tag:blogger.com,1999:blog-70766716587052568342024-03-13T05:55:36.775-07:00Let Us Lead You To The World of E-CommercePIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-7076671658705256834.post-27299979163380174142009-07-09T05:58:00.001-07:002009-07-12T00:38:09.005-07:00A review on post on Legal from My E-Commerce blog<div align="justify"><span style="font-family:times new roman;font-size:130%;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://orangmelayu.com/melayu/wp-content/uploads/2007/12/kantol.jpg"><img style="MARGIN: 0pt 10px 10px 0pt; WIDTH: 400px; FLOAT: left; HEIGHT: 313px; CURSOR: pointer" border="0" alt="" src="http://orangmelayu.com/melayu/wp-content/uploads/2007/12/kantol.jpg" /></a></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /><br /><br /><br /><br /><br /></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /><br /><br /><br /><br /><br /><br /><br /><br /></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">According to </span></span><a href="http://ecommerze.blogspot.com/search/label/Legal"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://ecommerze.blogspot.com/search/label/Legal</span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">, i am reviewing the post if "UK to get tough with illegal downloader". I notice that many people are like to download everything online either legally or illegally such as songs, movies, articles and journals, picures and so on. However, UK government is trying to against illegal downloaders by coming out a new law that can be cut off their internet connection. In UK, there are estimated around 6 million people are downloading files illegally. These illegal downloading of music and film are costing the industry to lose million of pounds in revenue every year. The contents of the new proposed law such as detail of customers suspected in illegal downloading can be made available to the courts. </span></span></span></div><div style="TEXT-ALIGN: left;font-family:arial;" align="justify"><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">In my opinion. Internet is the virtual world that we can perform many things through online but not everything is right to do. We don’t have any law specifically against the illegal downloaders. However, a new law been built in UK government is to be fairness, protect human being and copyright of the industry. The new law may reduce number of illegal downloaders and pirated material. Even the new law works, there still have the problem. It may not be eliminated as there are many ways to cover up the crime. The people like university students are willing to take risk to download the copyright materials because they are no need to spend a lot of money to buy th original copy for the materials.</span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></div><div style="TEXT-ALIGN: justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">The </span></span><span style="COLOR: rgb(255,0,0)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Recording Industry Association of America (RIAA)</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> is a group which represent the recording industry distributors in the United States. The goal are:</span></span></span></span></div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://upload.wikimedia.org/wikipedia/en/8/88/RIAA_logo.png"><span><img style="TEXT-ALIGN: justify; MARGIN: 0pt 0pt 10px 10px; WIDTH: 100px; FLOAT: right; HEIGHT: 100px; CURSOR: pointer" border="0" alt="" src="http://upload.wikimedia.org/wikipedia/en/8/88/RIAA_logo.png" /></span></a><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></div><ul><li><div style="TEXT-ALIGN: justify;font-family:arial;" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">To protect intellectual property rights worldwide and the Firse Amendment Rights of artists;</span></span></div></li><li><div style="TEXT-ALIGN: justify;font-family:arial;" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">To perform research about the music industry;</span></span></div></li><li><div style="TEXT-ALIGN: justify;font-family:arial;" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">To monitor and review relevant laws, regualtions and policies.</span></span></div></li></ul><p style="TEXT-ALIGN: left;font-family:arial;" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></p><p align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><o:smarttagtype name="country-region" namespaceuri="urn:schemas-microsoft-com:office:smarttags"></o:smarttagtype></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><o:smarttagtype name="place" namespaceuri="urn:schemas-microsoft-com:office:smarttags"></o:smarttagtype></span></span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">According to ariticle form New University website, the best way to prevent a violation of copyright laws is by educating students about using peer-to-peer software programs correctly.The latest movement by the </span></span></span><span style="COLOR: rgb(0,0,0)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">RIAA</span></span></span><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> has sparked renewed concerns by UCI's (University of California, Irvine) Networking and Academic Computing Services over students' understanding of what is and isn't legal to download. Many students on campus as regular users of peer-to-peer file sharing programs, UCI has to remind its students about the issue of copyright protection.<br /><br />Beside, the new approach is RIAA cooperate with individual Internet service providers. RIAA will ask ISP such as Verizon, Comcast, AOL or universities to issue warnings to their customers who are suspected of illegally downloading files to which they do not own the copyright. Warnings range from slower Internet service to verbal or e-mail warnings.<br /><br />Lastly, there is no free lunch in reality; we must pay before we get anything. So, we need support the original copy of material and avoid download illegally and pirated materials.</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /><br />Reference:<br /></span></span></span></p><ul face="times new roman"><li style="TEXT-ALIGN: justify"><a href="http://news.bbc.co.uk/2/hi/business/7240234.stm"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://news.bbc.co.uk/2/hi/business/7240234.stm</span></span></a></li><li style="TEXT-ALIGN: justify"><a href="http://en.wikipedia.org/wiki/Recording_Industry_Association_of_America"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://en.wikipedia.org/wiki/Recording_Industry_Association_of_America</span></span></a></li><li style="TEXT-ALIGN: justify"><a href="http://www.collegiatetimes.com/stories/12798"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://www.collegiatetimes.com/stories/12798</span></span></a></li><li style="TEXT-ALIGN: justify"><a href="http://www.newu.uci.edu/main/article?slug=uci_takes_action_against120"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://www.newu.uci.edu/main/article?slug=uci_takes_action_against120</span></span></a><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><br /><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style></span></li></ul>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0tag:blogger.com,1999:blog-7076671658705256834.post-48853105769214747422009-07-07T08:48:00.000-07:002009-07-31T05:11:05.433-07:00E-Government in Malaysia: Its Implementation so far and citizen's Adoption Strategies<div style="text-align: justify;" align="justify"><span style="font-family:times new roman;"><span class="Apple-style-span" style="font-size:130%;">E-Government, a short form for electronic government, can also know as e-gov, digital government, and online government. In nowadays, the popularity forevery household that owns a computer or laptop has been increase significantly. Range or age for internet users is no longer limit for working group or adults.Even a 9 years old kid also knows how to use internet network. Due to the advance and improvement ofinternet network, our livingstyle started to change into the world of internet. With just one click one hand, we are able perform a lot of tasks by just staying in home. </span></span></div><p align="justify"><span style=";font-family:Times New Roman;font-size:130%;" >The function of E-Government is to provide government services to citizens so that they can access and get the latest government information and issues. E-Government not only the spectrum of government operations, it also includes citizen-government,business-government, and government-government transactions.</span></p><p><span style="font-family:times new roman;"><span class="Apple-style-span" style="font-size:130%;"><img src="http://2.bp.blogspot.com/_87mczwseoR8/SldhlroGgzI/AAAAAAAAAOM/o0eTSvcAg70/s400/New%2BPicture%2B%283%29.png" /></span></span></p><p><span style="font-family:times new roman;"><span class="Apple-style-span" style="font-size:130%;">Since the initiation of Multimedia Super Corridor (MSC), Malaysian government started the implementation of E-Government. Multimedia Super Corridor is Malaysia's most exciting initiative for the global information and communication techonology (ICT) industry. So far, E-Government in Malaysia was implementing few projects, the projects are as follow:</span></span></p><p><o:p><b><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="color: rgb(51, 51, 255);"></span></span></span></b><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >Generic Office Environment (GOE)</span></span></span></b><span class="Apple-style-span"></span></o:p></p><p class="MsoNormal" align="justify"><o:p><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >Introduce a fully integrated, distributed and scalable office environment that leverages use of multimedia information technology. This project will lead to a efficient communication and make sure right information will deliver at right place, right people, and a right time, There will be three phases which are Pilot Phase, Operational Phase and Rollout Phase.</span></span></o:p></p><p class="MsoNormal" style="text-align: justify;"><o:p><b><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="color: rgb(51, 51, 255);"></span></span></span></b><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >Electronic Procurement (eP) Project</span></span></span></b><span class="Apple-style-span"></span></o:p></p><p class="MsoNormal" align="justify"><o:p><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >The aim is to re-engineer, automate, and transform current procurement system. This implementation will help in time and money savings while encourage suppliers to go for electronic systems. This eP project had introduced the </span></span><a href="http://www.eperolehan.com.my/"><span class="Apple-style-span"><span class="Apple-style-span"><span class="Apple-style-span" style="color: rgb(51, 51, 255);font-family:times new roman;font-size:130%;" >www.eperolehan.com.my</span></span></span></a><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >, suppliers can access to the website to obtain tender documents and submit bids through internet. For those conservative suppliers that worry about security issues, the system was equipped with smartcards in order for them to transact with the ePerolehan system. In addition, suppliers also can present their products, receive, manage and process purchase orders, and receive payment from government agencies through ePerolehan.</span></span></o:p></p><p class="MsoNormal" style="text-align: justify;"><o:p><span style="font-family:times new roman;"><span style="font-size:130%;"><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span">Human Resource Management Information System (HRMIS)</span></span></b><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"> </span></span><span class="Apple-style-span"></span></span></span></o:p></p><p class="MsoNormal" align="justify"><o:p><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >One of the E-Government projects that provide single interface for government employees to perform human resource functions effectively and efficiently. Besides, all human resource processes for federal, state, statutory body, and local authority services will be standardize and improve. This project by government is support by the Public Service Department (PSD).</span></span></o:p></p><p class="MsoNormal" style="text-align: justify;"><o:p><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >Project Monitoring System (PMS)</span></span></span></b></o:p></p><p class="MsoNormal" align="justify"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >This project objective is to create a mechanism to monitor project implementation throughout various government agencies and statutory bodies. PMS also offer stage so that can exchange ideas and make best practices models as an illustration in information management and communication services. There will be three services under PMS, which are Application Services, Data Services, and Communication Services.</span></span></p><p class="MsoNormal" style="text-align: justify;"><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >Electronic Services Directory (eServices)</span></span></span></b></p><p class="MsoNormal" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="Apple-style-span">The coming project under Electronic Services Directory will be Electronic Services Delivery. The success of implementation of this project will bring benefits to citizens. As citizens of Malaysia will able to engage in transactions with government and utilities payments such as telephone and electricity bill, police summons, Road and Transport Department (RTD) service and others. Citizens of </span><st1:country-region st="on"><st1:place st="on"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">Malaysia</span></span></st1:place></st1:country-region><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"> can use the eServices by access to the Internet and kiosk machines. Under the eServices project, it will break down to three phases which are utility bill payment services, opportunity to extend the rollout, and lastly the development of vehicle registration and licensing which is currently still in progress.</span></span></span></span></p><p class="MsoNormal" align="justify"><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >Electronic Labor Exchange (ELX)</span></span></span></b><span class="Apple-style-span"></span></p><p class="MsoNormal" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="Apple-style-span">The aim of this project is to improve the mobilization of human resources and optimize work force utilization through systematic matching of job seekers to job vacancies. This will further reduce the unemployment rate and boost up the economy in </span><st1:country-region st="on"><st1:place st="on"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">Malaysia</span></span></st1:place></st1:country-region><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">.</span></span></span></span></p><p class="MsoNormal" style="text-align: justify;"><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >E-Syariah</span></span></span></b><span class="Apple-style-span"></span></p><p class="MsoNormal" align="justify"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >To improve the quality of service in Syariah courts. The purpose is to enhance the Islamic Affairs Department to maintain a better monitoring and co-ordination of its 102 Syariah courts. The applications that available are such as Syariah Court Case Management System, Office Automation System, E-Syariah Portal, Syarie Lawyers Registration System and Library Management System.</span></span></p><p class="MsoNormal"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_87mczwseoR8/SldiRO_JRGI/AAAAAAAAAOc/jm5hVIjSs_M/s1600-h/MalaysiaGov.jpg"><span style=";font-family:times new roman;font-size:130%;" ><img id="BLOGGER_PHOTO_ID_5356858330000737378" style="margin: 0px auto 10px; display: block; width: 400px; cursor: pointer; height: 284px; text-align: justify;" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SldiRO_JRGI/AAAAAAAAAOc/jm5hVIjSs_M/s400/MalaysiaGov.jpg" border="0" /></span></a></p><p class="MsoNormal" style="text-align: justify;"><b><span class="Apple-style-span" style="color: rgb(255, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >Citizen's Adoption Strategies:</span></span></span></b></p><p class="MsoNormal" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span"><span class="Apple-style-span">Government has plan to improve the quality in order to provide </span><st1:country-region st="on"><st1:place st="on"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">Malaysia</span></span></st1:place></st1:country-region><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">’s citizens the better services.</span></span></span><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"> </span></span><span class="apple-style-span"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">Followings are the challenges faced by government:</span></span></span></span></span></p><p class="MsoNormal" style="margin-bottom: 12pt;" align="justify"><span class="apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;"><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span">Customer Satisfaction</span></span></b><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"> - </span></span><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">A higher level of customer satisfaction will increase the rate of e-Government adoption. Satisfaction can be measured in term of quality and quantity and information availability.</span></span><span class="Apple-style-span"></span></span></span></span></p><p class="MsoNormal" style="margin-bottom: 12pt;" align="justify"><span class="apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;"><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span">Services quality</span></span></b><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"> </span></span><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">-</span></span><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"> </span></span><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">Higher quality of service will lead to higher levels of customer satisfaction and thus can increase the use of e-government services. Quality refers to content provided, speed of the response to the citizens concerns with problem solving approach as well as the availability of names.</span></span></span></span></span></p><p class="MsoNormal" align="justify"><strong><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="Apple-style-span" style="font-weight: normal;"><b><span class="Apple-style-span" style="color: rgb(51, 51, 255);"><span class="Apple-style-span">Website design</span></span></b><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"> - </span></span></span><span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;">Webpage design must be user friendly. Personalization of websites, customization of product offerings, and self-care are the three key features that could be used not only to build relationship with the visitors, but also to enhance their experience.</span></span></span></span></span></strong></p><p class="MsoNormal" align="justify"><o:p><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" ></span></o:p></p><p class="MsoNormal" align="justify"><o:p><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >References:</span></span><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"><a href="http://www.google.com.my/search?hl=en&cr=countryMY&defl=en&q=define:E-Government&ei=6hpXSujBFI_IsQOW5530AQ&sa=X&oi=glossary_definition&ct=title"></a></span></span></span></o:p></p><p class="MsoNormal" style="text-align: justify;"><o:p><a href="http://www.google.com.my/search?hl=en&cr=countryMY&defl=en&q=define:E-Government&ei=6hpXSujBFI_IsQOW5530AQ&sa=X&oi=glossary_definition&ct=title"><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >http://www.google.com.my/search?hl=en&cr=countryMY&defl=en&q=define:E-Government&ei=6hpXSujBFI_IsQOW5530AQ&sa=X&oi=glossary_definition&ct=title</span></span></span></a><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"><a href="http://www.pelanduk.com/detail.cfm?ID=513"></a></span></span></span></o:p></p><p class="MsoNormal" style="text-align: justify;"><o:p><a href="http://www.pelanduk.com/detail.cfm?ID=513"><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >http://www.pelanduk.com/detail.cfm?ID=513</span></span></span></a><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"><a href="http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf"></a></span></span></span></o:p></p><p class="MsoNormal" style="text-align: justify;"><o:p><a href="http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf"><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf</span></span></span></a><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size:large;"><a href="http://www.expat.com.my/Multimedia%20Super%20Corridor%20MSC%20Malaysia.htm"></a></span></span></span></o:p></p><p class="MsoNormal" style="text-align: justify;"><o:p><a href="http://www.expat.com.my/Multimedia%20Super%20Corridor%20MSC%20Malaysia.htm"><span class="Apple-style-span" style="color: rgb(0, 0, 0);"><span class="Apple-style-span"><span class="Apple-style-span" style=";font-family:times new roman;font-size:130%;" >http://www.expat.com.my/Multimedia%20Super%20Corridor%20MSC%20Malaysia.htm</span></span></span></a></o:p></p><p class="MsoNormal"><o:p><span style=";font-family:times new roman;font-size:130%;" ></span></o:p></p><p class="MsoNormal"><span style=";font-family:times new roman;font-size:130%;" ></span></p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0tag:blogger.com,1999:blog-7076671658705256834.post-46759676727894774682009-07-07T01:54:00.001-07:002009-07-11T08:01:21.883-07:00A discussion on E-learning offered in Malaysian Universities: Pros and Cons from the students perspective - The Virtual Class VS The Real One<div align="justify"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 297px; FLOAT: right; HEIGHT: 187px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5356019648337303714" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/SlRnfiUoWKI/AAAAAAAAAM0/0Nt3HfzqIWk/s200/elearning.jpg" /><span class="Apple-style-span" style="font-size:large;">The market for corporate interactive distance learning-now known as "e-learning"-has boomed along with the growth in the Internet and corporate intranets (Morri. A,1997). According to Allison Rossett (2001), E-learning is defined as Web-based training (WBT), or on-line learning. It is a technology based training that resides on a server or host computer that is connected to the World Wide Web; training is delivered partially or entirely through electronic hardware, software, or both. In short E-learning is learning that involves the acquisition, generation and transfer of knowledge using information and communications technology.According to the U.S. Department of Education 63.4% of all colleges and universities in the United States now offer distance learning courses, However, Geteducated.com, a consulting agency for distance educators, estimates the online student dropout rate at around 35%, while the average attrition rate for college freshman at U.S. universities is around 20%. Just like anything else, E-Learning has its pros and cons, and in this section we will discuss it in the perspectives of students.