Podcast
Questions and Answers
Tech allows diverse prod and service providers to connect w/ ______.
Tech allows diverse prod and service providers to connect w/ ______.
consumers
Some firms are buying inventory and renting it out, such as ______.
Some firms are buying inventory and renting it out, such as ______.
Rent the Runway
Indiv takes possession of an item for a period of time then returns it for use by ______.
Indiv takes possession of an item for a period of time then returns it for use by ______.
others
Uber and Lyft are examples of ______ services.
Uber and Lyft are examples of ______ services.
A new class of micro-entrepreneurs providing personal services includes platforms like ______.
A new class of micro-entrepreneurs providing personal services includes platforms like ______.
Crowdfunding platforms such as ______ allow consumers to pool capital for projects.
Crowdfunding platforms such as ______ allow consumers to pool capital for projects.
Some services oversee inventory to gain more control, as seen with ______.
Some services oversee inventory to gain more control, as seen with ______.
Transportation services like Turo provide ______ vehicles.
Transportation services like Turo provide ______ vehicles.
Social media word of mouth accelerates the growth of the sharing ______.
Social media word of mouth accelerates the growth of the sharing ______.
Efforts to foster reusable services often have an ______ benefit.
Efforts to foster reusable services often have an ______ benefit.
Extortionists might leverage hacked data to demand ______.
Extortionists might leverage hacked data to demand ______.
Cyberware has become a legit ______.
Cyberware has become a legit ______.
Taking out key components of the US power grid is ______.
Taking out key components of the US power grid is ______.
Stuxnet showed that with computers at the heart of many systems, it's now possible to destroy critical ______.
Stuxnet showed that with computers at the heart of many systems, it's now possible to destroy critical ______.
San Francisco city government lost control of a large portion of its own computer network over a ______ day period.
San Francisco city government lost control of a large portion of its own computer network over a ______ day period.
Every 7 riders attract 1 new ______ user.
Every 7 riders attract 1 new ______ user.
91% recommend the last service to a ______ or colleague.
91% recommend the last service to a ______ or colleague.
Drivers and customers link to Lyft through their ______ accounts.
Drivers and customers link to Lyft through their ______ accounts.
Uber has raised $21B so far, and boasts a private valuation of over ______B.
Uber has raised $21B so far, and boasts a private valuation of over ______B.
Trust is essential on Airbnb, as guest identity is verified via a ______-step process.
Trust is essential on Airbnb, as guest identity is verified via a ______-step process.
Uber claims to create 50k new jobs a month, with nearly all being ______.
Uber claims to create 50k new jobs a month, with nearly all being ______.
WePay's fraud-fighting technology analyzes social ______ to streamline payment processes.
WePay's fraud-fighting technology analyzes social ______ to streamline payment processes.
Airbnb listings include unique options such as yurts, castles, and private ______.
Airbnb listings include unique options such as yurts, castles, and private ______.
Many local firms also benefit from ______ and regulatory fees from industries threatened by the sharing economy.
Many local firms also benefit from ______ and regulatory fees from industries threatened by the sharing economy.
Uber's product-market fit conveys the degree to which a product satisfies market ______.
Uber's product-market fit conveys the degree to which a product satisfies market ______.
Successful efforts should be desired by customers and scale into large, profitable ______.
Successful efforts should be desired by customers and scale into large, profitable ______.
Uber raises prices when supply does not meet demand to encourage drivers to work through ______ pricing.
Uber raises prices when supply does not meet demand to encourage drivers to work through ______ pricing.
Uber has been accused of the theft of self-driving car ______.
Uber has been accused of the theft of self-driving car ______.
Uber app knows who drivers are, who was picked up, and where they were ______.
Uber app knows who drivers are, who was picked up, and where they were ______.
Staff optimizes ______ to determine the number of drivers, where demand is, and dynamic pricing.
Staff optimizes ______ to determine the number of drivers, where demand is, and dynamic pricing.
Uber offers an API: published guideline on how other ______ can embed Uber into their own apps.
Uber offers an API: published guideline on how other ______ can embed Uber into their own apps.
UberHealth offers APIs for integration into healthcare ______.
UberHealth offers APIs for integration into healthcare ______.
Network effects mean that riders choose apps with more ______.
Network effects mean that riders choose apps with more ______.
Uber's growth concerns include rival Lyft putting up growth numbers much stronger than ______.
Uber's growth concerns include rival Lyft putting up growth numbers much stronger than ______.
Marginal Costs are associated with each additional unit ______.
Marginal Costs are associated with each additional unit ______.
Edward Snowden leaked over 1.7M digital docs from US, British, and Australian ______.
Edward Snowden leaked over 1.7M digital docs from US, British, and Australian ______.
