsolete to increase their productive capacity and competitiveness at a lower cost.

However, the work team, mostly made up of engineers, does not usually have experience in the use of design
methodologies but also they are often familiar with the functioning of various design and quality-management
tools.
This paper presents a clear and simple design methodology that facilitates the development of adaptations to
items of equipment that might be considered one-off products. It includes a selection of design tools that are,
according to the literature on the subject, the most common and best-known among engineers, and which are
also best-suited to the environment of an SME.

The design methodology was validated experimentally with the upgrading of a gear-rolling tester installed on
the premises of an SME in the sector. The recommended techniques and tools were satisfactory applied opening
the possibilities for further application of the methodology in similar machine's upgrades in the future

Use of design methodologies

Design methodologies have a large positive impact on product-development processes, helping designers to
make better decisions (Yeh, Pai, and Yang [45]). Results from these design processes not only depend on the
designer's experience of handling tools and techniques (Lutters et al. [27]), but also on the ability to select these
elements (Booker [ 6]). Part of the industry is now aware of the benefits offered by design methodologies,
although their implementation is still limited (Jagtap et al. [23]), especially in the case of SMEs.
They typically tend to employ approaches to design that are unstructured with a lack of systematic engineering
methods, as they are normally developed in-house (Gherardini, Renzi, and Leali [17]). This is as a consequence
of a hierarchy that usually bases decision-making on subjective factors (Kirkham et al. [25]), coupled with the
uneven time-management and deployment of human resources that results from an excess of day-to-day tasks.
Lack of resources (mainly economic) is presented as the main cause of different levels of success in the
application of engineering methods among SMEs and large-sized enterprises respectively (Blackwell, Shehab,
and Kay [ 5]; Marriott et al. [29]). Adapting the development of new design methodologies to requirements of a
particular company or its area of activity might, therefore, improve its implementation (Booker [ 6]).

Methodology

The choice of the most appropriate design methodology depends on the application and the ability and
experience of the designer (Tomiyama et al. [37]). The selection of tools is a difficult task that requires decision-
making skills similar to those of the development process itself. The key aspects are the quality of the final
product and the time and cost invested (Lutters et al. [27]). Finding a balance between these three factors is not
easy, especially in an SME environment. The engineers in charge of retrofits in SMEs usually have certain
technical knowledge on the tools but they are not expert in product-design processes

The proposed methodology follows a systematic approach based mainly on the design phases proposed by Pahl
and Beitz (Pahl et al. [31]), thereby following certain guidelines of VDI 2221 ([41]). Furthermore, it covers
other phrases similar to those proposed in VDI 2206 ([42]) from initial consideration to the final validation of
mechatronic systems. It also includes practical considerations and tools recommended by Ullman in mechanical
design processes (Ullman [38]), as well as some general design principles (Pahl et al. [31]) to obtain a more
robust design (Ebro and Howard [10]).

Planning

This phase aims to determine those technical requirements to be incorporated into the company's manufacturing
system, based on the identified needs and the market situation. We therefore need to plan the following stages:

General planning

The first step is to plan how to develop the process as a whole, including high-level planning of activities and
resources, and the scheduling of the remaining phases, using a Work Breakdown Structure (WBS) and a Gantt
chart (Barczak, Griffin, and Kahn [ 4]). Planning involves all departments who have to contribute with their
knowledge and experience. This phase also includes the planning of the quality-related activities required for
development of the retrofit, using Advanced Project Quality Planning (APQP).

Needs identification
This stage identifies the needs and possible shortcomings of production systems, involving the improvement of
existing processes or the anticipation of future demands. Joint meetings between different departments are
required to incorporate different points of view (Barczak, Griffin, and Kahn [ 4]). Pahl et al. ([31], chap. 3)
supply a series of key guidelines for carrying this out correctly.

Market research
Market research allows us to evaluate any technical and commercial solutions that might be available, and to
assess the investment required. Benchmarking is a rich source of ideas for the design of products and processes
alike (Ulrich and Eppinger [39]). It lets users in all manner of sectors take advantage of knowledge generated by
other companies analysing and improving in-house resources (Thevenot and Simpson [36]). Furthermore, if in-
house development is proposed, there is a need to examine patents so as to avoid intellectual-property disputes
during new-product development.

