lecture 7 - chapter 12 to 13 student version 2010

Upload: sitisaiful

Post on 08-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    1/52

    1

    UBMM1011Sun Zis Art of War and Business Strategies

    Lecture 6

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    2/52

    Chapters

    1. Detailed Assessment and Planning ()

    2. Waging War ()

    3. Strategic Attack ()

    4. Disposition of the Army ()

    5. Forces ()

    6. Weaknesses and Strengths ()7. Military Maneuvers ()

    8. Variations and Adaptability ()

    9. Movement and Development of Troops ()

    10. Terrain ()

    11. The Nine Battlegrounds ()12. Attacking with Fire ()

    13. Intelligence and Espionage ()

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    3/52

    Chapter 12Attacking with Fire (Chinese:)

    Chapter Outline

    5 ways of attacking with fire

    Rulers and generals

    Business application: Reinventing business

    Importance of leadership

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    4/52

    5 Ways Of Attacking With Fire

    The ways of attacking with fire are to burn the enemys:

    soldiers in their camp

    provisions and stockpiles

    heavy military equipment and supplies

    armoury and warehouses

    transportation trains

    The factors to be considered when launching attacks byfire:

    The materials and equipment

    The weather dry and hot and strong wind.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    5/52

    Prerequisites for Using Fire

    When fire breaks out within the camp of the enemy,prepare quickly to attack the enemy from outside.

    When fire breaks out within the camp of the enemy andthere is no confusion nor commotion among the soldiers,

    wait patiently and do not be eager to attack. When the fire is burning ferociously with opportunities to

    be gained, follow through quickly with your attacks.

    When there are no opportunities to be gained and

    followed through, cease immediately. Fire can be started from the outside of the camp of theenemy.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    6/52

    Prerequisites for Using Fire

    When fire is burning in the windward direction, do notassault the leeward position.

    When winds blow strongly and continuously in the day,they tend to cease in the night.

    Thus, those who use fire as a means to support attacksare wise and shrewd.

    Those who use water as a means to support attacks arepowerful.

    Water can be used to cut off and isolate an enemy, but itcannot be used to destroy and deprive him of hisequipment, provisions and supplies.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    7/52

    Attacking with Fire

    The targets for destruction by fire includes personnel, provisions,food, logistic support, weaponry and ammunition for combat, supplyroutes, and equipment.

    The use of fire attack is also a form of sabotage because it can inflict

    heavy damages with minimal resources.

    Attacking with fire to weaken the opponent

    with minimal resources

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    8/52

    Rulers and Generals

    Thus, it is said that it is the enlightened leaderwho deliberates onthe plan while the capable general implements it.

    Move only when there are advantages to be gained.

    Strike only when there are definite chances of success.

    Fight only when there are definite dangers. A warlord must not embark on a military campaign simply out of anger.

    A general must not go into battle out of rage.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    9/52

    Rulers and Generals

    Thus, an enlightened ruler must always be prudent in matters of warand a capable general must always be cautious and attentive.

    This is the way that keeps the state in peace and security, and the armyintact.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    10/52

    Summary

    Attacking with fire explains the use of weapons generally and theuse of the environment as a weapon specifically. It examines thefive targets for attack, the five types of environmental attack, and theappropriate responses to such attack.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    11/52

    Business Application- Reinventing business

    - Importance of leadership

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    12/52

    Business Application

    $Profit$ is the main concern in business: Acquisitions in a right and good way are the most important

    principles. Analyze market behavior before any introducing a new plan or

    new product.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    13/52

    Milton Friedman

    (1912 - 2006)

    American economist.

    Won a 1976 Nobel Prize for histheories of monetary control andgovernmental nonintervention in theeconomy.

    There is only ONE socialresponsibility of business -- touse its resources and engagein activities designed toincrease its PROFITs withoutdeception or fraud.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    14/52

    Importance of Leadership

    CEO must try to exploit whatever available means are at hisdisposal to build advantages in competition.

    This would include exploiting technology, automation techniques,management skills and production facilities.

    Nowadays, it is much easier to manage and analyze information(marketing, accounting, production scheduling, forecasting, datamanagement system, etc) by using computer software.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    15/52

    Reinventing an industry

    Attacking withFIRE = Reinventing an industry. Competing within an industry is an acceptable strategy, but

    REINVENTING an industry is much better.

    Businessmen must mastercreative destruction!!! Creative destruction is the wisest form of competition.

    Any innovation can help you win new territory.

    Any innovation can put your competitors on the defensive.

    Creative destruction only makes sense if it create a stronger position.

    However, if there is NO profit in reinventing your industry,AVOIDdoing it.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    16/52

    Reinventing An Industry

    To destroy an existing industry, the business climate must be right.

    Choose the right year.

    A tight business climate requires lower-cost alternatives.

    How about 2010? Is it a right year to reinvent?

