9,075
edits
Drew Jackson (talk | contribs) |
Drew Jackson (talk | contribs) |
||
Line 26: | Line 26: | ||
*'''mediator:''' A mediator is a neutral <span class="noglossary">third party</span> who assists people involved in a disagreement to resolve their differences. | *'''mediator:''' A mediator is a neutral <span class="noglossary">third party</span> who assists people involved in a disagreement to resolve their differences. | ||
*'''mystery shoppers:''' Mystery shopping or a mystery consumer is a tool used externally by market research companies, watchdog organizations, or internally by companies themselves to measure quality of service, compliance with regulation, or to gather specific information about products and services. The establishment being evaluated does not usually know the mystery consumer's identity and purpose. Mystery shoppers perform | *'''mystery shoppers:''' Mystery shopping or a mystery consumer is a tool used externally by market research companies, watchdog organizations, or internally by companies themselves to measure quality of service, compliance with regulation, or to gather specific information about products and services. The establishment being evaluated does not usually know the mystery consumer's identity and purpose. Mystery shoppers perform tasks such as purchasing a product, asking questions, registering complaints or behaving in a certain way, and then provide detailed reports or feedback about their experiences. | ||
*'''phishing:''' The word phishing comes from the analogy that Internet scammers are using emails to “fish” Internet users’ personal information. Also called "brand spoofing" is the creation of email messages and web pages that are replicas of existing legitimate sites and businesses. These websites and emails are used to trick users into submitting personal, financial, or password data. The emails often ask for information such as credit card numbers, bank <span class="noglossary">account</span> information, social insurance numbers, and passwords that <span class="noglossary">will</span> be used to commit fraud. | *'''phishing:''' The word phishing comes from the analogy that Internet scammers are using emails to “fish” Internet users’ personal information. Also called "brand spoofing" is the creation of email messages and web pages that are replicas of existing legitimate sites and businesses. These websites and emails are used to trick users into submitting personal, financial, or password data. The emails often ask for information such as credit card numbers, bank <span class="noglossary">account</span> information, social insurance numbers, and passwords that <span class="noglossary">will</span> be used to commit fraud. | ||
*'''pyramid scheme:''' | *'''pyramid scheme:''' Pyramid schemes are frauds that are based on recruiting an ever-increasing number of investors. The initial promoters (those at the peak of the pyramid) recruit investors expected to bring in more investors, who may or may not sell products or distributorships. Recruiting newcomers is more important than selling products. | ||
*'''scam:''' ''(Name)'' A trick or a fraud. ''(Verb)'' Action of obtaining something in a manner not considered ethical or proper. | *'''scam:''' ''(Name)'' A trick or a fraud. ''(Verb)'' Action of obtaining something in a manner not considered ethical or proper. |
edits