In this modern world, Information Technology forms the integral part of any kind of business. In the 21st century, countries across the globe have come to rely on complex computer networks that form the infrastructural backbone of even the most basic necessities of life, including electric power grids, global finance, food distribution, medical care, clean drinking water, petroleum production, and most types of communication. The protection of such networks, known as cyber security, is among the highest priorities in the civilized world, alongside planning and operations for major contingencies, including antiterrorism and land warfare. (Al-Saud, 2012:75).In Middle East region, the IT industry is dynamically growing along with their Economic growth. Due to this growth, competition has also amplified and hence cyber security plays a significant role here. In recent year there has been an unprecedented volume of malicious code and attacks (Anne Harding. accessed January/10 2012).Hence,the investments made on cyber security has increased, and the estimated IT security business in GCC is over 500 Million a year (Nordic Industries Development, 2012:5). This paper is an analysis of IT security industry’s strategic approach in GCC. It will evaluate the industry through porter Five Force model and other external strategies. Also, this paper will throws light on the inside-out strategy over outside-in strategy
Porter Five Forces Framework
The IT security industry, these days, is a critical area in business sector as well as political sector in the GCC. According to Porter Understanding the competitive forces, and their underlying causes, reveals the roots of an industry’s current profitability while providing a framework for anticipating and influencing competition (and profitability) over time (2008:80) because the strongest competitive force or forces determine the profitability of an industry and become the most important to strategy formulation (Porter,
References: Unlock the Potential of THE ICT BUSINESS IN MIDDLE EAST (2012), Tampere FINLAND: NORDIC INDUSTRIES DEVELOPMENT. Al-Saud, N.B.A. (2012) 'A Saudi Outlook for Cyber security Strategies Extrapolated from Western Experience ', (64): 75-81. Anderson, P. (2007) 'What is Web 2.0? Ideas, Technologies and Implications for Education '. Anon (2012), Strategy, Business Information and Analysis, University of Leicester, Cheltenham: Learning Resources Cavelty, M.D., Gratz, J., Jacobs, A., Mahadevan, P Cressey, R. and Nayfeh, M. (2012) 'Cyber Capability in the Middle East Seizing Opportunity while Managing Risk in the Digital Age’, Foss, A Habboush, M. (2010) 'Cyber Attacks on Gulf Infrastructure seen Rising ', Reuters, December10. Harding, A. (2012), 'Middle East Tackles Cyber Security Threat with World Class Training '. Online. Available at: https://www.sans.org/press/middle-east-sec-training.php (accessed January/10, 2013). Kostopoulos, K.C., Spanos, Y.E. and Prastacos, G.P. (2002) 'The Resource –Based View of the Firm and Innovation: Identification of Critical Linkages’, Liu, R MEED Middle East Economic Digest’ Hardware Security could Prevent Cyber Warfare ', (2010) 54 (51): Porter, M QCERT (2010) About Q-CERT. Online Available at: http://www.qcert.org/EN/About/Pages/About.aspx (accessed January/12 2013). Rivarda, S., Raymondb, L. and Verreault, D. (2006) 'Resource-Based View and Competitive Strategy: An Integrated Model of the Contribution of Information Technology to Firm Performance ', Journal of Strategic Information Systems, 29-50. Saif, I. (2009) The Oil Boom in the GCC Countries, 2002–2008: Old Challenges, Changing Dynamics, Dissertation, The Carnegie Middle East Center. Schneier, B. (2007), 'Do We Really Need a Security Industry '. Online. Available at: http://www.wired.com/politics/security/commentary/securitymatters/2007/05/securitymatters_0503 (accessed January/9, 2013). Sevounts, G. (2006) Addressing Cyber Security in the Oil and Gas Industry Pipeline & Gas Journal. Wilkinson, N. (2012), 'Michael Porter 's Five Forces and the future of the Cloud '. Online. Available at: http://www.wilkinsonadvisory.com/blog/2012/10/30/Michael-Porters-Five-Forces-and-the-future-of-the-Cloud.aspx (accessed January/15, 2013). Young, G. and Pescatore, J. (2011) Magic Quadrant for Enterprise Network Firewalls, United States: Gartner Inc.http://www.gartner.com/technology/reprints.do?id=1-18CHDB2&ct=111215&st=sb (accessed 14 December 2011). Yurdagul, M., Ozsoy, M.S., Burnaz, S. and Topcu, Y.I. (2012) 'Evaluation of Entry and Penetration Strategies To Middle East Marketutilizing A Multi Criteria Decision Analysis Approach ',