Requirements definition
The final stage has to link the identified needs to engineering specifications. This could be performed (using a
QFD) tool that takes into account the customer satisfaction, the design times and costs involved (Ullman [38],
chap. 6). Designers with less experience are however recommended to apply the improvements proposed by
Leary and Burvill ([26]) to avoid any loss of effectiveness. The result is a list of vital 'minimum' requirements
and 'desirable' alternative requirements of the product. Internal retrofits are normally more flexible in this
respect, and certain requirements can be modified if development is affected by some limiting factor

DISCUSSION AND CONCLUSION

Discussion:
FIFTHGEAR STRATEGISTS for Business Growth. In the realm of business growth, there comes a
point when conventional strategies may not suffice to achieve the desired expansion and success. This
is where "FIFTHGEAR" strategies come into play. These advanced and often audacious approaches
can catalyse rapid growth, open new avenues, and position a company as an industry leader. In this
discussion, we have explored the factors influencing the adoption and execution of these strategies.
One of the prominent drivers behind pursuing FIFTHGEAR STRATEGISTS is the dynamic nature of
markets. As industries evolve and consumer demands shift,
businesses must remain agile and responsive. "FIFTHGEAR" strategies enable companies to leverage
emerging trends, technologies, and opportunities that may not be accessible through traditional
methods. This adaptability is crucial, especially in today's fast-paced and highly competitive business
landscape.
However, it's important to acknowledge that while FIFTHGEAR STRATEGISTS hold great promise,
they are not without challenges. The high level of risk associated with these approaches demands
meticulous planning, careful risk assessment, and contingency strategies. Market uncertainties,
regulatory hurdles, and unexpected disruptions can impact the trajectory of growth initiatives.

CONCLUSION:
In conclusion, FIFTHGEAR STRATEGISTS represent a proactive and enterprising approach to
business growth. They epitomise the spirit of pushing boundaries, daring to dream big, and carving a
distinctive path in the business world. By carefully assessing the factors influencing their execution
and pursuing them with strategic foresight, companies can set themselves on a trajectory of sustained
and remarkable growth.

Acknowledgements
The authors thank the anonymous reviewers for much useful input.

