...is famous Chinese company. Alibaba Group Holding Limited is a Chinese e-commerce company that provides consumer-to-consumer, business-to-consumer and business-to-business sales services via web portals. Thunder is download the software, while providing cloud on-demand service. The internet is very important in their business. They made much reforms to go public; Alibaba’s partner system and Thunder’s business model change. These reforms have profound implications for their company. They also provide a better demonstration for Chinese companies listed in the United States. 1.0 Introduction On 2014, many Chinese company choose go public in the United States. Actually, more than 200 Chinese company go public in the United States, in which about 108 through backdoor listing and about 95 direct listing. I will talk about two famous Chinese company which go public in the United States on 2014; Thunder and Alibaba. Alibaba Group Holding Limited is a Chinese e-commerce company that provides consumer-to-consumer, business-to-consumer and business-to-business sales services via web portals. On 19 September 2014, Alibaba officially listed on the NYSE under the ticker symbol BABA, price is determined as $ 68 a share, its stock today opened at $ 92.7, higher than the issue price rose 36.32%. Because Alibaba Group...
Words: 2240 - Pages: 9
...More Effort Needed to Develop Application Stores in China SKU: IN0904397CWW Analyst: James Lei James.lei@instat.com.cn +1.8610.66422042 January 2010 Executive Summary An application store is a service platform for a specific mobile device through which providers integrate the value chain and other resources to provide mobile applications to consumers via the Internet, Wi-Fi, and cellular networks. Application stores developed alongside Web 2.0 and began with Apple’s App Store. The store’s huge success has since attracted other players to the market. As of October 2009, the App store has earned over US$ 2.4 billion for Apple and the independent developers the store uses. Over 93,000 applications are currently available, and over 2 billion downloads were made. There are two kinds of application store depending on the type of platform provider used. . Handset and OS vendors: Currently, most top smartphone vendors have launched their own application stores. Examples include Nokia’s Ovi Store, RIM’s BlackBerry App World, Palm’s App Catalog, Google’s Android Market, Microsoft Windows Marketplace for Mobile (WMM), and Samsung’s Mobile Innovator. Mobile carriers: Examples include China Mobile’s Mobile Market, China Telecom’s AppMarket, and Shanghai Unicom’s Wo-Store HIGHLIGHTS Most smartphone and OS vendors are becoming involved in the application store market because of the huge success of the App Store. Most platform providers use the 30/70 revenue share model, under which...
Words: 10056 - Pages: 41
...programme in Intellectual Property Law (LL.M.) INTERNET LAW The abuse of the cyberspace - jeopardizing the copyrights Prof. Goce Naumovski, PhD Temelkova Simona 42321 I.I The rise of technology and Internet as a platform for new problems So cyberspace is real. And so are the risks that come with it. - President Barack Obama1 Despite the many and obvious benefits of the modern electronic communications development,it has also brought with it the worrying threat of intentional attacks against information systems and network platforms/infrastructures. As cyberspace gets more and more complex and its components more and more sophisticated, especially due to the fast development and evolution of (broadband) Internet-based platforms, new and unforeseen vulnerabilities may emerge.” And further that “in the hands of persons acting in bad faith, malice, or grave negligence, information society technologies (ISTs) may become tools for activities that endanger or injure, the life, property, or dignity of individuals or even damage the public interest. Technology-enabled crimes are also known as high-tech crime, computer crimes or cyber crime. They include crimes committed directly against computers and computer systems, as well as the use of technology to commit or facilitate the commission of traditional crimes, bringing unique challenges to law enforcement. IT security in ICT, with the association of the Internet, has evolved into cyber security as we know it today...
Words: 4702 - Pages: 19
...Internet Piracy has become a hot topic as of late with all the recent cyber security bills being purposed in congress. Many companies that own intellectual property want these bills to pass, this will allow them to better defend their intellectual property against would be pirates. The three benefits to software piracy are the removal or price conscious consumers from the market, showing interest in the product, and give the owner company’s word of mouth advertising. Software piracy is a complicated issue, although the person pirating the piece of software is technically stealing, they are only stealing time and ideas. There is no physical item missing from the creator of the software. Software piracy is the unauthorized copying of computer software. Many countries around the world have copyright laws which apply to software piracy but the extent of enforcement differs. These copyrights usually surpass the practical life of the product (US Government). Today the oldest programs for computers have copyrights will not expire till the year 2030. These programs are forty years old, that’s a sixty year old copyright for a program that is about as useful as an ejector seat on a helicopter. The changes in operating systems, network environments, and user expectations generally make software programs out of date faster than the copyright runs out (Wikipedia). A law that has been proposed is the U.S. Uniform Computer Information Transaction Act (UCITA); this law is very controversial...
