Slides - New York University

advertisement
INFORMATION
TECHNOLOGY IN
BUSINESS AND
SOCIETY
SESSION 13 – MIDTERM REVIEW
SEAN J. TAYLOR
ADMINISTRATIVIA
• Assignment 3 due 3/20
Varun will email with instructions for
handing it in.
• Midterm on Thursday
MIDTERM FORMAT
• 8 multiple choice
• 4 true/false
• 8 matching
• 18 short answer questions
YOU ARE RESPONSIBLE FOR
1. Anything in a required reading
2. All lecture content and slides
3. Basic HTML knowledge from A2
4. “managerial level” knowledge of all
technical conceprts
S01:
TECHNOLOGY
SAMPLING: FROM ANALOG TO DIGITAL
Dhar and Sundararajan (2007)
EFFECT OF IT?
1. DIGITIZATION
2. MODULARITY
3. COMPUTING POWER
4. CONNECTIVITY
1. IT TRANSFORMS BUSINESS
AND SOCIETY
2. INVESTMENTS IN IT ARE
CRITICAL TO THE SUCCESS OF
ORGANIZATIONS
3. INNOVATION AND
CREATIVITY IN THE USE OF
DATA IS CRITICAL TO SUCCESS
S02/03:
INTELLECTUAL
PROPERTY
Before: protection only for published works with
© attached, otherwise public domain
After: protection for original works which are
fixed in a tangible medium of expression
1.
2.
3.
4.
5.
REPRODUCE
CREATE DERIVATIVE WORKS
SELL, LEASE, OR RENT
PERFORM PUBLICLY
DISPLAY PUBLICLY
BUT NO RIGHT TO UNDERLYING IDEA IS GRANTED.
IT’S IN THE PUBLIC DOMAIN.
FAIR USE
ANY COPYING OF COPYRIGHTED MATERIAL
DONE FOR A LIMITED AND “TRANSFORMATIVE”
PURPOSE SUCH AS TO COMMENT UPON,
CRITICIZE OR PARODY A COPYRIGHTED WORK.
SUCH USES CAN BE DONE WITHOUT
PERMISSION FROM THE COPYRIGHT OWNER.
DMCA:
CRACKING DRM IS ILLEGAL
Passed in 1998, signed into law by President Clinton
Implements treaties signed in 1996 at the World Intellectual Property
Organization (WIPO)
Supported by software and entertainment industries
DMCA TITLE II: OCILLA
Online Copyright Infringement Liability Limitation
Act
Creates conditional “safe harbor” for online
service providers (OSPs)
• Can make temporary copies to transmit them
• Not liable for infringement of your users!
HOW TAKE DOWN WORKS
1.
Jack puts content under Jill’s copyright on YouTube
2.
Jill notices this.
3.
Jill’s lawyer sends a letter to YouTube’s designated agent detailing
the infringement.
4.
YouTube MUST take the video down and tell Jack.
5.
Jack can send a counter-notice to YouTube to have the content
“Put Back”
6.
If Jill doesn’t file a lawsuit within 14 days, YouTube must put the
material back up.
SOPA POTENTIAL EFFECTS
Upstream/Downstream?
PATENTS
The right to exclude others from making, selling, or
using an invention.
• Most comprehensive form of IP protection
• Even using independent discovery of same invention is excludable.
Criteria
1.
Useful
2.
Novel
3.
Nonobvious
PATENTS: STILL RELEVANT?
• Mutually assured destruction?
• Defensive only.
• Startups say that they are not important for competitive
advantage.
• The right incentives?
How would you change the system?
If you had a startup, would you seek patents?
S04:
IT STRATEGY
HOW DOES IT LOWER COSTS?
Substitute information for physical assets or goods
•
Information vs. parts inventory (Dell, Toyota)
•
Information vs. finished-goods inventory (Zara, Cisco, Walmart)
Substitute information technology for labor
•
Self Service (FedEx, Citibank, Delta)
•
Automation (e.g., factory automation—Ford, Toyota)
Increase the output from the same payroll
•
Enable employees to work faster (tax returns at H&R Block)
•
•
Expand skills of employees (Progressive)
Outsourcing to lower cost regions (Microsoft call centers)
HOW DOES IT ENABLE BETTER PRODUCTS?