References
American Institute of Certified Public Accountants (AICPA). 2017a. AICPA Unveils Cybersecurity
Risk Management Reporting Framework. Durham, NC:AICPA.
https://www.aicpa.org/press/pressreleases/2017/aicpa-unveils-cybersecurity-risk-management-
reporting-framework.html
American Institute of Certified Public Accountants (AICPA). 2017b. Description Criteria for
Management's Description of an Entity's Cybersecurity Risk Management Program. New York, NY:
AICPA.
Angst, C. M., E. S.Block, J.D'Arcy, and K.Kelley. 2017. When do IT security investments matter?
Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS
Quarterly. 41 (3): 893–916. https://doi.org/10.25300/MISQ/2017/41.3.10
Ashraf, M. 2022. The role of peer events in corporate governance: Evidence from data breaches. The
Accounting Review. 97 (2): 1–24. https://doi.org/10.2308/TAR-2019-1033
Balsam, S., G. D.Fernando, and A.Tripathy. 2011. The impact of firm strategy on performance
measures used in executive compensation. Journal of Business Research. 64 (2): 187–193.
https://doi.org/10.1016/j.jbusres.2010.01.006
Banker, R. D., and C. Q.Feng. 2019. The impact of information security breach incidents on CIO
turnover. Journal of Information Systems. 33 (3): 309–329. https://doi.org/10.2308/isys-52532
Benaroch, M., and A.Chernobai. 2017. Operational IT failures, IT value-destruction, and board-level
IT governance changes. MIS Quarterly. 41 (3): 729–762.
https://doi.org/10.25300/MISQ/2017/41.3.04
Brown, S. V., X. S.Tian, and J. W.Tucker. 2018. The spillover effect of SEC comment letters on
qualitative corporate disclosure: Evidence from the risk factor disclosure. Contemporary Accounting
Research. 35 (2): 622–656. https://doi.org/10.1111/1911-3846.12414
Chai, S., M.Kim, and H. R.Rao. 2011. Firms' information security investment decisions: Stock market
evidence of investors' behaviour. Decision Support Systems. 50 (4): 651–661.
https://doi.org/10.1016/j.dss.2010.08.017
Dehning, B., V. J.Richardson, and R. W.Zmud. 2003. The value relevance of announcements of
transformational information technology investments. MIS Quarterly. 27 (4): 637–656.
https://doi.org/10.2307/30036551
Eulerich, A. K., M.Eulerich, and B.Fligge. 2023. Analysing the strategy-performance relationship in
Germany–Can we still use the common strategic frameworks?Journal of Strategy and Management
(forthcoming). https://doi.org/10.1108/JSMA-09-2022-0157
Ettredge, M., F.Guo, and Y.Li. 2018. Trade secrets and cyber security breaches. Journal of
Accounting and Public Policy. 37 (6): 564–585. https://doi.org/10.1016/j.jaccpubpol.2018.10.006
Feng, C. Q., and T.Wang. 2018. Does CIO risk appetite matter? Evidence from information security
breach incidents. International Journal of Accounting Information Systems. 32: 59–75.
https://doi.org/10.1016/j.accinf.2018.11.001
Gao, X., W.Zhong, and S.Mei. 2015. Security investment and information sharing under an
alternative security breach probability function. Information Systems Frontiers. 17 (2): 423–438.
https://doi.org/10.1007/s10796-013-9411-3
Hainmueller, J. 2012. Entropy balancing for causal effects: A multivariate reweighting method to
produce balanced samples in observational studies. Political Analysis. 20 (1): 25–46.
https://doi.org/10.1093/pan/mpr025
Administrative Science Quarterly. 26 (2): 253–275. https://doi.org/10.2307/2392472
Hambrick, D. C. 1983. Some tests of the effectiveness and functional attributes of Miles and Snow's
strategic types. The Academy of Management Journal. 26 (1): 5–26. https://doi.org/10.2307/256132
He, C. Z., T.Frost, and R. E.Pinsker. 2020. The impact of reported cybersecurity breaches on firm
innovation. Journal of Information Systems. 34 (2): 187–209. https://doi.org/10.2308/isys-18-053
Higgins, D., T. C.Omer, and J. D.Phillips. 2015. The influence of a firm's business strategy on its tax
aggressiveness. Contemporary Accounting Research. 32 (2): 674–702. https://doi.org/10.1111/1911-
3846.12087
Higgs, J. L., R. E.Pinsker, T. J.Smith, and G. R.Young. 2016. The relationship between board-level
technology committees and reported security breaches. Journal of Information Systems. 30 (3): 79–
98. https://doi.org/10.2308/isys-51402
Hoberg, G., G.Phillips, and N.Prabhala. 2014. Product market threats, payouts, and financial
flexibility. The Journal of Finance. 69 (1): 293–324. https://doi.org/10.1111/jofi.12050
Hsieh, C.-C., Z.Ma, and K. E.Novoselov. 2018. Accounting conservatism, business strategy, and
ambiguity. Accounting, Organizations and Society. 74: 41–55.
https://doi.org/10.1016/j.aos.2018.08.001
Huang, H. H., and C.Wang. 2021. Do banks price firms' data breaches?. The Accounting Review. 96
(3): 261–286. https://doi.org/10.2308/TAR-2018-0643
https://www.jstor.org/stable/248554
