SlideShare a Scribd company logo
Porter’s Value Chain,
Porter’s Five Force ,
Net Present Value, and
Internal Rate of Return
by: Rizka Detri Ariyanni
Porter Value
Chain
2
Value Chain
It evaluates which value
each particular activity adds
to the organizations products
or services.
This idea was built upon the
insight that an organization is
more than a random
compilation of machinery,
equipment, people and
money.
Only if these things are
arranged into systems
and systematic activates it
will become possible to
produce something for
which customers are willing
to pay a price.
Porter argues that the
ability to perform particular
activities and to manage
the linkages between these
activities is a source of
competitive advantage.
(Michael Porter in his book "Competitive Advantage:
Creating and Sustaining superior Performance"
(1985).
3
Porter Original Model
4
Primary Activities
Inbound Logistics: Here goods are received from a company's
suppliers. They are stored until they are needed on the
production/assembly line. Goods are moved around the
organization.
Operations:This is where goods are manufactured or
assembled. Individual operations could include room service
in an hotel, packing of books/videos/games by an online
retailer, or the final tune for a new car's engine.
Outbound Logistics:The goods are now finished, and they need
to be sent along the supply chain to wholesalers, retailers or
the final consumer.
Marketing and Sales: In true customer orientated fashion, at this
stage the organization prepares the offering to meet the
needs of targeted customers. This area focuses strongly
upon marketing communications and the promotions mix.
5
Support Activities
Procurement :This function is responsible for all purchasing of
goods, services and materials. The aim is to secure the lowest
possible price for purchases of the highest possible quality.
Technology Development :Technology is an important source
of competitive advantage. Companies need to innovate to reduce
costs and to protect and sustain competitive advantage. This
could include production technology, Internet marketing activities,
lean manufacturing, Customer Relationship Management (CRM),
and many other technological developments.
Human Resource Management (HRM) :Employees are an
expensive and vital resource. An organization would manage
recruitment and selection, training and development, and rewards
and remuneration.
Firm Infrastructure :This activity includes and is driven by
corporate or strategic planning. It includes the Management
Information System (MIS), and other mechanisms for planning
6
Margin
Margin’ implies that organizations realize a profit
margin that depends on their ability to
manage the linkages between all activities in
the value chain.
organization is able to deliver a product / service
for which the customer is willing to pay more
than the sum of the costs of all activities in the
value chain.
7
Porter’s Five
Force
8
Porter’s Five Force
9
Porter’s five force analysis is a
framework that attempts to analyze the
level of competition within an industry
and business startegy development by
michael E. Porter 1980 it determines
the competive. It also determines the
ultimate profit potential of the industry
10
Net Present Value
(NPV)
11
 Cash flows of the investment project should
are forecasted based on realistic assumptions
 Appropriate discount rate are identified to
discount the forecasted cash flows
 Present value of cash flows is calculated using
the oppurtunity cost of capital as the discount
rate
Net Present Value
12
 Accept the project when NPV is positive NPV=0
 Reject the project when NPV is negative NPV<0
 May accept the project when NPV is zero NPV=0
NPV=C*(PVF)-i
In the above formula:
C is the cash inflow expected to be received each period
PVF is the present value factor
I is the initial investment
13
Internal Rate of
Return
(IRR)
14
Internal rate of return
Discount rate that makes NPV = 0
Accept if IRR > required return
Same decision as NPV with
conventional cash flows
Unreliable with:
Non-conventional cash flows
Mutually exclusive projects
MIRR = better alternative
15
Multiples IRR
✖ Descartes Rule of Signs
✖ Polynomial of degree n→n roots
When you solve for IRR you are solving for the root of an
equation
1 real root per sign change
Rest = imaginary (i2 = -1)
16
0
)IRR1(
CFn
0t
t
t



Thanks!
Any questions?
17

More Related Content

What's hot

1 ppt
1 ppt1 ppt
Ms 09 managerial economics
Ms   09 managerial economicsMs   09 managerial economics
Ms 09 managerial economics
smumbahelp
 
What's it Worth? Valuing a Business for Sale
What's it Worth? Valuing a Business for SaleWhat's it Worth? Valuing a Business for Sale
What's it Worth? Valuing a Business for Sale
Financial Poise
 
Cp knowledge: valuation 29.11.2008
Cp knowledge: valuation 29.11.2008Cp knowledge: valuation 29.11.2008
Cp knowledge: valuation 29.11.2008
Pavan Kumar Vijay
 
BPOs
BPOsBPOs
Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling
Ralph Colucci, CFA
 
Tse financial viability of a business model 2014
Tse financial viability of a business model 2014Tse financial viability of a business model 2014
Tse financial viability of a business model 2014
Valeryia Kazheunikava
 

What's hot (7)

1 ppt
1 ppt1 ppt
1 ppt
 
Ms 09 managerial economics
Ms   09 managerial economicsMs   09 managerial economics
Ms 09 managerial economics
 
What's it Worth? Valuing a Business for Sale
What's it Worth? Valuing a Business for SaleWhat's it Worth? Valuing a Business for Sale
What's it Worth? Valuing a Business for Sale
 