Increase product quality
•
Create better products, enabled by IT (UPS, Progressive)
•
Overlay better IT-enabled service on existing products (Amazon)
Increase product variety and ‘fit’
•
Use local information about demand patterns (Zara)
•
•
Find out what your customers want and build it (Dell)
Convert uniform products into differentiated ones (Yahoo)
Increase pre-sale and after-sale support
•
•
Pleasurable Buying Experience (Amazon’s One Click Shopping)
Expedited shipping and easy return policies (Zappos)
FOUR KEY INTERNET-ENABLED
STRATEGIES
4 Key Internet-enabled Strategies for Competitive
Advantage:
1. Disintermediation
2. Mass Customization
3. Personalization
4. Global Reach
THE FIVE COMPETITIVE FORCES: REVIEW
firm = company = organization = business = competitor
Barriers to Entry, or
Threat of new Entrants
The extent of rivalry
between the existing firms
in the focal industry
The threat of entry
by potential entrants
(new firms) into
the focal industry
Industry that
you are analyzing
(focal industry)
Bargaining Power
of Suppliers
The bargaining power
of the firms that sell
inputs to the firms in
the focal industry
Rivalry Among
Existing Competitors
Threat of Substitute
Products or Services
The threat of products/services that could
substitute (be used
instead of) the finished products made by
the firms in the focal industry
Bargaining Power
of Buyers
The bargaining power
of the customers that buy
the finished products of
the firms in the focal industry
THE INNOVATOR’S DILEMMA
1. Sustaining innovations
• improve product performance
2. Disruptive innovations
• Result in worse performance (short-term)
• Eventually surpass sustaining technologies in
satisfying market demand with lower costs
• cheaper, simpler, smaller, and frequently
more convenient to use
S05:
PLATFORMS
PLATFORM OR PRODUCT?
• part of a technical system whose components
come from different companies or organizations
• relatively little value without complementary
products or services
PLATFORMS ARE INEVITABLE
DIRECT NETWORK EFFECTS
INDIRECT NETWORK EFFECTS
STANDARDS:
SOLVE COORDINATION PROBLEMS
• governments
• corporations
• consortia
• professional associations
• standards-organizations (ISO)
• volunteers or developers
• de facto standards
TECHNICALLY,
WHAT IS A PLATFORM?
•
A Hardware and/or Software system with an interface for
applications
•
Typically, a platform has an API--Applications Programming
Interface: an interface (i.e., a set of standardized commands)
that the underlying “platform” can execute
Software creators use the API when writing programs
•
Customized “programs” (e.g., Excel Macros)
Application Programming Interface
Application Software (e.g., Office)
Application
platform
Application Programming Interface
Operating System
Application Programming Interface
Processor (Hardware)
O/S
platform
Hardware
platform
S06/S07:
COMPUTERS
AND THE WEB
BASIC COMPUTER ARCHITECTURE:
INFORMATION REPRESENTATION
•
Numbers
42  00101010
•
Text
•
Pictures
IT 01001010 01010100
.gif, .jpeg, .bmp,…
•
Audio
AU-Sun, WAV-MS, AIF-Apple, MP3
FROM ANALOG TO DIGITAL DATA
000000000000
000111111000
001100001100
001000000100
010010010010
010000000010
010000000010
001011110100
001100001100
000111111000
000000000011
000000000011
000000000000
000111111000
001100001100
001000000100
010010010010
010000000010
010000000010
001011110100
001100001100
000111111000
000000000011
000000000011
BASIC COMPUTER
ARCHITECTURE
TELLING COMPUTERS WHAT TO DO
SIMPLIFIED STRUCTURE OF THE INTERNET
Hierarchy of privately-owned networks
•
Backbone network: High speed, city-to-city, with network access
points, owned by large service providers (AT&T, Sprint, Level3)
•
ISP networks: Connect from backbone to local areas (typically
providing access to consumers)
•
Local access networks: Access to individual computers
Internet:
•No single
•No single
•No single
•No single
authority
control source
entry point
type of application
LAYERS
INTERNET PROTOCOL
Each Internet computer (host) has an IP address
• String of 32 ones and zeros (IPv4 -> IPv6)
• Usually represented by four number segments separated by dots: dotted
decimal notation, e.g., 128.171.17.13
• IP names (e.g., www2.nyu.edu) correspond to IP addresses
Routers
•
•
•
•
Connect the Internet’s individual networks (subnets)
Cooperate to give an end-to-end route for each packet
Need to be very fast
Who is the world’s leading
seller of routers?
127.18.47.145
127.47.17.47
TRANSMISSION CONTROL
PROTOCOL
HTTP IN ACTION
HTTP IN ACTION
WORLD WIDE WEB
• web of hypertext documents
• viewed by browsers
• using a client–server architecture
• HTTP: communication protocol
• URLs: addressability
• HTML: hypertext!
BASIC DOCUMENT STRUCTURE
<html>
<head>
<title>My Awesome Webpage</title>
</head>
<body>
<h1>This is the heading!</h1>
<p>It was the best of webpages.</p>
<a href=“http://google.com”>Google</a>
</body>
</html>
MORE TAGS
<ul>
<li>List item 1</li>
<li>List item 2</li>
</ul>
<h1>Big header!</h1>
<h2>Smaller header</h2>
<img src=“http://link.to/image.png”></img>
<div>Some content</div>
<span>Some content</span>
S08:
ATTENTION
ECONOMICS
S09/S10:
SEARCH AND
ADVERTISING
SEARCH ENGINES AND WEB
DIRECTORIES
Resources on the Web that help you find sites with the
information and/or services you want.
