Sunday 16 December 2012

*Chapter 2 case. "Charge It" with your cell phone


 Assalamalaikum. This is a answer for the question with my group Azfar Yusop.




Do you view this technology as a potential threat to traditional telephone companies? If so, what counter strategies couldtraditional telephone companies adopt to prepare for this technology?
  •  Yes, if possible somehow tie the profits to the cell phone company to traditional telephone      companies to make some money off it without putting them out of business. Then, make traditional telephone more appealing to people and possibly cheaper packages then what they already have.

 Using Porter's Five Forces describe the barriers to entry for this new technology.
  •  Yes, if possible somehow tie the profits to the cell phone company to traditional telephone      companies to make some money off it without putting them out of business. Then, make traditional telephone more appealing to people and possibly cheaper packages then what they already have.









    Which of Porter's three generic strategies is the new technology following?
  •  The Porter’s three generic strategies is the new technology is focused strategy to target a niche market. It is show to targeting the growing market of cell phone users and purchasing products and services from the cell phone.
Describe the valure chain of the business of using cell phone as a payment method.
  •  Value chain increase the infrastructure of phone companies and improve technology development are :
    a.       Payment method can receive/store information from the consumers purchases and send that to the phone company.   
    b.      More people will engage in this type of payment method.
     

What type of regulatory issues might occur due to this type of technology? 
  •         Type of regulatory issues might occur due to this type of technology People will be skeptical with putting personal information out there not knowing what kind of security protection the company has.  Then, another type of regulatory issues is people will find a way to hack into cell phones.  










 




No comments:

Post a Comment