    C

    hoose the right time. The technological fuel must be readily available

    You want a TIME when people are readyfor a NEW beginning.

    Example: When Ogawa introduced massage chair, most customers were reluctantto purchase. However, the resistance level was milder when Osim entered themarket.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    17/52

    Reinventing Computer Industry

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    18/52

    Futuristic Computer

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    19/52

    Futuristic Computer

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    20/52

    20

    UBMM1011Sun Zis Art of War and Business Strategies

    Lecture 6

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    21/52

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    22/52

    Chapter 13Intelligence and Espionage ()

    Chapter Outline

    Intelligence and espionage

    Kinds of spies

    Importance of double agent Business application:

    Importance of business intelligence

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    23/52

    Intelligence and Espionage

    The enlightened ruler and the capable general are able to securevictories for their military campaigns and achieve success thatsurpass those of many others, because they can foresee thedevelopment of war.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    24/52

    Intelligence and Espionage

    Foreknowledge cannot be obtained:

    from the spirits nor from the gods.

    by comparing with similar present or past events and situations.

    from study of astrology.

    Foreknowledge must be obtained from people who clearly know theenemys situation.

    Foreknowledge =Intelligence

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    25/52

    Intelligence and Espionage

    In modern war, military uses modern satellites and othersurveillance equipment to zoom into micro details of their enemy.

    US army strikes against Taliban in Afghanistan (2001) relied heavily onadvanced surveillance equipment which can detect human movementeven at night.

    Foreknowledge =Intelligence

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    26/52

    5 Kinds of Spies

    The FIVE kinds of secret agents or spies are:

    1. Local agents ordinary people recruited from the homeland of theenemy and used as spies by us.

    2. Inside agents officials of the enemy who are recruited andemployed by us.

    3. Double agents spies of the enemy who have been converted &recruited to work for us.

    4. Doomed agents our own spies who provided false information fordeliberate leakage to the enemy.

    5. Living agents our spies who have penetrated deep into enemy

    territory & managed to return safely with information.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    27/52

    5 Kinds of Spies

    Thus, among all military relationships, none can be moreintimate than that maintainedwith spies and secretagents.

    Rewarding spies and secret agents: There can be no bigger rewards than those showered on spies

    and secret agents.

    There can be no greater secretive operations than thosepertaining to espionage.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    28/52

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    29/52

    Kinds of Spies

    Such is the intricacy and subtlety of espionage!

    Indeed, there is no place where espionage cannot be used.

    When espionage activities and secret operations have been leakedbefore their implementation, then the agents concerned and thosewhom they are in contact with must be put to death.

    There may be armies that you wish to strike, cities that you wish toconquer, and key people that you wish to assassinate.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    30/52

    Mata Hari: Female espionage (WWI)

    Margaretha Geertruida Zelle akaMata Hari

    A Dutch exotic dancer andcourtesan who was executedby firing squad on 15 October,1917, at the age of 41, forespionage during World War I.

    On 13 February, 1917, MataHari was arrested in her roomat the Hotel Plaza Athne inParis.

    She was put on trial, accusedof spying for Germany and

    consequently causing thedeaths of at least 50,000soldiers.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    31/52

    Kinds of Spies

    There is a need to know beforehand detailed informationon the identities of the garrison commander, hissupporting officers, the visiting consultants, the guardsand patrols, and the various attendants.

    Your agents must be ordered to investigate these matters ingreat detail.

    The secret agents of the enemy who are spying amongus must be actively sought out.

    Use incentives to bribe them, guide and counsel them, and then

    pardon and release them. Why? Thus, they can become double agents and be used and

    employed by us.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    32/52

    Importance Of Double Agent

    The situation of the enemy can be known, and local andinside agents can be recruited and deployed as well.

    Double agent will carry fabricated and false informationto the enemy.

    It is through the efforts of the double agents that ourliving agents are able to return as scheduled with needfulreports on the enemy.

    The ruler (general) must know how to use the 5 differentkinds of spies, so converted spies (double agents)should be rewarded generously.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    33/52

    Importance of Espionage

    In ancient times, the rise of the Shang Dynasty over the Xia Dynastywas because military advisor, Yi Yin, had served as an official in thekingdom of Xia.

    Similarly, the rise of the Zhou Dynasty over the Yin Dynasty wasbecause its military advisor, Lu Ya, had served as an official in the

    kingdom of Yin. The use of spies is essential in war, and the army must depend

    on this in its action.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    34/52

    Famous Spies In History

    (L-R)The Cambridge Spies: Blunt,Maclean, Burgess and Philby

    Burgess and Maclean defected to

    Russia in 1951, Philby in 1963. Blunt confessed to being a spy but was

    granted immunity in exchange forgiving full disclosure, and was allowedto keep his job (at the Palace).

    Guy Francis de Moncy Burgess,Anthony F. Blunt, Donald Maclean andKim Philby met while at school atCambridge University in the 1930s.

