predictive analytics texas business school

Predictive Analytics

Marketing

Strategy



Case Study Solution | Assignment Help | Case Help

Network Associates: Securing the Internet Description

Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would begin selling powerful encryption software from its Dutch subsidiary. Such a move looked to the U.S. government like a violation of export regulations, but the company was confident it had operated within the bounds of law. Indeed, Network Associates appeared to have deftly exploited the uncertain nature of government regulation in a time of rapidly changing technology. Encryption export regulations had become highly controversial in the mid-1990s, and were the subject of ongoing legislative debate in 1998. While the regulations had been slowly evolving toward permissiveness, the pace of change did not meet the expectations of many companies in Silicon Valley. Network Associates was the first company to boldly challenge the export regulations and assert its commercial rights to sell its encryption products to foreign users. While such a move gave the company distinct first-mover advantages, it was also a strategy that contained significant political risks.


Case Description Network Associates: Securing the Internet

Strategic Managment Tools Used in Case Study Analysis of Network Associates: Securing the Internet

STEP 1. Problem Identification in Network Associates: Securing the Internet case study

STEP 2. External Environment Analysis - PESTEL / PEST / STEP Analysis of Network Associates: Securing the Internet case study

STEP 3. Industry Specific / Porter Five Forces Analysis of Network Associates: Securing the Internet case study

STEP 4. Evaluating Alternatives / SWOT Analysis of Network Associates: Securing the Internet case study

STEP 5. Porter Value Chain Analysis / VRIO / VRIN Analysis Network Associates: Securing the Internet case study

STEP 6. Recommendations Network Associates: Securing the Internet case study

STEP 7. Basis of Recommendations for Network Associates: Securing the Internet case study

QUALITY & ON TIME DELIVERY

100% money back guarantee if the quality doesn't match the promise

100% Plagiarism Free

If the work we produce contain plagiarism then we payback 1000 USD

Paypal Secure

All your payments are secure with Paypal security.


300 Words per Page

We provide 300 words per page unlike competitors' 250 or 275

Freebies

Free Title Page, Citation Page, References, Exhibits, Revision, Charts

Case study solutions are career defining. Order your custom solution now.

Case Analysis of Network Associates: Securing the Internet

Network Associates: Securing the Internet is a Harvard Business (HBR) Case Study on Global Business , Texas Business School provides HBR case study assignment help for just $9. Texas Business School(TBS) case study solution is based on HBR Case Study Method framework, TBS expertise & global insights. Network Associates: Securing the Internet is designed and drafted in a manner to allow the HBR case study reader to analyze a real-world problem by putting reader into the position of the decision maker. Network Associates: Securing the Internet case study will help professionals, MBA, EMBA, and leaders to develop a broad and clear understanding of casecategory challenges. Network Associates: Securing the Internet will also provide insight into areas such as – wordlist , strategy, leadership, sales and marketing, and negotiations.

Case Study Solutions Background Work

Network Associates: Securing the Internet case study solution is focused on solving the strategic and operational challenges the protagonist of the case is facing. The challenges involve – evaluation of strategic options, key role of Global Business, leadership qualities of the protagonist, and dynamics of the external environment. The challenge in front of the protagonist, of Network Associates: Securing the Internet, is to not only build a competitive position of the organization but also to sustain it over a period of time.

Strategic Management Tools Used in Case Study Solution

The Network Associates: Securing the Internet case study solution requires the MBA, EMBA, executive, professional to have a deep understanding of various strategic management tools such as SWOT Analysis, PESTEL Analysis / PEST Analysis / STEP Analysis, Porter Five Forces Analysis, Go To Market Strategy, BCG Matrix Analysis, Porter Value Chain Analysis, Ansoff Matrix Analysis, VRIO / VRIN and Marketing Mix Analysis.

Texas Business School Approach to Global Business Solutions

In the Texas Business School, Network Associates: Securing the Internet case study solution – following strategic tools are used - SWOT Analysis, PESTEL Analysis / PEST Analysis / STEP Analysis, Porter Five Forces Analysis, Go To Market Strategy, BCG Matrix Analysis, Porter Value Chain Analysis, Ansoff Matrix Analysis, VRIO / VRIN and Marketing Mix Analysis.

