Online Auctions

Ebay’s business model is acting as an agent for the seller, giving them somewhere to post an item for sale. Ebay then makes commission of the item sold by the seller and charging a posting fee to the seller. It has been successful because while companies are using it to sell products, people are also…

Automata

A Turing test. This was designed by Alan Turing in 1950 to determine the intelligence of computers. That is, if a computer can ‘think’ and not just put out answers to questions it is asked. This is a hard quality to test reliably, with the only one coming to mind is Watson being able to…

M-Commerce

My cell phone provider basically offers me to be able to purchase credit and data through my phone and use of a voucher or my credit card. There is very little outside of that nowadays. Although you can now purchase packages through other providers to watch sport live.   I generally recharge via  voucher on…

Marketplace Elements

In a perfect world where everyone is striving for the most benefits overall then yes the dispersion of prices will narrow. I say this because there is a lot of economical factors involved in the dispersion of prices. The type of product, the exactness of the product being compared, ease of navigation of website, etc….

Digital Market Questions – Week 6

I have had many experiences shopping online, mostly for products such as clothing and flowers. I have had many good experiences using The Chivery to order clothes and miscellaneous items. They were always clear about what the pricing was, how much shipping was and how long it is expected to take to reach me. The…

Week 4 Questions

1.Why a customer centric Web site design is so important, yet so difficult to accomplish? It is important to make the customers experience with the website to be a smooth and sleek one. If the website is is not easy to navigate then the customer may be disgruntled and take their business else where out…

Authentication Vs Authorization

If someone has the information for authentication, does that give them the right to authorise an action even if they don’t have permission? Well, it seems that if someone knows that you have the information of authentication, then if a person were to use that authorise something, that would be an implied permission for the…

Information I regularly disclose

I disclose most general information when asked for it under the appropriate situation. Such as at a bank, if I need to confirm my identify to them I will provide them with my licence then answer what my date of birth is or what my address is. Whereas, if some random stranger came up to…

Good Privacy Practice

Good privay practice involves a lot of factors. The Guardian recommends a 101 practices and the OAIC has a top 10 tips for start-up businesses. It really comes down to making sure all your data is encrypted and making sure that all the data collected is completely essential to your operations. This will minimise the…

An example of a privacy breach in international news

Friend Finder Networks, an adult dating and pornography site company, has been hacked exposing the private details of more than 412m accounts. This was not the first hack of Friend Finder Networks, but this hack is one hundred times larger than the previous hack in 2015. There have been no consequences to the company as…

The 6 Webs

Bill Joy talks about ‘The 6 Webs’ of our current lifestyle 10 years ago. These are: The near web, which is the information with a screen and keyboard. The here web, which is laptops and wifi, smart phones, etc. The far web, sit back style. Like TV, just sitting there taking in information. The weird…

“Search is in its Infancy” Marissa Mayer.

After viewing the video of Marissa Mayer, I thought about this statement of hers. After some careful consideration, I am in agreement with this statement. I tall comes back to the simple facts that not everything is online yet. With that said there is a lot of information online now, in terms of sorting it…