    Were recruited to work for the SovietKGB (Soviet Union).

    Were active for 30 years.

    Were eventually exposed but none wasever caught.

    All four held high positions:

    Burgess and Maclean becamerespected diplomats.

    Philby became a senior officer in Britishintelligence.

    Blunt became an art historian.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    35/52

    Summary

    Intelligence and espionage focuses on the importance of developinggood information sources, specifically the five types of sources andhow to manage them.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    36/52

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    37/52

    Business Intelligence

    Market research is the vital activity for any business.

    Information from different sources will help to launch newproducts.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    38/52

    Competitive Intelligence vs Business Espionage

    CI - uses public sources to find and develop information oncompetition, competitors, and the market environment (legal andethical means).

    Business espionage - develops information by illegal means(corporate spying).

    Ex: hacking, Steal a competitor's client list CIP uses public information - all information that can be legally and

    ethically identified and accessed.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    39/52

    Trade-secret theft cost U.S.companies more than $100billion in lost revenues last

    year. If left unchecked,analysts estimate, the losses

    could grow an additional50% by the year 2003.

    Corporate Spying/Information Stealing

    Example:

    1993, executives at Science Applications International Corp., learned that aformer employee had been stealing the codes to their computer programs

    Later, they found out that the former employee had given those secrets to aspy ring that included Japanese corporate giants Mitsubishi, Nissan andToshiba

    The former employee was sentenced to 6 years in jail, but no action wasever brought against the Japanese companies, which claimed they did notknow the information was stolen.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    40/52

    Origins ofIndustrial Espionage

    Father Francois Xavier d'Entrecolles revealed to Europe regarding themanufacturing methods ofChinese porcelain in 1712 (early case ofindustrial espionage).

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    41/52

    Business Espionage: Eastman Kodak

    Harold Worden retired from Eastman Kodak in Rochester, NY after30 years of service in the mid 1990s.

    He founded a consulting firm that hired up to 60 other Kodak retireesand proceeded to try to sell information gleaned from thousands ofstolen confidential documents about Kodaks top-secret acetate-

    manufacturing machine.

    Both Agfa and Konica, competitors of Kodak approached byWorden, informed Kodak and the FBI of the attempts.

    In August 1997, Worden pleaded guilty to one count of interstatetransportation of stolen property and went to jail for 15 months aswell as having to pay a $30,000 fine.

    Kodak also sued him in civil court for damages.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    42/52

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    43/52

    'Spy scandal'hits Deutsche Bank

    July 2009, Deutsche Bank was accused of spying onbank spied not just on its employees, but also on peopleoutside the financial institution, which took place in 2006.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    44/52

    Business Intelligence

    In business, a spy can be viewed at both macro andmicro level.

    Macro level when country want to export or penetrate foreignmarket, it can conduct intensive study on the needs and

    preferences of that market by intensive studies by interviewing orsurveying their potential consumers (potential local customers).

    Micro level company can survey consumers on competitiveproducts, and their respective strengths and weaknesses or

    other areas such as pricing, distribution, advertising & promotion.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    45/52

    Business Intelligence

    Businessmen need to manage FIVE types ofinformation regarding their industry.

    1. The need to know people in their industry.

    2. The need to know their customers.

    3. The need to know their competitors.

    4. The need to create a market image.

    5. The need to know the sales trends.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    46/52

    Business Intelligence

    Getting information?

    You must be willing to pay the price for information.

    You need to know where your competitors get their informationfrom (so that you can win their contacts over)

    You must develop contacts who know your competitors.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    47/52

    Japanese Market Intelligence

    Over the years, Japan has created a massive institutionalinfrastructure that is geared to collecting information on variousmarkets.

    Ex: General Trading Companies (GTC), Ministry of InternationalTrade & Industry (MITI), Japan External Trade Organization

    (JETRO). These organizations conduct all kind of market-related research and

    information gathering and compile, collate, and compose them forJapanese companies.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    48/52

    Japanese Market Intelligence

    General Trading Companies (GTC)

    Can provide in-depth knowledge about particular country andproducts

    Their staff are well trained in language, culture, and marketcondition of the countries they work in.

    Constantly update their information and databanks.

    Ministry of International Trade & Industry (MITI)

    Would sponsor huge R&D projects, protect Japans strategictechnologies

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    49/52

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    50/52

    Business Intelligence

    Internal Sources

    Company Accounts

    Internal Reports and Analysis

    Stock Analysis

    Retail data - loyalty cards, till data,etc.

    External Sources

    Government Statistics

    Trade publications

    Commercial Data - Gallup,Mintel, etc.

    Household Expenditure Survey

    Magazine surveys

    Other firms research

    Research documents

    publications, journals, etc.

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    51/52

  • 8/6/2019 Lecture 7 - Chapter 12 to 13 Student Version 2010

    52/52

    Market ResearchCompany