Michael Poters Frame Work

In: Business and Management

Submitted By Wakibarangeta
Words 2552
Pages 11
MZUMBE UNIVERSITY
(CHUO KIKUU MZUMBE)
SCHOOL OF BUSINESS
DEPARTMENT OF BUSINESS STUDIES
MBA- CORPORATE MANAGEMENT
BUS 5021 Strategic Business Management.
GROUP ASSIGNMENT 1.
GROUP MEMBERS
S/No.NAME
1. BERTHA MARERE 2. CELESTA KAGWI 3. ERASTO NZOTA 4. MARIA KALUSE 5. AZIZA ABDULRALMAN 6. AGNESS KILINDO 7. JOHN SIULAPWA 8. HENRY MFUMU 9. PAUL HUMBI 10. WAKIBARA NGETA

DATE OF SUBMISSION: FRIDAY 16/11/2013.

TABLE OF CONTENTS 1.0. INTRODUCTION. 1 1.1. The Mobile phone Industry of Tanzania 1 2.0 .PORTER’S FIVE FORCES FRAMEWORK MODEL, PFFF 1 2.1. Degree of rivalry among existing firms. 2 2.2. Threat of substitute Products or Service. 3 2.3. Threats of new entrants 4 2.4 Bargaining power of buyers/Customers. 5 2.5. Bargaining power of Suppliers 5 2.6. Mapping the Porter’s Five Forces Model in the Mobile Industry in TANZANIA. 5 3.0. CONCLUSION. 7 4.0.REFERENCE 8

ABSTRACT

The Mobile Phone industry of Tanzania has been growing very slowly in terms of the number of firms in the industry during the last two decades. The growth rate in terms of the number of customers has been very fast. Number of things ishappening within the industry after its liberalization. The aspect of competition is now crucial for the operators who are within the Mobile Phone industry. Porter’s Five Forces Framework is one of the strategic models used to assess the attractiveness of the industry (being service or manufacturing). This model is defined by the five key forces which are; Rivalry among the existing firms, Threat of new entrants,Threat of substitutes, Bargaining power of suppliers and bargaining power of customers.
The mobile phone industry of Tanzania has 7 mobile phone operators, and two (2) substitute service provider.Bargaining Power of Suppliers, threat of new…...

Similar Documents

Sampling Frame

...Sampling Frame Advanced Cell technologies are constantly conducting hundreds of clinical trials in order to gain more knowledge on stem cell research. When dealing with the ethical barriers derived from stem cell research Advanced Cell Technologies spare no resources to maintain a healthy line so crossing of moral barriers occur. In order to conduct and proceed with research, a set of specific sampling frames must first be created. In statistics, a sampling frame is the source material or device from which a sample is drawn. [1] It is a list of all those within a population who can be sampled, and may include individuals, households or institutions. In many practical situations the frame is a matter of choice to the survey planner, and sometimes a critical one. [...] Some very worthwhile investigations are not undertaken at all because of the lack of an apparent frame; others, because of faulty frames, have ended in a disaster or in cloud of doubt.—Raymond James Jessen Within an ideal sampling frame the following elements must be achieved. First, all units have a logical, numerical identifier. Second all units can be found - their contact information, map location or other relevant information is present. Thirdly, the frame is organized in a logical, systematic fashion. Next the frame has additional information about the units that allow the use of more advanced sampling frames. Next every element of the population of interest is present in the frame. Finally, every......

