Business to Consumer
Julie Guignon
Teerachai Sriraveevilas
Martin Kardos
Sara Downard
1
Overview
North American Internet Users
Asia Market
E-Commerce Security
Piracy and the Music Industry
2
Internet Users
In 2002, the number of people in the U.S.
using the internet was between 150 and
300 Million
Internet shoppers
– 1999: 23.3M
– 2002: 36.6M
Reference 1, 2
3
Billions of Dollars
E-commerce Revenues
45
40
35
30
25
20
15
10
5
0
2000
Reference 3
2001
2002
4
Revenues for Online Content
In 2002, reached 1.3 billion
95% increase from 2001
Includes items like dating services,
subscriptions, entertainment, games
Leading websites
1.
2.
3.
4.
Yahoo!
Match.com
Real.com
Classmates.com
Reference 4
5
Most Popular Overall Websites
1. MSN
6. eBay
2. Yahoo!
7. Amazon
3. Microsoft
8. Real
4. AOL
9. About Network
5. Google
10. MapQuest
Reference 2
6
Top Online Advertisers
1. Estee Lauder
6. Sabre Holdings
2. NetFlix.com
7. Classmates.com
3. USA Interactive
8. Amazon.com
4. SBC
9. CoolSavings.com
5. 1-800-
10. Verizon
Flowers.com
Reference 2
7
Single vs. Married
Single
– 46 hours per month
surfing
– Visited 113 pages per
month
– 47% of single surfers
made online
purchases
Reference 2
Married
– 13.8 hours per month
surfing
– Visited 52 pages per
month
– 52% of married surfers
made online
purchases
8
Single vs. Married
Items Purchased
1. Student Loans
1. Prescriptions
2. Credit Cards
2. Home Improvement
3. Video Games
3. Software
4. Software
4. Gardening Tools
5. Music
5. Toys
Reference 2
9
Single vs. Married
Sites Visited
Single
Married
1.
2.
3.
4.
5.
1.
2.
3.
4.
5.
Reference 2
Match.com
TheSpark.com
Gay.com
Matchmaker.com
Date.com
FamilyFun
BabyCenter
American Baby
Nick Jr.
iVillage ParentsPlace
10
What Are Your Kids Looking At?
Ages 2-11
– 12M users
– Top Sites
Reference 2
Ages 12-17
– 15M users
– Top Sites
1. Diva Stars
1. Original Icons
2. Toon Town
2. Blunt Truth
3. Polly Pocket
3. Teen People
4. Barbie
4. Fire Hot Quotes
5. Disney Channel
5. Buddy4u
11
Monitoring Your Child’s Internet
Usage
Moving the family computer to areas where
usage can be observed
Monitoring software
ISP’s often provide restricted accounts for
children
Remember to discuss proper internet usage with
your child
Visit sites like www.netsmartz.org for information
for parents and children about the internet
12
Mobile Internet
As wireless phone use increases, so
does commerce from phones
– Purchase ring tones, graphics, music,
games
– Services like GPRS
– Connectivity of wireless phones to
laptops
Reference 5
13
Mobile Internet
Future of Mobile Internet
– Grouping of home, mobile, and other units into
one bill
– Laptops with same chips in them as mobile
phones with internet access
– Businesses finding ways to provide limited content
websites that are easily accessible from low
bandwith mobile phones
Reference 5
14
Marketing Research
How businesses are watching what you do
Adware and spyware on computers
– Remembers things like passwords, e-mail
address, sites visited, etc.
