Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 9 |
Internet | 9 |
Marketing | 9 |
Access to Information | 3 |
Advertising | 3 |
Information Technology | 3 |
Business | 2 |
Child Safety | 2 |
Computer Mediated… | 2 |
Information Services | 2 |
Online Vendors | 2 |
More ▼ |
Source
Internet Research | 2 |
Educom Review | 1 |
International Journal of… | 1 |
Journal of International… | 1 |
School Libraries in Canada | 1 |
Telecommunications | 1 |
Author
Aldridge, Alicia | 1 |
Chew, Daniel | 1 |
Collet, Robert | 1 |
Forcht, Karen | 1 |
Gan, Fong Jek | 1 |
Kervin, Melissa | 1 |
Lewis, Morgan V. | 1 |
Mah, Quee Yong | 1 |
McMullan, John L. | 1 |
Nkotagu, Gabriel Hudson | 1 |
Pierson, Joan | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 4 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Guides - Non-Classroom | 1 |
Reference Materials - General | 1 |
Education Level
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
McMullan, John L.; Kervin, Melissa – International Journal of Mental Health and Addiction, 2012
This study examines the web design and engineering, advertising and marketing, and pedagogical features present at a random sample of 71 international poker sites obtained from the Casino City directory in the summer of 2009. We coded for 22 variables related to access, appeal, player protection, customer services, on-site security, use of images,…
Descriptors: Addictive Behavior, Familiarity, Advertising, Internet
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing

Aldridge, Alicia; Forcht, Karen; Pierson, Joan – Internet Research, 1997
To cultivate an online market share, companies must design marketing strategies specifically for the Internet. This article examines the nature of business on the Internet, highlighting demographics, user control, accessibility, communication, authenticity, competition, and security and proposes a marketing strategy, including targeting and…
Descriptors: Access to Information, Advertising, Business, Competition

School Libraries in Canada, 2000
Presents a teaching unit from the Media Awareness Network Web site that introduces students (grades six through nine) to ways in which commercial Web sites collect personal information from children and issues surrounding children and privacy on the Internet. Highlights: objective; learning outcomes; preparation and materials; the lesson; guided…
Descriptors: Child Safety, Children, Class Activities, Computer Security
Collet, Robert – Telecommunications, 1998
Argues that the Internet can continue its explosive growth only if it is carefully, constantly, and thoughtfully administered. Discusses the role of ISPs (Internet Service Providers); the need to respond to the market force; making the transition from the federal to the commercial level; funding; the domain name server; security; and challenges to…
Descriptors: Computer Security, Financial Support, Futures (of Society), Government (Administrative Body)

Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security
Wakabayashi, Ippei – Educom Review, 1997
Discusses social and cultural challenges that Internet technology raises. Highlights include preserving the freedom in cyberspace, the information distribution scheme of the Internet, two-way interactivity, search engines as marketing tools, the insecurity of cyberspace, online safety rules for children, educating children to "walk…
Descriptors: Access to Information, Child Safety, Computer Mediated Communication, Computer Security
Lewis, Morgan V. – 2003
Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…
Descriptors: Access to Computers, Access to Information, Adult Education, Adult Students
Ohio State Univ., Columbus. Tech Prep Curriculum Services. – 2000
This profile provides the curricular framework for Ohio Tech Prep programs in e-commerce marketing beginning in high school and continuing through the end of the associate degree. It includes a comprehensive set of e-commerce marketing competencies that reflect job opportunities and skills required for e-commerce marketing professionals today and…
Descriptors: Articulation (Education), Associate Degrees, Business Administration, Business Communication