Monday, October 4, 2010

Chapter 6

1.    Other than search engines, what are some of the most popular uses of the Internet?
- Send or read e-mail, Get News, Check the Weather etc.
2.    Would you say that the Internet fosters or impedes social activity? Explain your position.
- I believe that the Interent fosters social activity. For example, many friends from high school I remain in contact with via interent, facebook to be more exact.
3.    Why would the amount of experience someone has using the Internet likely increase future Internet usage?
- With more experience becomes more adaptation and dependability, so this would likely cause the person to rely more no the internet.
4.    Research has shown that many consumers use the Internet to investigate purchases before actually buying, which is often done in a physical storefront. What implication does this have for online merchants? What can they do to entice more online buying, rather than pure research?Name four improvements Web merchants could make to encourage more browsers to become buyers.
-
5.    Name the five stages in the buyer decision process, and briefly describe the online and offline marketing activities used to influence each.
6.    What are the components of the core product, actual product, and augmented product in a feature set?
7.    Name some of the drawbacks to the four data mining techniques used in Internet marketing.
8.    Which of the four market entry strategies is most lucrative?
9.    Compare and contrast the four marketing strategies used in mass marketing, direct marketing, micromarketing, and one-to-one marketing.
10.  What are some of the reasons that freebies, such as free Internet service and giveaways, don’t work to generate sales on a Web site?
11.  Why do companies that bundle products and services have an advantage over those that don’t or can’t offer this option?

Monday, September 27, 2010

Chapter 5


1.    Why is it less risky to steal online? Explain some of the ways criminals deceive consumers and merchants.
- Its easy to steal online because of the almost no risk of being caught, and the lack of
security on the internet.
- Criminals use legimate looking services identities which trick consumers and place fraudulent orders to online merchants.
2.    Give an example of security breaches as they relate to each of the six dimensions of e-commerce security. For instance, what would be a privacy incident?
- Integrity: Redirecting a bank wire transfer to a different account.
- Nonrepudiation: Merchants don't receive a physical copy of a signature.
- Authenticity: Someone who claims to be someone he is not.
- Confidentiality: If a hacker breaks into a site and gains a credit card number.
- Privacy: Personal information being used in a unauthorized manner.
- Availabilty: The site may not be operational.
3.    How would you protect your firm against a Denial of Service attack?
- Constantly updating system with encryptions, firewalls etc.
4.    How does spoofing threaten a Web site’s operations?
- It threatens the integrity of the site. Hackers can redirect customers to a fake website and gain their private information.
5.    What are some of the steps a company can take to curtail cybercriminal activity from within a business?
- Encryption, Firewalls
6.    Identify and discuss the five steps in developing an e-commerce security plan.
- 1. Perform a risk assessement
  2. Develop a security policy
  3. Develop an inplementation
  4. Create a security organization
  5. Perform a security audit
7.    What are tiger teams, who uses them, and what are some of the tactics they use in their work?
8.    How do the interests of the four major payment systems stakeholders impact each other?

Wednesday, September 1, 2010

Chapter 1

Chapter 1


1. What is e-commerce? How does it differ from e-business? Where does it intersect with e-business?
- E-commerce is the use of the Internet and the Web to transact business.
-  E-business is primarily to the digital enabling of transactions and processes within a firm. E-commerce however, is not anything digital. Also E-business does not include commercial transactions involving an exchange of value across orgnizational boundaries.
- E-commerce and E-business systems blur together at the business firm boundary. A business e-business infrastructure provides support for online e-commerce exchanges.
2. What are some of the unique features of e-commerce technology?
-Ubiquity, -Global reach, -Universal standards, - Richness, - Interactivity, - Information density, - Personalization/Customization, - Social technology
3. What is Web 2.0? Give examples of Web 2.0 sites and explain why you included them in your list.
- Web 2.0 is a set of applications and technologies that allows users to create, edit, and distribute content; share preferences, bookmarks, and online personas; participate in virtual lives; and build online communities.
- Youtube: the largest online consumer-generated video posting site
-Myspace & Facebook: lead the online social networking site.
4. Give examples of B2C, B2B, C2C, and P2P Web sites besides those listed in the chapter materials.
-Amazon, Rhapsody, Monster
5. What factors will help define the future of e-commerce over the next five years
- Regulatory activity both in the U.S. and Canada, - Cost of energy