Skip to main content

Home/ Digiteen/ Group items tagged business

Rss Feed Group items tagged

Erin B

Electronic commerce - Wikipedia, the free encyclopedia - 0 views

  • Electronic Commerce, commonly known as (electronic marketing) e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.
  • Electronic commerce that is conducted between businesses is referred to as business-to-business or B2B.
  • Electronic commerce that is conducted between businesses and consumers, on the other hand, is referred to as business-to-consumer or B2C. This is the type of electronic commerce conducted by companies such as Amazon.com.
  •  
    a definition of e-commerce
Dru F

Technology's Language Barrier - Forbes.com - 0 views

  • Blunders like these can be costly. And as burgeoning markets in Asia increase in importance, new insight is required to break through what you could call a language barrier.As a result of the globalization of business through mergers and international investment, English has become a lingua franca. Almost two billion people worldwide speak it, and more than half of these learned it as a second language. Moreover, global popular culture is dominated by English-language television, music, film, print and social media.
  •  
    The language barrier can present problems in interactions when different languages are being used in business. "Blunders like these can be costly. And as burgeoning markets in Asia increase in importance, new insight is required to break through what you could call a language barrier. As a result of the globalization of business through mergers and international investment, English has become a lingua franca. Almost two billion people worldwide speak it, and more than half of these learned it as a second language. Moreover, global popular culture is dominated by English-language television, music, film, print and social media."
Haley M

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
Morgan G

Why is it important to be culturally aware when communicating in a diverse world? - Bus... - 0 views

  •  
    "The importance of intercultural awareness and communication has also becomes very important for internal management of organizations. We find that frequently large organizations across the world tend to employ people from many different cultures. This is quite well known for companies having different business units across the globe, and transferring employees across the globe to different countries. But this problem has also become also very important to organizations operating within confines of a single country. Thus we find that now US population consists of many different ethnic groups such as earliest American settlers, African Americans, Puerto Ricans, and so on."
Summer T

Protecting your information teenagers.ashx (application/pdf Object) - 0 views

  •  
    Personal information is disclosed to, and used responsibly by, many legitimate online businesses to conduct business and online social interactions. However, if not managed carefully, it is possible for personal information to be accessed and misused for marketing, identity theft or for cyberbullying or cyberstalking.
  •  
    Parents watch what your teens put online because other teens or older people could be stalking your child.
Erin B

Commerce on the Internet - Personalization - 0 views

  •  
    What companies may think of when the begin to customize their pages for shoppers. "Benefits of Personalization * Form lasting and loyal relationships with customers by profiling individualized content, information, offerings and services. As it has been stated many times before, it is more profitable and easier to sell to existing customers. * Learn more about customers--learn and understand the why and how they prefer to do business with your organization. This type of customer information is key to success in business today and into the future. * Web personalization coupled with tracking provides you with a powerful tool to monitor the performance of your Web site--what works, what doesn't. Personalization can help your find out what makes your audience "click."
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Maggie H

iPredators: Cyberbullying to cyber-harassing troll cop from hell - 1 views

  • Newsletter Subscriptions Newsletter Archives White Papers Webcasts Podcasts This Week In Print IT Jobs Community Slideshows New Data Center Solution Centers Aruba Networks Bring Your Own Device (BYOD) Aerohive Enterprise Networking Solution Center BMC Control-M Workload Automation CA Technologies Executive Resource Center CA Technologies Transform Your IT Strategy Dell 12th Generation PowerEdge Servers Solution Center HP + Microsoft Data Management Appliances & Architectures Network World Accelerating the Cloud Challenge Network World Data Center Challenge 2012 Network World Next Generation Firewall Challenge Network World Wi-Fi Challenge Riverbed Accelerate Business Performance Solution Center Silver Peak's Virtual WAN Optimization Center View all Solution Centers // Network World #nww_header ul.top_nav li.dropdown ul { display:none; } #nww_header ul.top_nav li.dropdown_active ul { background:url("http://www.networkworld.com/includes/styles/r08/img/more-back.gif") repeat-x scroll left top black; cursor:pointer !important; border:1px solid black; position:absolute; margin-top:20px; display:block; width:150px; left:0; } #nww_header ul.top_nav li.dropdown span { background-position:right center; background-repeat:no-repeat; cursor:default !important; padding:0 0 0 6px; color:#000000; height:20px; width:37px; } #nww_header ul.top_nav li ul li { background:none repeat scroll 0 0 transparent; margin-left:0; padding:0; } #nww_header ul.top_nav li.dropdown_active ul li a { background:url("http://www.networkworld.com/includes/styles/r08/img/more-sep.gif") no-repeat scroll left bottom transparent; cursor:pointer !important; text-decoration:none; padding-bottom:5px; padding-left:10px; line-height:11px; padding-top:3px; color:#EEEEEE; display:block; width:130px; } #nww_header ul.top_nav li.dropdown_active ul li.noBackground a { background:none; } #nww_header ul.top_nav li.dropdown_active ul li a:hover { background:url("http://www.networkworld.com/includes/styles/r08/img/more-hi.gif") repeat-x scroll left bottom transparent; padding-right:10px; width:129px; } function isMoreHovering() { $("#morepopupcontainer").bind("mouseleave", function() { $("#morepopupcontainer").hide(); }); $("#morepopupcontainer").show(); } $(document).ready(function() { $('.dropdown').hover( function () { $(this).addClass("dropdown_active"); }, function () { $(this).removeClass("dropdown_active"); } ); }); News Blogs & Columns &lpos=Nav:Ut
  • Back to Microsoft SubnetPrivacy and Security FanaticMs. Smith -- Select Microsoft Subnet Blog --Author expert: Microsoft Expression Web 3Brian Egler's SQL Server StrategiesEssential SharePointManaging MicrosoftMicrosoft Explorer Microsoft InsightsMicrosoft, Google and cloud tech newsMostly MicrosoftPrivacy and Security FanaticRated Critical: A Microsoft Security BlogSecrets of Windows Back Office ServersSQL Marklar The Best Microsoft VideosThe Social EnterpriseWatch Your Assets Previous Article iPredators: Cyberbullying to cyber-harassing troll cop from hellOctober is pegged to raise awareness about cyberbullying, cybersecurity and domestic violence, but an iPredator can play a part in all three. While getting help from the authorities is not always easy, what about when the cyber-creep doing the harassing and trolling is a cop? By Ms. Smith on Wed, 10/24/12 - 12:24pm. window.fbAsyncInit = function() { FB.init({ appId : '147094931979429', //NWW appId channelUrl : '//www.networkworld.com/community/sites/all/modules/nwmisc/channel.html', status : true, // check login status cookie : true, // enable cookies to allow the server to access the session xfbml : true // parse XFBML }); FB.Event.subscribe('edge.create', function(response) { if(typeof(OPG.Tracking.omniture_tl) != 'undefined') OPG.Tracking.omniture_tl('Social Click Complete', 'default'); }); }; (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/all.js#xfbml=1"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); 4 Comments Print document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); document.writeln(''); clas
  • When it comes to cyberbullying, there are thousands of articles online about the tragic suicide of 15-year-old Amanda Todd and how Anonymous may have unmasked the man who bullied her into sending pictures which he later posted online and sent to her friends. While the man responsible for tormenting the Canadian teenager was a creep and a bully, since an adult was involved then it technically wasn't cyberbullying, according to Stop cyberbullying.
  •  
    October is cybersecurity month and bullying prevention awareness month.
Sam V

Gale World History In Context - Document - 0 views

  • LOCAL corporate leaders, captains of industry and senior Government officials gathered in Windhoek on Wednesday to witness the launch of the country's UN Global Compact Network.
  • The newly launched business initiative is a global concept whereby companies integrate a number of social and environmental concerns into their business operations and in their interaction with their stakeholders on a voluntary basis, with the aim of advancing corporate social responsibility in the country.
  • Compact Network will generally facilitate access to business information, tools and technical inputs through its strong relations with other UN entities, development agencies and civil society.
  • ...3 more annotations...
  • Within the Namibian UN Global Compact Network, companies can choose their mode of engagement, which may be either collectively or individually", he explained.
  • Tim Parkhouse, said local participating companies would not only benefit from better public relations, but also from an increased understanding amongst their stakeholders of the private sector's potential as an agent for sustainable development.
    • Sam V
       
      Again with this one, I'm not sure if it entirely fits our topic, but I'm pretty sure the main idea does fit. If others in the group don't agree, we don't have to use it.
  •  
    This document talks about how the Namibian UN Global Compact Network can change the way companies interact with stakeholders and how they interact with each other.
Dylon Smith

The Practice Of Effective Communication In Business Etiquette - College Essays - Tgstone - 0 views

  • The Practice of Effective Communication in Business Etiquette Including Nonverbal and Verbal Communication Timothy Stone # L22751253 Liberty University Abstract This essay discusses the importance of effective communication in business, and the attributes that help build or tear down the communication process.   This essay begins with discussing the role of non-verbal communication plays in presenting a professional image.   The essay goes on to describe in detail, different kinds of non-verbal communication.   Next the essay explains the limits of non-verbal communication, and compares the differences and notable contrasts between verbal and non-verbal communication.   The role of verbal communication is described, along with different ways that different kinds of verbal communication is interpreted.   Finally, this essay describes how verbal communication must be modified for different people, since difference groups will respond differently to the
Brandon P

