study_guide_final_exam

study_guide_final_exam - Business model of Facebook What is...

Info icon This preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
ISOM231 Study Guide - Final Exam ONLINE CONTENT PROVIDERS network scalability 4 factors that required to charge for content the business model of newspapers in the internet age Digital Right Management (DRM) How Napster, Kazaa and BitTorrent work YouTube's business models and some of the difficulties it faces Netflix’s business model AUCTION Dynamic Pricing, Fixed Pricing, Trigger Pricing, Utilization Pricing Benefits of Auction Solutions to monitoring cost of auction and proxy bidding Biases in Dynamically Priced market English auction, Sealed-bid auction, Vickery auction, Reverse auction, "name your own price" auction Dutch Internet Auction Factors determine auction seller profits Winner's regret, Seller's lament, Loser's lament Shill bidding, shill feedback,bid rigging Ebay's business models and its business strategy SOCIAL NETWORK The "first" social network (well.com) Classification of social network based on activities Some of the ways social network sites make money
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Business model of Facebook What is social operating system and why Google is wary of Facebook PAYMENT SYSTEMS Desired property of money Differences between Fiduciary vs. Scriptural money In table 5.6, study the financial risk, merchant risk, float, anonymity, authentication, refutability for credit card, cash, personal check and debit card digital cash How Paypal works, its business models, strategy and competitors E-SECURITY Six dimensions of e-security The three points of vulnerability in e-commerce environment Trojan horse, worm The 3 types of viruses Spyware and Adware The 3 types of hackers social engineering & phishing Denial of service Difference between secret key and public key encryption Limitations of secret key encryption and public key encryption Hash digest, digital signatures, and digital envelop (see the "formulas") Certificate Authority (CA) limitations of PKI Format of the exam There are 60 MC questions and some short essay questions....
View Full Document

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern