Premium Essay

Hidden Flaws in Strategy

In:

Submitted By ketshepile
Words 4531
Pages 19
Hidden flaws in strategy
Charles Roxburgh
The McKinsey Quarterly, 2003 Number 2
After nearly 40 years, the theory of business strategy is well developed and widely disseminated. Pioneering work by academics such as Michael E. Porter and Henry Mintzberg has established a rich literature on good strategy. Most senior executives have been trained in its principles, and large corporations have their own skilled strategy departments.
Yet the business world remains littered with examples of bad strategies. Why? What makes chief executives back them when so much know-how is available? Flawed analysis, excessive ambition, greed, and other corporate vices are possible causes, but this article doesn't attempt to explore all of them. Rather, it looks at one contributing factor that affects every strategist: the human brain.
The brain is a wondrous organ. As scientists uncover more of its inner workings through brain-mapping techniques,1 our understanding of its astonishing abilities increases. But the brain isn't the rational calculating machine we sometimes imagine. Over the millennia of its evolution, it has developed shortcuts, simplifications, biases, and basic bad habits. Some of them may have helped early humans survive on the savannas of Africa ("if it looks like a wildebeest and everyone else is chasing it, it must be lunch"), but they create problems for us today. Equally, some of the brain's flaws may result from education and socialization rather than nature. But whatever the root cause, the brain can be a deceptive guide for rational decision making.
The basic assumption of modern economics—rationality—does not stack up against the evidence
These implications of the brain's inadequacies have been rigorously studied by social scientists and particularly by behavioral economists, who have found that the underlying assumption behind modern economics—human beings

Similar Documents

Premium Essay

Advertisement of Allison Cascio

...maintain her spot on the Metro Council. There are fallacies and transparent rhetorical strategies in this ad. A fallacy is false cause. It claims she has “worked successfully” to improve neighborhoods, implement Smart Growth strategies, and solve day-to-day Metro Council issues. This indicates that she had an extremely integral goal in completing these tasks. While she may have done some work in these areas, it is most likely that she embellished some of her work to make it seem as though these achievements are solely attributed to her. She used some positive effects and pointed their causes directly to her. Also, behavioral change attempts are evident. She uses the “expert” strategy with phrases like, “Someone with a track record of success,” and “She’s experienced.” She is trying to tell people that she knows what she’s doing and to trust her. She also tries to upgrade her ethos by claiming many endorsements. This list of supporters is her attempt to gain support because people already support these organizations. Her credibility is upgraded because she is backed by these clubs. Emotional appeal is also present. She says, “Our tax dollars are too precious to be wasted.” She is using attracting emotional appeal. Cascio wants people to read this line and hear precious, and become sympathetic and therefore, supportive of her. This advertisement is rich with fallacies, flaws, and hidden rhetorical...

Words: 252 - Pages: 2

Premium Essay

Suicide In Law Enforcement

...information in any way they see fit since fellow police officers are first on the scene on any suicide; whether it is to protect victim officers and their families from the stigma of suicide or to hurt them; officers who worked with the victim officer have the means and opportunity to manipulate the case. Therefore, if police suicides are being hidden or masked in some way, then suicide rates may be invalid and unreliable. This can then lead to either a positive or negative influence on how policies are made and can impact further research on the issue of suicide and suicidal...

Words: 737 - Pages: 3

Premium Essay

Self Developemnt

...Q1 Introduction With people being better educated and the globalization of the workforce, it is harder to become a manager in any organization much less a successful one. An individual has to have certain attributes in-order to have a competitive edge over others. Let look at two factors that will allow us to triumph in this fast changing world. Self-awareness Atwater and Yammarino(1992, p.143) define self-awareness as “the individual’s ability to assess other’s evaluations of the self and to incorporate these assessments into one’s self-evaluation”. Goleman (1998) suggests that an individual who is self-aware has a deep understanding of his/her emotions, strengths, weaknesses and drives. According to Daniel Goleman the competencies associated with self-awareness are: • Emotional self-awareness: recognizing your emotions and impact they have on your life. • Accurate self-assessment: identifying your strengths and limitations. • Self-confidence: knowing your self-worth and capabilities. Goleman (1996, 1998) argues that IQ accounts for only about 20 per cent of a person's success in life. He proposes that the rest can be accounted for by the term "emotional intelligence" which includes self-awareness. Before I can makes changes in myself, I need to know what there to work on. Self-awareness is all about understanding oneself. Example, when I know my strength and my limitation, I will be more confident about what I can do and cannot do. Self-confident will also allow...