Information like this is gathered
inconspicuously, often without user
knowing
Sometimes can cause problems on
computers
Reference 6
15
Business-to-Consumer (B2C)
Asia Market
• Internet Demographics
• IT Spending
• B2C Revenue
• Most popular online purchases
• B2C Obstacles in Asia
• Case Study - Rakuten
16
Asia Pacific
17
World Internet Demographic
Internet World Usage Statistic
Middle
East 1 .8 %
Oceania
2 .2 %
Africa
1 .2 %
Asia
31.1%
Europe
2 9 .4 %
Internet usage
population
1st America = 232 million
2nd Asia = 211 million
3rd Europe = 199 million
America
3 4 .3 %
4th Rest of the world = 35
million
Updated on September 19, 2003
18
Reference 7
Asia Internet Demographic
Internet Penetration Rate
• World = 10.7% (677 million out of 6,348 million)
• America = 26.8% (232 million out of 865 million)
• Asia = 5.9% (211 million out of 3,590 million)
Country
China
I nternet User
% Penetration
(in millions)
6 8 .0 0
5 .2 %
Japan
5 9 .2 0
4 6 .4 %
Korea
2 6 .2 7
5 6 .1 %
I ndia
1 6 .5 8
1 .6 %
Taiwan
1 1 .6 0
4 9 .1 %
The rest
2 9 .2 5
2 .9 %
2 1 0 .9 0
5 .9 %
Total
Major Asia Internet Users
The rest
14%
China
32%
Taiw an
6%
India
8%
Korea
12%
Japan
28%
Updated on September 19, 2003
Reference 8
19
Asia Pacific’s IT Spending
Source: IDC2003
Key findings
• Defensive investments – security, infrastructure and back office operations
– are on CIO’s priority list.
• E-Commerce increased from 15% in 2001 to 20% in 2002.
20
Reference 11
Asia E-commerce Revenues
Asia Pacific’s e-commerce revenues (by eMarketer)
Year 2000
Total E-commerce Revenues
• Business-to-Business
• Business-to-Customer
Year 2004
Growth
(in billions)
(in billions)
$39.4
$338
7.3%
$36.0
$300
7.6%
$3.2
$38
10.9%
B2C E-commerce Revenues
in the Asia-Pacific Region,2000 -2004
2004
$3 8.0
Year
2003
$2 6.4
2002
$1 5.6
2001
2000
$8 .2
Revenue (in billions)
$3 .2
Revenue
21
Reference 9, 10
Most Popular Online Purchase
Country
China (2002) Japan (2002)
Korea (2001)
Hong Kong (2001) Thailand (2001)
Product / Services
Books and Magazines
58.0%
9.7%
Tickets - Airlines / Entertainment
Computer (Software)
31.0%
56.0%
33.0% Less than 0.5%
5.5%
0.0%
1.2%
12.0%
31.3%
19.0%
10.5%
3.0%
22.2%
11.6%
18.0%
1.9%
25.0%
1.7%
5.6%
12.5%
7.2%
3.0%
8.4%
18.0%
6.1%
5.5%
29.9%
33. 7%
Home Electrical Appliance
CDs/ VCDs/ DVDs
19.3%
18.0%
Computer (Hardware)
Food / Groceries
27.0%
N/A
Financial Service is excluded in the surveys
Key findings
• Books and Magazines are leading Asia’s E-commerce product
• Japan is the only country where Airline tickets are purchased most online.
• Online computer-related buying has the highest growth rate in Japan and China.
22
Reference 12-16
B2C Obstacles in Asia
1. Technology
•
Low personal computer rate (only 1% in Asia VS 40% in the US)
•
Limited Telecommunication Infrastructure: Broadband Internet
(DSL) is only limited in the developed countries – South Korea,
Hong Kong, Taiwan.
•
Using technology to deal with customers is far lower than to
address internal process
Current Usage of Technology
63%
Use technology to address internal process
Use technology to deal with customers
Use technology to deal with suppliers and
business partners
19%
18%
0% 10% 20% 30% 40% 50% 60% 70%
Source: IDC, 2001
23
Reference 17, 18
B2C Obstacles in Asia
2.
People
•
Small number of credit card holders
•
Low Internet penetration rate in most of the countries
•
Asia’s markets are more heterogeneous than the U.S.
market, resulting in more difficult to achieve economies of
scale.
•
Rate of visitors converted to customers is less than 1%
compared with 2.3% in the US and 2.5% in Europe.
(Mckinsey)
•
Language
•
Culture – rely on personal interaction
In Japan - Much business in Japan is built on personal
relationship. Most people like to know the people
they are doing business with and value their
relationships with specific retailers and business
associates.
24
Reference 19 - 21
B2C Obstacles in Asia
3.
Process
• Distribution Infrastructure
• Reliability of online seller (20%) is especially a concern in Japan (43%).
• Security regarding credit card and personal information are major
concerns.
