Presentation on theme: "1 BA345W Announcements, 2/15/07 –Class next Tuesday (2/20) in Hamersly #108 –Class Project Concepts past due Note that students have greater degree of."— Presentation transcript:
1 BA345W Announcements, 2/15/07 –Class next Tuesday (2/20) in Hamersly #108 –Class Project Concepts past due Note that students have greater degree of “control” over Class Project. Think about various forms of competitive advantage. –Writing Assignment #2 due tonight. –Students should begin reading Chapters 7 & 8 in Laudon text.
2 Today’s agenda: 2/15/07 Cover Chapters 4, 5, and 6 briefly. –Material in text is generally technical, so is not on the required reading list. –For exams, only responsible for what we cover in class Start to get into Chapter 7
4 Chapter 4: Learning Objectives Brief overview of web site “do’s” and “don’ts”. Brief overview of the spectrum of web site approaches Simple: –Use of Templates (e.g. Yahoo Stores, MySpace) –Dreamweaver or FrontPage (no database) Complex: –Web sites linked to back-end databases Application servers such as IBM WebSphere CGI scripts and SQL databases
7 Jakob Nielsen, usability “guru” Nielsen Norman Group http://www.useit.com/ (not a visually impressive website, but easy to navigate) See his comments on “why this site has almost no graphics” –Short Answer: Download speeds –(Note: about 35% - 40% of home users still have dial up) –Recall “garish” examples of instructor sites
11 Chapter 5: Learning Objectives Brief discussion of common Internet-based security threats. –Viruses and other “malware.” –“Phishing” (Dilbert cartoon) Emphasis on practical information. Very brief discussion of encryption; focus on tension between privacy rights of citizens and role of government.
12 New term: “Malware” General term being used to encompass viruses, worms, spyware, adware, and any other software developed with malicious or dishonest intent. Viruses and worms are small software “programs” that run on a computer without the user’s consent.
13 How viruses spread: 2 common methods Some viruses e-mail themselves to every e- mail address in the victim’s address book. Single greatest risk of viruses often from e- mail attachments, especially “.exe” files. –Because these viruses then arrive with e-mail message from someone known to the user, they often spread very fast and far. –As a rule, don’t open or double-click on an “.exe” e-mail attachment unless you are sure what it is. –Some go further and say don’t open any e-mail attachment unless you are sure what it is. Also, Office documents (macro viruses), etc.
14 Impact of Viruses Varies substantially: –Some viruses do no tangible harm at all; e.g. user just sees some type of message appear on screen. Messages are sometimes political in nature. At other times, messages criticize Microsoft, especially since viruses usually exploit security vulnerability in Microsoft software.
15 Impact of Viruses Varies substantially: –At other end of spectrum, some viruses can wipe out the user’s hard drive, and all other storage devices connected to the PC. All information on any device may well be lost. –This is reason that truly critical information should also be backed up on storage device not connected to the PC –Viruses can also send information from the user’s PC back to the originator of the virus.
16 Security Suites: Recommendation –For personal (non-network) use, PC Magazine recommends two security suite products above others: “Editor’s Choice”: ZoneAlarm Security Suite (has become easier for novices to use, though complexities remain.) Norton Internet Security (good product, but can slow down PCs noticeably) Each cost approximately $70; user receives virus updates for a define period of time, usually 1 year. Sometimes, standalone anti-virus product better than a “suite” product (doesn’t slow PC down as much). Some routers also provide security functionality.
17 Practical security/safety tips Back up highly valuable work on a separate storage device that you are willing to keep detached from your PC and network. (“CD or USB drive in a drawer”) Only “foolproof” backup is on a detached storage device that is not infected with a virus. –USB “jump” drives becoming incredibly cheap ($15 for 1GB!) –CD-R and CD-RW discs usually less that $1/each (capacity 550MB – 700MB); if don’t have CD drive, floppy discs can store long text documents, and often cost less than 50 cents apiece Virus scanning tools often have flexible settings –Can run automatic virus scans when your computer is on, but not likely to be in use (e.g. dinner time). –Can scan just one folder, or an attached storage device
18 PC Magazine Recommendation –Backups protect user from loss of data from hard drive crash, stolen laptop, etc., in addition to possibility of damage from virus, –PC Magazine recommends Maxtor One Touch USB external hard drive as a personal (vs. network) backup solution –Can be configured for various forms of automatic backup Cost of a 200GB drive about $129 at Staples. WD 160GB “Little Black Book” external drive for $89. –For very specific, highly important information that is not too lengthy, paper backups can make sense as an additional measure. –Or, e-mail an important document to yourself using your Yahoo, G-Mail, or WOU e-mail account (server-based).
