Sharing Economy Concepts Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Tech allows diverse prod and service providers to connect w/ ______.

consumers

Some firms are buying inventory and renting it out, such as ______.

Rent the Runway

Indiv takes possession of an item for a period of time then returns it for use by ______.

others

Uber and Lyft are examples of ______ services.

<p>transportation</p> Signup and view all the answers

A new class of micro-entrepreneurs providing personal services includes platforms like ______.

<p>Rover</p> Signup and view all the answers

Crowdfunding platforms such as ______ allow consumers to pool capital for projects.

<p>Kickstarter</p> Signup and view all the answers

Some services oversee inventory to gain more control, as seen with ______.

<p>Rent the Runway</p> Signup and view all the answers

Transportation services like Turo provide ______ vehicles.

<p>loaner</p> Signup and view all the answers

Social media word of mouth accelerates the growth of the sharing ______.

<p>economy</p> Signup and view all the answers

Efforts to foster reusable services often have an ______ benefit.

<p>environmental</p> Signup and view all the answers

Extortionists might leverage hacked data to demand ______.

<p>payment</p> Signup and view all the answers

Cyberware has become a legit ______.

<p>threat</p> Signup and view all the answers

Taking out key components of the US power grid is ______.

<p>devastating</p> Signup and view all the answers

Stuxnet showed that with computers at the heart of many systems, it's now possible to destroy critical ______.

<p>infrastructure</p> Signup and view all the answers

San Francisco city government lost control of a large portion of its own computer network over a ______ day period.

<p>10</p> Signup and view all the answers

Every 7 riders attract 1 new ______ user.

<p>Uber</p> Signup and view all the answers

91% recommend the last service to a ______ or colleague.

<p>friend</p> Signup and view all the answers

Drivers and customers link to Lyft through their ______ accounts.

<p>Facebook</p> Signup and view all the answers

Uber has raised $21B so far, and boasts a private valuation of over ______B.

<p>70</p> Signup and view all the answers

Trust is essential on Airbnb, as guest identity is verified via a ______-step process.

<p>2</p> Signup and view all the answers

Uber claims to create 50k new jobs a month, with nearly all being ______.

<p>drivers</p> Signup and view all the answers

WePay's fraud-fighting technology analyzes social ______ to streamline payment processes.

<p>profiles</p> Signup and view all the answers

Airbnb listings include unique options such as yurts, castles, and private ______.

<p>islands</p> Signup and view all the answers

Many local firms also benefit from ______ and regulatory fees from industries threatened by the sharing economy.

<p>taxes</p> Signup and view all the answers

Uber's product-market fit conveys the degree to which a product satisfies market ______.

<p>demand</p> Signup and view all the answers

Successful efforts should be desired by customers and scale into large, profitable ______.

<p>business</p> Signup and view all the answers

Uber raises prices when supply does not meet demand to encourage drivers to work through ______ pricing.

<p>surge</p> Signup and view all the answers

Uber has been accused of the theft of self-driving car ______.

<p>tech</p> Signup and view all the answers

Uber app knows who drivers are, who was picked up, and where they were ______.

<p>taken</p> Signup and view all the answers

Staff optimizes ______ to determine the number of drivers, where demand is, and dynamic pricing.

<p>algorithms</p> Signup and view all the answers

Uber offers an API: published guideline on how other ______ can embed Uber into their own apps.

<p>developers</p> Signup and view all the answers

UberHealth offers APIs for integration into healthcare ______.

<p>products</p> Signup and view all the answers

Network effects mean that riders choose apps with more ______.

<p>drivers</p> Signup and view all the answers

Uber's growth concerns include rival Lyft putting up growth numbers much stronger than ______.

<p>Uber's</p> Signup and view all the answers

Marginal Costs are associated with each additional unit ______.

<p>produced</p> Signup and view all the answers

Edward Snowden leaked over 1.7M digital docs from US, British, and Australian ______.

<p>agencies</p> Signup and view all the answers

XKeyscore allows collection of data on 'nearly everything a user does on the ______.'

<p>internet</p> Signup and view all the answers

White hat hackers contribute to improving system ______.

<p>security</p> Signup and view all the answers

Black hat hackers are often referred to as computer ______.

<p>criminals</p> Signup and view all the answers

Social engineering involves con games that trick employees into revealing ______.

<p>info</p> Signup and view all the answers

Using ______ for authentication involves measuring and analyzing human body characteristics.