We have additionally used the concept of supply chain management and leadership framework to build a comprehensive case study solution for the case – Network Associates: Securing the Internet

Step 1 – Problem Identification of Network Associates: Securing the Internet - Harvard Business School Case Study

The first step to solve HBR Network Associates: Securing the Internet case study solution is to identify the problem present in the case. The problem statement of the case is provided in the beginning of the case where the protagonist is contemplating various options in the face of numerous challenges that Encryption Associates is facing right now. Even though the problem statement is essentially – “Global Business” challenge but it has impacted by others factors such as communication in the organization, uncertainty in the external environment, leadership in Encryption Associates, style of leadership and organization structure, marketing and sales, organizational behavior, strategy, internal politics, stakeholders priorities and more.

Step 2 – External Environment Analysis

Texas Business School approach of case study analysis – Conclusion, Reasons, Evidences - provides a framework to analyze every HBR case study. It requires conducting robust external environmental analysis to decipher evidences for the reasons presented in the Network Associates: Securing the Internet.

The external environment analysis of Network Associates: Securing the Internet will ensure that we are keeping a tab on the macro-environment factors that are directly and indirectly impacting the business of the firm.

What is PESTEL Analysis? Briefly Explained

PESTEL stands for political, economic, social, technological, environmental and legal factors that impact the external environment of firm in Network Associates: Securing the Internet case study. PESTEL analysis of " Network Associates: Securing the Internet" can help us understand why the organization is performing badly, what are the factors in the external environment that are impacting the performance of the organization, and how the organization can either manage or mitigate the impact of these external factors.

How to do PESTEL / PEST / STEP Analysis? What are the components of PESTEL Analysis?

As mentioned above PESTEL Analysis has six elements – political, economic, social, technological, environmental, and legal. All the six elements are explained in context with Network Associates: Securing the Internet macro-environment and how it impacts the businesses of the firm.

How to do PESTEL Analysis for Network Associates: Securing the Internet

To do comprehensive PESTEL analysis of case study – Network Associates: Securing the Internet , we have researched numerous components under the six factors of PESTEL analysis.

Political Factors that Impact Network Associates: Securing the Internet

Political factors impact seven key decision making areas – economic environment, socio-cultural environment, rate of innovation & investment in research & development, environmental laws, legal requirements, and acceptance of new technologies.

Policy Making Impact on Network Associates: Securing the Internet

Government policies have significant impact on the business environment of any country. The firm in “ Network Associates: Securing the Internet ” needs to navigate these policy decisions to create either an edge for itself or reduce the negative impact of the policy as far as possible.

Data safety laws – The countries in which Encryption Associates is operating, firms are required to store customer data within the premises of the country. Encryption Associates needs to restructure its IT policies to accommodate these changes. In the EU countries, firms are required to make special provision for privacy issues and other laws.

Competition Regulations – Numerous countries have strong competition laws both regarding the monopoly conditions and day to day fair business practices. Network Associates: Securing the Internet has numerous instances where the competition regulations aspects can be scrutinized.

Import restrictions on products – Before entering the new market, Encryption Associates in case study Network Associates: Securing the Internet" should look into the import restrictions that may be present in the prospective market.

Export restrictions on products – Apart from direct product export restrictions in field of technology and agriculture, a number of countries also have capital controls. Encryption Associates in case study “ Network Associates: Securing the Internet ” should look into these export restrictions policies.

Foreign Direct Investment Policies – Government policies favors local companies over international policies, Encryption Associates in case study “ Network Associates: Securing the Internet ” should understand in minute details regarding the Foreign Direct Investment policies of the prospective market.

Taxation & Regulation Impact on Network Associates: Securing the Internet

Corporate Taxes – The rate of taxes is often used by governments to lure foreign direct investments or increase domestic investment in a certain sector. Corporate taxation can be divided into two categories – taxes on profits and taxes on operations. Taxes on profits number is important for companies that already have a sustainable business model, while taxes on operations is far more significant for companies that are looking to set up new plants or operations.

Tariffs – Chekout how much tariffs the firm needs to pay in the “ Network Associates: Securing the Internet ” case study. The level of tariffs will determine the viability of the business model that the firm is contemplating. If the tariffs are high then it will be extremely difficult to compete with the local competitors. But if the tariffs are between 5-10% then Encryption Associates can compete against other competitors.

Government Scheme & Subsidies Impact on Network Associates: Securing the Internet

Research and Development Subsidies and Policies – Governments often provide tax breaks and other incentives for companies to innovate in various sectors of priority. Managers at Network Associates: Securing the Internet case study have to assess whether their business can benefit from such government assistance and subsidies.

Consumer protection – Different countries have different consumer protection laws. Managers need to clarify not only the consumer protection laws in advance but also legal implications if the firm fails to meet any of them.

Political System & Stability, and its Impact on Network Associates: Securing the Internet

Political System and Its Implications – Different political systems have different approach to free market and entrepreneurship. Managers need to assess these factors even before entering the market.

Freedom of Press is critical for fair trade and transparency. Countries where freedom of press is not prevalent there are high chances of both political and commercial corruption.

Corruption level – Encryption Associates needs to assess the level of corruptions both at the official level and at the market level, even before entering a new market. To tackle the menace of corruption – a firm should have a clear SOP that provides managers at each level what to do when they encounter instances of either systematic corruption or bureaucrats looking to take bribes from the firm.

Independence of judiciary – It is critical for fair business practices. If a country doesn’t have independent judiciary then there is no point entry into such a country for business.

Government attitude towards trade unions – Different political systems and government have different attitude towards trade unions and collective bargaining. The firm needs to assess – its comfort dealing with the unions and regulations regarding unions in a given market or industry. If both are on the same page then it makes sense to enter, otherwise it doesn’t.

Economic Factors that Impact Network Associates: Securing the Internet

Social Factors that Impact Network Associates: Securing the Internet

Technological Factors that Impact Network Associates: Securing the Internet

Environmental Factors that Impact Network Associates: Securing the Internet

Legal Factors that Impact Network Associates: Securing the Internet

Step 3 – Industry Specific Analysis

What is Porter Five Forces Analysis

PESTEL stands for political, economic, social, technological, environmental and legal factors that impact the external environment of firm in Network Associates: Securing the Internet case study. PESTEL analysis of " Network Associates: Securing the Internet" can help us understand why the organization is performing badly, what are the factors in the external environment that are impacting the performance of the organization, and how the organization can either manage or mitigate the impact of these external factors.

Step 4 – SWOT Analysis / Internal Environment Analysis

Step 5 – Porter Value Chain / VRIO / VRIN Analysis

Step 6 – Evaluating Alternatives & Recommendations

Step 7 – Basis for Recommendations

References :: Network Associates: Securing the Internet case study solution

Amanda Watson

Amanda is strategy expert at Texas Business School . She is passionate about corporate strategy, competitive strategy, game theory, and business model innovation. You can hire Texas Business School professinoals to revolutionize your strategy & business.

About Us

.

Wishlist

Dark Brown Leather Watch

$200.00 $180.00

Dining Chair

$300.00 $220.00

Creative Wooden Stand

$100.00 $80.00

Dark Brown Leather Watch

$200.00 $180.00

Creative Wooden Stand

$200.00 $180.00

Cart

Subtotal: $200.00

Free Shipping on All Orders Over $100!

# Hit enter to search or ESC to close

Wooden round table

$360.00 $300.00

Hurley Dry-Fit Chino Short. Men's chino short. Outseam Length: 19 Dri-FIT Technology helps keep you dry and comfortable. Made with sweat-wicking fabric. Fitted waist with belt loops. Button waist with zip fly provides a classic look and feel .

Quantity:
SKU: 12345
Categories: Fashion, Men, Sunglasses
Tags: Fashion, Men
Share on:
Close