Words: 1136 - Pages: 5
...Google in China’s World Lauri Mak Ottawa University October 19, 2012 Abstract This paper will discuss Google, one of the largest internet search engines decision to enter the China internet market and the deviation against their very own corporate ethics policies. It will identify the key stakeholders involved and will look at the primary non-marketing issues and analysis each issue. Introduction In 1996 Larry Page and Sergey Brin began developing a search engine called BackRub while enrolled at Stanford University. In 1998 the company was renamed Google Incorporated and launched their search engine from a garage in Santa Margarita California. First held as a private company, they went public in August of 2004. Google grew extremely quickly by taking their single language website and adding different products including but not limited to the development of various forms of advertising and web applications from a variety of different tasks as found on the company website http://Google.com. Google.com quickly grew to be the most popular search engine in the world. “Their technology used an algorithm to find possible Web pages with search criteria provided by the user. Google’s PageRanktm technology measures the importance of different Web pages by solving an equation with more than 500 million variables and 2 billion terms.” (Martin, 2011) Google’s decision to enter the Chinese market was based on greed and increased market share rather than their company’s highly publicized...
Words: 2785 - Pages: 12
...esonic: Strategic Analysis Yerheem Cha● Beth Jones ●Seetal Patel ●Erik Pickard ●Mike White University of Illinois Urbana-Champaign Institute of Labor and Industrial Relations September 2005 ♦Executive Summary♦ In an attempt to reap the potential profits of the emerging online music industry, Sonic Records has established esonic, a subsidiary exclusively designed to serve as an online music store. In the wake of mounting anti-piracy campaigns concerning music downloads, increased demand for digital technologies that offer greater access and mobility, and an overall increase in consumer demand for access to digital media, esonic has a more than favorable forecast of success in entering the digital music market. Despite fierce competition from established online music providers such as Apple’s iTunes and Napster, esonic will find more than enough room for growth. Through strategic alliances with software and hardware technology firms, esonic can further magnify its reach and appeal to become a digital music industry giant. A unique opportunity presents itself to esonic: it can learn from and avoid the mistakes of digital music industry pioneers, whilst simultaneously mimicking elements of successful strategies at the rapid pace that an online music store with relatively little operating costs can provide. Designing a competitive business strategy remains imperative, however, and the success of esonic will be dependent on its...
Words: 5891 - Pages: 24
...Business Project – HMV Chan Ho Yeung 13431908 Context 1. Introduction 2 2. Comparative Analysis of the company’s competitive position in its various markets 3 2.1 PEST 4 2.2 Porter 5 forces 5 2.3 Value Chain 7 3. Considerations for the company’s position in relation to cross-cultural issues 10 3.1 Hofstede Cultural dimensions 10 3.2 Iceberg model of culture 14 4. The company’s position in relation to corporate social responsibility 16 4.1 Carroll’s CSR Pyramid 16 5. Conclusion 21 6. References 24 1. Introduction People who were born in 1990s or before, they should have gone to CD shops to buy CDs and supported their favourite singers. So that, you must know HMV. HMV, everyone knows that it is a CDs retailer basically. HMV opened in Oxford Street London on 20th July 1921. HMV’s full name is “His Master’s Voice”. At that time, HMV was a part of EMI - Electric and Musical Industries. In 1998, HMV was divested from EMI. It needs to especially mention the logo of HMV. HMV’s logo is based on a dog that called Nipper, is listening to a gramophone. In 1921, when HMV had started, they were a company which sold gramophone and also used HMV’s name to produce TVs and radios. After that, HMV did not sell gramophone, they was transiting gradually to sell CDs. Until now, HMV has changed a lot. They are not only selling CDs, they also sell the other products including film, games and headphones. In 1988, HMV has opened their first overseas store in Canada...
