Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Marketing | 5 |
Risk | 3 |
Internet | 2 |
Program Effectiveness | 2 |
Web Sites | 2 |
Addictive Behavior | 1 |
Adult Education | 1 |
Advertising | 1 |
Biology | 1 |
Coding | 1 |
More ▼ |
Source
British Columbia Council on… | 1 |
EDUCAUSE Quarterly | 1 |
International Journal of… | 1 |
Journal of International… | 1 |
ProQuest LLC | 1 |
Author
Atkinson, Al | 1 |
Kervin, Melissa | 1 |
Kim, Jungsun | 1 |
McMullan, John L. | 1 |
Nixon, Andrea | 1 |
Nkotagu, Gabriel Hudson | 1 |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 1 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Adult Education | 1 |
Audience
Location
Canada | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
McMullan, John L.; Kervin, Melissa – International Journal of Mental Health and Addiction, 2012
This study examines the web design and engineering, advertising and marketing, and pedagogical features present at a random sample of 71 international poker sites obtained from the Casino City directory in the summer of 2009. We coded for 22 variables related to access, appeal, player protection, customer services, on-site security, use of images,…
Descriptors: Addictive Behavior, Familiarity, Advertising, Internet
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing
Kim, Jungsun – ProQuest LLC, 2009
Hoteliers have installed new technology, such as self-service and wireless technology, to improve customer service or to increase revenue. However, it seems that they tend to either be unaware of or ignore potential vulnerability of their systems when they add more technologies. The underestimated risks can possibly result in massive losses for…
Descriptors: Hospitality Occupations, Intention, Risk, Program Effectiveness
Atkinson, Al – British Columbia Council on Admissions and Transfer, 2009
The Education Planner website provides a searchable database of approximately 1,700 undergraduate post-secondary programs in British Columbia (BC). It is intended as a "one-start entry point" for students looking for post-secondary options. This independent review of Education Planner was undertaken to determine its overall…
Descriptors: Web Sites, Postsecondary Education, Undergraduate Study, Databases
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers