Nothing Special   »   [go: up one dir, main page]

Academia.eduAcademia.edu

TUTORIALS

Chapter 1 Compare brick-and-mortar and click-and-mortar Organizations. Why is buying with a smart card from a vending machine considered EC? Identify the contribution of Web 2.0. What does it add to EC? Discuss the reasons companies embark on social commerce. Distinguish an enterprise social network from a public one such as Facebook. 8. Carefully examine the non-technological limitations of EC. Which are company dependent and which are generic? Chapter 2 Compare physical marketplaces with marketspaces. What are the advantages and limitations of each? Discuss the following statement: “Technically, you can put together a portal in a weekend, but culturally there are a slew of things to consider; therefore it takes much longer.” Discuss the pros and cons of selling cars via auctions. 9. Discuss the pros and cons of using avatars in help desks. What are the benefits? The limitations? D&D Discuss the advantages of dynamic pricing strategy over fi xed pricing. What are the potential disadvantages of dynamic pricing? Debate: Some research suggests that the use of public social networks by employees during work hours can be good for a business because employees develop relationships and share information, which increases productivity and innovation. Others say it is a waste of time and ban the use of Facebook, YouTube, and other such sites at work. Chapter 10 Consider how a hacker might trick people into divulging their user IDs and passwords to their Amazon.com accounts. What are some of the specifi c ways that a hacker might accomplish this? What crimes can be performed with such information? 2. B2C EC sites and social networks continue to experience DoS and DDoS attacks. How are these attacks executed? Why is it so difficult to safeguard against them? What are some of the things a site can do to mitigate such attacks? How are botnets, identity theft, DoS attacks, and website hijackings perpetrated? Why are they so dangerous to e-commerce? Discuss some of the difficulties of eliminating online financial fraud. Why is it so difficult to fight computer criminals? What strategies can be implemented by financial institutions, airlines, and other heavy users of EC? 6. Debate this statement: “The best strategy is to invest very little and only in proven technologies such as encryption and fi rewalls.”