Jarvenpaa, S. L., and B.Ives. 1991. Executive involvement and participation in the management of
information technology. MIS Quarterly. 15 (2): 205–227. https://doi.org/10.2307/249382
Kwon, J., J. R.Ulmer, and T.Wang. 2013. The association between top management involvement and
compensation and information security breaches. Journal of Information Systems. 27 (1): 219–236.
https://doi.org/10.2308/isys-50339
Lawrence, A., M.Minutti-Meza, and D.Vyas. 2018. Is operational control risk informative of financial
reporting deficiencies?. Auditing: A Journal of Practice & Theory. 37 (1): 139–165.
https://doi.org/10.2308/ajpt-51784
Li, H., W. G.No, and J. E.Boritz. 2020. Are external auditors concerned about cyber incidents?
Evidence from audit fees. Auditing: A Journal of Practice & Theory. 39 (1): 151–171.
https://doi.org/10.2308/ajpt-52593
Lim, E. K., K.Chalmers, and D.Hanlon. 2018. The influence of business strategy on annual report
readability. Journal of Accounting and Public Policy. 37 (1): 65–81.
https://doi.org/10.1016/j.jaccpubpol.2018.01.003
March, J. G. 1991. Exploration and exploitation in organisational learning. Organization Science. 2
(1): 71–87. https://doi.org/10.1287/orsc.2.1.71
Martin, D. X. 2021. Cybersecurity as a business strategy. Corporate Board Member.
https://boardmember.com/cybersecurity-as-a-business-strategy/
Masli, A., V.Richardson, M. W.Watson, and R. W.Zmud. 2016. Senior executives' IT management
responsibilities: Serious IT-related deficiencies and CEO/CFO turnover. MIS Quarterly. 40 (3): 687–
708. https://doi.org/10.25300/MISQ/2016/40.3.08
McMullin, J. L., and B.Schonberger. 2020. Entropy-balanced accruals. Review of Accounting
Studies. 25: 84–119. https://doi.org/10.1007/s11142-019-09525-9
Melika, J. 2021. Cybersecurity is now essential to corporate strategy. Here's how to bring the two
together. Entrepreneur (May 22). https://www.entrepreneur.com/article/369618
Miles, R. E., and C. C.Snow. 1978. Organisational Strategy, Structure and Process. New York, NY:
McGraw-Hill.
https://www.ibm.com/downloads/cas/OJDVQGRY
Porter, M. E. 1980. Competitive Advantage. New York, NY: Free Press.
Richardson, V. J., R. E.Smith, and M. W.Watson. 2019. Much ado about nothing: The (lack of)
economic impact of data privacy breaches. Journal of Information Systems. 33 (3): 227–265.
https://doi.org/10.2308/isys-52379
Robinhood. 2021. Robinhood announces data security incident (update).
https://blog.robinhood.com/news/2021/11/8/data-security-incident
Securities and Exchange Commission (SEC). 2011. CF Disclosure Guidance: Topic No. 2:
Cybersecurity. Washington, DC: SEC. https://www.sec.gov/divisions/corpfin/guidance/cfguidance-
topic2.htm
Securities and Exchange Commission (SEC). 2018. Commission Statement and Guidance on Public
Company Cybersecurity Disclosures. Release Nos. 33-10459, 34-82746. Washington, DC: SEC.
https://www.sec.gov/rules/interp/2018/33-10459.pdf
Sen, R., and S.Borle. 2015. Estimating the contextual risk of data breach: An empirical approach.
Journal of Management Information Systems. 32 (2): 314–341.
https://doi.org/10.1080/07421222.2015.1063315
Simons, R. 1987. Accounting control systems and business strategy: An empirical analysis.
Accounting, Organizations and Society. 12 (4): 357–374. https://doi.org/10.1016/0361-
3682(87)90024-9
Smith, T. J., J. L.Higgs, and R. E.Pinsker. 2019. Do auditors price breach risk in their audit fees?.
Journal of Information Systems. 33 (2): 177–204. https://doi.org/10.2308/isys-52241
Tan, H.-T., and Y.Yu. 2018. Management's responsibility acceptance, locus of breach, and investors'
reactions to internal control reports. The Accounting Review. 93 (6): 331–355.
https://doi.org/10.2308/accr-52077
Treacy, M., and F.Wiersema. 1995. The Discipline of Market Leaders: Choose Your Customers,
Narrow Your Focus, Dominate Your Market. Reading, MA: Addison-Wesley.
Vincent, N. E., J. L.Higgs, and R. E.Pinsker. 2017. IT governance and the maturity of IT risk
management practices. Journal of Information Systems. 31 (1): 59–77. https://doi.org/10.2308/isys-
51365
Volz, D. 2021. State department to form new cyber office to face proliferating global challenges. The
Wall Street Journal (October 25). https://www.wsj.com/articles/state-department-to-form-new-cyber-
office-to-face-proliferating-global-challenges-11635176700
37 (6): 489–507. https://doi.org/10.1016/j.jaccpubpol.2018.10.002
Zhao, Q., and D.Percival. 2017. Entropy balancing is doubly robust. Journal of Causal Inference. 5
(1): 20160010. https://doi.org/10.1515/jci-2016-0010
Zubizarreta, J. R. 2015. Stable weights that balance covariates for estimation with incomplete
outcome data. American Statistical Association. 110 (511): 910–922.
https://doi.org/10.1080/01621459.2015.1023805

