Business to Consumer Julie Guignon Teerachai Sriraveevilas Martin Kardos Sara Downard 1 Overview North American Internet Users Asia Market E-Commerce Security Piracy and the Music Industry 2 Internet Users In 2002, the number of people in the U.S. using the internet was between 150 and 300 Million Internet shoppers – 1999: 23.3M – 2002: 36.6M Reference 1, 2 3 Billions of Dollars E-commerce Revenues 45 40 35 30 25 20 15 10 5 0 2000 Reference 3 2001 2002 4 Revenues for Online Content In 2002, reached 1.3 billion 95% increase from 2001 Includes items like dating services, subscriptions, entertainment, games Leading websites 1. 2. 3. 4. Yahoo! Match.com Real.com Classmates.com Reference 4 5 Most Popular Overall Websites 1. MSN 6. eBay 2. Yahoo! 7. Amazon 3. Microsoft 8. Real 4. AOL 9. About Network 5. Google 10. MapQuest Reference 2 6 Top Online Advertisers 1. Estee Lauder 6. Sabre Holdings 2. NetFlix.com 7. Classmates.com 3. USA Interactive 8. Amazon.com 4. SBC 9. CoolSavings.com 5. 1-800- 10. Verizon Flowers.com Reference 2 7 Single vs. Married Single – 46 hours per month surfing – Visited 113 pages per month – 47% of single surfers made online purchases Reference 2 Married – 13.8 hours per month surfing – Visited 52 pages per month – 52% of married surfers made online purchases 8 Single vs. Married Items Purchased 1. Student Loans 1. Prescriptions 2. Credit Cards 2. Home Improvement 3. Video Games 3. Software 4. Software 4. Gardening Tools 5. Music 5. Toys Reference 2 9 Single vs. Married Sites Visited Single Married 1. 2. 3. 4. 5. 1. 2. 3. 4. 5. Reference 2 Match.com TheSpark.com Gay.com Matchmaker.com Date.com FamilyFun BabyCenter American Baby Nick Jr. iVillage ParentsPlace 10 What Are Your Kids Looking At? Ages 2-11 – 12M users – Top Sites Reference 2 Ages 12-17 – 15M users – Top Sites 1. Diva Stars 1. Original Icons 2. Toon Town 2. Blunt Truth 3. Polly Pocket 3. Teen People 4. Barbie 4. Fire Hot Quotes 5. Disney Channel 5. Buddy4u 11 Monitoring Your Child’s Internet Usage Moving the family computer to areas where usage can be observed Monitoring software ISP’s often provide restricted accounts for children Remember to discuss proper internet usage with your child Visit sites like www.netsmartz.org for information for parents and children about the internet 12 Mobile Internet As wireless phone use increases, so does commerce from phones – Purchase ring tones, graphics, music, games – Services like GPRS – Connectivity of wireless phones to laptops Reference 5 13 Mobile Internet Future of Mobile Internet – Grouping of home, mobile, and other units into one bill – Laptops with same chips in them as mobile phones with internet access – Businesses finding ways to provide limited content websites that are easily accessible from low bandwith mobile phones Reference 5 14 Marketing Research How businesses are watching what you do Adware and spyware on computers – Remembers things like passwords, e-mail address, sites visited, etc. Information like this is gathered inconspicuously, often without user knowing Sometimes can cause problems on computers Reference 6 15 Business-to-Consumer (B2C) Asia Market • Internet Demographics • IT Spending • B2C Revenue • Most popular online purchases • B2C Obstacles in Asia • Case Study - Rakuten 16 Asia Pacific 17 World Internet Demographic Internet World Usage Statistic Middle East 1 .8 % Oceania 2 .2 % Africa 1 .2 % Asia 31.1% Europe 2 9 .4 % Internet usage population 1st America = 232 million 2nd Asia = 211 million 3rd Europe = 199 million America 3 4 .3 % 4th Rest of the world = 35 million Updated on September 19, 2003 18 Reference 7 Asia Internet Demographic Internet Penetration Rate • World = 10.7% (677 million out of 6,348 million) • America = 26.8% (232 million out of 865 million) • Asia = 5.9% (211 million out of 3,590 million) Country China I nternet User % Penetration (in millions) 6 8 .0 0 5 .2 % Japan 5 9 .2 0 4 6 .4 % Korea 2 6 .2 7 5 6 .1 % I ndia 1 6 .5 8 1 .6 % Taiwan 1 1 .6 0 4 9 .1 % The rest 2 9 .2 5 2 .9 % 2 1 0 .9 0 5 .9 % Total Major Asia Internet Users The rest 14% China 32% Taiw an 6% India 8% Korea 12% Japan 28% Updated on September 19, 2003 Reference 8 19 Asia Pacific’s IT Spending Source: IDC2003 Key findings • Defensive investments – security, infrastructure and back office operations – are on CIO’s priority list. • E-Commerce increased from 15% in 2001 to 20% in 2002. 