<br /><br /></span><strong><span style="color:#006600;"><span class="Apple-style-span" style="font-size:large;">Disadvantages </span><a href="http://2.bp.blogspot.com/_87mczwseoR8/SlRn55jMUoI/AAAAAAAAAM8/ALcVLKrAOgE/s1600-h/OutlineElearning.gif"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 155px; FLOAT: right; HEIGHT: 200px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5356020101248995970" border="0" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SlRn55jMUoI/AAAAAAAAAM8/ALcVLKrAOgE/s200/OutlineElearning.gif" /></a></span></strong><span class="Apple-style-span" style="font-size:large;"> </span></span></div><div align="justify"></div><div align="justify"><span><span><strong><span style="color:#006600;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Material warehouse-</span></span></span></strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Virtual Learning environment are being used primarily as repositories for materials rather than being used in more imaginative ways to support learning. This would make the learning process very boring and causes students to lack enthusiasm and motivation easily.</span></span></span></span></div><div align="justify"></div><div align="justify"><span><span><strong><span style="color:#006600;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Minimal communication</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">-</span></span></strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> Lower interaction between students since social interaction is replaced with non face to face communication with full use of technology such as instant messaging, discussion forums and email. Students will face difficulties in expressing themselves verbally, which will later affect the process of cultivating relationship. Furthermore, online classes, conferences and discussions are limited in time and totally exclude emotional interactivity. </span></span></span></span></div><div align="justify"></div><div align="justify"><span><span><span style="color:#006600;"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Poorer understanding-</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> According to a survey carried out by Professor Brown from Michigan University, it was reported that online students had as much as 10-percent of poorer understanding of the material. Reasons attributing to this findings include online students had jobs and other responsibilities that pulled their attention away, resulting in a 0-3 hours of study per wee</span></span></span></span></div><div align="justify"></div><div align="justify"><span><span><span style="color:#006600;"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Additional hardware and hardskills-</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Requires computer, software programs and connection to the internet to attend class. Poor internet connection or system failure will turn impact the learning process adversely. On top of this, students are required to learn new or enhance computer and troubleshooting skills constantly. </span></span></span></span></div><div align="justify"></div><div align="justify"><span><span><span style="color:#006600;"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Higher discipline-</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> Distractions are easily available in terms of attending class and logging in into other programs such as facebook, turning on a movie or doing other works simultaneously. Students also require high discipline to manage their time and studies efficiently.</span></span></span></span></div><div align="justify"></div><div align="justify"><span><span><span style="color:#006600;"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Education credibility-</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">ELearning experience in the enrolled college/university might not be properly accredited. This cause the students to bear the risk that their certificate will not be recognize. </span></span></span></span></div><p><strong><span style="color:#993399;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span></span></span></span></span></strong></p><p></p><div style="text-align: justify;"><span class="Apple-style-span" style=" color: rgb(153, 51, 153); font-weight: bold; font-family:'times new roman';font-size:18px;">Advantages</span></div><strong><span style="color:#993399;"><a href="http://3.bp.blogspot.com/_87mczwseoR8/SlRoSmlG9MI/AAAAAAAAANE/_UY1KvTsXhU/s1600-h/wijngaarden1.jpg"><span><img style="text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; width: 200px; float: right; height: 200px; cursor: pointer; " id="BLOGGER_PHOTO_ID_5356020525653488834" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SlRoSmlG9MI/AAAAAAAAANE/_UY1KvTsXhU/s200/wijngaarden1.jpg" /></span></a></span></strong><span><span><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span style="color:#993399;"></span></span></span></strong></span></span><p></p><p align="justify"><span><span><strong><span style="color:#993399;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Pervasive and integrated:</span></span></span></strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> E learning has become an important tool that makes learning easier. Technologies are being used extensively by students to find, manage, produce and support their work. They also use the internet to access expert knowledge and have an expectation of being able to communicate with anyone, about anything, when they want to.</span></span></span></span></p><p style="text-align: justify;"><span><span><span style="color:#993399;"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Personalized:</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> Students can mix and match between the various technological tools such as media, sites, tools, content, etc to suit their individual need. They can use the computer, internet and books simultaneously. Learning is now interactive and multifaceted especially with the strategies such as annotation and adaptation of materials.</span></span></span></span></p><p align="justify"><span><span><strong><span style="color:#993399;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Social:</span></span></span></strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> Students are part of a wider networked, community of peers. They are members of a range of communities of practice to share resources, ask for help, peer assess as well as job opportunities. Networking is easier as students have both university connection and statewide folks. </span></span></span></span></p><p align="justify"><span><span><span style="color:#993399;"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Changing skills set:</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> Students need and are demonstrating new skills in terms of harnessing the potential of technologies for their learning. These include developing skills of evaluation and an ability to critique and make critical decisions about a variety of sources and content. Students are becoming sophisticated at finding and managing information. </span></span></span></span></p><p align="justify"><span><span><span style="color:#993399;"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Flexibility and mobility:</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> Technologies provide students with more flexibility in terms of being able to undertake learning anytime, anywhere. Some students also work part time/full time, live hours away from campus or has family obligation that do not allow them to pursue campuses degree. Learning options are no longer constrained by their geographic. </span></span></span></span></p><a href="http://1.bp.blogspot.com/_87mczwseoR8/SlRob6WDrOI/AAAAAAAAANM/DJTH54wzsvs/s1600-h/2210078i1.gif"><span><img style="text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; width: 524px; float: right; height: 227px; cursor: pointer; " id="BLOGGER_PHOTO_ID_5356020685577891042" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/SlRob6WDrOI/AAAAAAAAANM/DJTH54wzsvs/s200/2210078i1.gif" /></span></a><span><div style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';font-size:180%;"><span class="Apple-style-span" style="font-size:18px;"><br /></span></span></div><span class="Apple-style-span" style="font-family:'times new roman';"><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:180%;"><span class="Apple-style-span" style="font-size:18px;"><br /></span></span></div><span class="Apple-style-span" style="font-size:large;"><div style="text-align: justify;"><br /></div></span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span></span></span></span><p style="text-align: justify;"><span><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Sources:<br /></span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span style="color:#000000;"></span></span></span></p><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span style="color:#000000;"></span></span></span></p><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span style="color:#000000;"></span></span></span></p><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span style="color:#000000;"></span></span></span></p><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span style="color:#000000;"></span></span></span></p><p style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><br /></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"><span></span></span></span></p><p></p><div style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';font-size:180%;"><span class="Apple-style-span" style="font-size:18px;"><br /></span></span></div><span><div style="text-align: justify;"><em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">“We’re living What We’re Learning”: Student perspectives in Distance Learning Degree and Certificate Programs in Public Health</span></span></em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">, Margaret M Cannon; Karl E Umble; Allan Steckler; Saundra Shay, Journal of Public Health Management and Practice; Jan 2001 retrieved from http://www.ksu.edu.sa/sites/Colleges/CollegeofPharmacy/Documents/Literature/English/AHS_Education/55.pdf</span></span></div><span><div style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';font-size:180%;"><span class="Apple-style-span" style="font-size:18px;"><br /></span></span></div><em><div style="text-align: justify;"><span class="Apple-style-span" style="font-style: normal; "><em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">Online Students Don't Fare as Well as Classroom Counterparts, Study Finds</span></span></em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">, Dan Carnevale, The Chronicle of higher Education, February 25, 2002, retrieved from chronicle.com/free/2002/02/2002022501u.htm</span></span></span></div></em></span></span><p></p><p style="text-align: justify;"><span><span><em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">An in-depth case study of students’ experiences of e-Learning-how is learning changing?</span></span></em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"> Conole. G. The University of Sydney: ascilite 2006,retrieved from </span></span></span></span><a href="http://ascilite.org.au/conferences/sydney06/proceeding/pdf_papers/p127.pdf"><span style="color:#000000;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">http://ascilite.org.au/conferences/sydney06/proceeding/pdf_papers/p127.pdf</span></span></span></a><span style="font-family:times new roman;font-size:130%;"> </span></p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com3tag:blogger.com,1999:blog-7076671658705256834.post-20752531558064428112009-07-06T05:25:00.000-07:002009-07-11T08:01:21.883-07:00Corporate Blogging: A new marketing communication tool for companies<p align="justify"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 213px; FLOAT: left; HEIGHT: 202px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5355322553805661570" border="0" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SlHtfS05ZYI/AAAAAAAAAMU/w_dhuwvzQC8/s200/corporate_bloggers.jpg" /><span class="Apple-style-span" style="font-size: large;">What is corporate blogging? </span><span style="color:#993300;"><em><span class="Apple-style-span" style="font-size: large;">Corporate blogging</span></em></span><span class="Apple-style-span" style="font-size: large;"> is a new marketing communication tool, called weblog that used and published by an organization to reach its strategic/organizational goals. Currently, most of the browsers (supported by RSS technology) such as Firefox, Opera, Safari and Internet Explorer enables readers to easily read the posts that recently posted by organization without visiting the blog directly. There three type of corporate blog which are external, internal and CEO Blogs.</span></span></p><span><p style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></span><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></p><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></p><p><span><img style="text-align: justify;margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; width: 332px; display: block; height: 382px; cursor: pointer; " id="BLOGGER_PHOTO_ID_5355323350472461490" border="0" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SlHuNqpEDLI/AAAAAAAAAMc/18mz1RQdAAQ/s200/75_thumbzoom.jpg" /></span></p><ul><li><div align="justify"><span><span><em><strong><span style="color:#00cccc;"><span style="color:#3366ff;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Internal Blogs</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></span></strong></em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">As its name, it is a blog that </span></span><span style="color:#6600cc;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">can view by employees of the organization through accessed the organization’s Intranet</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">. The blog is communal and just allow the employees to post any comment to the blog. This can encourage employee to participate in free discussion of issues; direct communication between various layers of an organization and collective intelligence. By this, employees will have a sense of community and more commitment toward organization.<br /><br />Besides, it can also be used in </span></span><span style="color:#6600cc;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">e-mail discussions and meeting</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">, especially for those stay in different locations or have conflicting schedules. It also can attract those individuals who may not aware or visited, to take part in the discussion to contribute their knowledge and expertise. </span></span></span></span></div></li></ul><p align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span></span></p><ul><li><div align="justify"><span><span><em><strong><span style="color:#3366ff;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">External Blogs</span></span></span></strong></em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br />An external blog is </span></span><span style="color:#6600cc;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">weblog that is available publicly where organization’s employees, spokespersons or teams can share their views.</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> It is used to explain and clarify policies, to announce new products or services, to react on public criticism on particular issues, or to announce new research and development in products to improve brand and organizational image. It is like an </span></span><span style="color:#6600cc;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">informal press release</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">, allows a window to the organizational culture and allows any comments to be made to the posts. It can seen that the external blogs can provides a more honest and direct view about the organization than traditional communication channels, however, they are one type of public relations tools and may be biased.<br /></span></span></span></span></div></li><span class="Apple-style-span" style="font-family:'times new roman';"><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:180%;"><span class="Apple-style-span" style="font-size: 18px;"><br /></span></span></div><span class="Apple-style-span" style="font-size: large;"><div style="text-align: justify;"><br /></div></span></span><li><div align="justify"><span><span><strong><em><span style="color:#3366ff;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">CEO Blogs</span></span></span></em><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Blogging among CEOs is becoming popular nowadays although there are some debates on whether CEOs have to blog or not. </span></span></span></span></div></li></ul><p align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Corporate blogging has become the new marketing communication tool for companies because it is a </span></span><span style="color:#993300;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">way of promoting</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> relating to the products/services of the companies. (The posts and comments can reach and follow easily through generally structured conversation threads and centralized hosting.)<br /><br />Moreover, it can be more accessible by executives since the corporate blogging are an “</span></span><span style="color:#993300;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">unparalleled information gathering mechanism</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">”. It can reduce the costs for the organizations in searching and gathering ideas and thoughts through the blogs.<br /><br />The organizations also can decrease the time in responding to employees’ or customers’ valuable and important enquiries and feedback. They can view the blogs immediately after the comments/enquiries/feedbacks being posted and interacting with customers/employees more efficiency. Through corporate blogging, customers’/employees’ satisfaction will increase as they know that their comments are concerned by the organization.<br /><br />Furthermore, corporate blogging is a </span></span><span style="color:#993300;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">form of advertising</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> for companies because customers will review and go through the blog frequently to update themselves with the new information of the companies. This has become an advertisement to customers </span></span></span><a href="http://2.bp.blogspot.com/_87mczwseoR8/SlHvFwjnVMI/AAAAAAAAAMk/KvGXb6EHSEk/s1600-h/blogosphere.jpg"><span><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 134px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5355324314132894914" border="0" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SlHvFwjnVMI/AAAAAAAAAMk/KvGXb6EHSEk/s200/blogosphere.jpg" /></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">indirectly because variety of information available in the blogs. It makes the companies easy to meet potential customers and increase their sales. Through corporate blogging, organizations are also able to enhance the trustworthiness and boost up their credentials. This is why it has become a success marketing communication tool for the companies.<br /><br /><br />However, by using corporate blogging, there are several risks for the companies. Corporate blogging might make it easy to </span></span><span style="color:#cc9933;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">breach information security; defamation and invasion of privacy; and loss of company confidentiality.</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> Besides, customers/employees will expect that the companies will update the blog regularly. However, to writing a blog, companies have to spending more time and incur more costs to it which may cause the companies to incur about $800billion in productivity every year. It is very costing for the companies.<br /><br />In conclusion, the corporate blogging is a very successful communication tool in delivering the message/information of the companies since it has brought more benefits even though the risks come along with it. Thus, the companies have to maintain corporate blogging by eliminating the potential risks in order to communicate effectively with their customers and employees.<br /><br /></span></span></span><span><span><strong><em><span style="color:#ff6666;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">The followings are the top 15 popular Corporate blogs [Tachnorati ranked]- May 2008<br /></span></span></span></em></strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br />15 Most Popular Corporate Blogs (Technorati ranked) – May 2008<br />#1. </span></span></span></span><a href="http://googleblog.blogspot.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Google</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 8492<br />#2. </span></span></span><a href="http://blogs.adobe.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Adobe</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 1797<br />#3. </span></span></span><a href="http://blog.flickr.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Flickr</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 1744<br />#4. </span></span></span><a href="http://blog.facebook.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Facebook</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 1478 </span></span></span><a href="http://3.bp.blogspot.com/_87mczwseoR8/SlHv3bZODlI/AAAAAAAAAMs/yEABwt-vfsU/s1600-h/204642150_5a75b9ecfd_o.jpg"><span><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 271px; FLOAT: right; HEIGHT: 260px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5355325167445610066" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SlHv3bZODlI/AAAAAAAAAMs/yEABwt-vfsU/s200/204642150_5a75b9ecfd_o.jpg" /></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br />#5. </span></span></span><a href="http://www.ysearchblog.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Yahoo! Search</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 1130<br />#6. </span></span></span><a href="http://direct2dell.com/one2one/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Dell</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 799<br />#7. </span></span></span><a href="http://blog.digg.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Digg</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 641<br />#8. </span></span></span><a href="http://blog.linkedin.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">LinkedIn</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 591<br />#9. </span></span></span><a href="http://blog.ask.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Ask</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 364<br />#10. </span></span></span><a href="http://fastlane.gmblogs.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">General Motors</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 364<br />#11. </span></span></span><a href="http://yodel.yahoo.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Yahoo!</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 297<br />#12. </span></span></span><a href="http://blog.delta.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Delta</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 252<br />#13. </span></span></span><a href="http://1000words.kodak.com/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Kodak</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 105<br />#14. </span></span></span><a href="http://monster.typepad.com/monsterblog/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Monster</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 73<br />#15. </span></span></span><a href="http://www.boeing.com/randy/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Boeing</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> – Authority: 67<br />Source: </span></span></span><a href="http://www.thenewpr.com/wiki/pmwiki.php?pagename=Resources.CorporateBlogsList"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">New PR Wiki</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">, provides the listing of corporate blogs.<br /><br /><br /><br /><br /><br /><br />For more information about corporate blogging, can visit following website:<br /></span></span></span><a href="http://www.sitepoint.com/blogs/2008/08/08/15-companies-that-really-get-corporate-blogging/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://www.sitepoint.com/blogs/2008/08/08/15-companies-that-really-get-corporate-blogging/</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></span><a href="http://money.cnn.com/2006/02/28/news/companies/pluggedin_fortune/index.htm"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://money.cnn.com/2006/02/28/news/companies/pluggedin_fortune/index.htm</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span><a href="http://www.socialtext.net/bizblogs/index.cgi?fortune_500_business_blogging_wiki"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://www.socialtext.net/bizblogs/index.cgi?fortune_500_business_blogging_wiki</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /><br /><br /><br />Reference:<br /></span></span></span><a href="http://en.wikipedia.org/wiki/Corporate_blog"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://en.wikipedia.org/wiki/Corporate_blog</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></span><a href="http://mariosundar.wordpress.com/2008/05/05/top-15-corporate-blogs-ranked-may-2008/"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://mariosundar.wordpress.com/2008/05/05/top-15-corporate-blogs-ranked-may-2008/</span></span></span></a><span style="font-family:times new roman;font-size:130%;"> </span></p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com3tag:blogger.com,1999:blog-7076671658705256834.post-77770722687086743122009-07-04T00:49:00.000-07:002009-07-11T07:54:34.693-07:00A Review on a post on E-Tailing from My E-Commerce Blog - Wal-Mart to implement product review systems<span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span"><div align="justify" style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></div><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></span></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_87mczwseoR8/SlTRAWhNmrI/AAAAAAAAAN0/HhrJIwMHwLo/s1600-h/1.jpg"><span><img style="text-align: justify;margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; width: 116px; display: block; height: 116px; cursor: pointer; " id="BLOGGER_PHOTO_ID_5356135660825451186" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/SlTRAWhNmrI/AAAAAAAAAN0/HhrJIwMHwLo/s400/1.jpg" /></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span><p class="MsoNormal" align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">This is the review after I had read one of the post regarding e-tailing, which is ‘Wal-Mart to implement product review systems’ from My E-Commerce Blog. Wal-</span></span><span style="color:black;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Mart </span></span><span class="apple-style-span"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">is an American</span></span></span><span class="apple-converted-space"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> public corporation</span></span></span><span class="apple-converted-space"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span><span class="apple-style-span"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">that runs a chain of large, discount department stores.</span></span></span></span></span></span></p><p class="MsoNormal" align="justify"><span style="color:black;"><span class="apple-style-span"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Recently, Wal-Mart had implemented a new system for customers able to review and rate the product and merchandise through Wal-Mart’s website. The purpose of this system had been explained by the Walmart.com Chief Marketing Officer, Cathy Halligan. She said that Wal-Mart decided to launch this system is to get more feedback from customers and therefore improve their services to serve them better in the future. Amazingly, the review and rating that Wal-Mart received from customers are double the number of expectation amount.</span></span></span></span></p><span class="Apple-style-span" style="color:#0000ee;"><span class="Apple-style-span" style="color:#000000;"><p class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family:'times new roman';"></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><img src="http://3.bp.blogspot.com/_87mczwseoR8/SlTRDT2TTWI/AAAAAAAAAN8/dKWTtDn1UFE/s400/13.jpg" /></span></span><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family:'times new roman';"></span></span></p><p class="MsoNormal" align="justify" style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Wal-Mart, one of the world’s largest retailers, has been conduct business through e-tailing. By implement the review and rating feature, Wal-Mart makes a significant improvement by increase customers’ loyalty towards their product, merchandise, and services. Besides from that, Wal-Mart, a typical store whole seller, had also launched a new program called ‘Site-to-Store’. This program allows customers to order products through online, and then Wal-Mart will ship the products to a local Wal-Mart store for free. It gives convenience to customer to pick up their orders at the nearest Wal-Mart store that the product been sent.</span></span></p><p class="MsoNormal" align="justify" style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Wal-Mart believes that by providing the No. 1 customer requested feature through online, it will bring benefits at the moment and in the future. For example, in the future when Wal-Mart comes to a decision on which products got the potential market to generate high sales. At that moment, Wal-Mart can interacts with customers that had posted their review or rating and based on that management is able to make an analyst and make decision on which products to place order and sell it to the customers.</span></span></p><span class="Apple-style-span" style="font-size: large;"><span class="Apple-style-span" style="font-family:'times new roman';"></span></span><p class="MsoNormal" style="text-align: justify;"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><img src="http://1.bp.blogspot.com/_87mczwseoR8/SlTRLhEEp7I/AAAAAAAAAOE/GaC8O2IHyqA/s400/images.jpg" /> </span></span></span></span></p><p style="TEXT-ALIGN: left" class="MsoNormal"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span></p><p class="MsoNormal" align="justify" style="text-align: justify;"><span class="apple-style-span"><span style="color:black;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">So, I believe that every customers that purchase products through online always unable to express their review or suggestion due to there is no review system been provide from that particular website. That’s the reason and strategies why Wal-Mart started to implement product review systems. This is exactly what customers want. I believe Wal-Mart will improve their services at Walmart online to give customers a better experience when they purchasing through online.</span></span></span></span></p><p class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span><p class="MsoNormal" style="text-align: justify;"><span class="apple-style-span"><span style="color:black;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">References:</span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><a href="http://news.zdnet.com/2100-9588_22-152582.html"></a></span></span></span></span></p><p class="MsoNormal" style="text-align: justify;"><span class="apple-style-span"><span style="color:black;"><a href="http://news.zdnet.com/2100-9588_22-152582.html"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://news.zdnet.com/2100-9588_22-152582.html</span></span></a><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><a href="http://www.bizreport.com/2007/07/walmartcom_launches_product_review_feature.html"></a></span></span></span></span></p><p class="MsoNormal" style="text-align: justify;"><span class="apple-style-span"><span style="color:black;"><a href="http://www.bizreport.com/2007/07/walmartcom_launches_product_review_feature.html"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">http://www.bizreport.com/2007/07/walmartcom_launches_product_review_feature.html</span></span></a></span></span></p><p style="TEXT-ALIGN: center"><span style="font-family:times new roman;font-size:130%;"></span></p></span></span><p><span style="font-family:times new roman;font-size:130%;"></span></p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com3tag:blogger.com,1999:blog-7076671658705256834.post-14907051896188864072009-07-03T10:02:00.000-07:002009-07-11T08:14:44.220-07:00The application of pre-paid cash card for consumers<div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Prepaid credit/cash card is a payment card pre-loaded with your own money, which you can then use wherever the payment card is acceptable. A prepaid card is not a credit facility, so you do not need to pass a credit check. Even if you have bad credit you are guaranteed to be approved for a prepaid card. Prepaid cars differs from debit card which is linked to your saving accounts and credit card where credits are extended. Its benefits include:<br /><br /></span></span></span></div><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span><ul><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Safe alternative to carrying cash – just carry a plastic card </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Keep track and control spending – Limit depends on the amount reloaded into the card. In other words, no money no talk! </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Usage – pay bill, purchase via online, withdraw cash from ATM, transfer money and etc </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Portability – usable as long as Visa/ mastercard is acceptable, depends on the type of prepaid card, Replaces traveler’s cash </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Fringe benefits – cash back programmes, points earning</span></span></span></div></li></ul><span class="Apple-style-span" style="font-family:'times new roman';"><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:180%;"><span class="Apple-style-span" style="font-size: 18px;"><br /></span></span></div></span><span><div style="text-align: justify;"><span class="Apple-style-span" style="font-family: 'times new roman'; font-size: 18px; ">Examples of application of pre-paid cash card for consumers in Malaysia are:</span></div></span><span class="Apple-style-span" style="font-family:'times new roman';"><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:180%;"><span class="Apple-style-span" style="font-size: 18px;"><br /></span></span></div><span class="Apple-style-span" style="font-size: large;"><div style="text-align: justify;"><br /></div></span></span><p></p><div style="text-align: justify;"><span class="Apple-style-span" style="font-family: 'times new roman'; color: rgb(51, 102, 255); font-size: 18px; ">Tune Money Prepaid Visa Card</span></div><a href="http://4.bp.blogspot.com/_87mczwseoR8/Sk46Xx-YSSI/AAAAAAAAAL0/QOrbM7O_WPY/s1600-h/tune+card.jpg"><span><img style="text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; width: 131px; float: right; height: 71px; cursor: pointer; " id="BLOGGER_PHOTO_ID_5354281187216476450" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/Sk46Xx-YSSI/AAAAAAAAAL0/QOrbM7O_WPY/s400/tune+card.jpg" /></span></a><p></p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span></span></span><ul><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">First prepaid visa card targeting at students aged 18 and above </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Launched by Tune Money Sdn Bhd ( Related to AIrAsia</span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Earns Tune points and has cash back program </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">RM 9.99 annual fees + transaction fees per reload charges at selected bank and ATM withdrawals </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Acceptable anywhere where Visa is acceptable </span></span></span></div></li><li><div align="justify"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">To apply, go to </span></span></span><a href="http://www.tunemoney.com/publicPageAction.do?value=page.ppc.public.cardbenefits"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">www.tunemoney.com/publicPageAction.do?value=page.ppc.public.cardbenefits</span></span></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span></div></li></ul><p align="justify"><span><span><span style="color:#3366ff;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Red Card</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span></span></p><ul><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Launched by Tune Money Sdn Bhd as a complement to Tune Money Prepaid Visa Card </span></span></span></span></div></li><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Prepaid visa card in Malaysia targeting for students aged 15-17 </span></span></span></span></div></li><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Works like an electronic wallet which helps parents to keep track on their teenaged kids spending </span></span></span></span></div></li><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">online tracking system with online statements which makes it easy for the parents to keep close track of their children's spending. </span></span><a href="http://1.bp.blogspot.com/_87mczwseoR8/Sk46f-g5iGI/AAAAAAAAAL8/0h49w79c4Qs/s1600-h/nextG.jpg"><span><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 93px; FLOAT: right; HEIGHT: 118px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5354281328021440610" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/Sk46f-g5iGI/AAAAAAAAAL8/0h49w79c4Qs/s400/nextG.jpg" /></span></a></span></span></div></li><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Only parents can apply for their teenaged kid. </span></span></span></span></div></li><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Rates are similar with Tune Money Prepaid Visa Card<br /></span></span></span></span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><br /></span></span></span></div></li></ul><p><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span style="color:#3366ff;"></span></span></span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></p><p style="text-align: justify;"><span><span><span style="color:#3366ff;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">AmBank NexG Prepaid Mastercard</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span></span></p><ul><li style="text-align: justify;"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Launched by AmBank </span></span></span></span></li><li style="text-align: justify;"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">The Starter Pack currently retails at RM25 each, each starter pack carries discount and cash vouchers worth RM300 and NexG cardholders will enjoy RM10,000 free PA upon registration </span></span></span></span></li><li style="text-align: justify;"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Reload Limit of RM10,000 </span></span></span></span></li></ul><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"><span></span> </span></span></p><p></p><div style="text-align: justify;"><span class="Apple-style-span" style="font-family: 'times new roman'; color: rgb(51, 102, 255); font-size: 18px; ">Touch and go</span></div><a href="http://1.bp.blogspot.com/_87mczwseoR8/Sk46q_ppqfI/AAAAAAAAAME/6cDji_HmtTw/s1600-h/TNG.jpg"><span><img style="text-align: justify;margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; width: 105px; float: right; height: 76px; cursor: pointer; " id="BLOGGER_PHOTO_ID_5354281517305145842" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/Sk46q_ppqfI/AAAAAAAAAME/6cDji_HmtTw/s400/TNG.jpg" /></span></a><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;"> </span></span></span><p></p><ul><li style="text-align: justify;"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Used mainly to pay toll </span></span></span></li><li style="text-align: justify;"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Can be used to pay for parking as it substitutes the ticket </span></span></span></li><li style="text-align: justify;"><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Usable for public transportation payment such as Rapid KL, KTM and LRT provided the machine is functional. </span></span></span></li></ul><span class="Apple-style-span" style="font-family:'times new roman';"><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:180%;"><span class="Apple-style-span" style="font-size: 18px;"><br /></span></span></div></span><p style="text-align: justify;"><span><span><span style="color:#3366ff;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Prepaid calling card </span></span></span></span></span></p><ul><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Used to make both domestic and international phone calls </span></span></span></span></div></li><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">No connection nor hidden charges </span></span></span></span></div></li><li><div align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Distributed by eCallChina<br /></span></span></span></span></div></li></ul><p align="justify"><span><span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size: large;">Sources:<br />http://www.what-prepaid-card.co.uk/features/compare-cards-prepaid.html<br />http://www.bernama.com/bernama/v5/newsindex.php?id=316556</span></span></span></span></p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com3tag:blogger.com,1999:blog-7076671658705256834.post-10143661998792902262009-07-02T17:28:00.000-07:002009-07-11T07:54:34.694-07:00Electronic Currency<div style="TEXT-ALIGN: justify" align="justify"><span><span><em style="FONT-STYLE: italic; FONT-WEIGHT: bold"><span style="COLOR: rgb(255,0,0)"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">Electronic currency</span></span></span></em><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"> also can call as </span></span><em style="font-family:times new roman;"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">e-money, electronic cash, electronic money, digital money, digital cash or digital currency</span></span></em><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">. It refers to money or scrip which is exchanged only electronically and this also involves use of computer networks, the internet and digital stored value systems. The examples of electronic currency are </span></span><em style="font-family:times new roman;"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">Electronic Funds Transfer (EFT)</span></span></em><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"> and </span></span><em style="font-family:times new roman;"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">direct deposit</span></span></em></span></span><span><span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">.
<br />
<br />The use of the various types of electronic money has not experienced a considerable popularity but it is being tried out in different parts of the world. The countries are widely using this technique of electronic cash system such as Singapore and Hong Kong. This technique is basically used for debits and credits or for exchanging values either online or offline. </span></span></span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">
<br />
<br /></span></span><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="place"></o:smarttagtype></span></span></span><span><span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"><object id="ieooui" classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D"></object></span></span><style> st1\:*{behavior:url(#ieooui) } </style><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">
<br /></span></span></span></span></div><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:595.3pt 841.9pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0; layout-grid:15.6pt;} div.Section1 {page:Section1;} --> </style><p style="TEXT-ALIGN: justify" class="MsoNormal" align="justify"><span lang="EN-US"><span><span class="Apple-style-span" style="font-size:large;">One of the e-currency is Octopus card system was launched in September 1997 to collect fares for the territory's mass transit system. It was the first contactless smart card system in the world and has since grown into a widely used payment system for virtually all public transport in </span><st1:place st="on"><span class="Apple-style-span" style="font-size:large;">Hong Kong</span></st1:place><span class="Apple-style-span" style="font-size:large;">.</span><span class="Apple-style-span" style="font-size:large;"><o:p></o:p> Octopus card is a rechargeable contactless stored value smart card used to transfer electronic payments in online or offline systems in </span><st1:place st="on"><span class="Apple-style-span" style="font-size:large;">Hong Kong</span></st1:place><span class="Apple-style-span" style="font-size:large;">. The Octopus is used for payment at convenience stores, supermarkets, fast-food restaurants, on-street parking meters, car parks, and other point-of-sale applications such as service stations and vending machines.</span></span></span></p><span class="Apple-style-span" style="font-size:medium;"><p align="justify"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">
<br /></span></span><span lang="EN-US"><span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">Payment processor for e-currency can sell own e-currency directly to the end user like Paypal or other payment processor like e-gold and Liberty Reserve can sell through digital currency exchangers (in this manner you exchange e-currency for real money like EURO, USD dollars). E-gold is an e-currency might be fully backed by gold and Liberty Reserve is an e-currency that non gold backed or both gold and non gold backed.</span></span></span></span></p><p class="MsoNormal" align="justify"><span class="Apple-style-span" style="font-size:large;">
<br /></span></p><span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"><span></span></span></span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"><span lang="EN-US"></span></span></span></span><p class="MsoNormal" align="justify"><span class="fullpost"><span class="fullpost"><strong><a href="http://www.e-gold.com/e-gold.asp?cid=4623443"><span class="Apple-style-span" style="font-size:large;">e-gold</span></a></strong><span><span class="Apple-style-span" style="font-size:large;">
<br />e-gold is a digital currency, issued by e-gold Ltd., a Nevis corporation, 100% backed at all times by gold bullion in allocated storage. Other e-metals are also issued and 100% back by the corresponding metal: e-silver, e-platinum, and e-palladium.
<br />e-gold is integrated into an account based payment system that empowers people to use gold as money.</span></span></span></span></p><span class="fullpost"><span class="fullpost"><span class="Apple-style-span" style="font-size:medium;"><p class="MsoNormal" align="justify"><span class="Apple-style-span" style="font-size:large;">
<br /></span></p><p align="justify"><span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"><span></span></span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"></span></span><span class="fullpost"><span class="fullpost"><strong style="color: rgb(255, 102, 0); font-weight: bold; "><a href="http://www.blogger.com/www.libertyreserve.com"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">Liberty Reserve</span></span></a></strong><span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"> Liberty Reserve is incorporated in Costa Rica. It is a 100% irrevocable payment system allowing you to send or receive money to or from anyone in the world.An offshore Trust protects Liberty Reserve and is always backed 100% by U.S. dollars for LR-USD accounts, and by gold for LR-gold accounts, etc. </span></span></span></span></span><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;"></span></span></p><p style="FONT-WEIGHT: bold;font-family:times new roman;" class="MsoNormal" align="justify"><span lang="EN-US"><span class="Apple-style-span" style="font-size:large;">The benefits of e-currency:</span></span></p><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span lang="EN-US"><span><span><span class="Apple-style-span" style="font-size:large;">- Send and receive money instantly to family, friends and business associates over the world;</span><span class="Apple-style-span" style="font-size:large;"><o:p></o:p></span></span></span></span></p><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span><span><span lang="EN-US"><span class="Apple-style-span" style="font-size:large;">- The users can make payments 24 hours a day from anywhere you are </span></span><span lang="EN-US"><span class="Apple-style-span" style="font-size:large;">through payment processor </span></span><span lang="EN-US"><span class="Apple-style-span" style="font-size:large;">and have possibility to connect to internet</span><span class="Apple-style-span" style="font-size:large;"><o:p></o:p></span></span></span></span></p><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span lang="EN-US"><span class="Apple-style-span" style="font-size:large;">- Take credits in real tame online payments from selling goods and services, online games, auctions, and etc.</span><span class="Apple-style-span" style="font-size:large;"><o:p></o:p></span></span></p><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span lang="EN-US"><span><span><span class="Apple-style-span" style="font-size:large;">- Open free e-currency account signup</span><span class="Apple-style-span" style="font-size:large;"><o:p></o:p></span></span></span></span></p><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span lang="EN-US"><span><span><span class="Apple-style-span" style="font-size:large;">- Email payments to any email address; request payments from anyone with an email address;</span><span class="Apple-style-span" style="font-size:large;"><o:p></o:p></span></span></span></span></p><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span lang="EN-US"><span><span><span class="Apple-style-span" style="font-size:large;">- Lower merchant fees than credit cards</span><span class="Apple-style-span" style="font-size:large;"><o:p></o:p></span></span></span></span></p><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span lang="EN-US"><span><span class="Apple-style-span" style="font-size:large;">- Value security systems for PIN verification of spends</span></span></span></p><p class="MsoNormal" align="justify"><span class="Apple-style-span" style="font-size:large;">
<br /></span></p><span><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';"><span></span></span></span></span><p class="MsoNormal" align="justify" style="font-family:times new roman;"><span class="Apple-style-span" style="font-size:large;">Reference:</span></p><ul><li><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">
<br /></span></span></div><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><div align="justify"><span lang="EN-US"><a href="http://en.wikipedia.org/wiki/Electronic_money"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">http://en.wikipedia.org/wiki/Electronic_money</span></span></a></span></div></li><li><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">
<br /></span></span></div><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><div align="justify"><span lang="EN-US"><a href="http://www.articlesbase.com/international-business-articles/ecurrency-pro-or-contra-732036.html"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">http://www.articlesbase.com/international-business-articles/ecurrency-pro-or-contra-732036.html</span></span></a></span></div></li><li><div align="justify"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><span lang="EN-US"><a href="http://www.sellingonnet.net/online-means-payment/various-types-electronic-money/"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">http://www.sellingonnet.net/online-means-payment/various-types-electronic-money/</span></span></a></span></div></li><li><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">
<br /></span></span></div><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><div align="justify"><span lang="EN-US"><a href="http://www.imoisilis.com/2008/05/what-is-e-currency.html"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">http://www.imoisilis.com/2008/05/what-is-e-currency.html</span></span></a></span></div></li><li><div style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">
