Reference no: EM132216109
Assignment 1: Models for Competitive Dynamics
Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more "winner-take-all" environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We've seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy, the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy.
Write a four to five page paper in which you:
1. Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.
2. Examine the "cannibalization" strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two business examples.
3. Determine whether or not changes in business strategy should entail reassessment of IS. Provide three reasons to support your position.
4. Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities; and what, how, and who should use social IT for a social business strategy.
5. Use at three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners.
• Use technology and information resources to research issues in enterprise architecture.
• Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
|
Define network neutrality in detail
: Define Network Neutrality. How the new FCC rules on Net Neutrality would affect Internet subscribers? How the new FCC rules on Net Neutrality affects cloud.
|
|
A preview of capital structure issues
: At any point in time, management has a specific target capital structure in mind, presumably the optimal one, though this target may change over time.
|
|
Analysis of recent demand
: Any that remain are donated to a nearby senior centre. Analysis of recent demand resulted in the following probability distribution:
|
|
Leadership competencies for health service mangers
: Identify and explain, at minimum, three of the most important leadership competencies for health service mangers.
|
|
Examine how firms can use social it in alignment
: Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more "winner-take-all" environments and greater churns among.
|
|
Expected demand during lead time
: Determine each of the following, assuming that lead time demand is distributed normally:
|
|
Long-term care facility provides inadequate nutrition
: Assume that a long-term care facility provides inadequate nutrition, wound care, and medication administration to its residents
|
|
What is the time between orders for case b above
: A retailer of home appliances obtains TV sets of a specific brand from a single Original Equipment Manufacturer (OEM). Demand is relatively constant throughout
|
|
Discuss the dangers of that same internet
: Please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet.
|