20 Reference 11 Asia E-commerce Revenues Asia Pacific’s e-commerce revenues (by eMarketer) Year 2000 Total E-commerce Revenues • Business-to-Business • Business-to-Customer Year 2004 Growth (in billions) (in billions) $39.4 $338 7.3% $36.0 $300 7.6% $3.2 $38 10.9% B2C E-commerce Revenues in the Asia-Pacific Region,2000 -2004 2004 $3 8.0 Year 2003 $2 6.4 2002 $1 5.6 2001 2000 $8 .2 Revenue (in billions) $3 .2 Revenue 21 Reference 9, 10 Most Popular Online Purchase Country China (2002) Japan (2002) Korea (2001) Hong Kong (2001) Thailand (2001) Product / Services Books and Magazines 58.0% 9.7% Tickets - Airlines / Entertainment Computer (Software) 31.0% 56.0% 33.0% Less than 0.5% 5.5% 0.0% 1.2% 12.0% 31.3% 19.0% 10.5% 3.0% 22.2% 11.6% 18.0% 1.9% 25.0% 1.7% 5.6% 12.5% 7.2% 3.0% 8.4% 18.0% 6.1% 5.5% 29.9% 33. 7% Home Electrical Appliance CDs/ VCDs/ DVDs 19.3% 18.0% Computer (Hardware) Food / Groceries 27.0% N/A Financial Service is excluded in the surveys Key findings • Books and Magazines are leading Asia’s E-commerce product • Japan is the only country where Airline tickets are purchased most online. • Online computer-related buying has the highest growth rate in Japan and China. 22 Reference 12-16 B2C Obstacles in Asia 1. Technology • Low personal computer rate (only 1% in Asia VS 40% in the US) • Limited Telecommunication Infrastructure: Broadband Internet (DSL) is only limited in the developed countries – South Korea, Hong Kong, Taiwan. • Using technology to deal with customers is far lower than to address internal process Current Usage of Technology 63% Use technology to address internal process Use technology to deal with customers Use technology to deal with suppliers and business partners 19% 18% 0% 10% 20% 30% 40% 50% 60% 70% Source: IDC, 2001 23 Reference 17, 18 B2C Obstacles in Asia 2. People • Small number of credit card holders • Low Internet penetration rate in most of the countries • Asia’s markets are more heterogeneous than the U.S. market, resulting in more difficult to achieve economies of scale. • Rate of visitors converted to customers is less than 1% compared with 2.3% in the US and 2.5% in Europe. (Mckinsey) • Language • Culture – rely on personal interaction In Japan - Much business in Japan is built on personal relationship. Most people like to know the people they are doing business with and value their relationships with specific retailers and business associates. 24 Reference 19 - 21 B2C Obstacles in Asia 3. Process • Distribution Infrastructure • Reliability of online seller (20%) is especially a concern in Japan (43%). • Security regarding credit card and personal information are major concerns. Most consumers are concerned about making online purchase Taiwan 94% South Korea 90% Hong Kong 86% Japan 82% Singapore 48% Regional 79% Online shoppers 74% Non-online shoppers 0% 82% 20% 40% 60% 80% 100% Visa International, February 2002 25 Reference 22 Example of B2C Business Model The Japanese Convenience Store Visit http://www.rakuten.co.jp Find a desired product and need to make on-line purchase Feel uncomfortable giving credit card number. Prefer to pay in cash. New way! – Simply order on-line, then pick up and pay for the product purchased at the nearest 7-Eleven 26 Reference 23, 24 Example of B2C Business Model Rakuten – Japanese’s largest on-line shopping mall “Famous homegrown e-commerce success” • Founded in 1997 (only 5 million people in Japan used in Internet) • Grown from 17 shops (in 1997) to 2,000 retailers (in 2001) • 600,000 registered shoppers (in 2001) • Over 40,000 items are sold every month Growth • 70 million pages viewed per month (in 2000) to 540 million pages viewed per month (in 2002) • Ranked in Top 10 websites domain in Japan (The leader is Yahoo! Japan) • Sales $5.4 million (in 1999) to $53 million (in 2001) • Profit $2.4 million (in 1999) to $16 million (in 2001) 27 Reference 23, 24 Example of B2C Business Model Rakuten – Japanese’s largest on-line shopping mall “Famous homegrown e-commerce success” Successful Strategies • Charge merchants only $475 to appear on web-site (compared to $1000 - $ 10,000 from other cybermalls) • Allow merchants to edit their site and do market analysis by accessing Rakuten’s database • Boosted revenue by selling ad space for half the price of most rival portals • Collaboration with many convenience stores Japan – allowed shoppers to pick up and pay for merchandise purchased on the Internet at the nearest store. 28 Reference 23, 24 Example of B2C Business Model Rakuten – Japanese’s largest on-line shopping mall “Famous homegrown e-commerce success” Collaboration with convenience stores offers several benefits to: 1. Convenience store • Generate more in-store visitors who might also buy other products • 7-Eleven set up a virtual bank connected by a network of ATM and Internet terminals in 7-Eleven. 2. On-line Customers • Pay cash (no credit-card mishaps) • No delivery mix-ups • Convenience to pick up 29 Reference 23, 24 Example of B2C Business Model Rakuten – Japanese’s largest on-line shopping mall “Famous homegrown e-commerce success” Which product is ranked No.1 best sale in Rakuten website? 30 Example of B2C Business Model Rakuten – Japanese’s largest on-line shopping mall “Famous homegrown e-commerce success” Because the Web is a marketing channel first and foremost, it is a language issue – a communication issue – to be able to deliver a marketing message to people. If they don’t speak English as their primary language, we need to communicate in their language ---- Terry Lund, Director of Internet Strategy, Kodak Example: eBay has Chinese and Korean but not Japanese. 31 Reference 25 E-commerce Security Tech jargon equals miserable communication A recent survey by MetaFacts Inc. Computer buyers are left cold by the “techie” language 52% of PC users don’t understand the term ‘megahertz’ used in a vast majority of PC ads Solution is simple: Clear English Reference 26 32 Some of the terms used most often in the world of computer security Vulnerability- System’s openness to unauthorized users or external impact Data Integrity- Data captured by the system is agreed upon Confidentiality- Authorized persons only Availability- Access to the system and its resources as needed Reference 27 33 Definitions Continued Authentication- Senders are verified Spoofing- Pretending to be someone you’re not Mail, IP, Web Viruses- Malicious programs that spread and replicate from computer to computer Trojan Horses- Non-replicable, but just as destructive Worms- A program that replicates itself as a separate entity is called a ‘worm’, not a virus 34 Why did we become so vulnerable? 1. Businesses much more dependent on the 2. 3. 4. 5. 6. Internet Systems have become more complex, feature piled on feature The software is riddled with flaws Lack of education IT Security isn’t a technology problem anymore, it’s a people problem Law enforcement agencies lack the technical expertise Reference 28, 29 35 Statistics on Viruses and Spam Survey has found that 60% of all e-mail employees receive is unwanted, disgusting and often fraudulent- a costly waste of time Thieves are figuring out how to mimic sites and gain personal information Cyber crime third on the list for FBI after the war on terror and counter-espionage Forrester Research- confidence in online security has fallen significantly since its peak in 2000. Businesses will have to spend ever more to attract back lost customers. Reference 26, 30 36 The surge in Viruses CERT- Carnegie-Mellon University – – – – Keeps track of the steadily growing threats on the Internet 1990 - 252 unique attacks on the Internet 2002 - 82,094 unique attacks on the Internet First half