Cp knowledge: valuation 29.11.2008
Cp knowledge: valuation 29.11.2008Cp knowledge: valuation 29.11.2008
Cp knowledge: valuation 29.11.2008
 
BPOs
BPOsBPOs
BPOs
 
Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling
 
Tse financial viability of a business model 2014
Tse financial viability of a business model 2014Tse financial viability of a business model 2014
Tse financial viability of a business model 2014
 

Similar to Management Strategic

Porter value chain
Porter value chainPorter value chain
Porter value chain
nailul khaira
 
Porter Value Chain
Porter Value ChainPorter Value Chain
Porter Value Chain
Fadhlan Husaini
 
Porter's value chain
Porter's value chainPorter's value chain
Porter's value chain
nailul khaira
 
Miscellaneous Topics
Miscellaneous TopicsMiscellaneous Topics
Miscellaneous Topics
syed_shahzad786
 
Operations and competitiveness
Operations and competitivenessOperations and competitiveness
Operations and competitiveness
Jubayer Alam Shoikat
 
Pvc sucialca
Pvc sucialcaPvc sucialca
Pvc sucialca
Suci Carles
 
Price to Win: No longer a Black Art
Price to Win: No longer a Black ArtPrice to Win: No longer a Black Art
Price to Win: No longer a Black Art
Amplio Services
 
Attorney's Guide to the Valuation of Intellectual Property
Attorney's Guide to the Valuation of Intellectual PropertyAttorney's Guide to the Valuation of Intellectual Property
Attorney's Guide to the Valuation of Intellectual Property
Clyde Hanson, CPVA
 
Capital
CapitalCapital
Capital
Brooke Curtis
 
Lego Group Essay
Lego Group EssayLego Group Essay
Lego Group Essay
Courtney Davis
 
VALUE CHAIN MANAGEMENT
VALUE CHAIN MANAGEMENTVALUE CHAIN MANAGEMENT
VALUE CHAIN MANAGEMENT
Muhammad Ikhsanuddin
 
A.value chain management
A.value chain managementA.value chain management
A.value chain management
Muhammad Ikhsanuddin
 
Horizon-Associates Services Presentation
Horizon-Associates Services PresentationHorizon-Associates Services Presentation
Horizon-Associates Services Presentation
AmyBRollason
 
How to Turn Raw Data into Product Revenue by Retrofit PM
How to Turn Raw Data into Product Revenue by Retrofit PMHow to Turn Raw Data into Product Revenue by Retrofit PM
How to Turn Raw Data into Product Revenue by Retrofit PM
Product School
 
chooing inovation projects
chooing inovation projectschooing inovation projects
chooing inovation projects
FajriAnsyahPutra2
 
Sd logic version_final2.0
Sd logic version_final2.0Sd logic version_final2.0
Sd logic version_final2.0
Ashish Aggarwal
 
Ojijo 6 s business performance measurement matrix
Ojijo 6 s business performance measurement matrixOjijo 6 s business performance measurement matrix
Ojijo 6 s business performance measurement matrix
Ojijo P
 
CATALOG DE SERVICII redus eng
CATALOG DE SERVICII redus engCATALOG DE SERVICII redus eng
CATALOG DE SERVICII redus eng
Dalia Anghel
 
Business Strategy LO3.PPTX
Business Strategy LO3.PPTXBusiness Strategy LO3.PPTX
Business Strategy LO3.PPTX
RuhDil
 
How CPOs Should Navigate the Digital Procurement Journey - Ward Karson, Raindrop
How CPOs Should Navigate the Digital Procurement Journey - Ward Karson, RaindropHow CPOs Should Navigate the Digital Procurement Journey - Ward Karson, Raindrop
How CPOs Should Navigate the Digital Procurement Journey - Ward Karson, Raindrop
Finance Network marcus evans
 

Similar to Management Strategic (20)

Porter value chain
Porter value chainPorter value chain
Porter value chain
 
Porter Value Chain
Porter Value ChainPorter Value Chain
Porter Value Chain
 
Porter's value chain
Porter's value chainPorter's value chain
Porter's value chain
 
Miscellaneous Topics
Miscellaneous TopicsMiscellaneous Topics
Miscellaneous Topics
 
Operations and competitiveness
Operations and competitivenessOperations and competitiveness
Operations and competitiveness
 
Pvc sucialca
Pvc sucialcaPvc sucialca
Pvc sucialca
 
Price to Win: No longer a Black Art
Price to Win: No longer a Black ArtPrice to Win: No longer a Black Art
Price to Win: No longer a Black Art
 
Attorney's Guide to the Valuation of Intellectual Property
Attorney's Guide to the Valuation of Intellectual PropertyAttorney's Guide to the Valuation of Intellectual Property
Attorney's Guide to the Valuation of Intellectual Property
 
Capital
CapitalCapital
Capital
 
Lego Group Essay
Lego Group EssayLego Group Essay
Lego Group Essay
 
VALUE CHAIN MANAGEMENT
VALUE CHAIN MANAGEMENTVALUE CHAIN MANAGEMENT
VALUE CHAIN MANAGEMENT
 
A.value chain management
A.value chain managementA.value chain management
A.value chain management
 