Most consumers are concerned about making
online purchase
Taiwan
94%
South Korea
90%
Hong Kong
86%
Japan
82%
Singapore
48%
Regional
79%
Online shoppers
74%
Non-online shoppers
0%
82%
20%
40%
60%
80%
100%
Visa International, February 2002
25
Reference 22
Example of B2C Business Model
The Japanese Convenience Store
Visit http://www.rakuten.co.jp
Find a desired product and need to make on-line purchase
Feel uncomfortable giving credit card number. Prefer
to pay in cash.
New way! – Simply order on-line, then pick up and pay
for the product purchased at the nearest 7-Eleven
26
Reference 23, 24
Example of B2C Business Model
Rakuten – Japanese’s largest on-line shopping mall
“Famous homegrown e-commerce success”
• Founded in 1997 (only 5 million people in Japan used in Internet)
• Grown from 17 shops (in 1997) to 2,000 retailers (in 2001)
• 600,000 registered shoppers (in 2001)
• Over 40,000 items are sold every month
Growth
• 70 million pages viewed per month (in 2000) to 540 million pages viewed
per month (in 2002)
• Ranked in Top 10 websites domain in Japan (The leader is Yahoo! Japan)
• Sales $5.4 million (in 1999) to $53 million (in 2001)
• Profit $2.4 million (in 1999) to $16 million (in 2001)
27
Reference 23, 24
Example of B2C Business Model
Rakuten – Japanese’s largest on-line shopping mall
“Famous homegrown e-commerce success”
Successful Strategies
• Charge merchants only $475 to appear on web-site (compared to
$1000 - $ 10,000 from other cybermalls)
• Allow merchants to edit their site and do market analysis by
accessing Rakuten’s database
• Boosted revenue by selling ad space for half the price of most rival
portals
• Collaboration with many convenience stores Japan – allowed
shoppers to pick up and pay for merchandise purchased on the
Internet at the nearest store.
28
Reference 23, 24
Example of B2C Business Model
Rakuten – Japanese’s largest on-line shopping mall
“Famous homegrown e-commerce success”
Collaboration with convenience stores offers several benefits to:
1. Convenience store
• Generate more in-store visitors who might also buy other products
• 7-Eleven set up a virtual bank connected by a network of ATM and
Internet terminals in 7-Eleven.
2. On-line Customers
• Pay cash (no credit-card mishaps)
• No delivery mix-ups
• Convenience to pick up
29
Reference 23, 24
Example of B2C Business Model
Rakuten – Japanese’s largest on-line shopping mall
“Famous homegrown e-commerce success”
Which product is ranked No.1 best
sale in Rakuten website?
30
Example of B2C Business Model
Rakuten – Japanese’s largest on-line shopping mall
“Famous homegrown e-commerce success”
Because the Web is a marketing channel first and foremost,
it is a language issue – a communication issue – to be able
to deliver a marketing message to people. If they don’t
speak English as their primary language, we need to
communicate in their language
---- Terry Lund, Director of Internet Strategy, Kodak
Example: eBay has Chinese and Korean but not Japanese.
31
Reference 25
E-commerce Security
Tech jargon equals miserable communication
A recent survey by MetaFacts Inc.
Computer buyers are left cold by the “techie”
language
52% of PC users don’t understand the term
‘megahertz’ used in a vast majority of PC ads
Solution is simple: Clear English
Reference 26
32
Some of the terms used most often in
the world of computer security
Vulnerability- System’s openness to
unauthorized users or external impact
Data Integrity- Data captured by the
system is agreed upon
Confidentiality- Authorized persons only
Availability- Access to the system and
its resources as needed
Reference 27
33
Definitions Continued
Authentication- Senders are verified
Spoofing- Pretending to be someone you’re not
Mail, IP, Web
Viruses- Malicious programs that spread and
replicate from computer to computer
Trojan Horses- Non-replicable, but just as
destructive
Worms- A program that replicates itself as a
separate entity is called a ‘worm’, not a virus
34
Why did we become so vulnerable?
1. Businesses much more dependent on the
2.
3.
4.
5.
6.