of 2003- 74,000 Biggest weak spot: Microsoft Mi2g, Security-research firm: The ten most damaging viruses all targeted Microsoft software Mi2g: Linux hardly hack-proof. Hackers gained entry to almost three times as many Linux servers in August as they did Windows. Reference 30 37 Spam Almost all of them are breaking some law FTC explains that spam senders are tough to find and prosecute Businesses should take a more active role Postini Inc., Antispam software company “When the spam rate was 15% of email, CIO's weren’t that worried about it. But when it crossed the 30% point around the middle of 2002, suddenly they got worried” CEO Shinya Akamine, Reference 30, 31 38 Spam-Ferris Research Very good business for spammers - $140-software, $70-list of 100 million emails, profits from $1,000-$10,000 Cost to business-enormous - Only 3.5% have spam-fighting technology - 10,000 employee company-$1.1mil per year in decreased productivity, help-desk cost, and use of IT resources Reference 30 39 Workplace Security: Today’s Issues PCs, Email, Website, Employees Symantec Corp. Security software company “Companies can’t just keep throwing money at the last attack…They need to get more proactive and put together a more holistic program that will protect against tomorrow’s attack.” Robert A. Clyde, CTO Reference 32 40 Workplace Security: Today’s Issues PCs, Email, Website, Employees PCs Protect each point where the computer system touches the outside worldFirewalls Block all Internet traffic that you don’t expressly want Turn off unused features in complicated software to minimize risks 41 Workplace Security: Today’s Issues PCs, Email, Website, Employees Email MessageLabs Inc., Star Technology Group “One in every 29 e-mail messages carried a virus in August, compared to one in 166 in July.” Infectious Attachments: Viruses, Worms, Trojan Horses Install and regularly update Antivirus software Hire filtering companies to screen email 42 Workplace Security: Today’s Issues PCs, Email, Website, Employees Web Sites Customer’s face to the world- Especially attractive to hackers Site defacement, digital graffiti, denial of service Databases tied to Web sites are the biggest concern Work with ISPs, which have the capacity and expertise to manage attack traffic 43 Reference 32, 33 Workplace Security: Today’s Issues PCs, Email, Website, Employees Employees Can cause serious damage to companies’ customer data, intellectual property, financial information Insiders can become accomplices to outside hackers – FBI & Computer Security Institute survey: – 45% of respondents had detected unauthorized access by insiders in a year 2002 PriceWaterhousCoopers survey: – Former employees No. 1 threat to corporate information, while outside hackers No. 5 Reference 32 44 Workplace Security: Today’s Issues PCs, Email, Website, Employees Employees What can you do: Strict background checks and close monitoring on new employees Train employees on the importance of security Access controls to view data relevant to jobs 45 Case Study on Hackers: Network World August 25, 2003 Originally A person who enjoys learning the details of computer systems One who programs enthusiastically Data from three angles ISPs’ intrusion-detection sensors Tel Aviv University enterprise network Firewalls of 24 corporations Reference 33, 34 46 Findings Attacks coming from all around the globe, day and night Reconnaissance is key contributor to the Internet background noise Between 45%-55% of suspicious activity is hackers scanning for targets Most hack attempts are automated, scripted attempts from previously compromised machines Reference 34 47 Findings Worms account for 90% of scanning and biting Main reasons: to relay spam, extra storage for illegal files, machines for future attacks July 10-23, Tel Aviv University -Scanned 96,000 times for open ports -Stream of 82,000 hackers from 99 countries -University IT Managers: Business as usual Reference 34 48 Choosing a Good, Memorable Password Concerns -Computers have more passwords than ever before -Users need simplicity, administrators demand complexity -Passwords that are easy to remember are easy to crack -Dictionary Attacks or Brute Force Attacks Reference 35 49 Choosing a Good, Memorable Password Suggestions Never share your password Never write down a password Change your password with frequency Never store your password in a program Choose different passwords between sites and applications Use Upper-lower case letters, numbers, symbols – taoijhf→ta01jhf→ta()1jHF Reference 36, 37 50 Lessons Learned Easy Tips from your IT department: 1. 