Podcast
Questions and Answers
Tech allows diverse prod and service providers to connect w/ ______.
Tech allows diverse prod and service providers to connect w/ ______.
consumers
Some firms are buying inventory and renting it out, such as ______.
Some firms are buying inventory and renting it out, such as ______.
Rent the Runway
Indiv takes possession of an item for a period of time then returns it for use by ______.
Indiv takes possession of an item for a period of time then returns it for use by ______.
others
Uber and Lyft are examples of ______ services.
Uber and Lyft are examples of ______ services.
Signup and view all the answers
A new class of micro-entrepreneurs providing personal services includes platforms like ______.
A new class of micro-entrepreneurs providing personal services includes platforms like ______.
Signup and view all the answers
Crowdfunding platforms such as ______ allow consumers to pool capital for projects.
Crowdfunding platforms such as ______ allow consumers to pool capital for projects.
Signup and view all the answers
Some services oversee inventory to gain more control, as seen with ______.
Some services oversee inventory to gain more control, as seen with ______.
Signup and view all the answers
Transportation services like Turo provide ______ vehicles.
Transportation services like Turo provide ______ vehicles.
Signup and view all the answers
Social media word of mouth accelerates the growth of the sharing ______.
Social media word of mouth accelerates the growth of the sharing ______.
Signup and view all the answers
Efforts to foster reusable services often have an ______ benefit.
Efforts to foster reusable services often have an ______ benefit.
Signup and view all the answers
Extortionists might leverage hacked data to demand ______.
Extortionists might leverage hacked data to demand ______.
Signup and view all the answers
Cyberware has become a legit ______.
Cyberware has become a legit ______.
Signup and view all the answers
Taking out key components of the US power grid is ______.
Taking out key components of the US power grid is ______.
Signup and view all the answers
Stuxnet showed that with computers at the heart of many systems, it's now possible to destroy critical ______.
Stuxnet showed that with computers at the heart of many systems, it's now possible to destroy critical ______.
Signup and view all the answers
San Francisco city government lost control of a large portion of its own computer network over a ______ day period.
San Francisco city government lost control of a large portion of its own computer network over a ______ day period.
Signup and view all the answers
Every 7 riders attract 1 new ______ user.
Every 7 riders attract 1 new ______ user.
Signup and view all the answers
91% recommend the last service to a ______ or colleague.
91% recommend the last service to a ______ or colleague.
Signup and view all the answers
Drivers and customers link to Lyft through their ______ accounts.
Drivers and customers link to Lyft through their ______ accounts.
Signup and view all the answers
Uber has raised $21B so far, and boasts a private valuation of over ______B.
Uber has raised $21B so far, and boasts a private valuation of over ______B.
Signup and view all the answers
Trust is essential on Airbnb, as guest identity is verified via a ______-step process.
Trust is essential on Airbnb, as guest identity is verified via a ______-step process.
Signup and view all the answers
Uber claims to create 50k new jobs a month, with nearly all being ______.
Uber claims to create 50k new jobs a month, with nearly all being ______.
Signup and view all the answers
WePay's fraud-fighting technology analyzes social ______ to streamline payment processes.
WePay's fraud-fighting technology analyzes social ______ to streamline payment processes.
Signup and view all the answers
Airbnb listings include unique options such as yurts, castles, and private ______.
Airbnb listings include unique options such as yurts, castles, and private ______.
Signup and view all the answers
Many local firms also benefit from ______ and regulatory fees from industries threatened by the sharing economy.
Many local firms also benefit from ______ and regulatory fees from industries threatened by the sharing economy.
Signup and view all the answers
Uber's product-market fit conveys the degree to which a product satisfies market ______.
Uber's product-market fit conveys the degree to which a product satisfies market ______.
Signup and view all the answers
Successful efforts should be desired by customers and scale into large, profitable ______.
Successful efforts should be desired by customers and scale into large, profitable ______.
Signup and view all the answers
Uber raises prices when supply does not meet demand to encourage drivers to work through ______ pricing.
Uber raises prices when supply does not meet demand to encourage drivers to work through ______ pricing.
Signup and view all the answers
Uber has been accused of the theft of self-driving car ______.
Uber has been accused of the theft of self-driving car ______.
Signup and view all the answers
Uber app knows who drivers are, who was picked up, and where they were ______.
Uber app knows who drivers are, who was picked up, and where they were ______.
Signup and view all the answers
Staff optimizes ______ to determine the number of drivers, where demand is, and dynamic pricing.
Staff optimizes ______ to determine the number of drivers, where demand is, and dynamic pricing.
Signup and view all the answers
Uber offers an API: published guideline on how other ______ can embed Uber into their own apps.
Uber offers an API: published guideline on how other ______ can embed Uber into their own apps.
Signup and view all the answers
UberHealth offers APIs for integration into healthcare ______.
UberHealth offers APIs for integration into healthcare ______.
Signup and view all the answers
Network effects mean that riders choose apps with more ______.
Network effects mean that riders choose apps with more ______.
Signup and view all the answers
Uber's growth concerns include rival Lyft putting up growth numbers much stronger than ______.
Uber's growth concerns include rival Lyft putting up growth numbers much stronger than ______.
Signup and view all the answers
Marginal Costs are associated with each additional unit ______.
Marginal Costs are associated with each additional unit ______.
Signup and view all the answers
Edward Snowden leaked over 1.7M digital docs from US, British, and Australian ______.
Edward Snowden leaked over 1.7M digital docs from US, British, and Australian ______.
Signup and view all the answers
XKeyscore allows collection of data on 'nearly everything a user does on the ______.'
XKeyscore allows collection of data on 'nearly everything a user does on the ______.'
Signup and view all the answers
White hat hackers contribute to improving system ______.
