SEARCH RESULTS

YOU WERE LOOKING FOR :Past Research Methods for Examining Internet Purchases

Essays 1141 - 1170

Auctions and the Internet

million worth of merchandise on the average each day; Yahoo! Auction which moves about $500,000 and Amazon.com auction, which move...

Internet Effects on the Contemporary World

In five pages this paper examines the contemporary social effects generated by the Internet with such issues as the law, data usag...

Internet Banking and Ecommerce Development; Bank One and Wingspan Merger

In six pages this paper examines the Bank One and Wingspan merger in terms of background and also considers how Internet banking a...

Programs of University and Online Distance Learning

Japan were incorporating their own variations into their respective educational curriculums (Matthews, 1999). By the early twenti...

Internet Security and Recent Developments

in thinking in network administrators. Systems need protection and this may include investigation of employees, changing passwords...

Overview of Global Higher Education

Altbach (2002) also reflects the views of a number of other theorists, who argue that there is an imperative for the globalization...

Internet and the US Supreme Court

and useful information about the Supreme Court, and how it is both dealing with and using the Internet. Recent Court Cases ...

US Public Schools and Prayer

or discourage prayer, or participate in such activities with students" (Uncle Sams Prayer Stick, 2003, p. 38). At what appeared to...

Teens and Addiction to the Internet

these teens the freedom and boosts to self-esteem that may not be afforded them in the real world. In these communities they are a...

Computer System Security Types

all security problems, encryption and the use of a firewall, as well as other solutions are often utilized. However, when discerni...

Internet Marketing

a result of ARPANET (Maitra, 1982). The interest in trading electronically was encouraged by announcements of proprietary netwo...

The Internet Law of Australia

included in Schedule 2 of the Communications Legislation Amendment Bill 2002,: "exempt entire documents (that...

Technology and Internet Banking

as the use of passwords have not been sufficient to discourage the hackers. The development of SSL protocols helped increase secur...

Personal Jurisdiction Issues and Internet Business Websites

Where jurisdiction is concerned, the courts generally rule one of two ways. First, there is the general jurisdiction which holds p...

TradeCard B2B eCommerce Case Study

means of getting traders and trade services providers to sign on and become YradeCard members? How could TradeCard change the mind...

A Covisint Overview

in efficiencies for the whole industry (2002). Indeed, this company that is comprised of other successful organizations is likely ...

Egypt and Media Accessibility

In five pages this paper examines Egypt in a consideration of the media's role with print, TV, radio, and the Internet each discus...

Technological Determinism

of those who pursue technological determinism in its most extreme form believe that society is determined by technology -- that ne...

eCommerce Experiences

US$87.4 billion, with a global total at this time being US$657 billion in revenues (Hobley, 2001). By the year 2002 the consumer s...

Internet and Competitive Advantage

same product at a range of supplier. When this level of competition is seen and the consumer is becoming more aware, then there is...

Internet Marketing of New and Used Automotive Parts

all has been that of the computer. In more recent times, the computer has moved from the restriction of industry well into the ma...

Benefits of Employment Recruiting on the Internet

option to use a headhunter, as this organizes the effort and streamlines the process. For example, a company that seeks to hire a...

Definition and Examples of Virtual Communities

formation of a virtual community may occur in many environments and as a result of many different pull factors, from entertainmen...

Bruce D. Nordwall's Article 'The Use of IP and PKI in Avionics'

for avionics networks (Nordwall, 2003). IP security appears to allow a high degree of control, but this alone is not sufficient. T...

Internet Addiction Disorder

addiction, including salience, mood modification, tolerance, withdrawal, conflict and relapse" (Griffiths, 2001, p. 333). Intern...

Advertising and the Internet

to promote a product to capture the most return on the advertising dollar. In "Guerrilla Marketing: Secrets for Making Big Profit...

Overview of VoIP Technology

traditional telephone companies (VoIP). The development of this market has a umber of supplier, such as VocalTec, 3Com, Cisco, a...

Electronic Data Transfer Evolution Through the Internet

In ten pages this paper examines how EDI has evolved as a result of the Internet and considers the future of business computer net...

Internet and Privacy Issues

In ten pages this paper examines the Internet and the recent concerns over privacy issues. Fifteen sources are cited in the bibli...

Human Resource Management Technologies

In five pages this paper discusses the technological impacts of computerized databases and the Internet on HRM with the 8 criteria...