1 Andersson, P. 1997. " On Robust Design in the Conceptual Design Phase: A Qualitative Approach."
Journal of Engineering Design 8 (1): 75 – 89. doi: 10.1080/09544829708907953.
2 ANSI/AGMA. 1998. " ANSI/AGMA 2111-A98 Cylindrical Wormgearing Tolerance and Inspection
Methods."
3 Arvidsson, Martin, and Ida Gremyr. 2008. " Principles of Robust Design Methodology." Quality
and Reliability Engineering International 24 (1): 23 – 35. doi: 10.1002/qre.864.
4 Barczak, Gloria, Abbie Griffin, and Kenneth B. Kahn. 2009. " Perspective: Trends and Drivers of
Success in NPD Practices: Results of the 2003 PDMA Best Practices Study." Journal of Product
Innovation Management 26 (1): 3 – 23. doi: 10.1111/j.1540-5885.2009.00331.x.
5 Blackwell, Paul, Esam M Shehab, and John M Kay. 2006. " An Effective Decision-Support
Framework for Implementing Enterprise Information Systems Within SMEs." International Journal of
Production Research 44 (17): 3533 – 3552. doi: 10.1080/00207540500525270.
6 Booker, Julian. 2012. " A Survey-Based Methodology for Prioritising the Industrial Implementation
Qualities of Design Tools." Journal of Engineering Design 23 (7): 507 – 525. doi:
10.1080/09544828.2011.624986.
7 Chen, Cheng Liang, Chih Yao Lin, and Jui Yuan Lee. 2013. " Retrofit of Steam Power Plants in a
Petroleum Refinery." Applied Thermal Engineering 61 (1): 7 – 16. doi:
10.1016/j.applthermaleng.2013.04.001.
8 Curtis, Shane K., Stephen P. Harston, and Christopher A. Mattson. 2011. " The Fundamentals of
Barriers to Reverse Engineering and Their Implementation Into Mechanical Components." Research
in Engineering Design 22 (4): 245 – 261. doi:
Ullman, David G. 2010. The Mechanical Design Process. McGraw-Hill Higher Education.
http://highered.mheducation.com/sites/0072975741/index.html.
Ulrich, Karl T., and Steven D. Eppinger. 2012. Product Design and Development. Philadelphia :
McGraw-Hill/Irwin.
Urbanic, R. Jill, and Waguih ElMaraghy. 2009. " A Design Recovery Framework for Mechanical
Components." Journal of Engineering Design 20 (February 2015): 195 – 215. doi:
10.1080/09544820701802261.
VDI. 1993. "VDI 2221 Systematic Approach to the Development and Design of Technical Systems
and Products."
VDI. 2004. "VDI 2206 Design Methodology for Mechatronic Systems."
VDI/VDE. 2001. "VDI/VDE 2608 Tangential Composite and Radial Composite Inspection of
Cylindrical Gears, Bevel Gears, Worm and Worm Wheels."
Yan, Mu Tian, Ming Hung Lee, and Ping Lang Yen. 2005. " Theory and Application of a Combined
Self-tuning Adaptive Control and Cross-Coupling Control in a Retrofit Milling Machine."
Mechatronics 15 (2): 193 – 211. doi: 10.1016/j.mechatronics.2004.07.011.
Yeh, Tsu Ming, Fan Yun Pai, and Ching Chow Yang. 2009. " Performance Improvement in New
Product Development with Effective Tools and Techniques Adoption for High-Tech Industries."
Quality and Quantity 44 (1): 131 – 152. doi: 10.1007/s11135-008-9186-7.

You might also like