White hat hackers contribute to improving system ______.
Signup and view all the answers
Black hat hackers are often referred to as computer ______.
Black hat hackers are often referred to as computer ______.
Signup and view all the answers
Social engineering involves con games that trick employees into revealing ______.
Social engineering involves con games that trick employees into revealing ______.
Signup and view all the answers
Using ______ for authentication involves measuring and analyzing human body characteristics.
Using ______ for authentication involves measuring and analyzing human body characteristics.
Signup and view all the answers
Malware seeks to compromise a computing system without ______.
Malware seeks to compromise a computing system without ______.
Signup and view all the answers
Unlike viruses, ______ are programs that automatically spread by exploiting security vulnerabilities.
Unlike viruses, ______ are programs that automatically spread by exploiting security vulnerabilities.
Signup and view all the answers
Software business is very attractive, with notable figures such as Bill Gates and ______ among the wealthiest people.
Software business is very attractive, with notable figures such as Bill Gates and ______ among the wealthiest people.
Signup and view all the answers
Open-Source Software (OSS) is free and allows anyone to look at and potentially ______ the code.
Open-Source Software (OSS) is free and allows anyone to look at and potentially ______ the code.
Signup and view all the answers
Cloud computing replaces computing with services provided over the Internet, on other’s ______.
Cloud computing replaces computing with services provided over the Internet, on other’s ______.
Signup and view all the answers
Software as a Service (SaaS) involves subscribing to a 3rd party software and receiving a service that is delivered ______.
Software as a Service (SaaS) involves subscribing to a 3rd party software and receiving a service that is delivered ______.
Signup and view all the answers
Linux is an example of an open-source software ______ system.
Linux is an example of an open-source software ______ system.
Signup and view all the answers
LAMP stands for Linux, Apache, MYSQL, and any of several programming languages that start with ______.
LAMP stands for Linux, Apache, MYSQL, and any of several programming languages that start with ______.
Signup and view all the answers
The open source community aims to improve software quality, making the reliability of OSS outperform its ______ competitors.
The open source community aims to improve software quality, making the reliability of OSS outperform its ______ competitors.
Signup and view all the answers
The ______ vulnerabilities in code can be addressed quicker when many eyes examine the OSS.
The ______ vulnerabilities in code can be addressed quicker when many eyes examine the OSS.
Signup and view all the answers
Study Notes
Chapter 11: Sharing Economy, Collaborative Consumption, and Efficient Markets
- Technology connects diverse product and service providers with consumers, offering wider reach and efficiency
- Efforts empower "citizen suppliers," where product owners become rental providers (e.g., rooms - Airbnb, cars - Turo, boats - Boatsetters)
- New micro-entrepreneurs offer personal services (e.g., car rides - Uber, pet sitting - Rover, meal prep - Feastly, home services - Care.com)
- Some firms buy inventory and rent it out (e.g., Rent the Runway, Zipcar, Chegg)
- Products are "collaboratively consumed," where individuals temporarily possess items for reuse by others
- Consumers pool capital to finance projects (e.g., Kickstarter, GoFundMe) or obtain loans (e.g., LendingClub)
- Internet-enabled market makers operate, rooted in platforms like eBay and Craigslist
- Goods examples: pre-owned (eBay, Craigslist, ThredUP), loaner products (Zilok, Rent the Runway, Chegg), custom products (Etsy)
- Service examples: professional (Upwork, crowdSPRING), personal (Angie's List, Handy, TaskRabbit), delivery (Doordash, Grubhub), transportation (Uber, Lyft, Didi), loaner vehicles (Turo, Zipcar), places to stay (Airbnb, HomeAway, Couchsurfing)
- Office space (LiquidSpace, ShareDesk)
Social Media and Sharing Economy Growth
- Word-of-mouth referrals significantly accelerate the sharing economy's growth across social media
- 47% of sharing economy participants learn through word-of-mouth
- Uber's inherent virality: Every 7 customers recommend the service to 1 new user
- Social proof positively influences others to join the platform through connections between customers and drivers via social media accounts
Chapter 15: Open Source, Cloud, Virtualized, and App-Driven Shifts
- Marginal cost for software products is zero (MC=0)
- Open-source software (OSS) is attractive due to its open code, enabling modification, fostering a large community of contributors, including early adopters like Bill Gates and Larry Ellison
- Cloud computing replaces traditional computing with services accessible over the internet (software as a service [SaaS]- a service provided online without any burden of buying, managing, or maintaining third-party software)
- Virtualization enables one computer to behave like multiple separate computers which allows for efficient resource use
Chapter 19: Information Security
- Large data breaches, like the Equifax breach (2017), highlight the vulnerabilities of systems holding sensitive customer information (e.g., credit card data, social security numbers)
- Large-scale breaches have significant economic, social, and legal consequences that impact consumers
- Hackers exploit vulnerabilities in software components (e.g., Apache Struts) to gain unauthorized access and cause financial harm, including hacking attacks before Thanksgiving, like the Target breach
- Security concerns emphasize data protection and the importance of secure practices (e.g., strong passwords, data backups, up-to-date software)
General Security Concerns
- Firms face considerable risks from malicious actors (e.g., hacking and data breaches) when employing systems relying on open-source software (OSS)
- Data harvesters and other cybercriminals exploit vulnerabilities and steal data for financial gain, extortion, or resale
- Social engineering and other malicious use of technology can lead to major data compromises, causing considerable financial, reputational, and operational damage. The need for updated technology and security protocols is critical and can be pricey.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the shared economy and its impact on diverse sectors. This quiz covers important platforms, concepts, and services that are reshaping how we think about ownership and resource sharing. Explore the implications and examples of the sharing economy in today's society.