<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Business Model of Security &#187; Competitive Advantage</title>
	<atom:link href="http://businessmodelofsecurity.com/category/bmos/introduction/competitive-advantage/feed/" rel="self" type="application/rss+xml" />
	<link>http://businessmodelofsecurity.com</link>
	<description>Demand Driven Security Program Management</description>
	<lastBuildDate>Wed, 31 Jul 2013 18:39:41 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Law, Strategy and Competitive Advantage</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/#comments</comments>
		<pubDate>Tue, 03 Nov 2009 17:44:24 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Competitive Advantage]]></category>
		<category><![CDATA[competitive strategy]]></category>
		<category><![CDATA[legal and regulatory issues]]></category>
		<category><![CDATA[organizational strategy]]></category>
		<category><![CDATA[Sarbanes-Oxley]]></category>
		<category><![CDATA[university of connecticut]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=78</guid>
		<description><![CDATA[<p>In the hunt for sources of competitive advantage, scholars have identified opportunities in most business-related disciplines, including marketing, accounting, human resources, and management. Competitive advantage from cross-functional perspectives such as organizational capital, human capital, and global competition have also received vast amounts of scholarly time and attention. The end result has been a cornucopia of [&#8230;]</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/">Law, Strategy and Competitive Advantage</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In the hunt for sources of competitive advantage, scholars have identified opportunities in most business-related disciplines, including marketing, accounting, human resources, and management. Competitive advantage from cross-functional perspectives such as organizational capital, human capital, and global competition have also received vast amounts of scholarly time and attention. The end result has been a cornucopia of research on improving organizational strategy to capture and sustain competitive advantage. Despite this fact, the thought of an organization&#8217;s regulatory and legal landscape as a source of advantage has remained largely unexplored.<span id="more-78"></span></p>
<p>The increased corporate regulation brought about by the Sarbanes-Oxley Act of 2002, and the increased demand for legal compliance programs, coupled with the trend in using litigation as a tool for business reform, have increased organization&#8217;s regulatory obligations. This increased scrutiny means that legal and regulatory issues may be one of the most important determinants in a organization’s external operating environment.</p>
<p>Compliance is quite possibly the last great source of untapped competitive advantage available today.</p>
<p>To download the latest research from University of Connecticut <a href="http://www.business.uconn.edu/cms/p461/u365/mc/r">Asst. Professor Robert C. Bird</a>, the paper that started it all, click below.</p>
<p><a class="btn" href="http://businessmodelofsecurity.com/wp-content/uploads/2009/11/Law_Strategy_and_Competitive_Advantage.pdf">Get The Paper</a></p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/">Law, Strategy and Competitive Advantage</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/law-strategy-and-competitive-advantage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Competitive Advantage Defined</title>
		<link>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/</link>
		<comments>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/#comments</comments>
		<pubDate>Wed, 21 Oct 2009 17:02:05 +0000</pubDate>
		<dc:creator><![CDATA[Brandon Dunlap]]></dc:creator>
				<category><![CDATA[Competitive Advantage]]></category>
		<category><![CDATA[competitive strategy]]></category>
		<category><![CDATA[harvard business school]]></category>
		<category><![CDATA[michael e porter]]></category>
		<category><![CDATA[quality management]]></category>
		<category><![CDATA[six sigma]]></category>
		<category><![CDATA[total quality management tqm]]></category>
		<category><![CDATA[value chain]]></category>

		<guid isPermaLink="false">http://competitivecompliance.com/?p=8</guid>
		<description><![CDATA[<p>What are you choosing to do differently than your rivals in order to create and sustain value for your organization?</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/">Competitive Advantage Defined</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignleft size-thumbnail wp-image-70" title="how YOU doing?" src="http://businessmodelofsecurity.com/wp-content/uploads/2009/10/iStock_000002652861Medium1-150x150.jpg" alt="how YOU doing?" width="150" height="150" />Competitive advantage is the &#8216;edge&#8217; a firm realizes against its rivals. There is a combination of activities that allow an organization to to manifest itself in the marketplace in the first place; it is <em>how</em> an organization executes these activities that are the determining factor in achieving advantage over rivals. Traditionally, these activities have been mapped across a value chain to show their inter-relationships and their contributions to the overall advantage (or disadvantage) to the firm. This value chain approach was developed and popularized by Michael E. Porter of the Harvard Business School in his groundbreaking work titled &#8220;<a href="http://astore.amazon.com/competitivecompliance-20/detail/0684841487" target="_blank">Competitive Strategy</a>&#8220;, published in 1980.</p>
<p>The activities that support the creation, production, sales, and delivery of a product or service are the fundamental constructs of competitive advantage. The term <em>operational effectiveness</em> is Porter&#8217;s way of describing how an organization performs these activities better (read as: faster, cheaper, higher quality, etc.) than market rivals. As we have discussed in presentations across the US, it was through operational effectiveness that Japanese companies, most notably the auto makers, dominated the US in the 1970s and 1980s. They used practices many of us are already familiar with, such as  Total Quality Management (TQM) and Six Sigma. Make no mistake, companies can gain tremendous advantages from operational effectiveness, but from a competitive standpoint, the best practices developed in this vein can be, and often are, easily emulated by rivals.</p>
<p>As the market begins to shift, adopting the same or similar best practices, the competitive advantage is eroded. Porter refers to this phenomena as the <em>productivity frontier</em>. The productivity frontier is a function of the application of the best technology, skills, and management techniques available to the organization and is the high water mark of value attained through this method.</p>
<p>As more and more companies adopt these operational effectiveness and efficiency measures, they become less and less differentiated. The marketplace then is essentially rebalanced, favoring no single player and reducing the past gains to simply a barrier to entry in the market.</p>
<p>As Porter sees it, the only way to achieve <em>sustainable</em> competitive advantage, is to do different things or to do the same things, but in a different fashion than your competitors.</p>
<p>What are you choosing to do differently?</p>
<p>The post <a rel="nofollow" href="http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/">Competitive Advantage Defined</a> appeared first on <a rel="nofollow" href="http://businessmodelofsecurity.com">The Business Model of Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://businessmodelofsecurity.com/bmos/introduction/competitive-advantage/competitive-advantage-defined/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
