Examine the cannibalization strategy

Assignment Help Management Information Sys
Reference no: EM131262574

Assignment 1: Models for Competitive Dynamics

Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more "winner-take-all" environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We've seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy, the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy.

Write a four to five (4-5) page paper in which you:

1. Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.

2. Examine the "cannibalization" strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two (2) business examples.

3. Determine whether or not changes in business strategy should entail reassessment of IS. Provide three (3) reasons to support your position.

4. Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy.

5. Use at three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

o Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

o Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners.

o Use technology and information resources to research issues in enterprise architecture.

o Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

Reference no: EM131262574

Questions Cloud

Discuss how the functioning of the os is affected : Discuss how the functioning of the OS is affected when synchronization fails. Give examples describing what can go wrong. How do operating systems recover from failures and how is this different from a deadlock?
Describe the new product strategy you might use : Imagine that you are charged with designing a successor to the Wii. Briefly describe the new-product strategy you might use.
Prepaid pension expense will be eliminated : At December 31, 20X5, after making all adjustments related to its defined benefit pension plan, but before recognizing any additional pension liability, Domir Co. has accumulated the following information: Ignoring any income tax effects, an entry, i..
How could hrm help to smooth the transition : Do you think outsourcing would be harder on employees in a small company than in a large corporation? Why or why not? How could HRM help to smooth the transition?
Examine the cannibalization strategy : Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.
How and when did the land area form : What is the geology of the area? How and when did the land area form? How has the geology of the area shaped the communities of the region? Be specific.
Defined benefit pension plan for its employees : Arroz Corporation implemented a defined benefit pension plan for its employees on January 2, 20X4. The following data are provided for 20X6 and as of December 31, 20X6: Which of the following are required disclosures in the notes to the financial sta..
Determinants of performance-declarative knowledge : Briefly describe the three determinants of performance-declarative knowledge, procedural knowledge, and motivation-and based on the information provided, give examples of each for both Maria and Brian.
Apply the cascade algorithm to the dilation equation : Apply the cascade algorithm to the dilation equation for D4(t). After a few iterations, choose six values for t on the interval (0, 3]. Test the dilation equation for those values to see if the equation is satisfied, or, if not, how close it is to..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write term paper on management

Write term paper on Management: Obtain an alternative/outside perspective on the functioning and management of teams and groups. This is the focus of the Term Paper

  End user input in database design

To what extent should end users be involved in the design of a database? How have our ideas of agile development environments affected this traditionally non-user input environment?

  Describe in very general terms the as-is business process

Describe in very general terms the as-is business process for registering for courses at your university. Collaborate with another student in your course and evaluate the process using problem analysis and root cause analysis.

  Sdlc approach versus prototyping

SDLC Approach versus prototyping - Describe the steps of a pure prototyping methodology as an alternative to an SDLC approach.

  Using a smart card and entering a pin

User authentication is controlled by Windows 2008 Active Directory and users must authenticate by using a smart card and entering a PIN. Discretionary access control methods are in use.List and assess three security threats faced by the information t..

  Business intelligences usageseven-eleven japan using

business intelligences usageseven-eleven japan using business intelligence for more than customer analysis. this use of

  Tools and technologies for developing rule-based dss

Analyze and describe the tools and technologies for developing rule-based DSS. Introduction: Using DSS involves interactive analytical modeling processing and information systems can support a variety of management decision-making levels and decis..

  Breifly decribe your role as anemployee of an organization

1. breifly decribe your role as anemployee of an organization in the isfield. give examples of what you would need to

  Does the implementation of new technology always mean

New technology and old ways - Does the implementation of new technology always mean the end of old ways of doing things? What are the dangers of continuing to do things the old way as well as using new technology to perform the same tasks?

  Explain a technology innovation

This post addresses health technology issues - Explain a technology innovation that can change/ease an inefficient visit at a medical facility experienced by you or a family member

  Until recently hur jae-hoon could end debate with junior

until recently hur jae-hoon could end debate with junior staff members just by declaring that the discussion was over.

  Arrange a one- or two-page document

Securing an Organization - Assignment: Arrange a one- or two-page document describing the key elements that FOSFCU wil need to consider in its business continuity planning.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd