Résultats de la recherche - "Stephen King"
Suggestion de sujets dans votre recherche.
Suggestion de sujets dans votre recherche.
- Fiction 5
- Criticism and interpretation 4
- History and criticism 4
- Horror tales, American 3
- Abandonment of automobiles 2
- American fiction 2
- Brand name products 2
- Buick automobile 2
- Police 2
- Advertising 1
- American prose literature 1
- Authors, American 1
- Awards 1
- Branding (Marketing) 1
- Cell phones 1
- Death row inmates 1
- Dystopias 1
- Electronic commerce 1
- Gothic revival (Literature) 1
- History 1
- Horror tales 1
- Journalism 1
- Kings and rulers 1
- Maine 1
- Management 1
- Marketing research 1
- Murderers 1
- Naturalism in literature 1
- New products 1
- Prisons 1
-
1
Stephen King a critical companion /
Publié 1996An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
2
Revisiting Stephen King a critical companion /
Publié 2002An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
3
-
4
Stephen King on the small screen
Publié 2011An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
5
King Stephen
Publié 2010Sujets: “…Stephen, King of England, 1097?-1154.…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
6
Stephen King as a postmodern author
Publié 2012An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
The best American magazine writing.
Publié 2013An electronic book accessible through the World Wide Web; click to view
Électronique eBook -
17
Defending the brand aggressive strategies for protecting your brand in the online arena /
Publié 2004Table des matières: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
An electronic book accessible through the World Wide Web; click to view
Électronique eBook