Internet
Systems have become more complex,
feature piled on feature
The software is riddled with flaws
Lack of education
IT Security isn’t a technology problem
anymore, it’s a people problem
Law enforcement agencies lack the
technical expertise
Reference 28, 29
35
Statistics on Viruses and Spam
Survey has found that 60% of all e-mail employees
receive is unwanted, disgusting and often fraudulent- a
costly waste of time
Thieves are figuring out how to mimic sites and gain
personal information
Cyber crime third on the list for FBI after the war on
terror and counter-espionage
Forrester Research- confidence in online security has
fallen significantly since its peak in 2000. Businesses
will have to spend ever more to attract back lost
customers.
Reference 26, 30
36
The surge in Viruses
CERT- Carnegie-Mellon University
–
–
–
–
Keeps track of the steadily growing threats on the Internet
1990 - 252 unique attacks on the Internet
2002 - 82,094 unique attacks on the Internet
First half of 2003- 74,000
Biggest weak spot: Microsoft
Mi2g, Security-research firm: The ten most damaging
viruses all targeted Microsoft software
Mi2g: Linux hardly hack-proof. Hackers gained entry to
almost three times as many Linux servers in August as
they did Windows.
Reference 30
37
Spam
Almost all of them are breaking
some law
FTC explains that spam
senders are tough to find and
prosecute
Businesses should take a
more active role
Postini Inc., Antispam software
company
“When the spam rate was
15% of email, CIO's weren’t
that worried about it. But when
it crossed the 30% point
around the middle of 2002,
suddenly they got worried”
CEO Shinya Akamine,
Reference 30, 31
38
Spam-Ferris Research
Very good business for spammers
- $140-software, $70-list of 100 million emails,
profits from $1,000-$10,000
Cost to business-enormous
- Only 3.5% have spam-fighting technology
- 10,000 employee company-$1.1mil per year
in decreased productivity, help-desk cost, and
use of IT resources
Reference 30
39
Workplace Security: Today’s Issues
PCs, Email, Website, Employees
Symantec Corp. Security software company
“Companies can’t just keep throwing money at
the last attack…They need to get more proactive
and put together a more holistic program that
will protect against tomorrow’s attack.” Robert
A. Clyde, CTO
Reference 32
40
Workplace Security: Today’s Issues
PCs, Email, Website, Employees
PCs
Protect each point where the computer
system touches the outside worldFirewalls
Block all Internet traffic that you don’t
expressly want
Turn off unused features in complicated
software to minimize risks
41
Workplace Security: Today’s Issues
PCs, Email, Website, Employees
Email
MessageLabs Inc., Star Technology Group
“One in every 29 e-mail messages carried a virus in August,
compared to one in 166 in July.”
Infectious Attachments: Viruses, Worms, Trojan
Horses
Install and regularly update Antivirus software
Hire filtering companies to screen email
42
Workplace Security: Today’s Issues
PCs, Email, Website, Employees
Web Sites
Customer’s face to the world- Especially attractive to hackers
Site defacement, digital graffiti, denial of service
Databases tied to Web sites are the biggest concern
Work with ISPs, which have the capacity and expertise to manage
attack traffic
43
Reference 32, 33
Workplace Security: Today’s Issues
PCs, Email, Website, Employees
Employees
Can cause serious damage to companies’ customer
data, intellectual property, financial information
Insiders can become accomplices to outside hackers
– FBI & Computer Security Institute survey:
– 45% of respondents had detected unauthorized access by
insiders in a year
2002 PriceWaterhousCoopers survey:
– Former employees No. 1 threat to corporate information, while
outside hackers No. 5
Reference 32
44
Workplace Security: Today’s Issues
PCs, Email, Website, Employees
Employees
What can you do:
Strict background checks and close monitoring
on new employees
Train employees on the importance of security
Access controls to view data relevant to jobs
45
Case Study on Hackers: Network World
August 25, 2003
Originally
A person who enjoys learning the details of
computer systems
One who programs enthusiastically
Data from three angles
ISPs’ intrusion-detection sensors
Tel Aviv University enterprise network
Firewalls of 24 corporations
Reference 33, 34
46
Findings
Attacks coming from all around the globe, day and
night
Reconnaissance is key contributor to the Internet
background noise
Between 45%-55% of suspicious activity is hackers
scanning for targets
Most hack attempts are automated, scripted
attempts from previously compromised machines
Reference 34
47
Findings
Worms account for 90% of scanning and
biting
Main reasons: to relay spam, extra storage
for illegal files, machines for future attacks
July 10-23, Tel Aviv University
-Scanned 96,000 times for open ports
-Stream of 82,000 hackers from 99 countries
-University IT Managers: Business as usual
Reference 34
48
Choosing a Good,
Memorable Password
Concerns
-Computers have more passwords than
ever before
-Users need simplicity, administrators
demand complexity
-Passwords that are easy to remember are
easy to crack
-Dictionary Attacks or Brute Force Attacks
Reference 35
49
Choosing a Good,
Memorable Password
Suggestions
Never share your password
Never write down a password
Change your password with frequency
Never store your password in a program
Choose different passwords between sites and
applications
Use Upper-lower case letters, numbers, symbols
– taoijhf→ta01jhf→ta()1jHF
Reference 36, 37
50
Lessons Learned
Easy Tips from your IT department:
1.
