Information Technology Positioning Nike Company for Competitive Advantage - Essay Example

Free

Extract of sample
Information Technology Positioning Nike Company for Competitive Advantage

The study focuses on the use of the information technology by the Nike Company and how it provides a competitive advantage for the organization over its competitors.
Background of Nike Company:
The Nike Company came into existence in the year 1971. The company had reached to a leading position in and after 1980. However, the company had lost its position by the mid-1980. Innovative products and marketing strategies brought the company back to its position. In the process, the new tagline called “Just do it” was discovered. During the 1990s, the company proved to be successful in launching its new sports apparel products as well as the campaign programs. Gradually the company has been improving in its delivery of products and by the present times, the company has enhanced both in its products as well as in its marketing and leads the industry of sports apparels (History & Heritage).
The use of Information Technology:
Nike Company is highly benefited by the use of information technology since the planning, development, implementation and maintenance of technology used by the company are managed by the information technology across the world. The focus of the company is in providing its business with all the requirements to perform its sales and marketing of its designed products. ...
Download paper

Summary

Information Technology Positioning Nike Company for Competitive Advantage
Introduction:
The use of information technology (IT) in the modern times can be found to provide huge benefits in the functioning of an organization.
Author : mikayla16
Download 21

Related Essays

Information technology
The areas of responsibility of the IT Manager include but not limited to the IT Project Management, Computer Network and Server Administration, compliance of Information Technology and procedures, Information Security, moreover, the responsibility of automating a company by implementing Enterprise Resource Planning (ERP) including diverse departments (finance, sales & marketing, procurement, operations, inventory etc.) of a company. However, a lead IT Manager can also be responsible for the developing and implementing information technology policy, strategic direction and planning for...
20 pages (5020 words) Term Paper
Competitive use of technology
For attaining these purpose organizations across the globe are bringing innovations by effectively using new technology and enhancing the role of information system (IS) and information technology (IT) (Stair, and Reynolds, 2009). Furthermore these information system and information technologies are being used as a weapon to gain competitive advantage over the rivals (Avlonitis, and Karayanni, 2000). Conventionally businesses used to practice and use IT and IS systems specifically for data processing but things got change as various innovations came forward. With the advent and rapid growth of...
14 pages (3514 words) Essay
Technology of Information Security
As technological advancement keeps coming, several reliable cryptography methods are continuing to emerge. Data encryption has a number of advantages and disadvantages. Its disadvantages come mainly because the technology is sometimes not used as required. Cryptography is a very powerful and important technology that can be used to protect information sent to emails and all financial based transactions. Information needs to be shared in order to make various decisions that govern various activities. For this reason, information should be as confidential as possible for sustainability and...
3 pages (753 words) Essay
Information Technology
The researcher also studies the prognosis for future employment and advancement opportunities for people related to the field of information technology. The results of the research showed that information technology is an ever-growing professional field which has increased the demand of IT professionals all over the world. Information Technology Information technology is one of the most progressive professional fields of the present world. It mainly refers to the use of computer systems and networks for storing, processing, and retrieving data or information required to run different business...
4 pages (1004 words) Research Paper
Strategic Information Technology Management
This essay stresses that mobile phones are advanced means of communication and through this device a person can send a message to another person having this device and communicate by making calls. You can take your phone with you whereever you want to go. There are many other devices or ways of communication for delivering information from one place or person to another place or person. With the extended access to information and communication technologies, people are encouraged to use these technologies. The information and communication technology sector is the main source for low income...
8 pages (2008 words) Essay
Information Technology 1-4D
This paper will serve to address four separate questions in regards to technology and modern society, with a careful look into how the use of technology is reflected in our day to day lives. Keywords: technology, day to day lives, Web 2.0, Mark Kennedy, data mining, data collection, decision making process, change, change management, organizational skills, management Information Systems D1-4 1. Mark Kennedy said, “All of the biggest technological inventions created by man – the airplane, the automobile, the computer – say a little about his intelligence, but speak volumes about his...
5 pages (1255 words) Essay
Information technology ethics
On the other hand the biggest pessimistic use of a computer is for crime purposes. As people make use of the computers they typically think that their activities are confidential and also their personal information is protected. For instance, web sites of business nature often gather details from many visitors; later on many web sites sell these personal details against the desires of the visitors (Turban, Rainer and Potter; NCSI-Net). This is a kind of computer crime. There are many other kinds of a crime which are performed using a computer however most of the computer crimes are covered...
3 pages (753 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!