1. What is an external analysis and explain which models can be used.
An external analysis is a good way to look at the opportunities and threats of a company. It gives you an good overview about the external environment. You can use models like the 5-forces model and a PESTEL analysis. (Porter, 2008) (Marcus & Dam, 2009)
2. explain each model you find.
PESTEL analysis: With a PESTEL analysis you can analyze you external environment. The factors are:
* Political: Here you can look at political factors, what kind of rules are there in the countries? For example on television you must broadcasting a good view of your country. Not only beautiful man and woman like in The bold and the beautiful but also the negro because he has to.
* Economic: How is the economic growth? If you want to expand you company and the economy you should think twice before you do.
* Social: Social trends are important. These days companies wants to be “Green”. This is a social trend, most of the time it costs more to be green but because it’s a trend it may work out. 30 years ago nobody cares.
* Technological: technological factors are important, the most for productions. Like the R&D tag iTunes came with. It’s the innovations that the customers want. Like newspapers on tablets.
* Legal: Logical there are also some legal factors, this include discrimination law, consumer law health and safety law, etc.
5-forces model:
To get a clear view of the external environment Porters 5 forces model is being used. It helps the company to develop the competitive advantages of the organization and so compete wit hit rivals. The five basic forces are: 1. the bargaining power of suppliers; 2. the bargaining power of buyers; 3. the threat of potential new entrants; 4. the threat of substitutes; 5. the extent of
Bibliography: Barrett, B. (2010, 10 12). Gizmodo. Retrieved 05 14, 2013, from test driving googles driverless cat: gizmodo.com/5662005/test-driving-googles-driverless-car D 'altorio, T Google. (n.d.). Google. Retrieved 05 14, 2013, from Books: http://books.google.com/ Howe, R., & Harrison, A Jonker, H., Mauw, S., Verschuren, J., & Schoonen, A. (2006). Security aspects of DRM systems. Delft: TU Delft. Liedtke, M. (2009, 07 8). Physorg. Retrieved 05 14, 2013, from News: http://www.physorg.com/news166247881.html) Marcus, N., & Dam, J Miltenburg, O. v. (2011, 05 14). Tweakers. Retrieved 05 14, 2013, from Samsung chromebooks: http://tweakers.net/reviews/2130/samsung-chromebook-netbook-a-la-google.html Moschina, A Nielsen. (2012, 01 18). Nielsen. Retrieved 05 14, 2013, from smartphones: http://blog.nielsen.com/nielsenwire/consumer/more-us-consumers-choosing-smartphones-as-apple-closes-the-gap-on-android/ Perez, S Porter, M. E. (2008). The five competitive forces that shape strategy. Harvard: Harvard Business Review. Rowinski, D. (2012, 01 18). Read write web. Retrieved 05 14, 2013, from apples iphone strategy: http://www.readwriteweb.com/mobile/2012/01/apples-iphone-strategy-cutting.php Sterling, G Trefis team. (2012, 01 17). Forbes. Retrieved 05 14, 2013, from Bing market share: http://www.forbes.com/sites/greatspeculations/2012/01/17/bings-market-share-squeaks-higher-google-still-gorilla-of-search/ Wakabayashi, D Yarrow, J. (2011, 11 15). businessinsider. Retrieved 05 14, 2013, from arcticles ios iphone: http://articles.businessinsider.com/2011-11-15/tech/30400455_1_ios-iphone-smartphone-market Zwaag, G