Words: 401 - Pages: 2

Michael

...Michael Jackson Personnel: 38 years of Michael Jackson's career as a solo artist. But some artist were significant to his career. The Jackson 5 recorded 14 albums and Michael recorded 4 solo albums with Motown records. Jackson 5: It jumpstarted his career by making him the lead singer of his family band, formed in 1964. The band put him into a recording contract with Motown, which boosted his fame. Slash: (VIDEO) In 1991, Slash played lead guitar on the single "Give In to Me" off Michael Jackson's album Dangerous, as well as in the opening skit for the song "Black or White" off the same album. In 1995, he played guitar on "D.S.," a controversial song from Jackson's HIStory album, and in 1997 appeared on the song "Morphine" off the remix album Blood on the Dance Floor. In 2001, Slash played on "Privacy" off Jackson's final studio album, Invincible. Slash also played at the "1995 MTV Video Music Awards" with Jackson on "Black or White" Van Halen: Was the feature guitarist in the song “Beat it” and peaking at No. 2 on the Billboard charts behind Michael Jackson's album Thriller Important recordings: 1. Billie Jean- This was one of Michael Jackson milestone songs. This song was true to who Michael really was and told the story of an event in his life. This song spent 7 weeks at the top of the pop singles chart in 1983 2. Black or White- This songs was the second biggest hit in Michael Jacksons solo career staying at number 1 for 7 weeks. This song represented......

Words: 333 - Pages: 2

Poters Model

...with filing the Revised Scheme and other necessary documents with the relevant High Courts and other regulatory authorities for their approval. EMPLOYEE STOCK OPTION PLAN (ESOP) The Bank has instituted an Employee Stock Option Scheme to enable its employees and the employees of its subsidiaries including Whole-time Directors, to participate in the future growth and financial success of the Bank. Under the Scheme 40,517,400 options can be granted to employees. The employee stock option scheme is in accordance with the Securities and Exchange Board of India (Employee Stock Option and Employee Stock Purchase Scheme) Guidelines, 1999. The eligibility and number of options to be granted to an employee is determined on the basis of the employee’s work performance and is approved by the Board of Directors. The Bank’s shareholders approved plans for the issuance of stock options to employees in February 2001, June 2004, June 2006, June 2008 and June 2010. Under the first two plans and upto the grant made on 29th April 2004, the option conversion price was set at the average daily high-low price of the Bank’s equity shares traded during the 52 weeks preceding the date of grant at the Stock Exchange which has had the maximum trading volume of the Bank’s equity share during that period. Under the third plan and with effect from the grant made by the Bank on 10th June 2005, the pricing formula has been changed to the closing price on the day previous to the grant date. The Remuneration......

Words: 76317 - Pages: 306

Legal Frame Work

...claim damages for breach of contract, including a claim that he had a reasonable prospect of a podium finish in a race which he had to miss because the car delevered was not competitive as a result of the increased weight. 1. This is a contract for the sale of goods between Sam ("The Seller") and Bert ("The Buyer") with an express term that the AC Mamba ("The Car") complied with the manufacturer specification. The contract is governed by the Sale of Goods Act 1979 and, in particular, the implied terms provision as to compliance with description (s. 13(1) and, satisfactory quality and fitness for purpose (s.14) The buyer's remedy of rejection and a claim in damages will depend on whether he is held to have accepted the goods after three works under ss 34 and 25; the doctrine of acceptance. The Express Term 2. The car was sold to "Manufacturer specifications" which included the weight provisions; a term which has clearly been broken in the car as delivered.There can be no doubt in the present case that the 'manufacturer specification' is incorporated as a term of the contract. It is not immediately apparent that such a term goes necessarily to the root of the contract, sufficient to be defined as a condition of the contract, breach entitling the buyer subject to affirmation to accept the repudiatory breach, terminate the contract and claim damages. (Photo Production Ltd v Securicor Ltd [1980] AC 827 ) It seems clear that the parties did not define such an obligation,......

Words: 29335 - Pages: 118

Asset Register Frame Work

...also some of the successful international experiments in this area. The first step in asset management is to differentiate assets from stores (items which are consumed like stationery) and stock-in-trade (items that are for sale such as the produce of jail inmates). An asset register policy framework that will guide the preparation and maintenance of asset register is imperative for an effective asset register framework. The policy framework is set out in Chapter 3 of this report. A major initiative such as the asset register preparation can not be accomplished without an adequate organizational support framework. It would not be possible to prepare and maintain a state wide asset register unless posts are identified for carrying out the work and their roles and responsibilities are precisely defined. The suggested organizational framework is given in Chapter 4. It is a matter of policy as to what assets would be included in the asset register and what would be key principles of asset management such as the threshold value beyond which an asset would be recognized as an asset, and so on. Chapter 5 provides a working definition of assets for the purpose of asset register framework and puts forward some rules for asset register. Asset register is essentially a database of assets. In order that asset information is easily and effectively retrieved, it is necessary to apply a coding and database structure that serves the information needs of different users. What data fields to......

