SlideShare une entreprise Scribd logo
1  sur  13
Management 265
Introduction to E-Commerce
                Nicholas A. Davis
                  Session Two
                   09/22/2009
Auctions
• Fixed pricing – National price
• Trigger pricing – Based on consumer
  location
• Personalization pricing – based on how
  much a user values a product
• Consumer to Consumer – Auction house is
  an intermediary
• Business to Consumer – Auction house
  sells items it controls
Rise and Fall of Ebay
• Started as a comic book exchange marketplace
• Moved to allow consumers to sell all kinds of
  items
• Moved to allow business to sell all kinds of items
• Bulk sellers get more benefit
• Small person being squeezed more
• Threat of Craigslist
• Vonage acquisition and sale
Differences
• Auctions
• Portals
• Online Communities
Intellectual Property and
          Digital Media
• What is intellectual property?
• Does it have the same value as physical
  property?
• How do you accurately judge the value of
  IP?
• Case Scenario, Nick never buys a CD, but
  loves music. Nick gets Napster and
  downloads 5000 songs he likes, but would
  never buy. What damage has been
  caused to the copyright owner?
Intellectual Property and
          Digital Media
• John regularly buys CDs. John gets
  Napster and downloads 5000 songs. What
  type of damage has been done?
• Should Nick and John be treated differently
  based on the fact that a different amount of
  damage has been done to the copyright
  holder, based on Nick and John’s shopping
  habits?
• Ethically speaking, what are the major
  issues here?
Online Content Revenue
            Models
• Marketing Tide.com
• Free content drives offline revenues
• May work for strong brands, or niche
  products, designed to enrich customer
  experience
Online Content revenue
           Models
• Advertising Yahoo
• Free content is paid for by online
  advertising
• Depends on growth in online ad volume
  and rates, as well as audience size
Online Content revenue
           Models
• Pay Per View / Pay Per Download
• Charge for premium content is a la carte
• Opportunities for unbundling digital
  products, work best with something like an
  MP3 player
Online Content revenue
           Models
• Subscription: Rhapsody
• Monthly charges for unlimited service
• This is the leading model (80%), very
  popular with high value products
Online Content revenue
           Models
• Mixed MSN
• Combination of all models
• Market segmentation opportunities make
  this a popular model, charging for some
  services, and providing others for free
Future trends in E-Commerce
• Anywhere availability of purchased content
• Intelligent outposts (Soda Machines)
• New payment methods (phones)
Additional Concerns

Contenu connexe

Similaire à Intellectual property and digital media nicholas davis

Strategic mgt of Ebay
Strategic mgt of EbayStrategic mgt of Ebay
Strategic mgt of Ebayfarah naz
 
Strategic mgt of Ebay
Strategic mgt of EbayStrategic mgt of Ebay
Strategic mgt of Ebayfarah khan
 
Selling Online
Selling OnlineSelling Online
Selling OnlineCosmic
 
Barnes & Noble Internet Marketing Strategy by Stephanie Sundheimer
Barnes & Noble Internet Marketing Strategy by Stephanie SundheimerBarnes & Noble Internet Marketing Strategy by Stephanie Sundheimer
Barnes & Noble Internet Marketing Strategy by Stephanie Sundheimerstephaniesundheimer
 
CQ - Creativity In Direct Marketing
CQ - Creativity In Direct MarketingCQ - Creativity In Direct Marketing
CQ - Creativity In Direct MarketingCQ
 
Ecommerce and online publishing
Ecommerce and online publishingEcommerce and online publishing
Ecommerce and online publishingdeepshikharao1
 
E-commerceG1-Case3 Amazon
E-commerceG1-Case3 AmazonE-commerceG1-Case3 Amazon
E-commerceG1-Case3 Amazonnewnwan
 
Fashion Marketing
Fashion Marketing Fashion Marketing
Fashion Marketing kiki243
 
E business and marketing
E business and marketingE business and marketing
E business and marketingNanditaAgrawal4
 
Getting ready for christmas plymouth 18 sep 2015
Getting ready for christmas  plymouth 18 sep 2015Getting ready for christmas  plymouth 18 sep 2015
Getting ready for christmas plymouth 18 sep 2015Get up to Speed
 
Five Things to Know in 2009
Five Things to Know in 2009Five Things to Know in 2009
Five Things to Know in 2009Dennis O'Neil
 
How to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyHow to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyJustin Denton
 
Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...
Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...
Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...Leonardo
 
1 the web as a marketing medium
1 the web as a marketing medium1 the web as a marketing medium
1 the web as a marketing mediumSheila McDonald
 
Essential tools and tips for selling online bridgewater 12.06.15
Essential tools and tips for selling online   bridgewater 12.06.15Essential tools and tips for selling online   bridgewater 12.06.15
Essential tools and tips for selling online bridgewater 12.06.15Get up to Speed
 
Are you Addicted to Netflix?
Are you Addicted to Netflix?Are you Addicted to Netflix?
Are you Addicted to Netflix?Hridja Tripathi
 
New Marketing for the New Economy - Kotler
New Marketing for the New Economy - KotlerNew Marketing for the New Economy - Kotler
New Marketing for the New Economy - KotlerFilipe Mello
 