How to stay safe online while traveling - San Jose Mercury News - 0 views

  •  
    "Taking a trip with always-on digital devices can be like traveling with your safe -- and forgetting to lock it. Connecting to the Internet over Wi-Fi hotspots in airports, hotels and cafes is an irresistible activity for business and casual travelers. But sending sensitive information over the air on an unsecured network is risky computing behavior, said Kelly Davis-Felner, marketing director for the Wi-Fi Alliance, a global nonprofit industry association." People have to be careful when traveling to places and using unsecured internet.
Vicki Davis

Internet addiction is real and you're probably experiencing it right now | Techi.com - 0 views

  •  
    This is a must read post with eye popping, shock inducing graphics that may let you see the Internet as never before. Cyber loafing costing businesses millions? 24% of people MISS real life events in order to share them with others who aren't there? People dying from gaming addiction? It just asks questions, but if you talk about digital citizenship, these are graphics you must share and discuss. Take time to read this article, it is important.
Dru F

Avoiding Conflict Online - 0 views

  • Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction!
  •  
    When talking back and forth via email, or instant messages one must be careful not to cross any lines that would make anyone misunderstand what was meant. "Diverse opinions are critical to constructive dialog. Diversity enriches a group. But there is a line between constructive critical thinking and behavior which demeans individuals and potentially destroys communities. It is a fine line with no obvious answer for a facilitator. The goal of this piece is to think about how to support diverse and divergent thinking while reducing the likelihood of personal conflict and group destruction. And this conflict often arises due to misunderstanding. So it is about conflict beteen people, not between ideas. This is an important distinction! Before we discuss how to avoid online conflict, there are five key attributes of online communication to take into consideration: Lack of physical communication cues - We cannot see or hear the huge range of non-verbal cues we use during the course of conversation to discern if our audience is understanding, agreeing, disagreeing, getting uncomfortable or opening up. In cyberspace, we must explicitly ask for this information. Potential impersonality of the medium (distance) - Sometimes, when communicating online people may lose some of their inhibitions and say things they would not say offline. Social norms are less clear and more open to individual interpretation. Setting norms that we agree to use together can control this loss of inhibition. Asynchronicity affects the way we experience and feel about messages - When you have time to think about your response, you may be more thoughtful or you may let issues build up and get blown out of proportion. In online interactions, each of us may interpret periods of silence very differently. These subtle, unspoken issues can cloud communication. Public vs. private spaces and perceptions - People have different tolerances of what they think should be "public" or "private." T
Maggie B

Internet Security Tips - 0 views

  •  
    All users of business and home computers should be aware of a few basic security precautions. A lack of safe internet usage could result in untold losses for a small business. Basic security practices include the following: 1)Never open attachments except from trusted sources, and only when you are expecting one.
Emma S

Supreme Court Hears Arguments in Foreign-Copyright Case - WSJ.com - 0 views

  •  
    Another article on a recent case in Washington about digital copyright internationally. It goes into some detail on some of the issues regarding the music business and the copyright issues regarding international artists. 
Katie S

Doing Business in Japan - 0 views

  •  
    This is about how to act when you are working in Japan. It is about how you should approach them and what is respectful to their culture and what isn't. 
Peter J

Culture and Internet Consumption: Contributions from Cross-Cultural Marketing and Adver... - 1 views

  •  
    This is about cultural awarness for businesses, but it does have some important points. It describes how the "products" on the web should be "cross cultural". This also applies to how an individual should present themselves online.
Vicki Davis

danah boyd | apophenia » Born This Way Foundation: guided by research - 0 views

  •  
    Five research papers about bullying and bullying prevention programs authored by some of the best in the business. This is in support of Lady Gaga's new "research based" foundation to promote grassroots student action to help students improve relations to each other.
Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Vicki Davis

An Update to the Children's Internet Protection Act (CIPA) « Thumann Resources - 0 views

  •  
    New rules from the CIPA act in the US.
  •  
    Lisa thuman blogged about the recent changes to the Children Internet Protection Act (CIPA) -- to those people who have rejected social networking and chats -- you're required to "educate minors on appropriate online safety including cyberbulling and interacting with others on social networking sites and in chat rooms." How are you going to do this without using safe alternatives and then coach them on it? This is REQUIRED in the US if you get erate funds. Get out there and get busy -- time for pushback. Lisa Thuman's article on this is an excellent read.
1 - 20 of 70 Next › Last »
Showing 20 items per page