StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Shape Strategy in IT - Essay Example

Cite this document
Summary
From the paper "Shape Strategy in IT " it is clear that the instantaneous access that hackers have to the latest technologies and types of equipment demands that businesses become more serious and aggressive in defending the safety of their networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Shape Strategy in IT
Read Text Preview

Extract of sample "Shape Strategy in IT"

? Shape Strategy Affiliation with more information about affiliation, research grants, conflict of interest and how to contact Subject: Computer Sciences and Information Technology. Topic:  Shape Strategy. Introduction Competitive advantage and performance of an organization are two special terms with a complex association. Effective Information Technology (IT) turns out to be essential to support the smooth functioning of any organization. IT assists in computerizing all activities of the firm, therefore facilitating managers to focus on core competencies and strategic issues. This kind of technology helps to improve effectiveness, efficiency, productivity, cost, elasticity and service quality of the business entity. IT enabled facilities of the organization help to build up the competitive advantage of the company by providing consumers with superior services. The successful deployment and adoption of IT will enable the company to accomplish success more easily. Five specific areas where IT represents a risk to a company’s competitive advantage: The five risks that the company has to consider during the course of its business are: “the bargaining power of buyers, the bargaining power of suppliers, the threat of substitute products or services, and threats from new entrants” (Mishra, 2012, par. 1). Threat of Entry: The entry of new firms to an industry bring new ability and a need to gain market share that puts stress on costs, prices and the price of investment essential to compete in the market. Microeconomics justifies that profitable industries attract new competition until the downward pressure on costs has forced our all financial profit from the industries. The most obvious sign of a company deteriorating is its failure to address to IT communications, which is the foundation for the break of the efficiency of IT generally. This vulnerability most frequently manifests itself in insufficient environment management tools, unreliable? old hardware etc. The power of suppliers: Powerful suppliers play a significant part in controlling the price of their products and services by charging high cost for limited services, high costs in general, or changing costs according to different customers. Suppliers are powerful if they are capable of charging differentiated price. Leading IT risk units have performed extensive research and have reached the conclusion that organizations which proactively deal with IT risks reap the most profits and benefits. The power of buyers: IT risk most frequently occurs during the breakdown of the enterprise business management to help with oversight of IT in some rational governance structure. The threat of substitutes: A substitute product functions similarly to that of the organization’s products but only by a different means. Positive IT risk management creates three competitive advantages for an organization. First, there is fewer firefighting. This permits the enterprise to concentrate on more strategic and productive work. Second, the base is better prepared thus freeing personnel, resources and dollars to focus more on efforts that can increase the price of the product. Third, the project is located in a stronger location than others to charge risk and? therefore? potentially employ chances that others would think too risky. Rivalry among existing competitors: Risk both downside and upside may happen from globalization, emerging technology, data growth, vendor chain complexities, economic ebbs and flows, client expectations as well as compliance supplies. Five specific areas in which IT may support or promote a company’s competitive advantage. Threat of new entrants: The increased usage of Information technology globally has many sides to it? one of which makes the threat of new entrants high. Mainly the entry of new firms has been made possible from the transition of wired technology to wireless? and such related facilities. The power of suppliers: Strategic systems have been used to give new facilities to suppliers, to enlarge consumer switching costs, and to lock in suppliers, with the detailed purpose of attaining improved results. The power of buyers: Benefits to buyers are increased from the use of information systems. Models of SCMS are used and these make the value of a particular supplier to be recognized by competing suppliers as well as turn generate standard practice in buyers networks. The threat of substitutes: Due to increased usage of information technology? major threats from substitutes has led to decrease in the organization’s capability over the past years. Rivalry among existing competitors: “The structural implications of information technology for an organization will be determined by its effects on rivalry within the industry, its impacts on the industry’s relations with its customers and its implications for prospective entrants and the threat of substitute products” (Bakos & Treacy, 1986). Disadvantage: The disadvantages that can be seen here consist of various threats in the analysis and the functioning of system, the vulnerability analysis etc. One of the major disadvanges identified is that it leads to rise of several security issues in the business. That is? use of IT in business can generate numerous security issues? as text messages, emails, and other website communication are frequently vulnerable to hacking by unauthorized parties. These security issues can entail in serious lawful liabilities if a client’s private information has been compromised, for example “a credit card number, social security number or driver’s license is accessed by illegal means through a company’s business technology. Companies must also create internal controls to safeguard information from inappropriate actions by company employees” (Vitez, 2012, par. 3). Vulnerability analysis and evaluation is an essential element of every significant activity under the Risk Management Framework (RMF). This analysis helps to solve various risks associated with the security issues. The RMF consists of certain steps, where under each step? the business has to undergo vulnerability analysis and assessment. The six steps involved in vulnerability analysis help in the easy identification and evaluation of various vulnerabilities found in the steps where the identification is necessary. The instantaneous access that hackers have to the latest technologies and equipments demands that business become more serious and aggressive in defending the safety of their networks. Carrying out a network vulnerability evaluation or a self-induced hack attack recognizes the components of the network that are under fault, and also the procedures that expose a business to malevolent network intruders. Vulnerability in the network is a characteristic that can be broken by an outside or inside agent? like a hacking agent? or even a malware attack to break a safety policy or cause harmful consequences in the software of the system. Performing vulnerability evaluation is only one among several steps required in developing a framework of vulnerability management, however it is a very significant step and can be carried out both internally or externally. Advantages: Using the five forces as a framework, innovative strategies of an organization may be capable of spotting other businesses with great potential and a bright future. There a lot of advantages here and these are seen to help the business to become efficient and effective as well as to reach the peak of productivity and profitability. One of the main advantages is clearly seen to be the facility that enables the storing of information. The storage of information is highly beneficial as well as important for all companies. According to experts, this type of information maintains the details about vital resources that has been stored years back, which a company can use for reference when needed as well as the interested authorities can retrieve any related information within a fractions of seconds from these stored accounts. The usage of IT security is also very beneficial in protecting the data from piracy and hacking. The automated processes help in increasing the company’s efficiency by making the efforts much easier and also by reducing the strength of staff in the organization. This IT enabled advantage of the company helps the company to develop and come up with a sort of competitive advantage. “Advanced technology or innovations are not by themselves enough to make an industry structurally attractive (or unattractive)” (Porter, 2008, p. 86). Understanding structure of the industry is equally essential for investors as well as the managers. The five competitive forces show whether a business is truly attractive or not, and also they assist investors to anticipate both negative as well as positive shifts in the structure of the business before they become too obvious. A strategic IT helps the business achieve a competitive advantage in the course of its contribution to the strategic objectives of the organization and its ability to considerably enhance productivity and performance. Reference List Bakos, J. Y. & Treacy, M. E. (1986). Information Technology and Corporate Strategy: A Research Perspective. MIS Quarterly. Retrieved from http://archive.nyu.edu/bitstream/2451/27825/2/CeDER-PP-1986-01.pdf Mishra, S. (2012). Michael Porter’s Five Forces. All Rights Reserved. Retrieved from http://www.franteractive.net/Porter-Five-Forces.html Porter, M. E. (2008). The Five Competitive Forces that Shape Strategy. Harvard Business Review. Print. Vitez, O. (2012). Disadvantages of Business Communication Technology. Hearst Communication. Inc. Retrieved from http://smallbusiness.chron.com/disadvantages-business-communication-technology-1799.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Shape Strategy Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Shape Strategy Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1463643-shape-strategy
(Shape Strategy Essay Example | Topics and Well Written Essays - 1250 Words)
Shape Strategy Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1463643-shape-strategy.
“Shape Strategy Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1463643-shape-strategy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Shape Strategy in IT