<p>biometrics</p> Signup and view all the answers

Malware seeks to compromise a computing system without ______.

<p>permission</p> Signup and view all the answers

Unlike viruses, ______ are programs that automatically spread by exploiting security vulnerabilities.

<p>worms</p> Signup and view all the answers

Software business is very attractive, with notable figures such as Bill Gates and ______ among the wealthiest people.

<p>Larry Ellison</p> Signup and view all the answers

Open-Source Software (OSS) is free and allows anyone to look at and potentially ______ the code.

<p>modify</p> Signup and view all the answers

Cloud computing replaces computing with services provided over the Internet, on other’s ______.

<p>hardware</p> Signup and view all the answers

Software as a Service (SaaS) involves subscribing to a 3rd party software and receiving a service that is delivered ______.

<p>online</p> Signup and view all the answers

Linux is an example of an open-source software ______ system.

<p>operating</p> Signup and view all the answers

LAMP stands for Linux, Apache, MYSQL, and any of several programming languages that start with ______.

<p>P</p> Signup and view all the answers

The open source community aims to improve software quality, making the reliability of OSS outperform its ______ competitors.

<p>commercial</p> Signup and view all the answers

The ______ vulnerabilities in code can be addressed quicker when many eyes examine the OSS.

<p>security</p> Signup and view all the answers

Flashcards

Sharing Economy

A system where individuals share access to goods and services rather than owning them outright, facilitated by technology.

Collaborative Consumption

A key aspect of the sharing economy where individuals share access to goods and services, using them for a limited time, often through online platforms.

Citizen Suppliers

Individuals who use the sharing economy to offer services or rent out their assets, becoming providers in the marketplace.

Market Makers

Online platforms that connect buyers and sellers in the sharing economy, facilitating transactions and enabling access to goods or services.

Signup and view all the flashcards

Pre-owned Goods in Sharing Economy

Platforms like eBay, craigslist, and thredUp that allow buyers and sellers to trade used goods.

Signup and view all the flashcards

Loaner Products

Services like Zilok, Rent the Runway, and Chegg that allow users to temporarily borrow items.

Signup and view all the flashcards

Professional Services in Sharing Economy

Platforms like Upwork and crowdSPRING that connect freelancers and businesses for various tasks.

Signup and view all the flashcards

Personal Services in Sharing Economy

Platforms like Angie’s List, Handy, and TaskRabbit that connect individuals needing household tasks with service providers.

Signup and view all the flashcards

Sharing Economy Growth Factors

Factors that propelled the growth of the sharing economy include economic recession, stagnant wages, and environmental concerns.

Signup and view all the flashcards

Social Media Impact on Sharing Economy

Social media platforms like Facebook play a significant role in promoting and spreading awareness about sharing economy services through word-of-mouth.

Signup and view all the flashcards

Cyber Extortion

Hackers use stolen data to threaten victims and demand payment.

Signup and view all the flashcards

Cyber-Attacks on Infrastructure

Hackers can target critical systems like power grids and oil refineries, causing significant damage.

Signup and view all the flashcards

Stuxnet

A sophisticated malware that showed the ability to disrupt industrial control systems, marking a new era of cyberwarfare.

Signup and view all the flashcards

Revengeful Employees

Angry employees can cause significant damage by sabotaging company networks, potentially leading to data loss or disruptions.

Signup and view all the flashcards

Tech Disruptions by Terrorists

Terrorist groups can use technology to cause significant damage or chaos, targeting infrastructure or communication networks.

Signup and view all the flashcards

Software Products: Marginal Cost

The cost of producing one additional unit of software is essentially zero. This is because software can be copied and distributed digitally with minimal additional cost.

Signup and view all the flashcards

Open Source Software (OSS)

Software where the source code is freely available for anyone to inspect, modify, and redistribute. Anyone can contribute to its development.

Signup and view all the flashcards

Cloud Computing

A model where computing resources (like servers, storage, and software) are provided as a service over the internet, rather than on your own hardware.

Signup and view all the flashcards

Software as a Service (SaaS)

A cloud computing model where you subscribe to software (like CRM or accounting software) and access it online, without needing to install or manage it yourself.

Signup and view all the flashcards

Virtualization

Technology that allows a single computer to act like multiple separate computers, improving efficiency and resource utilization.

