Search results

1 – 2 of 2
Case study
Publication date: 29 November 2019

Nicolas Kervyn, Judith Cavazos Arroyo, Fernando Rey Castillo Villar and Rosa Andrea Gomez Zuñiga

Learning outcomes are as follows: understanding the difference between brand identity and brand image; applying various segmentation tools; understanding the appeal of the…

Abstract

Learning outcomes

Learning outcomes are as follows: understanding the difference between brand identity and brand image; applying various segmentation tools; understanding the appeal of the aspirational brand and its consequence on private and public consumption; exploring the strategic options available to a brand facing a brand appropriation; exploring the pros and cons of opposing a brand appropriation; and developing a plan for the implementation of this strategy.

Case overview/synopsis

This case will help students understand the difference between the brand identity that the brand owners intend and the brand image that consumers actually perceive.

Complexity academic level

This case is designed to be used in marketing management, brand strategy or consumer culture course. Specifically, the case is designed for college seniors or master students with basic strategic marketing training. It should provide the basis of discussions on the topics of brand management, consumer culture, brand portfolio management, international marketing, repositioning strategy, brand architecture, brand equity, brand assets, brand appropriation and consumer relationships with brands.

Supplementary materials

Teaching Notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.

Subject code

CSS 8: Marketing

Details

Emerald Emerging Markets Case Studies, vol. 9 no. 3
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 21 September 2023

Vishwanatha S.R. and Durga Prasad M.

The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry…

Abstract

Research methodology

The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry reports, company websites, stock exchange websites and databases such as Bloomberg and CMIE Prowess.

Case overview/synopsis

Increasing competition in product and capital markets has put tremendous pressure on managers to become more cost competitive. To address their firms' uncompetitive cost structures, managers may have to consider dramatic restructuring of their businesses. During 2014–2017, Tata Steel Ltd (TSL) UK considered a series of divestitures and a merger plan to nurse the company back to health. The case considers the economics of the restructuring plan. The case is designed to help students analyze a corporate downsizing program undertaken by a large Indian company in the UK and to highlight the dynamic role of the CFO and governance issues in family firms. It introduces students to issues surrounding a typical restructuring and provides students a platform to practice the estimation of value creation in a restructuring exercise. While some cases on corporate restructuring in the context of developed economies are available, there are very few cases written in an emerging market context. This case bridges that gap. TSL presents a unique opportunity to study corporate restructuring necessitated by a failed cross-border acquisition. It illustrates the potential for value loss in large, cross-border acquisitions. It shows how managerial hubris can prompt family firm owners to overbid in acquisitions and create legacy hot spots. In addition, the case can be used to discuss the causes of governance failures such as weak institutional monitoring and poor legal enforcement in emerging markets that could potentially harm minority shareholders.

Complexity academic level

The case was developed from secondary sources and interviews with a security analyst. The secondary sources include company annual reports, news reports, analyst reports, industry reports, company websites, stock exchange websites and databases such as Bloomberg and CMIE Prowess.

1 – 2 of 2