当前位置:网站首页>Several methods of enterprise competition analysis: SWOT, Porter five forces, pest "suggestions collection"
Several methods of enterprise competition analysis: SWOT, Porter five forces, pest "suggestions collection"
2022-06-29 10:52:00 【Full stack programmer webmaster】
Hello everyone , I meet you again , I'm your friend, Quan Jun .
Recently, the laboratory will apply for an Internet + Project , In the project Enterprises The content of the business section really makes us engineering students unable to start , I got a little clue after consulting a student girl related to a major ( Thank you for your help here ~), In line with Interdisciplinary , Learning more is harmless Principles , Just Force Learned the relevant contents of Bohr economics , Here is a brief summary of the methods learned about competitive analysis ~
Catalog
1、SWOT analysis
SWOT analysis Situation analysis ,20 century 80 In the early s, it was proposed by Professor Merrick, a professor of management at the University of San Francisco , Including analyzing the advantages of enterprises 、 Inferiority 、 Opportunities and threats , Often used for Enterprise strategy development 、 Competitor analysis Etc .
SWOT Analysis It mainly focuses on the strength of the enterprise itself and its comparison with competitors .
Opportunity and threat analysis Pay attention to the changes in the external environment and the possible impact on the enterprise . The analysis of the environment generally uses PEST Analysis or porter's five forces analysis .
In the adaptability analysis, it is necessary to S、W、O、T Four different combinations of are used for different pattern analysis :
- Leverage effect ( Inferiority + The opportunity to ): Leverage effect arises when internal advantages and external opportunities are consistent and adapt to each other . In this case , Enterprises can use their internal advantages to pry up external opportunities , Give full play to opportunities and advantages .
- Inhibitory ( Inferiority + The opportunity to ): Inhibition means obstruction 、 prevent 、 Influence and control . When the opportunities provided by the environment do not match the internal resource advantages of the enterprise , Or when they cannot overlap , No matter how big the advantages of the enterprise are, they cannot be brought into play . In this case , Enterprises need to provide and add certain resources , To promote the transformation of internal resource disadvantages to advantages , So as to cater to or adapt to external opportunities .
- Vulnerability ( advantage + threat ): Vulnerability means a reduction in the degree or intensity of an advantage 、 Reduce . When environmental conditions threaten the company's advantages , The advantages are not brought into full play , There is a fragile situation with poor advantages . In this case , The enterprise must meet the customer service threat , To take advantage of .
- Problematic ( Inferiority + threat ): When the internal disadvantage of the enterprise meets the external threat of the enterprise , Enterprises are facing severe challenges , If not handled properly , It may directly threaten the survival of the company .
Reference link :https://wiki.mbalib.com/wiki/SWOT%E5%88%86%E6%9E%90%E6%A8%A1%E5%9E%8B
2、 Porter's five forces model
Porter's five forces model It's Michael · potter (Michael Porter) And 20 century 80 It was put forward in the s An analytical model for competitive strategy . As the name suggests, Porter proposed a competition in the industry , Not just in the hands of the original competitors , But there are five basic competitive forces , The comprehensive strength of these five basic competitive forces determines the intensity of industry competition , This determines the ultimate profit potential of the industry and the degree of capital flow to the industry . The five competitive forces determine the profitability of the industry , And point out the core of enterprise strategy , It should be in the right industry and the most attractive competitive position in the industry . The change of different combinations of the five forces will eventually affect the change of industry profit potential .
Porter's five forces analysis belongs to the external environment analysis Micro environment analysis , It is mainly used to analyze the competition pattern of enterprises in this industry and the relationship between this industry and other industries . In essence, it is a strategic application tool of management thought in the practice of enterprise marketing management , Our enterprise marketing managers are required to manage the enterprise from the perspective of strategic analysis , It emphasizes a kind of strategic consciousness , Or the application of strategic thinking .
Reference link :https://wiki.mbalib.com/wiki/%E6%B3%A2%E7%89%B9%E4%BA%94%E5%8A%9B%E5%88%86%E6%9E%90%E6%A8%A1%E5%9E%8B
3、PEST analysis
PEST analysis It is a method used by strategic consultants to help enterprises review their external macro environment . It refers to the analysis of macro environment . Macro environment refers to various macro forces that affect all industries and enterprises . Analyze macro environmental factors , Different industries and enterprises according to their own characteristics and business needs , The specific content of the analysis will be different , But generally we should deal with the political and legal environment 、 The economic environment 、 The social and cultural environment and technical environment are the four main external environmental factors that affect the enterprise , be called PEST analysis .
PEST analysis Relatively simple , Its application fields include : Corporate strategic planning 、 Market planning 、 Product management development 、 Research Report Writing, etc .
Reference link :https://wiki.mbalib.com/wiki/PEST%E5%88%86%E6%9E%90%E6%A8%A1%E5%9E%8B
Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/132449.html Link to the original text :https://javaforall.cn
边栏推荐
- 【FreeRTOS】08 互斥信号量、优先级反转问题
- 基于支持向量机的手写数字识别详解(MATLAB GUI代码,提供手写板)
- AQS之ReentrantLock源码解析
- Dormitory maintenance management system based on stm32+rfid design
- “AI x 科学计算”进行时,华为昇思 MindSpore 赛题火热开启,等你来!
- Given the values of two integer variables, the contents of the two values are exchanged (C language)
- 【C语言进阶】自定义类型
- C language printf family
- Creating postgre enterprise database by ArcGIS
- 小米手机-解BL锁+开ROOT权限
猜你喜欢

打印100~200之间的素数(C语言)

容器平台性能如何测试,稳定性、扩展效率、组件性能

深入浅出总结Flink运行时架构

Software test model (V model and W model)

SQL Server 数据库的几种简单查询

任职 22 年,PowerShell 之父将从微软离职:曾因开发 PowerShell 被微软降级过

Does your project need automated testing?

【NLP】文本生成专题1:基础知识

Exemples de programmation stm32f1 et stm32cubeide - entraînement du capteur de portée ultrasonique

ssh密钥泄露(B模块赛题)——应用服务漏洞扫描与利用
随机推荐
免费送书啦!畅销书《 OpenCV图像处理入门与实践》一本全搞定
智能组卷系统设计
STM32F1与STM32CubeIDE编程实例-超声波测距传感器驱动
Bug description, rating and life cycle
《Datawhale推荐系统教程》来了!
学习通否认 QQ 号被盗与其有关:已报案;iPhone 14 量产工作就绪:四款齐发;简洁优雅的软件早已是明日黄花|极客头条...
有了这款工具,自动化识别验证码再也不是问题
【NLP】文本生成专题1:基础知识
软件测试模型(V模型和W模型)
企业竞争分析的几种方法:SWOT、波特五力、PEST「建议收藏」
AGCTFb部分题解
BUUCTF--reverse1
QT writing IOT management platform 37- logic design
Given the values of two integer variables, the contents of the two values are exchanged (C language)
世界上第一个“半机械人”去世,改造自己只为“逆天改命”
Dormitory maintenance management system based on stm32+rfid design
Daily question brushing record (VII)
Reading notes of CLR via C -clr boarding and AppDomain
【FreeRTOS】08 互斥信号量、优先级反转问题
《如何阅读一本书》读后总结