2.
3.
4.
5.
Email- Don’t open attachments you don’t recognize,
people you don’t know
Files from home- Don’t bring in floppies or CDs; send
email instead
Passwords- Frequent update, No Post-It notes under
your keyboard
At home- Update your firewall and antivirus software
Downloads- On the corporate network, just don’t. Ever.
No music, No video etc.
Reference 38
51
Piracy and Music
What is piracy?
What is a copyright?
Why does this matter?
Napster
What is available to use today?
52
What is Piracy?
Piracy is using or reproducing the work of
another without permission.
Music piracy costs the music industry an
estimated $300 million per year.
One of the fastest growing activities on the
Internet
Reference 46
53
Three Types of Piracy
Simple
– unauthorized duplication of an original recording for commercial
gain without the consent of rights owner.
– packaging is different than the original.
Counterfeits
– are copied and packaged to resemble the original as closely as
possible.
– Original producer’s trademarks and logos are reproduced in
order to mislead the consumer into believing they are buying an
original product.
Bootlegs
– these are the unauthorized recordings of live or broadcast
performances.
Reference 46
54
What is a copyright?
Provides that the right holders determine
whether and how copying, distributing,
broadcasting, and other uses of their work take
place.
Gives people the incentive to create great works
and economic reasons to invest in them
Latest estimates in US, value copyright based
industries at $430 billion (representing 5% GDP)
Reference 47
55
Why does this matter?
Digital technology makes
it possible to make an
unlimited number of
perfect copies of music,
books, videos
Deprives the copyright
holder of revenues, if
purchased in traditional
form
Reference 48
56
Napster
Developed by Shawn
Fanning, 19-year-old who
was in search of better
way to find music.
From Oct. 1999 to March
2001, it attracted an
estimated 50-70 million
users
– Other source states 75
million users downloading
approx. 10,000 per second
Reference 48, 49
57
Napster
User connects to www.napster.com
Elects to download Napster’s software program,
Musicshare program, at no cost.
– Allows one user to access the hard drive of users
logged on at the same time.
Users type in name of artist or song and
program delivers list of available versions
Highlight and download song
Napster uses more that 100 central computers
that function as clearinghouse by pointing users
to computers where songs are available
Reference 49
58
Napster
Describes itself as “engaged in business of
providing users with an index of other users who
are prepared to share music files on a peer to
peer basis without compensation.”
Defined itself as:
–
–
–
–
Does not copy files
Does not provide technology for copying files
Does not make MP3 files
Does not transfer files
These factors crucial for defense
Reference 49
59
Napster Sued by RIAA
December 1999, Recording Industry Association
of America filed federal suit against Napster
alleging contributory and vicarious copyright
infringement
Napster countered that its users are “file
sharing” which should be considered fair use.
– This argument based on the 1984 Supreme Court
case which held that manufactures of Sony’s
Betamax VCR were not liable for copyright
infringement
Reference 50
60
Napster Sued by RIAA
According to the court, “virtually all Napster
users engage in unauthorized downloading and
uploading of copyrighted music.”
Because music is creative in nature and users
could download entire songs; it could not be
considered fair use.
The court found that the effects of use upon the
value of the work and potential markets weighed
against fair use
Reference 49, 50
61
Other Litigation
Responding to a slump in CD sales (down
8% this year alone) blamed in part to
song-swapping and CD burning, the
Recording Industry Association of America
filed copyright infringement suits against
260 people and promised thousands
more.