Words: 27945 - Pages: 112

Frame-Relay

...Professor Jeffrey Robinson August 20, 2013 Abstract In this discussion we look at some of the history around frame-relay. We then look at some of the equipment necessary to create the frame relay connections, as well as how the connections work both logically and physically. Some limiting factors are discussed as well as committed information rates, burst rates, an error handling. Some of the positive aspects of frame-relay are identified along with some options for the future of WAN technologies. Frame-Relay Operating at the physical and datalink layers of the OSI model, frame relay is a high-performing WAN protocol. It was originally designed for use with ISDN integrated services digital network interfacing. It has evolved into being used on multiple types of network interfaces. In 1984 the initial proposal for frame-relay standardization was presented to the CCITT Consultative Committee on international telephone and telegraph. Because interoperability standards were lacking, frame-relay did not fully take off until the 1990s. In 1990 StrataCom, Northern Telecom, Digital Equipment Corporation (DEC), and Cisco created a consortium that focused on the technical development of frame-relay technology. While the CCITT was already discussing frame-relay, the consortium established specifications that while still conforming to the frame-relay protocol, enhanced the protocol with additional features to accommodate more complex......

Words: 2574 - Pages: 11

Igrant Women and Their Livelihood Frame Work in Dhaka City

...Term Paper on MIGRANT WOMEN AND THEIR LIVELIHOOD FRAME WORK IN DHAKA CITY: A CASE STUDY ON T&T SLUM Chapter | Page no. | 1. Introduction | 4 | 2. Methodology | | 2.1 Focus Group | 5 | 2.2 Group Size | 5 | 2.3 Data Collection | 6 | 2.4 Data Analysis 2.5 Limitation | 6 7 | 3. Findings And Analysis | 7 | 3.1 Reasons Of Migration | 7 | 3.2 Way Of Earning | 9 | 3.3 Obstacles | 10 | 3.4 Family | 12 | 3.5 Earning And Spending | 12 | 3.6 Support | 14 | 3.7 Satisfaction | 15 | Conclusion | ...

Words: 3430 - Pages: 14

Michael

...four _variations, that college football (in your opinion) is bad for the players. Look at the work oJ any professional writer and notice how constantly he is moving from the generality, the abstract statement, to the concrete example, the facts and figures, the illustration. If he is writing on juvenile delinquency, he does not just tell you that juveniles . are (it seems to him) delinquent and that (in his opinion) something should be done about it. He shows you juveniles being delinquent, tearing up movie theatres in Buffalo, stabbing high school principals in Dallas, smoking marijuana in Palo Alto. And more than likely he is moving toward some specific remedy, not just a general wringing of the hands. It is no doubt possible to be too concrete, too illustrative or anecdotal, but few inexperienced writers err this way. For mostthe soundest advice is to be seeking always for the picture, to be always turning general remarks into seeable examples. Don't say, "Sororities teach girls the social graces." Say, "Sorority life teaches a girl how to carry on a conversation while pouring tea, without sloshing the tea into the saucer." Don't say, "I like certain kinds of popular music very much." Say, "Whenever I hear Gerber Spinklittle play 'Mississippi Man' on the trombone, my socks creep up my ankles." to achieve this staggering total? Obviously by never using one word when he can somehow work in ten. He is therefore seldom content with a plain statement like "Fast driving is......