Similaire à Intellectual property and digital media nicholas davis (20)

E-buying behaviour
E-buying behaviourE-buying behaviour
E-buying behaviour
 
E buyingbehaviour son
E buyingbehaviour sonE buyingbehaviour son
E buyingbehaviour son
 
Strategic mgt of Ebay
Strategic mgt of EbayStrategic mgt of Ebay
Strategic mgt of Ebay
 
Strategic mgt of Ebay
Strategic mgt of EbayStrategic mgt of Ebay
Strategic mgt of Ebay
 
Selling Online
Selling OnlineSelling Online
Selling Online
 
Barnes & Noble Internet Marketing Strategy by Stephanie Sundheimer
Barnes & Noble Internet Marketing Strategy by Stephanie SundheimerBarnes & Noble Internet Marketing Strategy by Stephanie Sundheimer
Barnes & Noble Internet Marketing Strategy by Stephanie Sundheimer
 
Digital Marketing Revolution
Digital Marketing RevolutionDigital Marketing Revolution
Digital Marketing Revolution
 
CQ - Creativity In Direct Marketing
CQ - Creativity In Direct MarketingCQ - Creativity In Direct Marketing
CQ - Creativity In Direct Marketing
 
Ecommerce and online publishing
Ecommerce and online publishingEcommerce and online publishing
Ecommerce and online publishing
 
E-commerceG1-Case3 Amazon
E-commerceG1-Case3 AmazonE-commerceG1-Case3 Amazon
E-commerceG1-Case3 Amazon
 
Fashion Marketing
Fashion Marketing Fashion Marketing
Fashion Marketing
 
E business and marketing
E business and marketingE business and marketing
E business and marketing
 
Getting ready for christmas plymouth 18 sep 2015
Getting ready for christmas  plymouth 18 sep 2015Getting ready for christmas  plymouth 18 sep 2015
Getting ready for christmas plymouth 18 sep 2015
 
Five Things to Know in 2009
Five Things to Know in 2009Five Things to Know in 2009
Five Things to Know in 2009
 
How to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyHow to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economy
 
Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...
Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...
Engage at Every Stage: What Hotel Marketers Can Learn from Successful Online ...
 
1 the web as a marketing medium
1 the web as a marketing medium1 the web as a marketing medium
1 the web as a marketing medium
 
Essential tools and tips for selling online bridgewater 12.06.15
Essential tools and tips for selling online   bridgewater 12.06.15Essential tools and tips for selling online   bridgewater 12.06.15
Essential tools and tips for selling online bridgewater 12.06.15
 
Are you Addicted to Netflix?
Are you Addicted to Netflix?Are you Addicted to Netflix?
Are you Addicted to Netflix?
 
New Marketing for the New Economy - Kotler
New Marketing for the New Economy - KotlerNew Marketing for the New Economy - Kotler
New Marketing for the New Economy - Kotler
 

Plus de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

Plus de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Intellectual property and digital media nicholas davis

  • 1. Management 265 Introduction to E-Commerce Nicholas A. Davis Session Two 09/22/2009
  • 2. Auctions • Fixed pricing – National price • Trigger pricing – Based on consumer location • Personalization pricing – based on how much a user values a product • Consumer to Consumer – Auction house is an intermediary • Business to Consumer – Auction house sells items it controls
  • 3. Rise and Fall of Ebay • Started as a comic book exchange marketplace • Moved to allow consumers to sell all kinds of items • Moved to allow business to sell all kinds of items • Bulk sellers get more benefit • Small person being squeezed more • Threat of Craigslist • Vonage acquisition and sale
  • 5. Intellectual Property and Digital Media • What is intellectual property? • Does it have the same value as physical property? • How do you accurately judge the value of IP? • Case Scenario, Nick never buys a CD, but loves music. Nick gets Napster and downloads 5000 songs he likes, but would never buy. What damage has been caused to the copyright owner?
  • 6. Intellectual Property and Digital Media • John regularly buys CDs. John gets Napster and downloads 5000 songs. What type of damage has been done? • Should Nick and John be treated differently based on the fact that a different amount of damage has been done to the copyright holder, based on Nick and John’s shopping habits? • Ethically speaking, what are the major issues here?
  • 7. Online Content Revenue Models • Marketing Tide.com • Free content drives offline revenues • May work for strong brands, or niche products, designed to enrich customer experience
  • 8. Online Content revenue Models • Advertising Yahoo • Free content is paid for by online advertising • Depends on growth in online ad volume and rates, as well as audience size
  • 9. Online Content revenue Models • Pay Per View / Pay Per Download • Charge for premium content is a la carte • Opportunities for unbundling digital products, work best with something like an MP3 player
  • 10. Online Content revenue Models • Subscription: Rhapsody • Monthly charges for unlimited service • This is the leading model (80%), very popular with high value products
  • 11. Online Content revenue Models • Mixed MSN • Combination of all models • Market segmentation opportunities make this a popular model, charging for some services, and providing others for free
  • 12. Future trends in E-Commerce • Anywhere availability of purchased content • Intelligent outposts (Soda Machines) • New payment methods (phones)