Words: 1138 - Pages: 5

Premium Essay

Theory of Knowledge: Essay on a Prescribed Title

...Elizabeth Petersen Wilde Theory of Knowledge 20 May 2012 Essay on a Prescribed Title Rewrite One of the various methods of understanding used among all living organisms is communication. Many methods of communication are built up over time to form languages. Language is formed from various rules, but consists mainly of vocabulary. Vocabulary affects how easily one person communicates with another, which in turn affects how much a person is able to know. If the vocabulary of a certain language does not contain words that describe a given event, or if a language has not developed words that are complex enough to be used to form a meaning of equal value, it is then impossible to impart that knowledge to another person. The extent of vocabulary in a language is determined by what information and knowledge can be shared, using that specific language. Vocabulary can also limit how we communicate with one another because using certain words to describe something may make understanding it much more complex. For example, when one uses abstraction they take away individualistic value to the subject to which they are referring. Does one abstract a cow to the point where they are nothing but a farming asset, or not abstract the cow enough to the point where it is only a large mass of particles and organisms? When there are multiple meanings for the same word, or if something is able to be interpreted in various ways, words and phrases may often be misunderstood and used incorrectly...

Words: 2074 - Pages: 9

Premium Essay

Summary: Restaurant Sentenced To 4 Years

...Have you ever wondered why not only one citizen, but a mass, becomes effortlessly fooled into believing fake news and pseudo-events? The current United States society enables the ability to avoid trickery in presuming untruths and pseudoscience by analyzing news, researching a plethora of information, and looking in depth to a topic. The articles “‘Pizzagate’ Conspiracy Theorist Who Shot Up DC. Restaurant Sentenced To 4 Years” by Ryan J. Reilly, Hidden History: Exploring Our Secret Past Chapter 21: A Flood of Pseudo-events by Daniel J. Boorstin, Unspun finding facts in a world of disinformation by Brooks Jackson and Kathleen Hall Jamieson, “Everyday Survival” by Laurence Gonzales, and “Does Truth Matter? Science, Pseudoscience, and Civilization”...

Words: 1340 - Pages: 6

Premium Essay

Common Information Security Threats Paper

...Common Information Security Threats Paper Courtney Gardner CMGT/400 2-25, 2013 Terry Green Common Information Security Threats Paper The growing number of security treats an organization faces from day to day grows substantially as each day passes. Even the failed attempts to access secure data bear fruit of some kind in the form of another vulnerability being discovered or a different tactic is used that the company wasn’t prepared for. One organization that can’t afford not to be prepared is the Chase Bank organization. This financial institution is very accustomed to fending off skilled cyber thieves. It gets hit every day by thousands if not tens of thousands of attacks on their infrastructure and networks I will discuss three major threats that Chase faces DDoS attacks, Mobile Banking and Phishing. Transferring funds out of users' accounts is a major security treat they face. This can be achieved many ways which makes it an active job for the security admins of banks. Online banking has opened the banks to a wide variety of vulnerabilies that much be patched or mitigated to the lowest degree possible. Being the victim of a DDoS attack is always a possibility for Chase as they contact a large amount of online tractions and overseas money handling. Attackers can employee DDoS attacks, or distributed denial of service attacks, named for denial of customer service by aiming large capacities of network traffic to a website until it forced to or collapse. To help combat...

Words: 1188 - Pages: 5

Premium Essay

Manager

...A R T I C L E www.hbr.org THINKING ABOUT … The Hidden Traps in Decision Making by John S. Hammond, Ralph L. Keeney, and Howard Raiffa Included with this full-text Harvard Business Review article: 1 Article Summary The Idea in Brief—the core idea The Idea in Practice—putting the idea to work The Hidden Traps in Decision Making Further Reading A list of related material, with annotations to guide further exploration of the article’s ideas and applications 2 11 Product 5408 THINKING ABOUT … The Hidden Traps in Decision Making The Idea in Brief Making business decisions is your most crucial job—and your riskiest. New product development, mergers and acquisitions, executive hirings—bad decisions about any of these can ruin your company and your career. Where do bad decisions come from? Mostly from distortions and biases—a whole series of mental flaws—that sabotage our reasoning. We all fall right into these psychological traps because they’re unconscious—hardwired into the way we all think. Though we can’t get rid of them, we can learn to be alert to them and compensate for them—monitoring our decision making so that our thinking traps don’t cause judgment disasters. The Idea in Practice The higher the stakes of your decision, the higher the risk of getting caught in a thinking trap. Worse, these traps can amplify one another—compounding flaws in our reasoning. Here are five of the nine traps: Avoiding the Trap: • Get views of people...

Words: 7567 - Pages: 31

Free Essay

How and Why Is It Important for Businesses to Engage with the Media During a Crisis?

...* * How and why is it important for businesses to engage with the media during a crisis? What strategies are successful in external communications for business during such times? Compare & contrast two news stories which centre on a crisis for different businesses giving detailed analysis of each communications strategy. This Essay will begin by reviewing crisis definitions and message strategies. Next it will explore translation strategies used by organisations involved in a crisis to communicate with stakeholders. The essay will then consider Ford–Firestone’s tire failure crisis of 2000 as an example of poor crisis management, and contrast toy maker Mattel’s recall crisis of 2007 as an example of successful crisis management. It will first lie out the rhetorical context of each case before embarking on a detailed analysis equating the effectiveness of both firms’ external communications, and in the case of Ford-Firestone, how these might have been alternatively approached in order to avoid detrimental reputational damage. * Fink (1986, from King, 2000) defines an organisational crisis as ‘a situation that can potentially escalate in intensity, fall under close government or media scrutiny, jeopardize the current public image of the organisation or interfere with normal business operations.’ Pearson and Mitroff support this in their ‘five dimensions of a crisis’, explaining that the situation will be ‘highly visible, require immediate attention, have a surprise...

Words: 2837 - Pages: 12

Premium Essay

Just-in-Time Production at Hewlett-Packard, Personal Office Computer Division

...------------------------------------------------- Case: Just-in-Time Production at Hewlett-Packard, Personal Office Computer Division Question 1: Should it be easier to run JIT effectively on the 150 than on the 120? Explain. Considering information given in the beginning of the case, it should be easier to run JIT effectively on HP-150. 1) HP-150 requires less number of parts, which leads to less inventory needed (20,000 active part numbers for HP-120 and its options vs 450 part numbers for HP-150); 2) Less suppliers are needed for HP-150 (200 suppliers), comparing to HP-120 (2,000 for HP-120 and its options). It will be easier to establish and maintain efficiently a long-term trustworthy relationship. 3) HP-150 has less variety (17 types of keyboards due (languages) while CPU is the same), but for HP 120 there were an average of 6 options per product. Less variety, again, provides fewer inventories and more flexibility to the process. To reduce complexity Question 2: How serious is the forecasting problem? In other words, does success with JIT depend on good forecast? Forecasting problem seems to be severe at the plant. Case says that “…manufacturing does a lot of “second guessing” because the forecasts are terrible”. However, good forecast for JIT systems is crucial. As JIT significantly reduces the amount of raw materials, WIP inventories and finished goods on hand, it greatly relies on accurate information, i.e. on the timely delivery of exactly the...

Words: 2055 - Pages: 9

Premium Essay

Watchmen Archetype

...superheroes by introducing characters in Watchmen that are faulty and human. Kingdom Come is a similar novel that takes inspiration from Moore’s Watchmen while having it’s own unique characteristics that sets it apart. The superheroes that we see in Watchmen and Kingdom Come are heroes and/or vigilantes whose actions are seen as understandable but not morally justified. Rather than write the traditional archetype of the high-morale superheroes of the early to mid 1900s, Moore instead parodies the stereotypical superhero genre, by writing about the character’s philosophical warped views of society, arguable actions, and unjustified ideas. Both graphic novels do convey similar themes of social criticism, distinctions between right and wrong, and flaws in people we look up to. Although the argument that he has influenced others to develop more compelling archetypes is valid, that point of view is false because it is through the depiction of the characters that Alan Moore deconstructs how far the stereotype has gone. Superman from Kingdom Come and The Comedian from Watchmen are characters who desire the practice of faith in Society. When Superman returns to Metropolis to reform Magog’s vigilante regime, Superman appears in front of the audience and says “We have returned to teach them the meaning of Truth and Justice. Together, we will guide this new breed with wisdom… and if necessary, with force. Above all, we will restore order (pg. 68, panel 4). ” Both characters were written to convey...

Words: 2203 - Pages: 9

Premium Essay

Cloud Computing

...fast-past changing of Internet Technologies. Cloud computing is a newer means of technology that allows users and businesses to store and forward information in a network. Large corporations are now using cloud computing as their key business structure. Users can connect to the cloud and store data, but they will be issued a fee for how much data they can store. The users can then retrieve the data from their laptop or smartphone. In a few years, cloud computing will be a primary storage service for many users. John Rhoton, a technology and business strategy consultant, defines cloud computing as a pool of virtual resources that are easily usable and accessible.i Rhoton mentions these resources are made up of hardware devices, information system platforms, and networking services.ii The cloud is built to be virtually unacknowledged by the user and perform in the simplest way. They are built using complex methods that are hidden from the user. Companies base their projects around simplicity because that is what the user wants. A user will buy a product or service that is easy to learn, compared to an abstract service that will take a lot of time and effort to use. A cloud network is very complex and misleading in terms of the infrastructure; however, the user can access the cloud by simply logging into the host from a webpage or a phone application. Generally, cloud services are built around consumers, but they are also used by businesses as well. Many companies are based...