Reference 51
62
Alternatives
Compulsory Licensing
– Internet users would pay a small tax in their
monthly bills to pay for music. Artists would be
paid out of the tax pool and make more than
they get in record royalties. Consumers would
get more entertainment for less money,
distribution would be more efficient and save
cost of litigation
Reference 52
63
Alternatives
Change Copyright wording
– Instead of standard “all rights reserved” the
notice would explicitly allow users of the CD
to work the music into their own work
– Departure from standard, which forbids such
use without legal agreement
– Statement is flexible – copyright holder states
which rights to reserve and which to waive
Reference 52
64
Alternatives
Digital Rights Management
– Serve as basis for security which allows only
one copy of a CD to be made and does not
allow the copy to be copied
– Allows tracks from the same CD to be
exported to a portable MP3 player but not to
be transferred online
Reference 52
65
Roxio Inc.
Christopher Gorog, Chief Executive of
Roxio Inc.,
“It was colossally stupid that the record
companies and Napster hadn’t found a way to
turn one plus one into two.”
Roxio Inc. bought Napster out of
bankruptcy in November 2002 for $6.1
million.
– Not using the file-sharing technology.
Reference 53
66
Roxio Inc.
In May, Roxio paid $39 million for
Pressplay, a three-year-old music
subscription service formed by Universal
and Sony Music Entertainment Inc.
Obtained access to music licenses, the
technology required to sell songs via the
Internet, and a head start on subscribes
Reference 53
67
Napster 2.0
Legal way to buy direct
from record labels.
Launched on October 29.
offers 99 cent-per-song
downloads and a $9.95
monthly subscription
service.
– that gives customers extra
features such as streaming
songs to their computer, an
online magazine, exclusive
live recordings of up and
coming artists
Reference 54
68
Napster 2.0
www.napster.com
Price - 99 cents per song, $9.95 per album or for
unlimited listening a $9.95 subscription per month. Don’t
have to subscribe to buy songs but pay $1 extra per
song to move the subscription download to recordable
CD or MP3 player
Selection - 500,000 songs
Extras - Pay monthly fee and get over 40 preprogrammed and customizable radio stations and
community message boards.
Pros - interface greatly improved from previous
Pressplay, Easy to use. Sense of community like old
Napster.
Cons - Not free but songs are legit, reliable and ample.
Songs not compatible with Apple iPod.
69
Reference 55
iTunes Music Store
www.apple.com/itunes
Price - 99 cents per song, $9.95 per album. Unlimited
burning of songs to CD(though you can not copy the
same play list more that 10 times) and transferring to
portables
Selection – 200,000 songs
Extras - Recommendations based on your choices.
Pros - Proved consumers will pay for digital music if
presented in w/ usage rules that make sense. Elegant
and easy to use.
Cons - Just a store not a music destination like Napster,
Rhapsdoy and MusicMatch
Reference 55
70
MusicMatch
www.musicmatch.com
Price - 99 cents per song, $9.99 per album.
Unlimited burning and transfers of songs.
Selection - 240,000 songs
Extras - 15 pre-programmed and customizable
radio stations for an extra $2.25-$4.95 a month.
Album art comes w/ download.
Pros - Service works best if you also pay for
radio offerings, which offer clickable downloads
while listening.
Cons - Casual browser has to work hard to use.
Not compatible w/ iPod.
Reference 55
71
Rhapsody
www.listen.com
Price - $9.95 a month subscription, no downloads (can
not be transferred to portables). But you can burn any
song in its library to CD for 79 cents
Selection - 390,000 songs with a catalog that seems
wider and deeper that competitors.
Extras - 60 pre-programmed and customizable radio
stations, artist and album information., art & reviews.
Pros - Better presentation that any other Windows-based
rivals with album cover art and information over
database lists of songs
Cons - Not being able to download songs to the hard
drive or MP3 player. But can get around this by burning
songs to CD. Tracks will not play on iPod.
Reference 55
72
Buymusic
www.buymusic.com
Price - start at 79 cents, most sell for 99 cents or
$1.14 each. No subscription necessary. Rules
about burning and transferring had been more
restrictive that others
Selection - 315,000 songs, with some exclusives
Extras - As with the others, you can get 30second previews of songs; site also sells MP3
players, CD burners and blank discs.
