Preview

3. Critically Evaluate the Outside-in Approach to Strategy Formulation.

Best Essays
Open Document
Open Document
4040 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
3. Critically Evaluate the Outside-in Approach to Strategy Formulation.
Introduction
In this modern world, Information Technology forms the integral part of any kind of business. In the 21st century, countries across the globe have come to rely on complex computer networks that form the infrastructural backbone of even the most basic necessities of life, including electric power grids, global finance, food distribution, medical care, clean drinking water, petroleum production, and most types of communication. The protection of such networks, known as cyber security, is among the highest priorities in the civilized world, alongside planning and operations for major contingencies, including antiterrorism and land warfare. (Al-Saud, 2012:75).In Middle East region, the IT industry is dynamically growing along with their Economic growth. Due to this growth, competition has also amplified and hence cyber security plays a significant role here. In recent year there has been an unprecedented volume of malicious code and attacks (Anne Harding. accessed January/10 2012).Hence,the investments made on cyber security has increased, and the estimated IT security business in GCC is over 500 Million a year (Nordic Industries Development, 2012:5). This paper is an analysis of IT security industry’s strategic approach in GCC. It will evaluate the industry through porter Five Force model and other external strategies. Also, this paper will throws light on the inside-out strategy over outside-in strategy
Porter Five Forces Framework
The IT security industry, these days, is a critical area in business sector as well as political sector in the GCC. According to Porter Understanding the competitive forces, and their underlying causes, reveals the roots of an industry’s current profitability while providing a framework for anticipating and influencing competition (and profitability) over time (2008:80) because the strongest competitive force or forces determine the profitability of an industry and become the most important to strategy formulation (Porter,



References: Unlock the Potential of THE ICT BUSINESS IN MIDDLE EAST (2012), Tampere FINLAND: NORDIC INDUSTRIES DEVELOPMENT. Al-Saud, N.B.A. (2012) 'A Saudi Outlook for Cyber security Strategies Extrapolated from Western Experience ', (64): 75-81. Anderson, P. (2007) 'What is Web 2.0? Ideas, Technologies and Implications for Education '. Anon (2012), Strategy, Business Information and Analysis, University of Leicester, Cheltenham: Learning Resources Cavelty, M.D., Gratz, J., Jacobs, A., Mahadevan, P Cressey, R. and Nayfeh, M. (2012) 'Cyber Capability in the Middle East Seizing Opportunity while Managing Risk in the Digital Age’, Foss, A Habboush, M. (2010) 'Cyber Attacks on Gulf Infrastructure seen Rising ', Reuters, December10. Harding, A. (2012), 'Middle East Tackles Cyber Security Threat with World Class Training '. Online. Available at: https://www.sans.org/press/middle-east-sec-training.php (accessed January/10, 2013). Kostopoulos, K.C., Spanos, Y.E. and Prastacos, G.P. (2002) 'The Resource –Based View of the Firm and Innovation: Identification of Critical Linkages’, Liu, R MEED Middle East Economic Digest’ Hardware Security could Prevent Cyber Warfare ', (2010) 54 (51): Porter, M QCERT (2010) About Q-CERT. Online Available at: http://www.qcert.org/EN/About/Pages/About.aspx (accessed January/12 2013). Rivarda, S., Raymondb, L. and Verreault, D. (2006) 'Resource-Based View and Competitive Strategy: An Integrated Model of the Contribution of Information Technology to Firm Performance ', Journal of Strategic Information Systems, 29-50. Saif, I. (2009) The Oil Boom in the GCC Countries, 2002–2008: Old Challenges, Changing Dynamics, Dissertation, The Carnegie Middle East Center. Schneier, B. (2007), 'Do We Really Need a Security Industry '. Online. Available at: http://www.wired.com/politics/security/commentary/securitymatters/2007/05/securitymatters_0503 (accessed January/9, 2013). Sevounts, G. (2006) Addressing Cyber Security in the Oil and Gas Industry Pipeline & Gas Journal. Wilkinson, N. (2012), 'Michael Porter 's Five Forces and the future of the Cloud '. Online. Available at: http://www.wilkinsonadvisory.com/blog/2012/10/30/Michael-Porters-Five-Forces-and-the-future-of-the-Cloud.aspx (accessed January/15, 2013). Young, G. and Pescatore, J. (2011) Magic Quadrant for Enterprise Network Firewalls, United States: Gartner Inc.http://www.gartner.com/technology/reprints.do?id=1-18CHDB2&ct=111215&st=sb (accessed 14 December 2011). Yurdagul, M., Ozsoy, M.S., Burnaz, S. and Topcu, Y.I. (2012) 'Evaluation of Entry and Penetration Strategies To Middle East Marketutilizing A Multi Criteria Decision Analysis Approach ',

You May Also Find These Documents Helpful

  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    Gates, Gilbert. "How a Secret Cyberwar Program Worked." The New York Times, June 1, 2012. http://www.nytimes.com/interactive/2012/06/01/world/middleeast/how-a-secret-cyberwarprogram-worked.html?ref=middleeast…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones and Bartlett.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Economic Indicators refer to poverty in statistical terms and numerations. In 2011 the poverty rate was 15%. 46.2 Million Americans living at or below the poverty line. However what these definitions and figures do not illustrate that the face of poverty is no longer that of the destitute or indigent individuals and families. Poverty is now becoming a part of mainstream…

    • 2518 Words
    • 11 Pages
    Best Essays