SMG IS 223 Study Guide - Final Guide: Dynamic Pricing, Switching Barriers, Intranet
• Bids on ebay if there are more people biding - the buyer gains money and
the bider keeps losing money b/c they pay more - more people drive the
price up
• Switching costs- e-commerce marketing technique
o Making it difficult to change
o Adobe : subsidize consumer - slide 263
▪ Take away: If they give something away for free - they will lure you in
• What is a major difference if i'm an employe in a standard economy vs. a regular business ?
o Standard economy - no sense of benefits, promotion, standard table of org does not
apply, HR component is different (major difference) , you define hours
o Regular business- benefits, caped hours, standard table of organization applies, HR
component is key
• Chicken and egg problem
• Intranet- extension of my private network
• MYSQL - relational database - relationship betweens tables
• Dynamic pricing - willingness to pay
Security
• Pharming - uses website - tricks people to go to a rouge website to gain their info - maliciously
drawing people in - pretending to be a legit website or do a knock off on a legit website
• Evil-twin - uses public wifi network/ unencrypted network - tricks people to go to a rouge
website to gain their info
• Phishing - brining/ luring people in - technique through email
o May or may not have success
• #1 weakness with security - people / employees
• Lock on computer - ransomware
• Malware - malicious
• Keylogger- records
• Trojan - looks beijing but it explodes
• Worms- doesn't need to be attached to anything
• Virus- attached to something
• Intrusion detection - firewall - detects what is in and out - & intrusion detection will let you
know if someone is trying to break in or tell you there is unusual traffic to firewall
• Denial of service attack - flood in transactrations to bring registration system now
• Internet vulnerabilities
o Network is open to anyone
o Size of internet means abuses can have wide impact
o Use of fixed internet address with cable/DSL modems creates fixed targets for hackers
o Unencrypted VOIP - VOIP - using computer as a video conference or phone
connection & Unencrypted - not protected - tracking what you do
o E-mail, P2P, IM
▪ Interception
find more resources at oneclass.com
find more resources at oneclass.com