XKeyscore allows collection of data on 'nearly everything a user does on the ______.'
XKeyscore allows collection of data on 'nearly everything a user does on the ______.'
White hat hackers contribute to improving system ______.
White hat hackers contribute to improving system ______.
Black hat hackers are often referred to as computer ______.
Black hat hackers are often referred to as computer ______.
Social engineering involves con games that trick employees into revealing ______.
Social engineering involves con games that trick employees into revealing ______.
Using ______ for authentication involves measuring and analyzing human body characteristics.
Using ______ for authentication involves measuring and analyzing human body characteristics.
Malware seeks to compromise a computing system without ______.
Malware seeks to compromise a computing system without ______.
Unlike viruses, ______ are programs that automatically spread by exploiting security vulnerabilities.
Unlike viruses, ______ are programs that automatically spread by exploiting security vulnerabilities.
Software business is very attractive, with notable figures such as Bill Gates and ______ among the wealthiest people.
Software business is very attractive, with notable figures such as Bill Gates and ______ among the wealthiest people.
Open-Source Software (OSS) is free and allows anyone to look at and potentially ______ the code.
Open-Source Software (OSS) is free and allows anyone to look at and potentially ______ the code.
Cloud computing replaces computing with services provided over the Internet, on other’s ______.
Cloud computing replaces computing with services provided over the Internet, on other’s ______.
Software as a Service (SaaS) involves subscribing to a 3rd party software and receiving a service that is delivered ______.
Software as a Service (SaaS) involves subscribing to a 3rd party software and receiving a service that is delivered ______.
Linux is an example of an open-source software ______ system.
Linux is an example of an open-source software ______ system.
LAMP stands for Linux, Apache, MYSQL, and any of several programming languages that start with ______.
LAMP stands for Linux, Apache, MYSQL, and any of several programming languages that start with ______.
The open source community aims to improve software quality, making the reliability of OSS outperform its ______ competitors.
The open source community aims to improve software quality, making the reliability of OSS outperform its ______ competitors.
The ______ vulnerabilities in code can be addressed quicker when many eyes examine the OSS.
The ______ vulnerabilities in code can be addressed quicker when many eyes examine the OSS.
Flashcards
Sharing Economy
Sharing Economy
A system where individuals share access to goods and services rather than owning them outright, facilitated by technology.
Collaborative Consumption
Collaborative Consumption
A key aspect of the sharing economy where individuals share access to goods and services, using them for a limited time, often through online platforms.
Citizen Suppliers
Citizen Suppliers
Individuals who use the sharing economy to offer services or rent out their assets, becoming providers in the marketplace.
Market Makers
Market Makers
Signup and view all the flashcards
Pre-owned Goods in Sharing Economy
Pre-owned Goods in Sharing Economy
Signup and view all the flashcards
Loaner Products
Loaner Products
Signup and view all the flashcards
Professional Services in Sharing Economy
Professional Services in Sharing Economy
Signup and view all the flashcards
Personal Services in Sharing Economy
Personal Services in Sharing Economy
Signup and view all the flashcards
Sharing Economy Growth Factors
Sharing Economy Growth Factors
Signup and view all the flashcards
Social Media Impact on Sharing Economy
Social Media Impact on Sharing Economy
Signup and view all the flashcards
Cyber Extortion
Cyber Extortion
Signup and view all the flashcards
Cyber-Attacks on Infrastructure
Cyber-Attacks on Infrastructure
Signup and view all the flashcards
Stuxnet
Stuxnet
Signup and view all the flashcards
Revengeful Employees
Revengeful Employees
Signup and view all the flashcards
Tech Disruptions by Terrorists
Tech Disruptions by Terrorists
Signup and view all the flashcards
Software Products: Marginal Cost
Software Products: Marginal Cost
Signup and view all the flashcards
Open Source Software (OSS)
Open Source Software (OSS)
Signup and view all the flashcards
Cloud Computing
Cloud Computing
Signup and view all the flashcards
Software as a Service (SaaS)
Software as a Service (SaaS)
Signup and view all the flashcards
Virtualization
Virtualization
Signup and view all the flashcards
Linux
Linux
Signup and view all the flashcards
LAMP
LAMP
Signup and view all the flashcards
Why is Open Source Software Popular?
Why is Open Source Software Popular?
Signup and view all the flashcards
Surge Pricing
Surge Pricing
Signup and view all the flashcards
Network Effects
Network Effects
Signup and view all the flashcards
Uber's God View
Uber's God View
Signup and view all the flashcards
Marginal Costs
Marginal Costs
Signup and view all the flashcards
Uber's API
Uber's API
Signup and view all the flashcards
Uber's Challenges
Uber's Challenges
Signup and view all the flashcards
Uber's Future?
