_SLIDE_1_
HACKERS ¸¶ÄÉÆÃÀü·«
_SLIDE_2_
INDEX
1
¼±Á¤ ÀÌÀ¯
2
±â¾÷°³¿ä
5
STP Àü·«
4
SWOT ºÐ¼®
3
3C ºÐ¼®
6
7P Àü·«
7
Á¦¾ð
1. ÇØÄ¿½º ¼±Á¤¹è°æ
2. ÇØÄ¿½º ±â¾÷°³¿ä
±â¾÷¿¬Çõ
»ç¾÷ºÐ¾ß
À繫ºÐ¼®
3. 3C ºÐ¼®
ÀÚ»çºÐ¼® (Company)
°æÀï»çºÐ¼® (Competitor)
°í°´ºÐ¼® (Customer)
4. ÇØÄ¿½º SWOTºÐ¼®
Strength
Weakness
Opportunity
Threat
5. ÇØÄ¿½º STPÀü·«
Segmentation
Targeting
Positioning
6. ÇØÄ¿½º ¸¶ÄÉÆùͽº 7PÀü·«
Product
Place
Price
Process
People
Promotion
Physical Evidence
7. Àü·«Á¦¾È
_SLIDE_3_
CHAPTER 1
ÇØÄ¿½º ¼±Á¤¹è°æ
_SLIDE_4_
Contents
_SLIDE_5_
CHAPTER 2
CHAPTER 2
ÇØÄ¿½º ±â¾÷°³¿ä
_SLIDE_6_
±â¾÷¿¬Çõ
1¡¦(»ý·«)
2008. ÇØÄ¿½º ¾îÇпø °³²¿ª 1,2,3º°°ü °³°ü
|