Tactics To Look Out For Business 340-Week Essay

PAGES
2
WORDS
639
Cite

Tactics to Look Out For Business 340-Week 8 Assignment 4: Tactics Look out for Write a (1-2) page paper develop a general strategy counteracting "tactics." & nbsp; The format report: •Typed, double spaced, Times New Roman font (size 12), inch margins sides, APA format.

Tactics to look out for The outrageous first offer

When negotiating, one common tactic is "the outrageous first offer" (Cameron, 2012, Tactics used at the table; opening plays [part 1 of 3]). In other words, the first offer is designed to seem so unreasonable that all other offers will seem like reasonable concessions in comparison. When some is buying a new car or another product that is commonly purchased through haggling, he or she will almost always 'start low.' The best way to deal with this technique is to call your opponent's bluff and let them know that the offer is outrageous. Citing facts or figures to back up you claim is an important step...

...

This is often used in sales, to make the customer believe that he or she needs to take the offer without thinking. Often, upon closer analysis, the offer is not nearly as good as it might appear on the surface. The ploy is used to prevent the opposing party from engaging in critical thinking. The best technique is to call the other person's bluff and to demand more time: quite often, an offer will or can be extended, and if it is not, it likely does not bear up under further scrutiny.
Silence

Often, people are frightened of pauses and silence. Silence can be used as a way of establishing control over the situation, as the opponent may accept an offer, simply as a way of filling the silence. Once again, this common strategy…

Sources Used in Documents:

References

Cameron, Matt. (2012). Tactics used at the table; opening plays [part 1 of 3]. WHOTO

Retrieved: http://whoto.wordpress.com/2012/01/26/negotiation-4-tactics-used-at-the-table-opening-plays-part-1-of-3/

Cameron, Matt. (2012). Tactics used at the table; opening plays [part 2 of 3]. WHOTO

Retrieved: http://whoto.wordpress.com/2012/02/01/negotiation-4-tactics-used-at-the-table-the-middle-part-2-of-3/
Retrieved: http://whoto.wordpress.com/2012/02/08/negotiation-5-tactics-used-at-the-table-the-end-game-part-3-of-3/


Cite this Document:

"Tactics To Look Out For Business 340-Week" (2012, November 26) Retrieved May 17, 2024, from
https://www.paperdue.com/essay/tactics-to-look-out-for-business-340-week-83280

"Tactics To Look Out For Business 340-Week" 26 November 2012. Web.17 May. 2024. <
https://www.paperdue.com/essay/tactics-to-look-out-for-business-340-week-83280>

"Tactics To Look Out For Business 340-Week", 26 November 2012, Accessed.17 May. 2024,
https://www.paperdue.com/essay/tactics-to-look-out-for-business-340-week-83280

Related Documents

This is disturbing because not only were the thieves being able to access and steal the information, they were able to send an extortion letter to the company without anyone knowing. Then, no one at the company was aware of the issue, until it was too late. (Ragan) What this shows is that Express Scripts was more interested in increasing their overall bottom line, than protecting their customers' privacy.

Soft Systems Techniques in the Preparation of Information Technology as a Systems Manager Company Systems Consulting process and model Systems approach, client relationships Company Culture Client defenses, attachments to existing systems Interaction with the company culture in order to facilitate change System and Culture working together Dependancy issues Lewin Company Systems Consulting process and model Systems approach, client relationships Company Culture Client defenses, attachments to existing systems Interaction with the company culture in order to facilitate change System and Culture working together Dependency issues Lewin's model of

, et al., 2011). Individuals most often use social media to create and strengthen relationships and increase communication within those relationships, rather than explicitly wanting to shop for products. Those individuals are using social media sites to: a) "construct a profile within a bounded system"; b) maintain "lists of other users with whom they share connections"; and c) view and "browse" those lists of connections with others they have interacted

It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying

Ethical Dilemmas & Marketing Ethical Dilemmas Ethical dilemmas in international marketing Background of Marketing Ethics Ethical Issues in Marketing Modern Debate in Stakeholder Theory Ethical Theories Teleological Theories Virtue Ethics Ethics in Marketing Ethical dilemmas in international marketing Humanity has long struggled with the question of what constitutes ethical behavior. The answer to this question has not always been simple or easy especially in the midst of conflicting interests. Businesses desire and need to sell products to consumers but serious issues

Computer Games Research When considering the short history of computers, video and PC gaming are very recent on the timeline of technology. This is one of the reasons why there have not been many conclusive studies on the negative and/or positive effects of electronic games on children and young adults -- the most formative years. With the ever-increasing interest and involvement of children in this activity, much concern has been expressed