Words: 2172 - Pages: 9

Premium Essay

How, When, and Why (Possible Concerns)Flash Sale Sites Be Used in Lodging Industry?

...Research Paper: How, When, and Why (possible concerns)flash sale sites be used in lodging industry? HRIM602 Interactive Hospitality Service Marketing 10/30/2012 Qin Bian Executive Summary In the lodging industry, operators typically struggle with excess inventory because of the seasonal nature of consumption. This is further exacerbated at times of economic downturns and market slowdowns. These conditions together combined with the reach of the Internet has spawned a relatively new business model called “flash sales” where websites tie up with suppliers to offer deep discounts to customers based on optimal economies of scale. store the excessive inventory goods by offering deep discounts on everything from luxury fashion to home goods to local services to travel experiences, which represent the fastest growing part of the online retail sector. A recent study showed that up to 20 percent of leisure travelers bought some kind of travel service as a result of a “flash sale” or time-sensitive offer from provider such as a hotels and airlines (YPartnership Report, 2011).With time limits on sales, this trend has generated a whole new market—the online impulse travel deals purchase. For the hotels, the special deals help to fill empty rooms that might be hard to sell because of off season or a room’s undesirable location. Meanwhile, the sales offer travelers an opportunity to learn about a new property or a first try in a high end hotel that would normally beyond their financial...

Words: 3504 - Pages: 15

Premium Essay

Is308 Project

...UNFO Security White Paper Information Security Analyst Executive Summary Date: Friday, September 06, 2013 Introduction Since UNFO’s customer base will have the ability to call in by using credit card numbers to make online purchases with an expectation of 6,000,000 transactions, the need for a well thought out framework plan is essential. The conversations will be recorded and stored in the organization's Private Branch Exchange (PBX) system to where data storage hardware and software requirements will be needed. This document is to outline a Web security life cycle for the organization that will later be compiled as part of the organization's overall security policy by the organization's Senior Security Engineer. Therefore the following categories will serve as the staple of this outline: Application development, QA/testing, deployments, website encryption/key management, data storage/access, systems/devices that interact with the website, 3rd party vendor access, employee web security training, regulatory compliance, emerging laws and regulations for website security. 1. Application development : a. System Analysis: i. Define clearly of the purpose of the software ii. Provide direction for further development iii. Refine project goals for clear function and intended application b. Design: iv. Application’s features and operational functions v. Documentation of application vi. Visualization...

Words: 1842 - Pages: 8

Free Essay

A Critique on Bertrand Russel's 'Why I'M Not a Christian'

...not up to the pedestal of being a Christian because he thought he couldn’t live up to the righteous maxims of Christianity, he found the religion too hypocritical and its norms too uptight and self-righteous for his own sake. It was his contention that religion and its maxim’s purpose was to limit knowledge, especially to children and prevents their ability to think clearly by trapping them with norms and inhibiting them from cooperating with others whose views are different from theirs. He also believes that religion flourishes fear and dependency. He also asserted that religion caused war, oppression and misery that is happening right now. Issues: According to Russell, The character of Christ isn’t as divine as God because of the flaws in his teachings and to his followers. Russell attacks Christ’s divinity and characteristics and followers in attempt to debunk Christianity. And that the argument of design is unpersuasive because if God was omnipotent, why would he create such detrimental things such as the KKK and fascists. Russell asserts that God’s imperfections caused detrimental things. However, it’s very noticeable that Russell’s persecuting points about Christianity all stemmed from his biased hatred towards...

Words: 2094 - Pages: 9

Premium Essay

E-Shoplifting

...opCHAPTER 10 E-Shoplifting The broadest and most prevalent error requires the most disinterested virtue to sustain it. Henry David Thoreau (1817–1862) 276 E-Shoplifting Introduction I the beginning, computer systems were installed to manage back-end N operations and support employees in their daily tasks. As technology evolved and systems became cheaper to deploy, businesses started using computers more and more in the management of their operations. By the early 1990s, computers and computer networks had become the information backbone of most enterprises, hosting a myriad of applications that even handled complex business logic. As Internet availability and use increased, information dissemination via the Web became very popular. It allowed small and mediumsized businesses to present information about them and their products for the whole world to see. No longer were storefronts restricted by geographic limitations. Numerous catalog stores such as Sears and Macy’s started putting out their catalogs and brochures in electronic form. By the late 1990s, almost every major consumer-based U.S. company had a Web site that featured its goods and services. Moreover, as Web applications gained momentum, merchants realized that they could reduce reliance on physical storefronts and let customers place orders and pay for them directly over the Internet. Thus was born the electronic storefront was born. Computer networks and applications were now mature enough to handle...

Words: 4936 - Pages: 20