Entrepreneurial Strategy Generating and Exploiting New Strategies
Entrepreneurial Strategy Generating and Exploiting New Strategies
Entrepreneurial Strategy
Generating and Exploiting
New Strategies
New Entry
Offering a new product to an established or
new market. Offering an established product to
a new market or creating a new organization.
Entry
Knowledge
Strategy
Assessment of
Resource Risk Reduction Firm
New Entry
Bundle Strategy Performance
Opportunity
Other
Resources Organization
An entrepreneurial strategy has three Key
Stages
1. Generation of a New Entry Strategy
2. Exploitation of New Entry Strategy
3. A feedback loop from the New strategy
New Entry
Entrepreneurial Strategy is the set of decisions
actins, and reactions that first generate, and
then exploit over time a new entry
Generation of a new Entry
Opportunity
Resources as a source of Competitive
Advantage
Understanding where a sustainable competitive
advantage comes from will provide some
insight into how entrepreneurs can generate
new entries that are likely to provide the basis
for high firm from performance over an
extended period of time
Generation of a new Entry
Opportunity
Entrepreneurial Resources: The ability to obtain, and
then recombine, resources into a bundle that is
valuable, rare, and inimitable
Entrepreneurs combines the resources into such a
different ways as this bundle of resources provides a
firm its capacity to achieve superior performance
For Example: A high skilled workforce will be
useless if the organization’s culture, teamwork,
communication does not support them
Generation of a new Entry
Opportunity
Resources must be:
1. Valuable: enables a firm to pursue opportunities,
neutralize threats, and offer valuable product and
services to the customers
2. Rare: Possessed by few, (potential) competitors
3. Inimitable: Replication of this bundle of resources
would difficult or costly for the potential
competitors
Generation of a new Entry
Opportunity
Market Knowledge: Possession of Information,
technology, know-how, and skills that provide
insight into a market and its customers
Technological Knowledge: Possession of
information, technology, know-how and skills
that provide insight into ways to create new
knowledge
Generation of a new Entry
Opportunity
Assessing the Attractiveness of a New Entry
Opportunity
The entrepreneur needs to determine whether it
is in fact valuable, rare, and inimitable by
assessing whether the new product or the new
market are sufficiently attractive to be worth
exploiting and developing
Generation of a new Entry
Opportunity
Assessing the Attractiveness of a New Entry
Opportunity
Information on a New Entry: The prior
market and technological knowledge used to
create the potential new entry can also be of
benefit in assessing the attractiveness of a
particular opportunity
Generation of a new Entry
Opportunity
Window of Opportunity: The period of time
when the environment is favorable for
entrepreneurs to exploit a particular new entry
Generation of a new Entry
Opportunity
Comfort with making a decision under
Certainty
The trade-off between more information and the
likelihood that the window of opportunity will
close provides a dilemma for entrepreneurs
Here entrepreneurs usually commits two types of
errors
Generation of a new Entry
Opportunity
1.Error of Commission occurs from the decision
to pursue this new entry opportunity, only to
find out later that the entrepreneur had over
estimated his/her ability to create customer
demand and/or to protect the technology from
imitation by competitors. The cost of the
entrepreneur were derived from acting on the
perceived opportunity
Generation of a new Entry
Opportunity
2. Error of Omission occurs from the decision
not to act on the new entry opportunity only to
find out later that the entrepreneur had
underestimated his/her ability to create
customer and/or protect the technology from
imitation by competitors. In this case, the
entrepreneur must live with the knowledge that
he let an attractive opportunity slip through his
fingers
Generation of a new Entry
Opportunity
Decision to Exploit or Not Exploit the New
Entry Figure 3.2