NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Arikli, Güven – Turkish Online Journal of Educational Technology - TOJET, 2023
Real-life threats are at the root of all possible threats to be encountered on the Internet. All risk headings for the Internet are situations that can be encountered in real life. Therefore, we should pay attention to the risks of the virtual world by learning to use the internet consciously, safely and effectively, and by teaching our children…
Descriptors: Internet, Computer Use, Child Safety, Family Role
Peer reviewed Peer reviewed
Direct linkDirect link
McMullan, John L.; Kervin, Melissa – International Journal of Mental Health and Addiction, 2012
This study examines the web design and engineering, advertising and marketing, and pedagogical features present at a random sample of 71 international poker sites obtained from the Casino City directory in the summer of 2009. We coded for 22 variables related to access, appeal, player protection, customer services, on-site security, use of images,…
Descriptors: Addictive Behavior, Familiarity, Advertising, Internet
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Goldsborough, Reid – Black Issues in Higher Education, 2004
"Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…
Descriptors: Computer Security, Computers, Fear, Computer Security
Peer reviewed Peer reviewed
Rowley, Jennifer – Internet Research, 1996
Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)
Descriptors: Advertising, Business, Computer Security, Free Enterprise System
Peer reviewed Peer reviewed
Aldridge, Alicia; Forcht, Karen; Pierson, Joan – Internet Research, 1997
To cultivate an online market share, companies must design marketing strategies specifically for the Internet. This article examines the nature of business on the Internet, highlighting demographics, user control, accessibility, communication, authenticity, competition, and security and proposes a marketing strategy, including targeting and…
Descriptors: Access to Information, Advertising, Business, Competition
Peer reviewed Peer reviewed
Walker, Becki – CD-ROM Professional, 1995
Describes three companies' approaches to marketing and selling CD-ROM products on the World Wide Web. Benefits include low overhead for Internet-based sales, allowance for creativity, and ability to let customers preview products online. Discusses advertising, information delivery, content, information services, and security. (AEF)
Descriptors: Advertising, Comparative Analysis, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security