Professional Documents
Culture Documents
Kompilasi PPT Bisdig UAS
Kompilasi PPT Bisdig UAS
Chapter 7
Together, APIs and SDKs have fundamentally changed the degree to which
businesses share their information resulting in a vastly improved and more
useful World Wide Web.
Send button Allows users to send content from a website to their Facebook friends
Comments This plug-in allows users to comment on a webpage’s content using their
Facebook profile and shows the activity to the user’s friends in a newsfeed
Embedded posts Places content from any public Facebook post on to your website or blog
Facepile This feature displays the profile photos of the people who have connected
with your Facebook page or app
Login button Shows profile pictures of the user’s friends who have already signed up for
your site in addition to the login button
Source: Facebook (2014)
Figure 7.2 Data collected in 2016 illustrate that people spend more time on
Facebook than any other social networking site. One of the newest social
platforms, Snapchat, is already in second place across age groups, although
younger people spend almost three times longer on the service than older people.
Facebook Statistics
Copyright ©2018 John Wiley & Sons, Inc. 24
Social Networking Services: Differentiation
• While SNS sites share some common features, they are
not all alike. As the category matures, sites are
differentiating themselves in a variety of ways:
o Target age group
o Geographic location of users
o Language
o Area of interest; for example, music, photography, gaming,
travel
o Social vs. professional networking
o Interface; for example, profile page, microblog, virtual world,
emphasis on graphic vs. text content
Chapter 8
• Sell-Side Marketplaces
o Where organizations sell their products or services to other
organizations from their own private website or from a third-party
site.
o Creates greater competition for sellers (a buyer advantage)
o Similar to B2C model, but the ‘C‘ is an organization.
• Amazon Business
• Alibaba wholesaling Chinese products
• Dell Computer auctions through eBay
• Overstock.com for obsolete of excess assets
Vishing Again, similar to phishing, but the fraudulent communication comes in the form
of a voice or voicemail message encouraging the victim to divulge secure information.
Lost or stolen phone Lost or stolen cell phones can be used to conduct financial
transactions without the owner’s permission.
Chapter 14
• 3D Printing
o Depositing tiny layers of material to create computer-assisted
design and/or computer-assisted manufacturing blueprints.
• Bioprinting
o Using DNA to 3D print human body parts using bioprinting
technology.