SlideShare a Scribd company logo
1 of 17
By: Annie Herbowy
Blake Rizner
 Environmental Model
 Resource Model
 Core Logic
 Activity
 Implications for leaders
 Review
 Porter Frameworks
◦ 5 Forces
◦ Opportunities
◦ Threats
◦ Value Chain
 Generic strategy
◦ Differentiation
◦ low cost leadership
 Physical Capital
 Human Capital
 Organizational Capital Resources
 Heterogeneous / Homogeneous
 Mobile / Immobile
 Sustained Competitive Advantage
◦ Valuable
◦ Rare
◦ Imperfectly Imitable
 Unique Historical Conditions
 Casual Ambiguity
 Socially Complex
◦ Non-Substitutive
 Resource based
◦ Capability Logic
 Hypercompetitive / High velocity
◦ Guerilla Logic
 Ecosystem / Chaos
◦ Complexity Logic
 Superior Resources
 Depicts core competencies as foundations for
the future
 Emphasizes internal capabilities
 Protection of imitation
 Complementary interdependence to support
superior accomplishments
 Constant disruption of current conditions
 Lifespan of solutions is short
 Radical changes to create temporary
advantages
 Organization units and actions are loosely
coupled to support innovation and reduce
constraint
 Increase speed and capitalize on risk
 Rely on network feedback and emergent
relationships
 Require a blend of competition and
cooperation
 Healthy ecosystem open to material and
energy flows
 Influence is achieved by managing initial
conditions and forces/attractors
 Value and culture determine the boundaries
of social system
 Determine the appropriate strategy for a firm
competing in the consumer products industry
with regards to:
◦ Capability Logic- Group 1
◦ Guerilla Logic – Group 2
◦ Complexity Logic- Group 3
 Efforts to combine and blend these
conceptual perspectives within a single
strategy create serious problems for
managers who are concerned about achieving
consistency of purpose (Lengnick-Hall and
Wolf, 1998)
 http://www.youtube.com/watch?v=SxuYdzs4
SS8
 Vision/Mission
 Consistent Message
 Filter
 Capability Logic
 Guerilla Logic
 Complexity Logic
Strategy 683 Presentation
Strategy 683 Presentation
Strategy 683 Presentation

More Related Content

Viewers also liked

T 21 renacimiento_español
T 21 renacimiento_españolT 21 renacimiento_español
T 21 renacimiento_españolAntonio
 
Grupo Cyberclick Key Points Linkedin
Grupo Cyberclick Key Points LinkedinGrupo Cyberclick Key Points Linkedin
Grupo Cyberclick Key Points Linkedinsfborja
 
Dandy clássicos do evangelho
Dandy   clássicos do evangelhoDandy   clássicos do evangelho
Dandy clássicos do evangelhoCarlos Janes
 
SAMSUNG YP-P2
SAMSUNG YP-P2SAMSUNG YP-P2
SAMSUNG YP-P2damai789
 
Maus raus - Surfen mit Tabulator
Maus raus - Surfen mit TabulatorMaus raus - Surfen mit Tabulator
Maus raus - Surfen mit Tabulatorbeate.firlinger
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Viewers also liked (9)

T 21 renacimiento_español
T 21 renacimiento_españolT 21 renacimiento_español
T 21 renacimiento_español
 
Grupo Cyberclick Key Points Linkedin
Grupo Cyberclick Key Points LinkedinGrupo Cyberclick Key Points Linkedin
Grupo Cyberclick Key Points Linkedin
 
Dandy clássicos do evangelho
Dandy   clássicos do evangelhoDandy   clássicos do evangelho
Dandy clássicos do evangelho
 
SAMSUNG YP-P2
SAMSUNG YP-P2SAMSUNG YP-P2
SAMSUNG YP-P2
 
Maus raus - Surfen mit Tabulator
Maus raus - Surfen mit TabulatorMaus raus - Surfen mit Tabulator
Maus raus - Surfen mit Tabulator
 
Zadanie2
Zadanie2Zadanie2
Zadanie2
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Strategy 683 Presentation

Similar to Strategy 683 Presentation (20)

Foundations Of Individual Behavior
Foundations Of Individual BehaviorFoundations Of Individual Behavior
Foundations Of Individual Behavior
 
Organizational Social Context
Organizational Social ContextOrganizational Social Context
Organizational Social Context
 
Organizational Social Context
Organizational Social Context Organizational Social Context
Organizational Social Context
 
Competing for Advantage.pptx
Competing for Advantage.pptxCompeting for Advantage.pptx
Competing for Advantage.pptx
 
Strategy Implementation
Strategy ImplementationStrategy Implementation
Strategy Implementation
 
1588416689-ch-5-1.ppt
1588416689-ch-5-1.ppt1588416689-ch-5-1.ppt
1588416689-ch-5-1.ppt
 
OB11_05st_PerceptionandIndividualDecisionMaking.ppt
OB11_05st_PerceptionandIndividualDecisionMaking.pptOB11_05st_PerceptionandIndividualDecisionMaking.ppt
OB11_05st_PerceptionandIndividualDecisionMaking.ppt
 