Words: 6637 - Pages: 27

Michael

...following commands enables you to set your system to view hidden files by only entering l? D. alias l= "ls -a" You have written a script, but when you run it there is an error. Which of the following commands can you use to debug your script? (Choose all that apply.) B. sh -v D. sh -x You have written a shell program that creates four temporary files. Which of the following commands can you use to remove these files when the script has completed its work? A. trap Which of the following commands work well for menus used in a script? (Choose all that apply.) B. case You are currently in the soruce directory, which is the new directory you have just created for storying and running your scripts. You want to make certain that the source directory is in your default path. Which of the following commands enable you to view the current default path settings? D. echo $PATH You have created a script for use by your entire department in a commonly accessed directory. Only you are able to run the script, which works perfectly. Which of the following is likely to be the problem? B. You did not give all users in your department execute permissions for that script. For which of the following logic structures used within a script if fi the final line for that logic structure? (Choose all that apply.) D. if Which of the following are examples of arithmetic or relational operators? (Choose all that apply.) A. / B. < C. % D. * You have......

Words: 696 - Pages: 3

Portal Frames

...Portal Frames Portal frames are generally low-rise structures, comprising columns and horizontal or pitched rafters, connected by moment-resisting connections. Resistance to lateral and vertical actions is provided by the rigidity of the connections and the bending stiffness of the members, which is increased by a suitable haunch or deepening of the rafter sections. This form of continuous frame structure is stable in its plane and provides a clear span that is unobstructed by bracing. They are very efficient for enclosing large volumes; therefore they are often used for industrial, storage, retail and commercial applications as well as for agricultural purposes. A portal frame building comprises a series of transverse frames braced longitudinally. The primary steelwork consists of columns and rafters, which form portal frames, and bracing. The end frame (gable frame) can be either a portal frame or a braced arrangement of columns and rafters. The light gauge secondary steelwork consists of side rails for walls and purlins for the roof. The secondary steelwork supports the building envelope, but also plays an important role in restraining the primary steelwork. The roof and wall cladding separate the enclosed space from the external environment as well as providing thermal and acoustic insulation. The structural role of the cladding is to transfer loads to secondary steelwork and also to restrain the flange of the purlin or rail to which it is......

Words: 2094 - Pages: 9

Nist Cyber Security Frame Work

...Cybersecurity (cybersecurity executive order) on February 12, 2013. The cybersecurity executive order directed the US Department of Commerce’s National Institute of Standards and Technology (NIST) to work with stakeholders to develop a voluntary framework for reducing cybersecurity risks to critical infrastructure. As a result, on February 12, 2014, NIST released its Framework for Improving Critical Infrastructure Cybersecurity (Framework). The Framework is a risk-based approach to cybersecurity that provides a methodology to develop a cybersecurity program within an organization but does not provide concrete security recommendations. NIST is a non-regulatory federal agency and the Framework is voluntary. Therefore, the Framework does not form the basis for any formal regulations or regulatory action. However, the cybersecurity executive order directed the federal regulatory agencies to assess their regulations and guidance against the Framework. Accordingly, it is possible that the Framework may become the standard for federal cybersecurity regulations. There is a growing consensus that it is fast becoming the de facto standard for private sector cybersecurity. By implementing the Framework’s approach to developing a cybersecurity program, organizations can: „„ Assess and work toward a plan to improve their cybersecurity. „„ Potentially avoid the conclusion that they were negligent or inattentive to cybersecurity best practices in the event of......

Words: 4438 - Pages: 18

Michael

...Wikipedia, the free encyclopedia For other people named Michael Jackson, see Michael Jackson (disambiguation). Michael Jackson Jackson at the White House in 1984 Background information Birth name Michael Joseph Jackson[1] Also known as Michael Joe Jackson Born August 29, 1958 Gary, Indiana, U.S. Died June 25, 2009 (aged 50) Los Angeles, California, U.S. Genres R&B, pop, rock, soul, dance, funk, disco, New jack swing Occupations Singer-songwriter, record producer, composer, musician, dancer, choreographer, actor, businessman, philanthropist Instruments Vocals Years active 1964–2009 Labels Motown, Epic, Legacy Associated acts The Jackson 5 Website michaeljackson.com Michael Jackson's signature Michael Joseph Jackson[1] (August 29, 1958 – June 25, 2009) was an American recording artist, entertainer, and businessman. Referred to as the King of Pop, or by his initials MJ,[2] Jackson is recognized as the most successful entertainer of all time by Guinness World Records. His contribution to music, dance, and fashion, along with a much-publicized personal life, made him a global figure in popular culture for over four decades. The seventh child of the Jackson family, he debuted on the professional music scene along with his brothers as a member of The Jackson 5, then the Jacksons in 1964, and began his solo career in 1971. In the early...

