digital technologies, permits anyone with these tools at their disposal to easily make a potentially unlimited number of copies ofcontent without any degradation in quality andto distribute a single copy to an unlimited number of users. As a result, unprotected digital contentis extremely vulnerable totheft, unauthorized access, and propagation. The availability of multiple perfect copies of
And Apple, of course, developed and owns the software. Further, given the barriers to entry outlined above, Apple has little to worry about forward integration from its suppliers. So, in this sense, Apple is not beholden tothe whims of powerful suppliers.
3. Consumer Power
The buyers ofthe iPhone are somewhat more powerful, however. Broadly speaking, the consumers as a group can be regarded
and other information customers may need to know.
■ Examples of Violating Rules
1) A leakage of IT technology
- Recruitment of key person
It isoften called as a scout andthe simple way to get rival's information by hiring the executives of rival's company. For example, In 2002, 30~50 persons belonged to Hynix moved into other countries such as China and Taiwan.
- computer hacking
to be stolen than paper book
(3) DRM
- Definition
: Digital rights management (DRM) is a generic term
that refers to access control technologies.
- Problem situation
e.g., Sony’s e-reader
Primary factor of growth acceleration
1. 55 millions of Amazon’s members
2. e-book’s very cheap price
3. The power of lowering price
4. E
contents provider and service provider. At first, solution provider means a business proprietor who invents builds, processes, and distributes everything or part ofinformation system which is related with the education to make E-learning. Second, a contents provider is a business proprietor who develops, produces, manufactures and distributes information and documents in multimedia form. For the