2. 3. 4. 5. Email- Don’t open attachments you don’t recognize, people you don’t know Files from home- Don’t bring in floppies or CDs; send email instead Passwords- Frequent update, No Post-It notes under your keyboard At home- Update your firewall and antivirus software Downloads- On the corporate network, just don’t. Ever. No music, No video etc. Reference 38 51 Piracy and Music What is piracy? What is a copyright? Why does this matter? Napster What is available to use today? 52 What is Piracy? Piracy is using or reproducing the work of another without permission. Music piracy costs the music industry an estimated $300 million per year. One of the fastest growing activities on the Internet Reference 46 53 Three Types of Piracy Simple – unauthorized duplication of an original recording for commercial gain without the consent of rights owner. – packaging is different than the original. Counterfeits – are copied and packaged to resemble the original as closely as possible. – Original producer’s trademarks and logos are reproduced in order to mislead the consumer into believing they are buying an original product. Bootlegs – these are the unauthorized recordings of live or broadcast performances. Reference 46 54 What is a copyright? Provides that the right holders determine whether and how copying, distributing, broadcasting, and other uses of their work take place. Gives people the incentive to create great works and economic reasons to invest in them Latest estimates in US, value copyright based industries at $430 billion (representing 5% GDP) Reference 47 55 Why does this matter? Digital technology makes it possible to make an unlimited number of perfect copies of music, books, videos Deprives the copyright holder of revenues, if purchased in traditional form Reference 48 56 Napster Developed by Shawn Fanning, 19-year-old who was in search of better way to find music. From Oct. 1999 to March 2001, it attracted an estimated 50-70 million users – Other source states 75 million users downloading approx. 10,000 per second Reference 48, 49 57 Napster User connects to www.napster.com Elects to download Napster’s software program, Musicshare program, at no cost. – Allows one user to access the hard drive of users logged on at the same time. Users type in name of artist or song and program delivers list of available versions Highlight and download song Napster uses more that 100 central computers that function as clearinghouse by pointing users to computers where songs are available Reference 49 58 Napster Describes itself as “engaged in business of providing users with an index of other users who are prepared to share music files on a peer to peer basis without compensation.” Defined itself as: – – – – Does not copy files Does not provide technology for copying files Does not make MP3 files Does not transfer files These factors crucial for defense Reference 49 59 Napster Sued by RIAA December 1999, Recording Industry Association of America filed federal suit against Napster alleging contributory and vicarious copyright infringement Napster countered that its users are “file sharing” which should be considered fair use. – This argument based on the 1984 Supreme Court case which held that manufactures of Sony’s Betamax VCR were not liable for copyright infringement Reference 50 60 Napster Sued by RIAA According to the court, “virtually all Napster users engage in unauthorized downloading and uploading of copyrighted