Words: 4754 - Pages: 20
...to crack down copyright piracy by implementation of anti-piracy and anti-counterfeiting laws and regulations; it faces increasing pressure to show progress. The periodic crackdowns against counterfeiting have been launched but they often seem motivated more by politically appeasing the United States and other countries than a sincere effort to combat the problem. The United States and other countries want China to impose harsher penalties on crimes linked with counterfeit goods. Chinese law protects trademarks and prohibits companies from copying the “look and feel” of other companies' stores. The Chinese government enforced laws against copyrights piracy in 2006; there were criminal penalties on producing or selling counterfeit goods if the total value of the confiscated products was less than a certain amount. The penalty for importing pirated discs is up to four years in prison and a fine of $1,290 for each imported disc. The Chinese government warns violators in large markets in Shanghai and Beijing of these penalties. However, some doubt that much will change until China graduates from manufacturing goods to designing them. New opinions on handling criminal copyright infringement cases contain helpful provisions which could foster an effective criminal remedy against online piracy activities. The International Intellectual Property Alliance (IIPA) commends the efforts of the U.S. Government to secure these important commitments. However, as has been the case with past...
Words: 3961 - Pages: 16
...Case study 2: The death of the iPod Module 2 - External environment Identify the industry, product segment and value chain Apple is a company based in the United States. Apple designs, manufactures and markets mobile communication and media devices, personal computers and portable digital music players, and sells a variety of related software. mobile communication and media devices What is the current life cycle of the industry? Currently in the decline or renewal stage if its life cycle. What have been the key issues affecting historical industry growth? What was their impact? Key issues influencing historical industry growth using TEMPLES model |Factor |Issue |Nature of impact (+/=/-) | |Technology |Internet has enabled downloading and files sharing of music across the world. |+ | | | | | | | | | |Economy |Dotcom bubble |- | | | |...
Words: 1769 - Pages: 8
...Political/Legal Forces 4 3.4 Socio-cultural Conditions 5 3.5 Technological Changes 5 4.0 External Analysis (Competitive Environment) 6 4.1 Intensity of Rivalry among Competitors 6 4.2 The Threat of New Entrants 6 4.3 The Threat of Substitutes 6 4.4 Suppliers 7 4.5 Customers 7 5.0 Internal Environment Analysis ………………………………………………8 5.1 Resource Types ……………………………………………………………8 5.2 Firms Capabilities …………………………………………………………8 6.0 Conclusion …………………………………………………………………...9 7.0 Recommendations for Future Action ………………………………………..9 Reference…………………………………………………………………….....10 I. Introduction In 1998, Google Company was established and, over such a short period of time, become an American international corporation specifying in Internet-related services and products. The two first founders of google were Larry Page and Sergey Brin who met each other at Stanford University in 1995. 1.1 Services and Products Google focuses on web advertising technology, search engine, software and other products like Android phone and tablet. 1.1 Finances Most of the company’s profits derive from AdWords, which is Google main advertising product and main source of revenue. Google's total advertising revenues were USD$42.5 billion and Annual Net Income was USD$10,737,000 in 2012. 1.1 Organizational...
Words: 2318 - Pages: 10
...GBUS-180 Case Synopsis Candidate Name: Harshit Bhalla Session: Spring 2015 Subject: GBUS-180 Due: 4/30/15 Professor: D. Flynn Candidate Name: Harshit Bhalla Session: Spring 2015 Subject: GBUS-180 Due: 4/30/15 Professor: D. Flynn 1. Historical Analysis: - A. Business In: * Overview: * Apple Inc. “is an American multinational corporation headquartered in Cupertino, California, that designs, develops, and sells consumer electron1ics, computer software, online services, and personal computers. Its best-known hardware products are the Mac line of computers, the iPod media player, the iPhone smartphone, and the iPad tablet computer. Its online services include iCloud, iTunes Store, and App Store. Apple's consumer software includes the OS X and iOS operating systems, the iTunes media browser, the Safari web browser, and the iLife and iWork creativity and productivity suites.” * Apple generates revenue through many mediums. Consumer electronics is by far generating most of its revenue. Of course, it’s worth mentioning that with just one of its products, the IPhone, generating 50% of its revenue. It also generates revenue through its Apple Mac Sales, IPad, and IPod, IPod accessories, ITunes and App store and of course it’s AppleCare services. We will focus mainly on the specific consumer electronics mentioned below when describing its financial, competitive, and environmental areas. * Products & Services: ...
Words: 4861 - Pages: 20
...How Ethics Relate To Computer Crimes Herman T. Everidge III Legal and Ethical Issues in Computing CIS 4253, 847 James R. Moore, Jr. September 29, 2012 Computer Viruses, Worms, Trojan Horses and Malware Malware refers to software programs designed to damage or do other unwanted actions on computer systems; viruses, worms, Trojan horses, and spyware are the most common types of malware. Computer viruses show us how vulnerable we are; viruses can have a devastating effect on businesses, they disrupt productivity and can cause billions of dollars in damages. They also show us how sophisticated and interconnected we have become. Computer viruses are called viruses because they share some of the traits of biological viruses; computer viruses pass from computer to computer much like a biological virus passes from person to person. Computer viruses are created by people by writing code to create the virus, and designing the attack phase which could be a message or initiate the destruction of a piece of hardware. Early viruses were pieces of code embedded in legitimate programs, like games or word processors. A virus is a small piece of software that piggybacks on real programs; it might attach itself to a program and each time the program runs the virus runs too, and they can reproduce by attaching to other programs. E-mail viruses travel as an attachments to e-mail messages and can replicate themselves by automatically mailing itself to people in the victim's e-mail address...
Words: 3580 - Pages: 15
...Searching for Internet Freedom in China_GALLEYED (Do Not Delete) 3/18/2013 9:19 PM SEARCHING FOR INTERNET FREEDOM IN CHINA: A CASE STUDY ON GOOGLE’S CHINA EXPERIENCE JYH-AN LEE,* CHING-YI LIU,** AND WEIPING LI*** ABSTRACT ........................................................................................ 406 INTRODUCTION ................................................................................. 406 I. THE NATURE OF THE INTERNET AND GOOGLE’S BUSINESS ............ 408 A. The Evolving Nature of the Internet................................. 408 B. The Study of Google and its China Experience................ 409 II. GOOGLE.CN AND CHINA’S INTERNET POLICY ............................... 412 A. The Story of Google.cn .................................................... 413 B. China’s Internet Policy in the Case of Google.cn............. 419 1. Technological Control of Search Engines .................. 419 2. Legal Control of Search Engines................................ 421 III. POLICY IMPLICATIONS FROM THE CASE OF GOOGLE.CN .............. 423 A. Global Network, Local Internet........................................ 424 B. Leveraging Commercial Power to Regulate the Internet . 426 IV. THE ACCOUNTABILITY CRISIS IN INTERNET GOVERNANCE ......... 428 A. The Problem of Internet Accountability ........................... 428 B. Solutions to the Digital-Accountability Problem ............. 431 CONCLUSION.......................................................................
Words: 13967 - Pages: 56
...& Noble first must consider the issues and problems facing their company, and then perform an opportunity analysis to determine their strengths and weaknesses in relation to their customers, competitors, and company capabilities. In regards to the main concerns of Barnes & Noble, the company needs to worry about the uncertainties associated with the expected rapid growth of the Internet, the changing profile of Internet users, increased competition and indeterminate future developments in electronic retailing from publishers, wholesalers, and retailers, and intense price competition. By 2000, more than 80 million users will be on the World Wide Web, with an increase in females and a broader spectrum of education levels and age, changing the market demographics. Additionally, some book publishers, namely Simon & Schuster and Bertelsmann, have expanded online, while the national leading wholesaler, Ingram, is developing a website where wholesalers could ship directly to consumers. In the meantime, small publishers and universities have started to publish directly on the Web, avoiding print versions completely and thereby challenging the posterity of conventional books. Within the Barnes & Noble Corporation, their smaller traditional bookstores such as B. Dalton and Scribner's already face cannibalization from the growth of superstores and online purchasing. Finally, some claim that the burgeoning nature of the Internet will lead to increased bargaining...
Words: 2657 - Pages: 11
...Gambling and Business Contents To Our Stockholders 1 Financial Summary 1 Financial Statements 1 Notes to Financial Statements 1 Independent Auditor’s Report 1 Contact Information 1 Company Information 1 What is online gambling? Before we present the topic of online gambling, you need to ask yourself what is online gambling. Internet Gambling is a means of using the internet to place bets on casino games, sports games, etc. Bets are normally placed on credit card accounts and wins or losses are collected or paid for accordingly. History of Online Gambling Gambling sites first began to appear in the 1990s. The earliest confirmed date of an authentic Internet gambling site is September 1993, when the Swiss Lottery began selling lottery tickets to individuals with a special terminal and software (Pavalko 2004). In 1994, the Antiguan government passed legislation permitting online casinos to be established. Intercasino was the first online casino to accept real money wagers. It was launched in Antigua in 1996 (it is now registered in Malta) and their revenue reports attracted significant interest. Since the early beginnings of internet gambling, the number of online gambling sites has increased at an astounding rate each year. In 1994, there were reportedly 30 gambling websites but 4 years later, there were approximately 90 online casinos, 39 lotteries, 8 online sites offering bingo, and 53 sports books. By 1999, the number dramatically increased to 250 online casinos...
Words: 3047 - Pages: 13