2.9: Summary
- Page ID
- 94873
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)
Key Takeaways
- In the last 20 years, companies have created profound shifts in the way firms advertise and individuals and organizations communicate.
- New technologies have redefined our concepts of software and computing, cut costs, fueled data-driven decision making, and raised privacy and security concerns.
- Technology can play a key role in creating and reinforcing assets for sustainable advantage.
- Beware of those who say, “IT doesn’t matter” or refer to the “myth” of the first mover. This thinking is overly simplistic. It’s not a time or technology lead that provides sustainable competitive advantage; it’s what a firm does with its time and technology lead to create valuable assets.
- The value chain can be used to map a firm’s efficiency and to benchmark it against rivals, revealing opportunities to use technology to improve processes and procedures. When a firm is resistant to imitation, its value chain may yield sustainable competitive advantage.
- Nothing lasts forever, and shifting technologies and market conditions can render once strong assets as obsolete.
- Just purchasing and installing the latest technology will not by itself make a company more successful.
Review Questions
- How is social media impacting firms, individuals, and society?
- How do recent changes in computing impact consumers? How do they impact businesses? Explain.
- What are the strategies employed to achieve competitive advantage? Provide some examples for each strategy not used in the text.
- Do you think it is possible to use information technology to achieve competitive advantage? If so, how? If not, why not?
- What is the value chain, and how can it be enhanced by information systems and technology?
- What are the primary activities and support activities of the value chain?
- What are switching costs? What role does technology play in strengthening a firm’s switching costs?
- Why is an innovation based on technology alone often subjected to intense competition?
- Does technology lower barriers to entry or raise them? Do low entry barriers necessarily mean that a firm is threatened?
- Is there such a thing as the first-mover advantage? Why or why not?
- A former editor of the Harvard Business Review, Nick Carr, published an article with the title “IT Doesn’t Matter.” In the article he also offered firms the advice: “Follow, Don’t Lead.” What would you tell Carr about the relationship between time, technology, and competitive advantage?
- Identify a company whose strategy might be at risk if they were to adopt a generic enterprise software. Why do you think adopting generic software would be risky to the company? What could they do as an alternative?
Exercises
Overview
This assignment will help you apply Porter’s Five Forces to an organization to find competitive opportunities using technology.
Assignment
In this assignment you will choose an organization, and then walk through each force and ultimately choose a technology strategy to create an advantage.
- Choose an industry, and then choose an organization within that industry. Describe both briefly.
- Using Porter’s Five Forces, for each force describe a ‘problem’ and an ‘opportunity’ within each force for the organization you selected in the above step.
For Example: If I chose fast food and McDonald’s, a problem for McDonalds in the customer force is that customers are increasingly becoming health focused. An opportunity for McDonald’s would be to explore ‘power shakes’ that include workout supplements. - Next, examine the four basic competitive strategies. For each strategy, identify your selected organization’s main competitor that would fit in that strategy (describe why you feel it fits). Which strategy (area) provides the most opportunity for your organization and which area does your organization belong to?
- Finally, make a statement on what your selected organization’s strategy should be.
Chapter 2 Attributions
Business Computer Information Systems: 1.1 Tech is Everywhere by Emese Felvegi; Barbara Lave; Diane Shingledecker; Julie Romey; Noreen Brown; Mary Schatz; OpenStax; Saylor Academy; University of Minnesota Libraries; and Robert McCarn is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.
Information Systems – A Manager’s Guide to Harnessing Technology: 1.1 Tech’s Tectonic Shift Radically Changing Business Landscapes & 2.1 Introduction & 2.2 Powerful Resources by Minnesota Libraries is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.
Information Systems for Business and Beyond (2019)- Chapter 7 by David Bourgeois is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted.
Information Systems: No Boundaries! Chapter 6 by Shane M Schartz is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted.
Maritime Management: Micro and Small Businesses-Chapter 15 by Matthew Pauley is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.
Principles of Management 8.6 Competition, Strategy, and Competitive Advantage & 18.2 Developing Technology and Innovation by OpenStax is licensed under Creative Commons Attribution 4.0 License