Pros - You can buy songs without subscribing
Cons - Interface is confusing and searches can
be tricky.
Reference 55
73
Fun Facts
Jupiter Research estimates that revenue form
online music will go form $80 million this year to
$1.5 billion in 2008. The CD market today is
worth $12 billion.
US music fans have legally downloaded more
than 7.7 million digital songs since the end of
June, compared with only 4 million CD singles
that were sold, Nielsen Sound Scan reports. In
the week ending Oct 26, 2003 857,000 digital
songs were sold vs. 170,000 hardcopy CD
singles sold.
Reference 56, 57
74
Conclusion
North American Internet Users
Asian Internet Users
E-Commerce Security
Piracy and the Music Industry
75
References
1. Fuscaldo, Donna (2003). E-commerce: selling strategies – the
cyber shoppers next door. Wall Street Journal.
2. Nielson NetRatings (2003). http://www.nielson-netratings.com
3. U.S. Census Bureau (March 19, 2003). “E-Stats.”
http://www.census.gov
4. Online Publishers Association (March 6, 2003). “Over USD1
billion spent on online content” http://www.nua.ie
5. Telecom’s Hottest Tech, Coolest Gadgets (Oct. 15, 2003).
Business Week Online. http://www.businessweek.com
6. Black, Jane (Sept 12, 2003) “Immunity from the Pop-Up
Plague.” BusinessWeek Onlin. http://www.businessweek.com
76
References
7.
www.internetworldstats.com, viewed on October 20, 2003
8.
www.internetworldstats.com/stat3.htm, viewed on October 20, 2003
9.
http://www.ebizchronicle.com/backgrounders01/feb/internetasia.com, viewed on
October 20, 2003
10.
http://www.emarketer.com, viewed on October 20, 2003
11.
http://www.idc.com.sg/press/2003/AP-PR-contiuum_survey.htm, viewed on
October 21, 2003
12.
http://www.kiko-net.com/Foreigners/White_Paper/White_Paper.php?year=2002,
viewed on October 29, 2003
13.
http://www.chineselocal.com/cnnic.htm, viewed on October 29, 2003
14.
http://www.nca.or.kr/white/data/2002engwhite/review.pdf, viewed on October 29,
2003
15.
http://www.ecommercethai.or.th, viewed on October 29, 2003
16.
Karen Mazukewich. Far Eastern Economic Review. Hong Kong: Jul6, 2000 Vol.
163, Iss.27; pg.42, 1 pgs
17.
http://asia.internet.com/news/article.php/992141, viewed on October 18, 2003
77
References
18.
Accentrue. The future of digital Asia: page 19
19.
http://search.bangkokpost.co.th/bkkpost/2001/jan2001/bp20010125/250101_business10.html,
viewed on September 23, 2003
20.
Jason Dedrick and Kenneth L/ Kraemer. Asia E-commerce Report 2000: April 2000, Page 8
21.
F. Gerard Adams. The E-Business Revolution & The New Economy: 2004, Page 150
22.
http://www.visa-asia.com/newsroom/includes/uploads/verified_by_visa_research.ppt, viewed
on October 20, 2003
23.
http://www.asiaweek.com/asiaweek/magazine/enterprise/0,8782,179100,00.html, viewed on
October 22, 2003
24.
Janar A. Weerasingam and Jeremy Rowe. The East is Wireless: Outlook 2001, Page 75-75
25.
Joan Harrison. Mergers and Acquisitions. Philadelphia: Apr 2002. Vol. 37, Iss 4; pg 22
26.
http://www.jir.net/jir9_02.html, view on November 4, 2003
27.
http://news.bbc.co.uk/2/hi/business/1844458.stm, viewed on November 4, 2003
28.
Connie Ling in Hong Kong and Nick Wingfield in San Francisco. Wall Street Journal. (Eastern
Edition). New York, NY.: Feb 26, 2003. Pg. B.6
29.
http://www.cnn.com/2001/TECH/computing/01/09/ebay.in.asia.idg, viewed on November 4,
2003
30.
http://www.ecommercetimes.com/perl/story/16812.html, viewed on November 4, 2003
31.
Barry Parr and Maureen McManus. Web-Site Globalization: The next Imperative for the
Internet. Pg 8
78
References
32.