Uber's Future?
Signup and view all the flashcards
Rival Lyft's Growth
Rival Lyft's Growth
Signup and view all the flashcards
Uber's Data Advantage
Uber's Data Advantage
Signup and view all the flashcards
Snowden Leaks
Snowden Leaks
Signup and view all the flashcards
XKeyscore
XKeyscore
Signup and view all the flashcards
White Hat Hackers
White Hat Hackers
Signup and view all the flashcards
Black Hat Hackers
Black Hat Hackers
Signup and view all the flashcards
Bad Apples
Bad Apples
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Worms
Worms
Signup and view all the flashcards
Social Proof
Social Proof
Signup and view all the flashcards
Trust in Sharing Economy
Trust in Sharing Economy
Signup and view all the flashcards
Insurance Concerns in Sharing Economy
Insurance Concerns in Sharing Economy
Signup and view all the flashcards
Independent Contractor vs. Employee Classification
Independent Contractor vs. Employee Classification
Signup and view all the flashcards
WePay's Solution
WePay's Solution
Signup and view all the flashcards
Airbnb's Trust Mechanisms
Airbnb's Trust Mechanisms
Signup and view all the flashcards
Airbnb's Monitoring System
Airbnb's Monitoring System
Signup and view all the flashcards
Airbnb's Legal Challenges
Airbnb's Legal Challenges
Signup and view all the flashcards
Uber's Value Proposition
Uber's Value Proposition
Signup and view all the flashcards
Product-Market Fit
Product-Market Fit
Signup and view all the flashcards
Study Notes
Chapter 11: Sharing Economy, Collaborative Consumption, and Efficient Markets
- Technology connects diverse product and service providers with consumers, offering wider reach and efficiency
- Efforts empower "citizen suppliers," where product owners become rental providers (e.g., rooms - Airbnb, cars - Turo, boats - Boatsetters)
- New micro-entrepreneurs offer personal services (e.g., car rides - Uber, pet sitting - Rover, meal prep - Feastly, home services - Care.com)
- Some firms buy inventory and rent it out (e.g., Rent the Runway, Zipcar, Chegg)
- Products are "collaboratively consumed," where individuals temporarily possess items for reuse by others
- Consumers pool capital to finance projects (e.g., Kickstarter, GoFundMe) or obtain loans (e.g., LendingClub)
- Internet-enabled market makers operate, rooted in platforms like eBay and Craigslist
- Goods examples: pre-owned (eBay, Craigslist, ThredUP), loaner products (Zilok, Rent the Runway, Chegg), custom products (Etsy)
- Service examples: professional (Upwork, crowdSPRING), personal (Angie's List, Handy, TaskRabbit), delivery (Doordash, Grubhub), transportation (Uber, Lyft, Didi), loaner vehicles (Turo, Zipcar), places to stay (Airbnb, HomeAway, Couchsurfing)
- Office space (LiquidSpace, ShareDesk)
Social Media and Sharing Economy Growth
- Word-of-mouth referrals significantly accelerate the sharing economy's growth across social media
- 47% of sharing economy participants learn through word-of-mouth
- Uber's inherent virality: Every 7 customers recommend the service to 1 new user
- Social proof positively influences others to join the platform through connections between customers and drivers via social media accounts
Chapter 15: Open Source, Cloud, Virtualized, and App-Driven Shifts
- Marginal cost for software products is zero (MC=0)
- Open-source software (OSS) is attractive due to its open code, enabling modification, fostering a large community of contributors, including early adopters like Bill Gates and Larry Ellison
- Cloud computing replaces traditional computing with services accessible over the internet (software as a service [SaaS]- a service provided online without any burden of buying, managing, or maintaining third-party software)
- Virtualization enables one computer to behave like multiple separate computers which allows for efficient resource use
Chapter 19: Information Security
- Large data breaches, like the Equifax breach (2017), highlight the vulnerabilities of systems holding sensitive customer information (e.g., credit card data, social security numbers)
- Large-scale breaches have significant economic, social, and legal consequences that impact consumers
- Hackers exploit vulnerabilities in software components (e.g., Apache Struts) to gain unauthorized access and cause financial harm, including hacking attacks before Thanksgiving, like the Target breach
- Security concerns emphasize data protection and the importance of secure practices (e.g., strong passwords, data backups, up-to-date software)
General Security Concerns
- Firms face considerable risks from malicious actors (e.g., hacking and data breaches) when employing systems relying on open-source software (OSS)
- Data harvesters and other cybercriminals exploit vulnerabilities and steal data for financial gain, extortion, or resale
- Social engineering and other malicious use of technology can lead to major data compromises, causing considerable financial, reputational, and operational damage. The need for updated technology and security protocols is critical and can be pricey.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.