Words: 21623 - Pages: 87

Michael

...wear and tear, depletion, passage of time, obsolescence or accidents over a time period. Therefore, the actual value of the asset cannot be determined if we take the purchase amount in the books every year. Fixed assets are major expenses of any business and have a set life period of their own when used commercially. After a certain time period they become obsolete for use, and require the business to buy that particular asset again. In terms of realization of cash, fixed assets have a longer liquidity time period. For example, if the business has purchased land and buildings, it will take a longer time to be realized in cash. In contrast, the current assets of the company – including money receivable, inventory, etc. – have a shorter time frame to be realized in cash. In order to reduce the burden on the business accounting bodies all over the world, the depreciation tool is used to determine the actual value of the asset and use it as a sinking fund to replace the asset in the future. The whole process of depreciation calculation occurs at the end of the year when accounts are prepared. The calculation is a non-cash expense which is estimated or forecasted and is shown in both the profit and loss statement and the balance sheet. Depreciate Fixed Assets? The question of why fixed assets should be depreciated is a common one asked by many. The main reason for calculating depreciation is to calculate the recovery of cost that is incurred on fixed assets over their useful......

Words: 2738 - Pages: 11

Html Frames

...HTML Frames • Frames allow you to have multiple sections of the browser window, called frames, each showing their own .html file within the frame. • HTML Frames can be used to split a web page so you can load multiple HTML files or pages into one web page. This will cause the web browser to display multiple pages at one time. Frame sets are rarely used these days, as the introduction of server side scripting languages such as php and asp allow you to create content pages dynamically. The introduction of HTML5 has also provided new methods of doing page layouts without having to use frames. Frame Set - ... • the frameset tag defines a group of frames. Setting the rows and cols attribute allow you to create the number of frames needed for your layout. • rows="??,??" - To set up multiple frames in rows, replace the question marks by the size of each row, either in pixels or as a percentage. A * can be used as a wild card, for instance: rows="100,*" would give you a top frame of 100 pixels high, and a bottom frame using the rest of the screen. cols="??,??" - Similar to rows, a number of frames can be set out in columns. border="?" - Frame border thickness in pixels. bordercolor="?" - Colour of border between frames. (*) • • • Frame - Each frame within a set will need a frame tag to tell it which web page to load in the frame. It uses the attribute: • src="url" - Filename or URL of page to show in the frame • noresize="noresize"...

Words: 672 - Pages: 3

Depth and Frame for Corleone

...Depth and Frame for Corleone The depth of field and framing in the ending scene of Francis Ford Coppola’s 1972 film The Godfather uses an assortment of focuses and cunning surroundings to portray the sincerity and emotional concepts which aid in the expression and dramatic power of Michael Corleone’s rise as Godfather. Application of both soft and deep focus photography combined with tight framing greatly influence the meaning and structure associated with Michael’s growth of power and allows us, the audience, to pay attention to details of the event occurring. In terms of depth of field, during the last few minutes of the ending scene, we see Michael Corleone and Kay are in the same room discussing whether or not Michael is responsible for the murder of his sister’s husband. We see his Kay ask the question if he’s guilty or not, but during the scene, as he begins his reply, we see a constant deep focus camera shot on Michael whereas a soft focus shot is almost always directed towards Kay. She is mainly drowned out of the picture as a soft focus remains almost constant on the back of her head leaving Michael as the main focal point and in a subjective point of view to Kay. These particular attentions to detail begin to show the lack of importance of Kay, and a more personal importance of Michael. By this, the audience can see a disconnection and assume that a separation into two worlds is now occurring. These focuses greatly affect the audiences’ view of a separation of...

Words: 616 - Pages: 3