20 “Phishing” “Phishing” Illustration: –E-mail sent from e-mail address that appears to eBay customer service, e.g. firstname.lastname@example.org@ebay.com –E-mail states “For security reasons, please update your credit card information” and provides a link, which appears to be something like http://www.ebay.com/customer-service http://www.ebay.com/customer-service –This is a link to a scam site, masquerading as eBay, which will capture your credit card information for fraudulent use. –Never follow such links; when updating sensitive account information, type URL (www.ebay.com) directly into browser Address Bar –Newest phishing scam: e-mail that purports to be from the IRS. –WOU’s e-mail system being hit by more phishing e-mails
22 eBay and PayPal a common “phishing” target If they get login information from a eBay/PayPal user, scammers can potentially buy and sell “products,” and transfer money, from that user’s account. Scam leverages reputation user established One measure PayPal has taken to combat phishing: –After an account is established, on a PayPal screen where the credit card number must be re-entered, PayPal shows the user the last few numbers of the card in question. –PayPal now tells users that after initial setup, PayPal will NEVER ask users to enter a credit card number on a screen where PayPal hasn’t already identified the last few numbers of the card. –This is information that scammers would not know.
23 Encryption Encryption converts meaningful information, e.g. an e-mail message, into unreadable “gibberish.” The intended reader then decrypts the message and is able to read it. Well know, widely available encryption program is PGP, i.e. “Pretty Good Privacy.” Technical issues regarding how this is done beyond scope of this course.
24 Encryption and Societal Issues Should government be able to get special access to information that would allow it to intercept and decrypt citizens’ messages? –On one hand, citizens should have the right to communicate to each other privately. Example: what if citizens want to criticize government policies in their private e-mails? –On the other hand, terrorists and criminals are known to use programs like PGP to encrypt their electronic communications. In the past, government and original developer of PGP clashed on this issue.
28 PayPal illustrates power of “de facto” industry standards “Open, ‘Official’ Industry Standard” –Established by organizations like IEEE. –Example: Wi-Fi standards, e.g. 802.11b, 802.11g, 802.11n –Not always successful in the marketplace. De Facto Industry Standard –Established when a product, service, or technology is embraced by users and customers. –Classic example: Microsoft Windows –Friedman’s discussion of PayPal: eBay wanted its users to utilize Billpoint, eBay’s payment service. But users indicated “We want a standard, and we’ve picked the standard, and it’s PayPal.” –eBay’s response was to eventually give up on Billpoint and acquire PayPal. Perhaps things could get to a point where almost every Internet user will think: “We all have PayPal, who needs anything else?”
29 PayPal illustrates concept of “Network Effect” –General concept of Network Effect: As the number of people in the network increases, the value of the network to all participants increases exponentially –Network Effect: As more Internet users establish PayPal accounts, the usefulness (or value) of a PayPal account increases for everyone. If everyone has a PayPal account (i.e. it is the de facto standard), who needs anything else?
33 Question #1 for Marketers “Is my target customer online?” More refined version: “To what degree is my target customer online?”
34 Late 2006: “Ballpark” demographics, U.S. About 300 million people live in the U.S. There are about 110 million “households” in the U.S. 69 to 74 million households (63% to 68%) have Internet access. About 40 million households have broadband access. 30 to 35 million households still have dial-up access. Source for broadband/dial-up data: “Rewired and Ready For Combat,” Business Week, 11/7/05; Online Video Goes Mainstream, Sparking an Industry Land Grab, WSJ, 2/21/06; also “Why the Web Is Hitting a Wall,” Business Week, 3/20/06.
35 U.S. Internet usage data from Jupiter Research
37 Age-related demographic skew “Nearly 60% of people 65 or older do not use the Internet at all.” (Source: Park Associates, reported in Business Week, 3/20/06) For company like General Motors, which has several brands which appeal primarily to older consumers (e.g. Buick, Cadillac), this “skew” is a major factor in marketing decisions.
40 Generic vs. specific models Next slides “Generic” consumer behavior models Try to determine how these generic models manifest in the industry you are focused on in your class project. Generic models should be the starting point of your analysis.
46 Advertising Networks Will discuss again in Chapter 9, from Privacy standpoint. Advertising Networks are controversial because of the privacy issues they raise. However, Ad Networks address a key need for the advertiser who is spending the money –Advertisers want some evidence that they are not paying for their ads to be shown to users who have absolutely no interest in their product/service.
49 Basic concept of a customer database While some database technology is complex, the basic concept of a customer database is not. Think of the Blockbuster Video Store. Blockbuster wants to know: –Customer name, and how to reach customer –What videos the customer has checked out, and when they are due back. –Other information that might be helpful in understanding broader customer trends. For example, history of videos the customer has checked out.