Signup and view all the flashcards

Linux

A popular open-source operating system used in various devices and servers, from cell phones to supercomputers.

Signup and view all the flashcards

LAMP

A popular open-source web development stack consisting of Linux, Apache web server, MySQL database, and programming languages like PHP, Perl, or Python.

Signup and view all the flashcards

Why is Open Source Software Popular?

Open source software is often chosen for its cost-effectiveness, reliability, and security. Its collaborative development model allows for rapid bug fixes and security improvements.

Signup and view all the flashcards

Surge Pricing

A dynamic pricing strategy used by Uber to increase prices during periods of high demand, encouraging more drivers to work and balance supply and demand.

Signup and view all the flashcards

Network Effects

The phenomenon where the value of a product or service increases as more users adopt it. In Uber's case, more riders attract more drivers, and more drivers attract more riders.

Signup and view all the flashcards

Uber's God View

A software system that displays real-time information about Uber drivers, customer locations, and traffic patterns to optimize operations.

Signup and view all the flashcards

Marginal Costs

The cost of producing one additional unit of a product or service.

Signup and view all the flashcards

Uber's API

A set of guidelines that allows other developers to integrate Uber services into their own applications.

Signup and view all the flashcards

Uber's Challenges

Key challenges for Uber include regulatory concerns, maintaining service quality, and expanding into global markets with existing competitors.

Signup and view all the flashcards

Uber's Future?

Some analysts believe Uber might expand into various logistics businesses, like shipping and delivery, leveraging its platform and technology.

Signup and view all the flashcards

Rival Lyft's Growth

Lyft has experienced rapid growth, surpassing Uber's recent performance, particularly in active riders and revenue.

Signup and view all the flashcards

Uber's Data Advantage

Uber's massive data collection allows it to analyze demand patterns, optimize driver allocation, and adjust pricing for better efficiency and growth.

Signup and view all the flashcards

Snowden Leaks

Edward Snowden, a former CIA employee and NSA contractor, leaked over 1.7 million digital documents that exposed widespread government surveillance programs.

Signup and view all the flashcards

XKeyscore

A data collection system that allows the collection of data on nearly everything a user does on the internet, including browsing history, communication logs, and location data.

Signup and view all the flashcards

White Hat Hackers

Ethical hackers who identify and report vulnerabilities in computer systems without exploiting them. They contribute to improving system security.

Signup and view all the flashcards

Black Hat Hackers

Computer criminals who exploit vulnerabilities in systems for malicious purposes, such as stealing data, disrupting services, or launching attacks.

Signup and view all the flashcards

Bad Apples

Dishonest employees who steal confidential information, install malware, or sabotage a company's systems for personal gain.

Signup and view all the flashcards

Social Engineering

Manipulative tactics used to trick people into revealing sensitive information or performing actions that compromise security, often using deception and psychological manipulation.

Signup and view all the flashcards

Malware

Harmful software designed to infiltrate and damage computer systems without permission.

Signup and view all the flashcards

Worms

Self-replicating malware that spreads through network vulnerabilities, automatically infecting multiple systems without requiring user interaction.

Signup and view all the flashcards

Social Proof

The positive influence created when someone sees others doing something, making it more likely they'll do it too. This is a powerful tool in marketing and can be seen in actions like recommending services to friends.

Signup and view all the flashcards

Trust in Sharing Economy

A critical factor in platforms like Uber and Airbnb. Trust is built through verification processes, ratings, and safety measures. However, it's always an ongoing challenge in the sharing economy due to potential risks and the lack of traditional regulations.

Signup and view all the flashcards

Insurance Concerns in Sharing Economy

The sharing economy raises questions about insurance coverage for incidents involving service providers. Traditional insurance models may not fully cover these situations, leading to uncertainties for both platforms and participants.

Signup and view all the flashcards

Independent Contractor vs. Employee Classification

A major legal debate in the sharing economy revolves around whether workers should be classified as independent contractors or employees. This impacts their access to benefits like minimum wage, overtime pay, and unemployment insurance.

Signup and view all the flashcards

WePay's Solution

A payment platform specifically designed for buyer/seller platforms within the sharing economy, offering efficient and secure transactions. WePay uses fraud-fighting technology and machine learning to monitor and prevent fraudulent activity.

Signup and view all the flashcards

Airbnb's Trust Mechanisms

Airbnb implements strict measures to build trust between guests and hosts, including verified identities, secure payment guarantees, and 24/7 customer support. These measures aim to prevent fraud and ensure a safe experience.