music.” Because music is creative in nature and users could download entire songs; it could not be considered fair use. The court found that the effects of use upon the value of the work and potential markets weighed against fair use Reference 49, 50 61 Other Litigation Responding to a slump in CD sales (down 8% this year alone) blamed in part to song-swapping and CD burning, the Recording Industry Association of America filed copyright infringement suits against 260 people and promised thousands more. Reference 51 62 Alternatives Compulsory Licensing – Internet users would pay a small tax in their monthly bills to pay for music. Artists would be paid out of the tax pool and make more than they get in record royalties. Consumers would get more entertainment for less money, distribution would be more efficient and save cost of litigation Reference 52 63 Alternatives Change Copyright wording – Instead of standard “all rights reserved” the notice would explicitly allow users of the CD to work the music into their own work – Departure from standard, which forbids such use without legal agreement – Statement is flexible – copyright holder states which rights to reserve and which to waive Reference 52 64 Alternatives Digital Rights Management – Serve as basis for security which allows only one copy of a CD to be made and does not allow the copy to be copied – Allows tracks from the same CD to be exported to a portable MP3 player but not to be transferred online Reference 52 65 Roxio Inc. Christopher Gorog, Chief Executive of Roxio Inc., “It was colossally stupid that the record companies and Napster hadn’t found a way to turn one plus one into two.” Roxio Inc. bought Napster out of bankruptcy in November 2002 for $6.1 million. – Not using the file-sharing technology. Reference 53 66 Roxio Inc. In May, Roxio paid $39 million for Pressplay, a three-year-old music subscription service formed by Universal and Sony Music Entertainment Inc. Obtained access to music licenses, the technology required to sell songs via the Internet, and a head start on subscribes Reference 53 67 Napster 2.0 Legal way to buy direct from record labels. Launched on October 29. offers 99 cent-per-song downloads and a $9.95 monthly subscription service. – that gives customers extra features such as streaming songs to their computer, an online magazine, exclusive live recordings of up and coming artists Reference 54 68 Napster 2.0 www.napster.com Price - 99 cents per song, $9.95 per album or for unlimited listening a $9.95 subscription per month. Don’t have to subscribe to buy songs but pay $1 extra per song to move the subscription download to recordable CD or MP3 player Selection - 500,000 songs Extras - Pay monthly fee and get over 40 preprogrammed and customizable radio stations and community message boards. Pros - interface greatly improved from previous Pressplay, Easy to use. Sense of community like old Napster. Cons - Not free but songs are legit, reliable and ample. Songs not compatible with Apple iPod. 69 Reference 55 iTunes Music Store www.apple.com/itunes Price - 99 cents per song, $9.95 per album. Unlimited burning of songs to CD(though you can not copy the same play list more that 10 times) and transferring to portables Selection – 200,000 songs Extras - Recommendations based on your choices. Pros - Proved consumers will pay for digital music if presented in w/ usage rules that make sense. Elegant and easy to use. Cons - Just a store not a music destination like Napster, Rhapsdoy and MusicMatch Reference 55 70 MusicMatch www.musicmatch.com Price - 99 cents per song, $9.99 per album. Unlimited burning and transfers of songs. Selection - 240,000 songs Extras - 15 pre-programmed and customizable radio stations for an extra $2.25-$4.95 a month. Album art comes w/ download. Pros - Service works best if you also pay for radio offerings, which offer clickable downloads while listening. Cons - Casual browser has to work hard to use. Not compatible w/ iPod. Reference 55 71 Rhapsody www.listen.com Price - $9.95 a month subscription, no downloads (can not be transferred to portables). But you can burn any song in its library to CD for 79 cents Selection - 390,000 songs with a catalog that seems wider and deeper that competitors. Extras - 60 pre-programmed and customizable radio stations, artist and album information., art & reviews. Pros - Better presentation that any other Windows-based rivals with album cover art and information over database lists of songs Cons - Not being able to download songs to the hard drive or MP3 player. But can get around this by burning songs to CD. Tracks will not play on iPod. Reference 55 72 Buymusic www.buymusic.com Price - start at 79 cents, most sell for 99 cents or $1.14 each. No subscription necessary. Rules about burning and transferring had been more restrictive that others Selection - 315,000 songs, with some exclusives Extras - As with the others, you can get 30second previews of songs; site also sells MP3 players, CD burners and blank discs. Pros - You can buy songs without subscribing Cons - Interface is confusing and searches can be tricky. Reference 55 73 Fun Facts Jupiter Research estimates that revenue form online music will go form $80 million this year to $1.5 billion in 2008. The CD market today is worth $12 billion. US music fans have legally downloaded more than 7.7 million digital songs since the end of June, compared with only 4 million CD singles that were sold, Nielsen Sound Scan reports. In the week ending Oct 26, 2003 857,000 digital songs were sold vs. 170,000 hardcopy CD singles sold. Reference 56, 57 74 Conclusion North American Internet Users Asian Internet Users E-Commerce Security Piracy and the Music Industry 75 References 1. Fuscaldo, Donna (2003). E-commerce: selling strategies – the cyber shoppers next door. Wall Street Journal. 2. Nielson NetRatings (2003). http://www.nielson-netratings.com 3. U.S. Census Bureau (March 19, 2003). “E-Stats.” http://www.census.gov 4. Online Publishers Association (March 6, 2003). “Over USD1 billion spent on online content” http://www.nua.ie 5. Telecom’s Hottest Tech, Coolest Gadgets (Oct. 15, 2003). Business Week Online. http://www.businessweek.com 6. Black, Jane (Sept 12, 2003) “Immunity from the Pop-Up Plague.” BusinessWeek Onlin. http://www.businessweek.com 76 References 7. www.internetworldstats.com, viewed on October 20, 2003 8. www.internetworldstats.com/stat3.htm, viewed on October 20, 2003 9. http://www.ebizchronicle.com/backgrounders01/feb/internetasia.com, viewed on October 20, 2003 10. http://www.emarketer.com, viewed on October 20, 2003 11. http://www.idc.com.sg/press/2003/AP-PR-contiuum_survey.htm, viewed on October 21, 2003 12. http://www.kiko-net.com/Foreigners/White_Paper/White_Paper.php?year=2002, viewed on October 29, 2003 13. http://www.chineselocal.com/cnnic.htm, viewed on October 29, 2003 14. http://www.nca.or.kr/white/data/2002engwhite/review.pdf, viewed on October 29, 2003 15. http://www.ecommercethai.or.th, viewed on October 29, 2003 16. Karen Mazukewich. Far Eastern Economic Review. Hong Kong: Jul6, 2000 Vol. 163, Iss.27; pg.42, 1 pgs 17. http://asia.internet.com/news/article.php/992141, viewed on October 18, 2003 77 References 18. Accentrue. The future of digital Asia: page 19 19. http://search.bangkokpost.co.th/bkkpost/2001/jan2001/bp20010125/250101_business10.html, viewed on September 23, 2003 20. Jason Dedrick and Kenneth L/ Kraemer. Asia E-commerce Report 2000: April 2000, Page 8 21. F. Gerard Adams. The E-Business Revolution & The New Economy: 2004, Page 150 22. http://www.visa-asia.com/newsroom/includes/uploads/verified_by_visa_research.ppt, viewed on October 20, 2003 23. http://www.asiaweek.com/asiaweek/magazine/enterprise/0,8782,179100,00.html, viewed on October 22, 2003 24. Janar A. Weerasingam and Jeremy Rowe. The East is Wireless: Outlook 2001, Page 75-75 25. Joan Harrison. Mergers and Acquisitions. Philadelphia: Apr 2002. Vol. 37, Iss 4; pg 22 26. http://www.jir.net/jir9_02.html, view on November 4, 2003 