Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 6 |
Retailing | 6 |
Internet | 3 |
Advertising | 2 |
Business | 2 |
Corporations | 2 |
Foreign Countries | 2 |
Information Security | 2 |
Access to Computers | 1 |
Audits (Verification) | 1 |
Banking | 1 |
More ▼ |
Source
Internet Research | 2 |
Alberta Education | 1 |
Chronicle of Higher Education | 1 |
Journal of Education for… | 1 |
ProQuest LLC | 1 |
Author
Chew, Daniel | 1 |
Gan, Fong Jek | 1 |
Jamaine Mungo | 1 |
Mah, Quee Yong | 1 |
Reid, Edna | 1 |
Rowley, Jennifer | 1 |
Soh, Christina | 1 |
Zhao, Jensen J. | 1 |
Zhao, Sherry Y. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Audience
Administrators | 2 |
Policymakers | 1 |
Practitioners | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jamaine Mungo – ProQuest LLC, 2022
The purpose of this generic qualitative inquiry research study is to examine the features that need to be improved in self-paced cybersecurity awareness training to educate retail employees to identify phishing attacks. Malicious phishing attacks are a significant threat to retail corporations' business operations and confidential data. Employees'…
Descriptors: Computer Security, Information Security, Training, Employees
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy

Rowley, Jennifer – Internet Research, 1996
Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)
Descriptors: Advertising, Business, Computer Security, Free Enterprise System

Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security
Chronicle of Higher Education, 2005
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 28, 2005 issue of "Chronicle for Higher Education" includes the following articles: (1) "Wasting Money: A Failed Fund-Raising Trip Makes a Development Officer…
Descriptors: Fund Raising, Educational Finance, Higher Education, Retailing