Verified Document

Internet: Friend Or Foe To Term Paper

Hence the price to "rent" a book for a semester is about $50 for a $100 book." (Varian, 2005) This means that some author's books, if there is a sure demand for them on the resale market, can benefit from a more accessible second hand book market, where before students would simply share books with one another, or photocopy the necessary pages, despite the inconvenience, because of the textbook's great expense. Thus, there are a number of critical factors that come into play when evaluating the impact of second-hand shopping upon an industry, in this case the book and publishing industry online as well as in the real or non-virtual world. First of all, what is the current state of the industry overall? Second of all, what is the perceived difference in the eye of the consumer between the value of the second hand and new materials? Thirdly, what is the resale value of the materials, and how might the existence of such an online forum actually contribute rather than deter sales?

Appendix Survey

Question

How frequently do you buy books online?

A very frequently 2 somewhat frequently 3 never/not at all

Question

How often, if you do buy books, do you buy used books online?

A very frequently 2 somewhat frequently 3 never/not at all

Question

How often, if you do buy books, do you buy new books online?

A very frequently 2 somewhat frequently 3 never/not at all

Question

Sometimes I was going to buy a new book, then found a used version online and bought it instead at a cheaper price.

A very frequently 2 somewhat frequently 3 never/not at all

Question 5 prefer new to used books.

A very frequently 2 somewhat frequently 3 never/not at all

Question 6 buy textbooks...

Smith & Rahul Telang. "Internet Exchanges for Used Books." Study by the Carnegie Mellon Institute. Retrieved 28 Jul 2005 at ssrn.com/abstract=584401.
Varian, Hal. (28 Jul 2005) "Reading Between the Lines of Used Book Sales." The New York Times. Retrieved 28 Jul 2005 at http://www.nytimes.com/2005/07/28/technology/28scene.html?pagewanted=print

Sources used in this document:
Works Cited

Ghose, Anindya, Michael D. Smith & Rahul Telang. "Internet Exchanges for Used Books." Study by the Carnegie Mellon Institute. Retrieved 28 Jul 2005 at ssrn.com/abstract=584401.

Varian, Hal. (28 Jul 2005) "Reading Between the Lines of Used Book Sales." The New York Times. Retrieved 28 Jul 2005 at http://www.nytimes.com/2005/07/28/technology/28scene.html?pagewanted=print
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorism and the Internet Modern
Words: 2030 Length: 7 Document Type: Term Paper

(Ulph, 2006) The document is remarkable for a couple of reasons, which more widely emphasizes on the importance of the internet for the jihadi terrorists. The first one is the component of collective initiative that the writer promotes; emphasizing the pace of communication and the prospective strength that spread jihadi sympathizers throughout the world could concentrate on a single project. Second relates to the competence for data storing that the

Navies in American Revolution for Hundreds of
Words: 4742 Length: 15 Document Type: Term Paper

Navies in American Revolution For hundreds of years, maritime expansion represented the only way to reach distant shores, to attack enemies across channels of water, to explore uncharted territories, to make trade with regional neighbors and to connect the comprised empires. Leading directly into the 20th century, this was the chief mode of making war, maintaining occupations, colonizing lands and conducting the transport of goods acquired by trade or force. Peter

Information Security
Words: 1774 Length: 4 Document Type: Term Paper

Security Mobile Code Mobile code creates a required programming device to provide adaptability to form distributed systems for the Internet viz. Java Applets. (Mobile Code Security) Mobile code may be defined as small bits of software, which can without a user initiating action or even without his knowledge, be automatically downloaded into the workstation and executed. Without suitable controls appropriately positioned, there is the possibility of security risks, as these executable

Role and Importance of the
Words: 5946 Length: 20 Document Type: Essay

Most individuals fail to appreciate life to the fullest because they concentrate on being remembered as some of the greatest humans who ever lives. This makes it difficult for them to enjoy the simple pleasures in life, considering that they waste most of their time trying to put across ideas that are appealing to the masses. While many did not manage to produce ideas that survived more than them, others

Reebok and Nike
Words: 2361 Length: 7 Document Type: Term Paper

Reebok and Nike are athletic apparel companies with differing promotional strategies and marketing. They sell similar products, particularly sneakers and are known globally as companies that promote athletic lifestyles through their sporting goods. The footwear industry, for which Nike and Reebok have their niche is a tough industry to not only market in, but also sustain profits. Both companies although different in their approach, have managed to create a brand

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now