What are the advantages and disadvantages of auctions

1. Case Study: Auctions and Dynamic Pricing
Overview
There are many types of auctions, each with strengths and weaknesses in uncovering the value of an item. Auctions are widely used in finance, e-commerce, and e-games. They are also widely used to generate revenue for not-for-profit organizations.
The following video describes auctions as price discovery mechanisms:
• The Ideal Auction.
Use the video on auctions and at least three academic or high-quality business publications (see acceptable types below) to compare and contrast English auctions and Dutch auctions, and sealed-bid first-price auctions and Vickery auctions.
Instructions
Address the following questions in 5–7 pages:
2. Compare and contrast how each of the following uncovers value:
o English and Dutch auctions.
o Sealed-bid first-price auctions and Vickery auctions.
3. Compare and contrast surge pricing and congestion pricing. Give an example of each currently in use.
4. Identify three examples of auctions used in finance, e-commerce, and/or e-games. Explain the following in depth:
o The need for an auction to uncover value in the product or service.
o How the type of auction used to uncover the value of the product or service is better at uncovering value than other types of auctions.
5. What are the advantages and disadvantages of auctions as revenue generators for not-for-profit organizations?
6. Suggest ways in which a for-profit company, such as the company for which you work or a company for which you aspire to work, can use auctions or dynamic pricing to better uncover value and increase revenue.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
Acceptable Types of Publications
A high-quality, professional business publication is one that is primarily directed at reporting or analyzing the workings of the business. Examples are the Wall Street Journal, Bloomberg, and Reuters. Avoid general news publications such as USA Today, the Washington Post, and the New York Times. Other articles and resources can be found at the Strayer Library.
Please do not rely on Wikipedia, Investopedia, or similar websites as references at any time in this course.
The specific course learning outcome associated with this assignment is:
• Propose ways in which a company can use auctions to better uncover value and increase revenue.

 

The potential security weakness of SCADA systems

Transitioning from cybersecurity to physical security, this module examines how our nation’s critical infrastructure is affected by the vulnerable cyber technology that controls its daily functions.

In his 2012 Defcon 20 cybersecurity conference presentation, Dan Tentler, founder of the San Diego-based information security consulting firm AtenLabs, shared screenshots of dozens of connected devices he could find on the Internet using a laptop and browser. He was able to access several critical infrastructure systems, showing that they were vulnerable to cyber-attack. His presentation vividly demonstrated that the Internet was not designed with security in mind.

Network-ready industrial control systems that monitor and control the physical processes of machines have become the instruments that contribute to a threat we call physical security. The machines we rely on to supply energy, drinking water, and safe food are at risk. The potential security weakness of SCADA systems was exposed by a cyber-attack against the Natanz Iran uranium enrichment facility. A computer worm, called Stuxnet, caused the facility’s control systems to make the centrifuges spin out of control. Stuxnet, a cyber-weapon that changed modern warfare, does not discriminate between nations; it simply attacks and destroys computer-managed machines.

References:

Tentler, D. (2012) “Defcon 20 – Dan Tentler – Drinking from the Caffeine Firehose We Know as Shodan.” YouTube. Retrieved from: https://www.youtube.com/watch?v=5cWck_xcH64:

Case Assignment
Using three different industries, provide three examples of physical security dangers faced by SCADA (supervisory control and data acquisition) network systems.
After reviewing Presidential Policy Directive 21 (PPD-21), discuss a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. What is resilient infrastructure? Provide two examples of how this concept protects people and property.
Assignment Expectations
Length: This Case Assignment should be 3-5 pages, not counting the title page and references.

Respect for Personal Autonomy

Write a one-page (double-spaced) paper discussing and describing “What are human beings about?” or “What does it mean to be a human being?” How are the concepts of Beneficence, Justice, and Respect for Personal Autonomy derived from the nature of human beings? In other words, what are the implications for ethics given the abilities and limitations of human beings? You may use definitions or scenarios in your writing.

The abilities and limitations of human beings

Write a one-page (double-spaced) paper discussing and describing “What are human beings about?” or “What does it mean to be a human being?” How are the concepts of Beneficence, Justice, and Respect for Personal Autonomy derived from the nature of human beings? In other words, what are the implications for ethics given the abilities and limitations of human beings? You may use definitions or scenarios in your writing.

Knowledge of the nuclear disaster

Write a 1,500-word essay that analyzes the entire book; for example, you could focus on one theme and show how the book develops this theme through its three parts.

In addition to using quotes from the book, support your argument with evidence from 3 additional sources. In the U.S., Alexievich’s work has not received a lot of attention, much of which is due to traditional assumptions about what a literary text should look like and do. As a result, you will not find many scholarships about her work in academic journals; however, you can find book reviews of her work as well as articles in newspapers, magazines, or journals that give you some background knowledge of the nuclear disaster at Chornobyl and Alexievich’s method of gathering information and writing her books.

Suggested sources: book reviews, interviews with the author (check YouTube), Alexievich’s website, and any of the sources linked in our Canvas site (for example, the article “The Memory Keeper”)

The success and failure of an economic endeavor

A free enterprise system provides individuals the opportunity to make their own economic decisions, without restrictions from the government. It allows the supply and demand of consumers to determine the success and failure of an economic endeavor. As a result, some business owners have become successful, while others have not.

In an essay, you will choose an entrepreneur and argue whether the free enterprise system was necessary for that individual to make an impact on the business world.

The lens of sociological research methodology

Utilizing nonparticipant observation, participant observation, ethnography, or ethnography observe and record a detailed account of a social context or virtual social context that you are no stranger to (think local coffee shop, shopping mall, church or night club, a blog, Twitter feed, or Instagram) from a sociological perspective. Be careful to be objective and ethically neutral. Do not include judgments or opinions of behaviors but rather, as best as possible, systematic observations.

Third, discuss how a common-sense view of that social setting may look different from a sociological one. Does looking through the lens of sociological research methodology transform how that social space may be viewed? Substantiate your views.

Fourth and finally, post a response to another classmate’s posting discussing your thoughts in a respectful and thoughtful manner. What stood out to you about their observations and the behaviors occurring?

Testing the impact of advertising on consumer repurchase propensity

Image transcription text

As a marketing manager for a large chain of coffee houses, you are interested in testing the
impact of advertising on consumer repurchase propensity; at this time, you are interested in
estimating the relationship between repurchase (i.e., whether a customer repur… Show more

As a marketing manager for a large chain of coffee houses, you are interested in testing the impact of advertising on consumer repurchase propensity; at this time, you are interested in estimating the relationship between repurchase (i.e., whether a customer repurchased a given product or not) and advertising exposure (i.e., whether a customer saw a particular ad or not); the most appropriate statistical technique to reach this goal is (write-in the name of the technique).

The negative impact of exposure to domestic violence

Discuss the negative impact of exposure to domestic violence on the developing child’s brain. How can adverse childhood experiences (ACEs) produce a life-long risk for poverty? In the child welfare case planning process, services are often substituted for needs. Why is this a problem? Provide examples illustrating the importance of matching services to the family’s needs.

Describe the importance of SLA monitoring to an organization using cloud computing models

Question 1 – Describe the importance of SLA monitoring to an organization using cloud computing models. Explain the technical details of SLA monitoring and how it works utilize the case study example under diagram Figure 8.7 in the text to fully detail your answer.

Question 2 – Describe the importance of SLA monitoring to an organization using cloud computing models. Explain the technical details of Load Balancing and how it works utilize the case study example under diagram Figure 8.5 in the text to fully detail your answer.

Question 3 – Describe the importance of automated scaling to an organization using cloud computing models. Explain the technical details of automated scaling and how it works utilize the case study example under diagram Figure 8.1 in the text to fully detail your answer.

Question 4 – Describe the

Explain the technical details of failover systems and how it works utilize the case study example under diagram Figure 8.22 in the text to fully detail your answer.