27. http://news.bbc.co.uk/2/hi/business/1844458.stm, viewed on November 4, 2003 28. Connie Ling in Hong Kong and Nick Wingfield in San Francisco. Wall Street Journal. (Eastern Edition). New York, NY.: Feb 26, 2003. Pg. B.6 29. http://www.cnn.com/2001/TECH/computing/01/09/ebay.in.asia.idg, viewed on November 4, 2003 30. http://www.ecommercetimes.com/perl/story/16812.html, viewed on November 4, 2003 31. Barry Parr and Maureen McManus. Web-Site Globalization: The next Imperative for the Internet. Pg 8 78 References 32. Baker, Stephen, “Where danger lurks spam, complexity, and piracy could hinder tech's recovery” Business Week. New York: Aug 25, 2003. , Iss. 3846; pg. 114 33. Elifoglu, I Hilmi. “Navigating the "information super highway": How accountants can help clients assess and control the risks of Internet-based E-commerce” Review of Business. Jamaica: Winter 2002. Vol. 23, Iss. 1; pg. 67, 5 pgs 34. Totty, Michael and Hymowitz, Carol. “Workplace Security (A Special Report); How Vulnerable Are You? The latest ways to protect your employees, facilities and information” Wall Street Journal. (Eastern edition).New York, N.Y.: Sep 29, 2003. pg. R.1 35. Tan, Harry S K. “E-fraud: Current trends and international developments” Journal of Financial Crime. London: Apr 2002. Vol. 9, Iss. 4; pg. 347 36. Kirkpatrick, David. “Taking back the Net” Fortune. New York: Sep 29, 2003. Vol. 148, Iss. 6; pg. 117 37. Wagstaff, Jeremy. “Becoming slaves to spam” Far Eastern Economic Review. Hong Kong: Sep 25, 2003. Vol. 166, Iss. 38; pg. 42 38. Richmond, Riva. “Workplace Security (A Special Report); How to Find Your Weak Spots: A checklist of the ways your company's computer network can be attacked -- and what you can do to protect it” Wall Street Journal. (Eastern edition).New York, N.Y.: Sep 29, 2003. pg. R.4 Palmer, C C. “Ethical hacking” IBM Systems Journal. Armonk: 2001. Vol. 40, Iss. 3; pg. 769, 12 pgs 39. 40. Burns, Christine. “Danger zone:Who's that knocking at the network door?”Network World. Framingham: Aug 25, 2003. Vol. 20, Iss. 34; pg. 48 41. Anonymous. “P@$$word management, security solutions” Security. Highlands Ranch: Aug 2000. Vol. 37, Iss. 8; pg. 73 43. Wagstaff, Jeremy. “Try cracking this code” Far Eastern Economic Review. Hong Kong: Oct 10, 2002. Vol. 165, Iss. 40; pg. 44 44. http://security.uchicago.edu/docs/userpassword.shtml 45. Wahl, Andrew. “OK, we admit it-we need help” Canadian Business. Toronto: Sep 29, 2003. Vol. 76, Iss. 18; pg. 23 79 References 46. http://www.ifpi.org/site-content/antipiracy/what_is_piracy.html, viewed November 3, 2003 47. http://www.ifpi.org/site-content/copyrightcreativity/what_is_copyright.html, viewed November 3, 2003 48. Ku, Raymond Shih Ray, “The Creative Destruction of Copyright: Napster and the New Economics of Digital Technology” The University of Chicago Law Review; Winter 2002; 69, 1; Pg. 263-324 49. Greene, Stephanie, “Reconciling Napster with the Sony Decision and Recent Amendments to Copyright Law’, American Business Law Journal; Fall 2001; 39, 1; Pg. 57-98 50. Langenderfer, Jeff and Cook, Don Lloyd, “Copyright Policies and Issues Raised by A&M Records v. Napster: “The Shot Heard Round the World” or “Not with a Bang but a Whimper?”, Journal of Public Policy & Marketing; Fall 2001; 20, 2; pg. 280 – 288 51. Graham, Jefferson, “Music Industry weighs its options”, USA Today, Tech 9-28-2003 52. Smith, Ethan, “E-Commerce; Can Copyright Be Saved? New Ideas to Make Intellecutal Property work in the digital age.” Wall Street Journal, October 20, 2003. Pg R 1 53. Burrows, Peter, “ Napster Lives Again – Sort of Its new owner has made nice with the music industry. But will fans return.” Business Week, October 20, 2003. Iss. 3854; pg. 66 54. Veiga, Alex, “New Pay Version of Napster music download service debuts.” USA Today, October 9, 2003. 55. Graham, Jefferson, “Meet the New Napster – and the rest of the pack”, USA Today, October 13, 2003. 56. USA Today, November 4, 2003 57. Hamilton, Anita, “Napster Turns Legit”, Time, September 1, 2003. Vol. 162, Iss. 9; pg. 68. 80