Radio Shack Strategic Management

Strategic issues There are two major strategic management problems facing RadioShack Corporation: merchandise mix and growth strategy.... RadioShack Corporation is a leading US retailer of consumer electronics goods and services which includes mobile technology products and services, as well as products related to personal and home technology and power supply needs....
15 Pages (3750 words) Research Paper

The Five Competitive Forces That Shape Strategy

The assignment "The Five Competitive Forces That shape strategy" states that the pharmaceutical company that we look at is the second-largest pharmaceutical company in the world and the largest in Europe, GlaxoSmithKline (GSK).... In the 2010 financial year.... ... ... ... The main challenge though is for GlaxoSmithKline to be more efficient in turning its revenue to profits probably by re-examining its cost structure and bring its costs under control....
8 Pages (2000 words) Assignment

How Competition Forces Shape Strategy

This essay "How Competition Forces shape strategy" discusses the music that has radically changed the music scene by distorting the commercial channels to provide 'free' music and thus the internet has irreversibly changed the business model in the music industry.... The aim of assessing the competitive landscape of the music industry it would be worth employing a Marketing Mix (MM) strategy to tap into the preferences of the consumer base(Laudon, and Laudon 2008)....
10 Pages (2500 words) Essay

Skype - Marketing Strategy

The paper "Skype - Marketing strategy" highlights that Skype users around the globe are able to make free audio and video calls to other registered Skype users.... Information technology has been a significant influential factor to shape up any company's presence in the global market....
9 Pages (2250 words) Essay

What Shapes External Competitiveness (Compensation Strategy)

Finally, coming to organizational structure, it is believed that whether the business is labour or capital intensive, technology driven or market driven- all contribute towards the kind of wage or compensation strategy that would be enforced.... Compensation strategy:In the sphere of external competitiveness, that is wage bargaining, there are several factors which make their mark.... The “comparing of compensation rates of one organization with that of its competitors” is what determines compensation strategy....
2 Pages (500 words) Essay

Business Strategy and Market Share at Acer

An author of the study "Business strategy and Market Share at Acer" will briefly examine the history of business development of the Acer company.... It is of considerable importance to highlight the fact that the paradox related to the company's focus on the global and local markets is part of the company's long terms strategy....
4 Pages (1000 words) Case Study

The Five Competitive Forces That Shape Strategy

The Harvard Business Review saw a very complete compilation of the five competitive factors that affect strategy building for businesses in 1979, authored by Michael Porter.... This article brought out some of the salient and most important points of business strategy and.... Porter takes a very comprehensive look at the various aspects of strategy building that have been used till then, and that have been ignored till the time of publication of the We study and form our respective opinions around this article through this paper....
5 Pages (1250 words) Essay

Management Strategy: The Five Competitive Forces that Shape Strategies

According to the porter (1996), the gist of a strategy is on the activities performed by the company to compete effectively and sustainably with the competitors.... He defined strategy as executing different activities from what competitors are doing or performing related activities using a special approach.... Contrary to operation effectiveness, the competitive strategy should be viewed as a sustainable tool that withstands competition for the long term rather than focuses on short-term goals such as reduced prices to attract customers....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us