Signup and view all the flashcards

Airbnb's Monitoring System

To identify potential scams and maintain a safe platform, Airbnb monitors transactions, communication, and reviews at a deep level, analyzing data to detect suspicious activities.

Signup and view all the flashcards

Airbnb's Legal Challenges

In many locations, Airbnb faces legal challenges related to zoning regulations, health and safety codes, and competition with established hospitality industries. These challenges highlight the evolving legal landscape for the sharing economy.

Signup and view all the flashcards

Uber's Value Proposition

Uber offers convenience, affordability, and a trustworthy experience to customers. It leverages technology to simplify the ride-hailing process and provides riders with transparent pricing and payment methods.

Signup and view all the flashcards

Product-Market Fit

A measure of how well a product meets the demands of its target market. In the context of the sharing economy, it describes how well platforms like Uber and Airbnb address the needs and preferences of their customers.

Signup and view all the flashcards

Study Notes

Chapter 11: Sharing Economy, Collaborative Consumption, and Efficient Markets

  • Technology connects diverse product and service providers with consumers, offering wider reach and efficiency
  • Efforts empower "citizen suppliers," where product owners become rental providers (e.g., rooms - Airbnb, cars - Turo, boats - Boatsetters)
  • New micro-entrepreneurs offer personal services (e.g., car rides - Uber, pet sitting - Rover, meal prep - Feastly, home services - Care.com)
  • Some firms buy inventory and rent it out (e.g., Rent the Runway, Zipcar, Chegg)
  • Products are "collaboratively consumed," where individuals temporarily possess items for reuse by others
  • Consumers pool capital to finance projects (e.g., Kickstarter, GoFundMe) or obtain loans (e.g., LendingClub)
  • Internet-enabled market makers operate, rooted in platforms like eBay and Craigslist
  • Goods examples: pre-owned (eBay, Craigslist, ThredUP), loaner products (Zilok, Rent the Runway, Chegg), custom products (Etsy)
  • Service examples: professional (Upwork, crowdSPRING), personal (Angie's List, Handy, TaskRabbit), delivery (Doordash, Grubhub), transportation (Uber, Lyft, Didi), loaner vehicles (Turo, Zipcar), places to stay (Airbnb, HomeAway, Couchsurfing)
  • Office space (LiquidSpace, ShareDesk)

Social Media and Sharing Economy Growth

  • Word-of-mouth referrals significantly accelerate the sharing economy's growth across social media
  • 47% of sharing economy participants learn through word-of-mouth
  • Uber's inherent virality: Every 7 customers recommend the service to 1 new user
  • Social proof positively influences others to join the platform through connections between customers and drivers via social media accounts

Chapter 15: Open Source, Cloud, Virtualized, and App-Driven Shifts

  • Marginal cost for software products is zero (MC=0)
  • Open-source software (OSS) is attractive due to its open code, enabling modification, fostering a large community of contributors, including early adopters like Bill Gates and Larry Ellison
  • Cloud computing replaces traditional computing with services accessible over the internet (software as a service [SaaS]- a service provided online without any burden of buying, managing, or maintaining third-party software)
  • Virtualization enables one computer to behave like multiple separate computers which allows for efficient resource use

Chapter 19: Information Security

  • Large data breaches, like the Equifax breach (2017), highlight the vulnerabilities of systems holding sensitive customer information (e.g., credit card data, social security numbers)
  • Large-scale breaches have significant economic, social, and legal consequences that impact consumers
  • Hackers exploit vulnerabilities in software components (e.g., Apache Struts) to gain unauthorized access and cause financial harm, including hacking attacks before Thanksgiving, like the Target breach
  • Security concerns emphasize data protection and the importance of secure practices (e.g., strong passwords, data backups, up-to-date software)

General Security Concerns

  • Firms face considerable risks from malicious actors (e.g., hacking and data breaches) when employing systems relying on open-source software (OSS)
  • Data harvesters and other cybercriminals exploit vulnerabilities and steal data for financial gain, extortion, or resale
  • Social engineering and other malicious use of technology can lead to major data compromises, causing considerable financial, reputational, and operational damage. The need for updated technology and security protocols is critical and can be pricey.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Sharing Economy Review and Analysis
85 questions
Use Quizgecko on...
Browser
Browser