Horizon-Associates Services Presentation
Horizon-Associates Services PresentationHorizon-Associates Services Presentation
Horizon-Associates Services Presentation
 
How to Turn Raw Data into Product Revenue by Retrofit PM
How to Turn Raw Data into Product Revenue by Retrofit PMHow to Turn Raw Data into Product Revenue by Retrofit PM
How to Turn Raw Data into Product Revenue by Retrofit PM
 
chooing inovation projects
chooing inovation projectschooing inovation projects
chooing inovation projects
 
Sd logic version_final2.0
Sd logic version_final2.0Sd logic version_final2.0
Sd logic version_final2.0
 
Ojijo 6 s business performance measurement matrix
Ojijo 6 s business performance measurement matrixOjijo 6 s business performance measurement matrix
Ojijo 6 s business performance measurement matrix
 
CATALOG DE SERVICII redus eng
CATALOG DE SERVICII redus engCATALOG DE SERVICII redus eng
CATALOG DE SERVICII redus eng
 
Business Strategy LO3.PPTX
Business Strategy LO3.PPTXBusiness Strategy LO3.PPTX
Business Strategy LO3.PPTX
 
How CPOs Should Navigate the Digital Procurement Journey - Ward Karson, Raindrop
How CPOs Should Navigate the Digital Procurement Journey - Ward Karson, RaindropHow CPOs Should Navigate the Digital Procurement Journey - Ward Karson, Raindrop
How CPOs Should Navigate the Digital Procurement Journey - Ward Karson, Raindrop
 

Recently uploaded

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Management Strategic

  • 1. Porter’s Value Chain, Porter’s Five Force , Net Present Value, and Internal Rate of Return by: Rizka Detri Ariyanni
  • 3. Value Chain It evaluates which value each particular activity adds to the organizations products or services. This idea was built upon the insight that an organization is more than a random compilation of machinery, equipment, people and money. Only if these things are arranged into systems and systematic activates it will become possible to produce something for which customers are willing to pay a price. Porter argues that the ability to perform particular activities and to manage the linkages between these activities is a source of competitive advantage. (Michael Porter in his book "Competitive Advantage: Creating and Sustaining superior Performance" (1985). 3
  • 5. Primary Activities Inbound Logistics: Here goods are received from a company's suppliers. They are stored until they are needed on the production/assembly line. Goods are moved around the organization. Operations:This is where goods are manufactured or assembled. Individual operations could include room service in an hotel, packing of books/videos/games by an online retailer, or the final tune for a new car's engine. Outbound Logistics:The goods are now finished, and they need to be sent along the supply chain to wholesalers, retailers or the final consumer. Marketing and Sales: In true customer orientated fashion, at this stage the organization prepares the offering to meet the needs of targeted customers. This area focuses strongly upon marketing communications and the promotions mix. 5
  • 6. Support Activities Procurement :This function is responsible for all purchasing of goods, services and materials. The aim is to secure the lowest possible price for purchases of the highest possible quality. Technology Development :Technology is an important source of competitive advantage. Companies need to innovate to reduce costs and to protect and sustain competitive advantage. This could include production technology, Internet marketing activities, lean manufacturing, Customer Relationship Management (CRM), and many other technological developments. Human Resource Management (HRM) :Employees are an expensive and vital resource. An organization would manage recruitment and selection, training and development, and rewards and remuneration. Firm Infrastructure :This activity includes and is driven by corporate or strategic planning. It includes the Management Information System (MIS), and other mechanisms for planning 6
  • 7. Margin Margin’ implies that organizations realize a profit margin that depends on their ability to manage the linkages between all activities in the value chain. organization is able to deliver a product / service for which the customer is willing to pay more than the sum of the costs of all activities in the value chain. 7
  • 10. Porter’s five force analysis is a framework that attempts to analyze the level of competition within an industry and business startegy development by michael E. Porter 1980 it determines the competive. It also determines the ultimate profit potential of the industry 10
  • 12.  Cash flows of the investment project should are forecasted based on realistic assumptions  Appropriate discount rate are identified to discount the forecasted cash flows  Present value of cash flows is calculated using the oppurtunity cost of capital as the discount rate Net Present Value 12
  • 13.  Accept the project when NPV is positive NPV=0  Reject the project when NPV is negative NPV<0  May accept the project when NPV is zero NPV=0 NPV=C*(PVF)-i In the above formula: C is the cash inflow expected to be received each period PVF is the present value factor I is the initial investment 13
  • 15. Internal rate of return Discount rate that makes NPV = 0 Accept if IRR > required return Same decision as NPV with conventional cash flows Unreliable with: Non-conventional cash flows Mutually exclusive projects MIRR = better alternative 15
  • 16. Multiples IRR ✖ Descartes Rule of Signs ✖ Polynomial of degree n→n roots When you solve for IRR you are solving for the root of an equation 1 real root per sign change Rest = imaginary (i2 = -1) 16 0 )IRR1( CFn 0t t t   