• Directory search engine - organizes listings of Web sites
into hierarchical lists.
• Search engine - uses software agent technologies (or
“spiders”, or “bots”) to search the Web for key words
and place them into indexes.
SEARCH ENGINES DRIVE
ECOMMERCE!
HOW SEARCH ENGINES WORK
–
Search engines discover new pages by
following links
–
Keep track of words that appear in pages and
when you enter a query, the search engine
returns a ranked list
–
Text content is important! But is not enough!
(Why?)
How do search engines rank pages?
(why does this matter?)
PAGERANK
BOOK A
.400/3
People who bought this also bought…
.133/2
book B
book C
BOOK B
People who bought this also bought…
book A
.400
book C
.133
book D
.400/3
.400/3
BOOK D
.333
.133/2
BOOK C
People who bought this also bought…
People who bought this also bought…
book C
book A
.133
.133
.333
(ignoring damping factor for illustration)
EXAMPLE
AdWords Placement
Most relevant sites
AdWords
Placement
TARGETING BANNER ADS
Context:
Movie reviews
User Profile:
NYU user
New York
Request for
Ad from
Ad Server
Targeted Ad is
Delivered to
User
IP Address
Country, Domain, Company
Browser, Operating System
Surfing Behavior from cookies
Demographic Data?
FUTURE OF SEARCH
1. Information Extraction:
Search on Structured Data
2. Social Search
3. Privacy Preserving Search
S11:
IT AND
JOURNALISM
KEY POINTS
• New low cost models of “journalism”
• A/B testing and response to consumer
demand
• The move to real-time
• NY Times social media strategy (Tumblr
integration)
• Disruptive innovations (Wordpress as a
CMS)
S12:
COMPUTER
SECURITY
Computer crime and security
1. Understand some common forms of computer crime
and their impact on individuals and businesses
2. Recognize some common classes of viruses, how
they work, how they spread, and their impact on
individuals and businesses
3. Understand how denial of service (DoS) and
distributed DoS attacks are implemented
4. Discuss spyware, web defacing, identity theft and
their consequences
5. Discuss some typical computer security precautions
6. Understand the basics of cryptography, symmetric
key encryption, and public/private key encryption
(and the applications in digital signatures)
VIRUSES
What exactly is a virus?
•
Program or set of programs
•
Written to cause annoyance or damage (200 new ones every day)
Some commonly encountered viruses
•
Welchia, SoBig, Blaster, Slammer, Code Red, Love Bug, Melissa
Some common types of viruses
•
Stand-alone viruses – can run without a VB script.
•
Macro viruses – infects an app and runs a macro or program.
(can be an email virus like Melissa)
•
Worms – Self replicating, unlike viruses do not need to attach to
an existing program or app.
•
Trojan horses (not really a virus but usually classified as such) –
seems to one thing but performs another (e.g. install backdoors)
DOS AND D-DOS ATTACKS:
WHAT ARE THEY
Denial-of-service (DoS) attacks:
• Attack a machine/server and make it unusable (e.g., flood a Web site with
so many requests for service that it slows down or crashes.)
• Usually the attacker does not get access to the system which is being
attacked
Distributed denial-of-service (D-Dos):
• Attack a single machine/server from multiple computers (e.g., flood a
Web site with so many requests for service that it slows down or crashes.)
• The term “Ping of Death” is NOT used to describe the D-DoS described in
the textbook (i.e., the textbook is wrong)
E-trade, Amazon, Yahoo, Microsoft, Whitehouse…
SPYWARE
Software that gathers information about users without
their knowledge
•
Initially created for marketing purposes, and called
adware.
•
•
Tracks Web surfing or online buying so marketers can send
you targeted--and unsolicited--ads
Potential Damage:
•
Monitor keystrokes (including username, passwords, email
content); take snapshots of screen; scan your hard disk.
•
Having a number of unauthorized programs running on
your PC at once makes it sluggish, unstable, and,
ultimately, more likely to crash.
•
Monitors and transmits user activity to someone else.
Other spyware may have a more malicious intent, such as
stealing passwords or credit-card information.
FOUR CRITICAL INFORMATION SECURITY ISSUES
 Confidentiality
 keeping information from unauthorized usage.
 Authentication
 determining whose information you are receiving
 determining who is on the other end before sending
information
 Non-repudiation
 preventing repudiation after an agreement by dealing
with digital signatures
 Integrity Control
 determining whether the information you receive is
genuine (or unadulterated).
Download