Baker, Stephen, “Where danger lurks spam, complexity, and piracy could hinder tech's recovery” Business Week. New York: Aug
25, 2003. , Iss. 3846; pg. 114
33.
Elifoglu, I Hilmi. “Navigating the "information super highway": How accountants can help clients assess and control the risks of
Internet-based E-commerce” Review of Business. Jamaica: Winter 2002. Vol. 23, Iss. 1; pg. 67, 5 pgs
34.
Totty, Michael and Hymowitz, Carol. “Workplace Security (A Special Report); How Vulnerable Are You? The latest ways to protect
your employees, facilities and information” Wall Street Journal. (Eastern edition).New York, N.Y.: Sep 29, 2003. pg. R.1
35.
Tan, Harry S K. “E-fraud: Current trends and international developments” Journal of Financial Crime. London: Apr
2002. Vol. 9, Iss. 4; pg. 347
36.
Kirkpatrick, David. “Taking back the Net” Fortune. New York: Sep 29, 2003. Vol. 148, Iss. 6; pg. 117
37.
Wagstaff, Jeremy. “Becoming slaves to spam” Far Eastern Economic Review. Hong Kong: Sep 25, 2003. Vol. 166, Iss. 38; pg. 42
38.
Richmond, Riva. “Workplace Security (A Special Report); How to Find Your Weak Spots: A checklist of the ways your company's
computer network can be attacked -- and what you can do to protect it” Wall Street Journal. (Eastern edition).New York, N.Y.: Sep
29, 2003. pg. R.4
Palmer, C C. “Ethical hacking” IBM Systems Journal. Armonk: 2001. Vol. 40, Iss. 3; pg. 769, 12 pgs
39.
40.
Burns, Christine. “Danger zone:Who's that knocking at the network door?”Network World. Framingham: Aug 25,
2003. Vol. 20, Iss. 34; pg. 48
41.
Anonymous. “P@$$word management, security solutions” Security. Highlands Ranch: Aug 2000. Vol. 37, Iss. 8; pg. 73
43.
Wagstaff, Jeremy. “Try cracking this code” Far Eastern Economic Review. Hong Kong: Oct 10, 2002. Vol. 165, Iss. 40; pg. 44
44.
http://security.uchicago.edu/docs/userpassword.shtml
45.
Wahl, Andrew. “OK, we admit it-we need help” Canadian Business. Toronto: Sep 29, 2003. Vol. 76, Iss. 18; pg. 23
79
References
46.
http://www.ifpi.org/site-content/antipiracy/what_is_piracy.html, viewed November 3, 2003
47.
http://www.ifpi.org/site-content/copyrightcreativity/what_is_copyright.html, viewed November 3, 2003
48. Ku, Raymond Shih Ray, “The Creative Destruction of Copyright: Napster and the New Economics of Digital
Technology” The University of Chicago Law Review; Winter 2002; 69, 1; Pg. 263-324
49. Greene, Stephanie, “Reconciling Napster with the Sony Decision and Recent Amendments to Copyright Law’,
American Business Law Journal; Fall 2001; 39, 1; Pg. 57-98
50.
Langenderfer, Jeff and Cook, Don Lloyd, “Copyright Policies and Issues Raised by A&M Records v. Napster: “The
Shot Heard Round the World” or “Not with a Bang but a Whimper?”, Journal of Public Policy & Marketing; Fall
2001; 20, 2; pg. 280 – 288
51.
Graham, Jefferson, “Music Industry weighs its options”, USA Today, Tech 9-28-2003
52. Smith, Ethan, “E-Commerce; Can Copyright Be Saved? New Ideas to Make Intellecutal Property work in the digital
age.” Wall Street Journal, October 20, 2003. Pg R 1
53. Burrows, Peter, “ Napster Lives Again – Sort of Its new owner has made nice with the music industry. But will fans
return.” Business Week, October 20, 2003. Iss. 3854; pg. 66
54. Veiga, Alex, “New Pay Version of Napster music download service debuts.” USA Today, October 9, 2003.
55. Graham, Jefferson, “Meet the New Napster – and the rest of the pack”, USA Today, October 13, 2003.
56.
USA Today, November 4, 2003
57. Hamilton, Anita, “Napster Turns Legit”, Time, September 1, 2003. Vol. 162, Iss. 9; pg. 68.
80