Ethics
EthicsEthics
Ethics
 
Chapter 5.ppt
Chapter 5.pptChapter 5.ppt
Chapter 5.ppt
 
Ethics
EthicsEthics
Ethics
 
Ethics in HRD
Ethics in HRDEthics in HRD
Ethics in HRD
 
Ch04 Discussion Light
Ch04 Discussion LightCh04 Discussion Light
Ch04 Discussion Light
 
Rb Base Government Presentation1
Rb Base Government Presentation1Rb Base Government Presentation1
Rb Base Government Presentation1
 
AKN Final Presentation Bangkok 2014
AKN Final Presentation Bangkok 2014AKN Final Presentation Bangkok 2014
AKN Final Presentation Bangkok 2014
 
Strategic management 2
Strategic management 2Strategic management 2
Strategic management 2
 
Ethics and the Project Manager
Ethics and the Project ManagerEthics and the Project Manager
Ethics and the Project Manager
 
Introduction to ifbap
Introduction to ifbapIntroduction to ifbap
Introduction to ifbap
 
Ecosystem managers: What do they do?
Ecosystem managers: What do they do?Ecosystem managers: What do they do?
Ecosystem managers: What do they do?
 
comprehensive exam
comprehensive examcomprehensive exam
comprehensive exam
 
組織理論第三章 F..
組織理論第三章 F..組織理論第三章 F..
組織理論第三章 F..
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Strategy 683 Presentation

  • 2.  Environmental Model  Resource Model  Core Logic  Activity  Implications for leaders  Review
  • 3.  Porter Frameworks ◦ 5 Forces ◦ Opportunities ◦ Threats ◦ Value Chain
  • 4.  Generic strategy ◦ Differentiation ◦ low cost leadership
  • 5.  Physical Capital  Human Capital  Organizational Capital Resources  Heterogeneous / Homogeneous  Mobile / Immobile
  • 6.  Sustained Competitive Advantage ◦ Valuable ◦ Rare ◦ Imperfectly Imitable  Unique Historical Conditions  Casual Ambiguity  Socially Complex ◦ Non-Substitutive
  • 7.  Resource based ◦ Capability Logic  Hypercompetitive / High velocity ◦ Guerilla Logic  Ecosystem / Chaos ◦ Complexity Logic
  • 8.  Superior Resources  Depicts core competencies as foundations for the future  Emphasizes internal capabilities  Protection of imitation  Complementary interdependence to support superior accomplishments
  • 9.  Constant disruption of current conditions  Lifespan of solutions is short  Radical changes to create temporary advantages  Organization units and actions are loosely coupled to support innovation and reduce constraint  Increase speed and capitalize on risk
  • 10.  Rely on network feedback and emergent relationships  Require a blend of competition and cooperation  Healthy ecosystem open to material and energy flows  Influence is achieved by managing initial conditions and forces/attractors  Value and culture determine the boundaries of social system
  • 11.  Determine the appropriate strategy for a firm competing in the consumer products industry with regards to: ◦ Capability Logic- Group 1 ◦ Guerilla Logic – Group 2 ◦ Complexity Logic- Group 3
  • 12.  Efforts to combine and blend these conceptual perspectives within a single strategy create serious problems for managers who are concerned about achieving consistency of purpose (Lengnick-Hall and Wolf, 1998)  http://www.youtube.com/watch?v=SxuYdzs4 SS8
  • 13.  Vision/Mission  Consistent Message  Filter
  • 14.  Capability Logic  Guerilla Logic  Complexity Logic

Editor's Notes

  1. Anne-
  2. Anne-
  3. Anne-
  4. Anne-
  5. Blake- Plant and Equipment Laborers to Leaders Structure, Planning, Controlling, Procedures In the Environmental Model it is conceptualized that Resources are Homogeneous and Mobile. This creates an environment where all of the resources are the same and accessible for all firms. Therefore, a Sustained Competitive Advantage could not form. In the Resource Model it is conceptualized that Resources are Heterogeneous and Immobile. This creates opportunities for sustained competitive advantage because all firms do not have equal access to all resources.
  6. Blake- Value- Exploit Opportunities or neutralize threats Rare- Among Competition Imperfectly Imitable- If the resource is imitable it ceases to be rare. Historical Conditions – firms cannot go back in time to duplicate historical impacts Casual Ambiguity- if the firm itself cannot determine the source of competitive advantage, how can competing firms? Socially Complex- Like Casual Ambiguity a competitive advantage arises without a great understanding. This time it has to do with a complex social phenomena for example Pixar. In regards to leadership, one resource required in the implementation of almost all strategies is managerial talent (Hambrck 1987)
  7. Blake-
  8. Blake- Competitive Advantages can be gained through..
  9. Anne-
  10. Anne- Each of these three core logics offers a different way to structure the ambiguous problem of strategy by creating a reasonable set of purposes, and by defining an effective relationship between a firm and its context.
  11. Anne
  12. Blake-
  13. Blake-
  14. Anne-
  15. Blake-