SMG IS 223 Study Guide - Final Guide: Dynamic Pricing, Switching Barriers, Intranet

39 views1 pages
Bids on ebay if there are more people biding - the buyer gains money and
the bider keeps losing money b/c they pay more - more people drive the
price up
Switching costs- e-commerce marketing technique
o Making it difficult to change
o Adobe : subsidize consumer - slide 263
Take away: If they give something away for free - they will lure you in
What is a major difference if i'm an employe in a standard economy vs. a regular business ?
o Standard economy - no sense of benefits, promotion, standard table of org does not
apply, HR component is different (major difference) , you define hours
o Regular business- benefits, caped hours, standard table of organization applies, HR
component is key
Chicken and egg problem
Intranet- extension of my private network
MYSQL - relational database - relationship betweens tables
Dynamic pricing - willingness to pay
Security
Pharming - uses website - tricks people to go to a rouge website to gain their info - maliciously
drawing people in - pretending to be a legit website or do a knock off on a legit website
Evil-twin - uses public wifi network/ unencrypted network - tricks people to go to a rouge
website to gain their info
Phishing - brining/ luring people in - technique through email
o May or may not have success
#1 weakness with security - people / employees
Lock on computer - ransomware
Malware - malicious
Keylogger- records
Trojan - looks beijing but it explodes
Worms- doesn't need to be attached to anything
Virus- attached to something
Intrusion detection - firewall - detects what is in and out - & intrusion detection will let you
know if someone is trying to break in or tell you there is unusual traffic to firewall
Denial of service attack - flood in transactrations to bring registration system now
Internet vulnerabilities
o Network is open to anyone
o Size of internet means abuses can have wide impact
o Use of fixed internet address with cable/DSL modems creates fixed targets for hackers
o Unencrypted VOIP - VOIP - using computer as a video conference or phone
connection & Unencrypted - not protected - tracking what you do
o E-mail, P2P, IM
Interception
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows half of the first page of the document.
Unlock all 1 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers