Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 4 |
Information Technology | 4 |
Marketing | 4 |
Internet | 3 |
Computer Mediated… | 2 |
Computers | 2 |
Access to Information | 1 |
Advertising | 1 |
Articulation (Education) | 1 |
Associate Degrees | 1 |
Banking | 1 |
More ▼ |
Author
Chew, Daniel | 1 |
Gan, Fong Jek | 1 |
Mah, Quee Yong | 1 |
Nixon, Andrea | 1 |
Reid, Edna | 1 |
Soh, Christina | 1 |
Wakabayashi, Ippei | 1 |
Publication Type
Journal Articles | 3 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Reference Materials - General | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Practitioners | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating

Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security
Wakabayashi, Ippei – Educom Review, 1997
Discusses social and cultural challenges that Internet technology raises. Highlights include preserving the freedom in cyberspace, the information distribution scheme of the Internet, two-way interactivity, search engines as marketing tools, the insecurity of cyberspace, online safety rules for children, educating children to "walk…
Descriptors: Access to Information, Child Safety, Computer Mediated Communication, Computer Security
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Ohio State Univ., Columbus. Tech Prep Curriculum Services. – 2000
This profile provides the curricular framework for Ohio Tech Prep programs in e-commerce marketing beginning in high school and continuing through the end of the associate degree. It includes a comprehensive set of e-commerce marketing competencies that reflect job opportunities and skills required for e-commerce marketing professionals today and…
Descriptors: Articulation (Education), Associate Degrees, Business Administration, Business Communication