• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

Understanding a Company's Strategy - What to Look For.

Extracts from this document...


Understanding a Company's Strategy What to Look For Why Organisational Behaviour Matters � Individual members of organisations tend to conform to the organisation's formal and informal rules and the 'company culture' - or else leave; � The behaviour of an organisation is determined by the relationships within it and by its purpose and by the environment in which it operates. What is an' Organisation'? Defining 'Organisation' The definition selected from Huczynski and Buchanan, for example, brings out three important aspects of organisations: * The fact that they are social organisations and hence must cater for the individual needs of people within * The fact that organisations require controls and direction in order to succeed * The fact that measurement is required in order to assess organisational performance Determining Features of an Organisation What is Organisational Culture? How Organisational Culture Develops Impact of Organisational Culture 1 � An organisation's culture is either an important contributor or an obstacle to successful strategy execution. � A deeply rooted culture well matched to strategy is a powerful lever for successful strategy execution. � A strong culture is a valuable asset when it matches strategy and a serious liability when it doesn't. � A 'weak' culture may prove to be an organisational opportunity since it can more easily be encouraged to be adaptive. Traditional Organisational Structure Alternative 'Flat' Structure Alternative - Matrix Organisation IT & Organizational Structures 1 1 Traditional organization is hierarchical, flat or matrixed. 2 In hierarchical orgs. Middle managers tell subordinates what to do and tell superiors the outcomes. IS supports this hierarchy. 3 In flat structured orgs. Work is more flexible and employee do whatever is needed. IS allows offloading extra work and supports intrafirm communications. IT & Organizational Structures 4 In matrixed organizations, work is organized in small work groups and integrated regionally and nationally/globally. 5 IS reduce operating expenses by allowing information to be easily shared among different managerial functions. ...read more.


Disruptions, destruction and disaster - Unauthorized access Creating Controls A control is something that mitigates or stops a threat Controls include (technology) - Redundancy - Anti-virus software - Passwords and encryption - Firewalls Risk Assessment Framework Threat A threat is a force, organisation or person, which seeks to gain access to, or compromise, information. A threat can be assessed in terms of the probability of an attack. Vulnerability A weakness of a system or facility holding information that can be exploited to gain access. Asset Value E.g. the impact if information were leaked or disclosed. Business Risk The combination of asset value, threat and vulnerability. Importance of Confidentiality 1 Confidential information ("B2B") can involve research, design, prototypes and key technologies 2 Privacy ("B2C") concerns the facts a business holds about an individual. Safe storage, non-transfer to others and responsible usage are required by law. (In any case, a database holding information about customers can also be considered a valuable asset) DPA 1998 - Principle 7 Appropriate technical and organizational measures shall be taken against unauthorized and unlawful processing - Technical and Organizational measures - Encryption - Digital Signatures - Access to personal information Business Continuity Management According to the Business Continuity Institute 'a realistic objective is to ensure the survival oy your organisation by establishing a culture that will identify and manage those risks that could cause it to suffer': Inability to maintain customer services Damage to image, reputation or brand Failure to protect the company assets Business control failure Failure to meet legal requirements Every business should therefore develop a comprehensive business continuity plan Involving Outside Experts What is Outsourcing? 1 Outsourcing is the strategic use of outside resources to perform activities traditionally handled by internal staff and resources. 2 Outsourcing is a management strategy by which an organization outsources major, non-core functions to specialized, (efficient) service providers. Strategic Outsourcing Hire external firm to create (and manage) ...read more.


The balanced scorecard methodology involves simultaneously taking four different perspectives on the business: * the Financial Perspective monitors such measures as profitability, revenue growth and shareholder value; * the Customer Perspective requires measures such as service levels, satisfaction ratings, complaints and the volume of repeat business; * the Internal Perspective reports on the efficiency of internal processes (workflow) and procedures using measures such as the cycle time to record or fulfill a customer order; * the Learning and Growth Perspective is the key long-term predictor as it deals with employee issues: indicators here include intellectual assets as well as career and skills development. Objectives are set within each perspective and these objectives are linked together as causes and effects respectively. In this way every measure selected can ultimately be related to financial results. Identifying Key Success Factors � Answers to three questions pinpoint KSFs - On what basis do customers choose between competing brands of sellers? - What resources and competitive capabilities does a seller need to have to be competitively successful? - What does it take for sellers to achieve a sustainable competitive advantage? � KSFs consist of the 3 - 5 really major determinants of financial and competitive success in an industry Risk Management � A systematic approach to IS security management � Assesses - Vulnerability & sensitivity of systems & data - Feasibility and costs of risk controls & measures - Feasibility and costs considered in terms of social, financial and technical requirements /implications Risk Management stages � Risk identification - Identifying all potential risks to the organisation � Risk analysis - Assess the probability, expected frequency, likely severity and cost of each identified risk � Risk handling - Select optimum controls & counter measures � Disaster recovery - Contingency plan in case of disaster Sources of potential threats Risk handling � Application of controls & counter measures appropriate to the risk according to time, money and other constraints � Four strategies: - Risk avoidance: if possible - Risk retention: if not potentially too harmful - Risk reduction: the most common strategy - Risk transfer: e.g. maintenance contracts, insurance ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Marked by a teacher

    business online

    4 star(s)

    Today the Tesco group operates in 12 markets outside the UK, in Europe and Asia. Over 100,000 employees work in there international operations, serving over 15 million customers and generating �7.6 billion sales and �370 million profit. Amazon seeks to be the world's most customer-centric company, a place where people

  2. Evaluate the competitive position of RAC Motoring Service in terms of its operations-based strengths ...

    RAC design has these advantages and is quite suitable for the type of service they are providing to their customers. RAC is also facing some disadvantages in terms of huge costs in expansion and rearranging of existing layout, lower utilization of their patrols and they need more equipment to full fill the demand.

  1. Ao1 : aims and objectives

    If Tesco had a sole trader ownership, which it originally was, it would not have been so successful for numerous amounts of reasons. Mainly because the sole trader would not have been able to control the business by themselves and finances would be very difficult to control.

  2. Apple Incorporation - Case Analysis

    This difference must be managed with continued improvements that allow the public to perceive design and functional advantages over the competitors' operating system platforms. Failure to compete effectively could cause a negative affect on Apple's financial and operating results. Software Piracy Software piracy has been a problem for software and operating systems producing companies.

  1. A construction firm, Tyne Construction Ltd, wishes to benefit from the e-business but needs ...

    Yes- very simple can clear. No congestion of information. Headings and icons stand out. Yes- clear headings and icons, but information in middle of page is too much. What is the main information has to site offer Career news, industry news, project info and products (6 in total)

  2. Analysis of The Cadbury company.

    consumer research studies they undertook in 2005 into food, health, diet, nutrition and obesity. Cadbury aims to offer alternative product choices including reduced fat, sugar and salt, for their core brands. In each market in which Cadbury's operate, they listen to their consumers.

  1. Describe the key elements of research methodology

    The method or methods chosen will depend on what the researchers think will generate the most useful information. Researchers will consider carefully what it is they wish to gain from the secondary research and information they will need for the project.

  2. In this assignment I'll be explaining how the government supports the development of e-business, ...

    is security and data protection, both of these points are very crucial for the business to keep account of all the data from the customers and they need to take full responsibility of protecting the information extracted from the customers and it should not be revealed elsewhere of the business so it should be kept internal.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work