Internet: Friend Or Foe To Term Paper

PAGES
3
WORDS
1061
Cite

Hence the price to "rent" a book for a semester is about $50 for a $100 book." (Varian, 2005) This means that some author's books, if there is a sure demand for them on the resale market, can benefit from a more accessible second hand book market, where before students would simply share books with one another, or photocopy the necessary pages, despite the inconvenience, because of the textbook's great expense. Thus, there are a number of critical factors that come into play when evaluating the impact of second-hand shopping upon an industry, in this case the book and publishing industry online as well as in the real or non-virtual world. First of all, what is the current state of the industry overall? Second of all, what is the perceived difference in the eye of the consumer between the value of the second hand and new materials? Thirdly, what is the resale value of the materials, and how might the existence of such an online forum actually contribute rather than deter sales?

Appendix Survey

Question

How frequently do you buy books online?

A very frequently 2 somewhat frequently 3 never/not at all

Question

How often, if you do buy books, do you buy used books online?

A very frequently 2 somewhat frequently 3 never/not at all

Question

How often, if you do buy books, do you buy new books online?

A very frequently 2 somewhat frequently 3 never/not at all

Question

Sometimes I was going to buy a new book, then found a used version online and bought it instead at a cheaper price.

A very frequently 2 somewhat frequently 3 never/not at all

Question 5 prefer new to used books.

A very frequently 2 somewhat frequently 3 never/not at all

Question 6 buy textbooks...

...

Smith & Rahul Telang. "Internet Exchanges for Used Books." Study by the Carnegie Mellon Institute. Retrieved 28 Jul 2005 at ssrn.com/abstract=584401.
Varian, Hal. (28 Jul 2005) "Reading Between the Lines of Used Book Sales." The New York Times. Retrieved 28 Jul 2005 at http://www.nytimes.com/2005/07/28/technology/28scene.html?pagewanted=print

Sources Used in Documents:

Works Cited

Ghose, Anindya, Michael D. Smith & Rahul Telang. "Internet Exchanges for Used Books." Study by the Carnegie Mellon Institute. Retrieved 28 Jul 2005 at ssrn.com/abstract=584401.

Varian, Hal. (28 Jul 2005) "Reading Between the Lines of Used Book Sales." The New York Times. Retrieved 28 Jul 2005 at http://www.nytimes.com/2005/07/28/technology/28scene.html?pagewanted=print


Cite this Document:

"Internet Friend Or Foe To" (2005, July 28) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/internet-friend-or-foe-to-67821

"Internet Friend Or Foe To" 28 July 2005. Web.23 April. 2024. <
https://www.paperdue.com/essay/internet-friend-or-foe-to-67821>

"Internet Friend Or Foe To", 28 July 2005, Accessed.23 April. 2024,
https://www.paperdue.com/essay/internet-friend-or-foe-to-67821

Related Documents

(Ulph, 2006) The document is remarkable for a couple of reasons, which more widely emphasizes on the importance of the internet for the jihadi terrorists. The first one is the component of collective initiative that the writer promotes; emphasizing the pace of communication and the prospective strength that spread jihadi sympathizers throughout the world could concentrate on a single project. Second relates to the competence for data storing that the

Navies in American Revolution For hundreds of years, maritime expansion represented the only way to reach distant shores, to attack enemies across channels of water, to explore uncharted territories, to make trade with regional neighbors and to connect the comprised empires. Leading directly into the 20th century, this was the chief mode of making war, maintaining occupations, colonizing lands and conducting the transport of goods acquired by trade or force. Peter

Information Security
PAGES 4 WORDS 1774

Security Mobile Code Mobile code creates a required programming device to provide adaptability to form distributed systems for the Internet viz. Java Applets. (Mobile Code Security) Mobile code may be defined as small bits of software, which can without a user initiating action or even without his knowledge, be automatically downloaded into the workstation and executed. Without suitable controls appropriately positioned, there is the possibility of security risks, as these executable

Role and Importance of the
PAGES 20 WORDS 5946

Most individuals fail to appreciate life to the fullest because they concentrate on being remembered as some of the greatest humans who ever lives. This makes it difficult for them to enjoy the simple pleasures in life, considering that they waste most of their time trying to put across ideas that are appealing to the masses. While many did not manage to produce ideas that survived more than them, others

Reebok and Nike
PAGES 7 WORDS 2361

Reebok and Nike are athletic apparel companies with differing promotional strategies and marketing. They sell similar products, particularly sneakers and are known globally as companies that promote athletic lifestyles through their sporting goods. The footwear industry, for which Nike and Reebok have their niche is a tough industry to not only market in, but also sustain profits. Both companies although different in their approach, have managed to create a brand

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.