<br /></span></span></div><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CUser%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; text-align:justify; text-justify:inter-ideograph; mso-pagination:none; font-size:10.5pt; mso-bidi-font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体; mso-font-kerning:1.0pt;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} /* Page Definitions */ @page {mso-page-border-surround-header:no; mso-page-border-surround-footer:no;} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><div align="justify"><span lang="EN-US"><a href="http://en.wikipedia.org/wiki/Octopus_card"><span class="Apple-style-span" style="font-size:large;"><span class="Apple-style-span" style="font-family:'times new roman';">http://en.wikipedia.org/wiki/Octopus_card</span></span></a></span></div></li></ul><p align="justify">
<br /></p></span></span></span></span>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com2tag:blogger.com,1999:blog-7076671658705256834.post-88820389892797745852009-07-02T07:07:00.000-07:002009-07-29T23:34:53.613-07:00Credit Card debts: Causes and Prevention<div align="justify"><a href="http://1.bp.blogspot.com/_87mczwseoR8/Sk0BeTTkl2I/AAAAAAAAALU/iPECBUd9Oko/s1600-h/1creditcard1cc6.jpg"></a><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 686px; FLOAT: left; HEIGHT: 215px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353937091349010226" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/Sk0Baw-lVzI/AAAAAAAAALM/jVrdkp_3ARs/s400/iStock_000005912769XSmall-credit-cards_crop380w.jpg" /><br /><br /></span></div><div align="justify"><span style="font-family:times new roman;font-size:130%;">Holding credit card is like a sign of fashion nowadays. It is almost like a necessity rather than a luxury. This caused a lots of people have a serious problem with credit card debt due to most of them having more than one credit card with a balance. A credit card is same as what it means as, it is a card that you are able to use it by credit. Each time you use it, it will increase your debts and may causes you have credit card debt problem.<img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 400px; DISPLAY: block; HEIGHT: 210px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353935803075935378" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/Sk0APxyWPJI/AAAAAAAAAKc/qxO2TbNG3rg/s400/bad_credit2.jpg" /><br />Now, let us look at the causes of credit card debt. There are Top 10 causes of credit card debt summarized at this website - </span><a href="http://www.bankrate.com/brm/news/debt/debt_manage_2004/top-10-causes.asp"><span style="font-family:times new roman;font-size:130%;">http://www.bankrate.com/brm/news/debt/debt_manage_2004/top-10-causes.asp</span></a><span style="font-family:times new roman;font-size:130%;">. I will focus on five causes that I feel they are the top 5 causes for this issue.</span></div><div align="justify"><span style="font-family:times new roman;"><br /><span style="font-size:130%;"></span></span></div><div align="justify"><br /><span style="color:#6666cc;"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#33ccff;"><strong>1.Income reduced but expenses remain the same.</strong></span><br /></span></span></span><a href="http://1.bp.blogspot.com/_87mczwseoR8/Sk0AfToAmPI/AAAAAAAAAKk/72SYk7-XbO0/s1600-h/money-tree.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 353px; FLOAT: left; HEIGHT: 297px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353936069857417458" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/Sk0AfToAmPI/AAAAAAAAAKk/72SYk7-XbO0/s400/money-tree.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;">Due to the increase of oil price, many companies have started to downsizing. One of the methods for downsizing is reduce the salaries/income of employees. Thus, the income of those employees affected will decrease but the expenses need to spend, for example, education fees for children, school fees, daily expenditure and etc will remain the same or even will increase. Most of them will delay bringing expenses in line with a reduction in their income and let the credit card debt to fill the gap. </span></div><div align="justify"><span style="font-family:times new roman;"><br /><span style="font-size:130%;"></span></span></div><div align="justify"><span style="font-family:times new roman;font-size:130%;"></span></div><div align="justify"><span style="font-family:times new roman;"><br /><span style="font-size:130%;"></span></span></div><div align="justify"><span style="font-family:times new roman;font-size:130%;"></span></div><div align="justify"><span style="font-family:times new roman;font-size:130%;"></span></div><div align="justify"><br /><strong><span style="font-family:times new roman;font-size:130%;color:#33ccff;"></span></strong></div><div align="justify"><strong><span style="font-family:times new roman;font-size:130%;color:#33ccff;"></span></strong></div><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><span style="color:#33ccff;">2.Under employment.</span><br /></strong>This is quite similar to first cause. People who are experiencing under employment will continue to think positively that their current situations are temporary or they are coming off unemployment. Therefore, they would not decrease their current spending style and go on using the credit card to spend. As a result, spending does not in line with current income, the credit card debt will increase and most probably become worse.<br /><br /></span></span><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><span style="color:#33ccff;">3.Poor money management.</span><br /></strong>A monthly spending is very important because it provides us an idea that where our money are going. Most of the credit card holders did not have a proper spending plan (poor money management), they may be spending hundreds of dollars on the unnecessarily or luxury merchandises each month. Furthermore, some of them feel that a budget will construct a constricting and disall</span></span><a href="http://4.bp.blogspot.com/_87mczwseoR8/Sk0CavPCyII/AAAAAAAAALc/5bCWXXTcq5E/s1600-h/untitled.bmp"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 239px; FLOAT: right; HEIGHT: 299px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353938190392805506" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/Sk0CavPCyII/AAAAAAAAALc/5bCWXXTcq5E/s400/untitled.bmp" /></span></a><span style="font-family:times new roman;font-size:130%;">ow them have any freedom on spending.</span></div><div align="justify"><span style="font-family:times new roman;"><br /><span style="font-size:130%;"></span></span></div><div align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#33ccff;"><strong>4.Saving too little or not at all.</strong></span><br />We are advised to saving three to six months of living expenses for the event of unexpected expenditures. This is the simplest way to avoid unwanted debt. However, most of the people did not have this good habit; they may save 1-2% of their income or not at all. So, when face the event of emergency for need of money, they will just use their credit card to settle it.</span></span></div><div align="justify"><span style="font-family:times new roman;"><br /><span style="font-size:130%;"></span></span></div><div align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#33ccff;"><strong>5. Financial illiteracy.</strong><br /></span>Many people do not know how the money grows and work; how to invest and save for future use, or even why they have to balance their checkbook. This knowledge was not taught in school, their parents also would not have to explain the knowledge to them. So, wrong financial decision will increasing and difficult to resolve it.<br /></span></span></div><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 564px; DISPLAY: block; HEIGHT: 128px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353936778313157058" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/Sk0BIi1BScI/AAAAAAAAAK8/zp-V2bjjFUk/s400/howtoavoidcreditcarddebtbanner.gif" /> </span><p align="justify"><br /><span style="font-family:times new roman;font-size:130%;">The credit card debts can cause a lot of card holders went into bankruptcy. So, prevention is important to solve it. There are several preventions found in several websites:</span></p><div align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><span style="color:#ff6600;">1.Manage own finances<br /></span></strong>It is very important to have a savings plan or budget. It can help us to have a plan for money: how to allocate it for various expenses, where it spent, and how much to be saved into a savings account. It also can prevent people from getting into debt by setting a goal with a deadline by help to keep us on track the goals set and put motivators in place.</span></span></div><div align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><span style="color:#ff6600;">2.Know the interest rate of credit card</span><br /></strong>All credit holders are advised to know the interest rate that offered and approved by the credit card issuers and checking the rate on monthly statement. This is because the issuers can increase the rates with or without any reason or warning. It is very important for the emergencies event, such as, cars break down or jobs are lost, may cause holders to put some expenses on the card. If the card holders did not up-to-date with their interest rate, they might end up with paying more interest than they have to.</span></span></div><div align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><span style="color:#ff6600;">3.Use credit card like cash, not a credit card.</span></strong><br />By using credit card, people cannot physically feel the charges charged. They will continue to purchase by using the credit card until they cannot afford to repay the debt. If treat credit card as cash, you know how much you have and how much you can spent, you will know you cannot afford any purchases when your money is decreased in amounts. This called GREEN FACTOR. By using credit card like cash, you need to be in control of your spending habits and credit card.</span></span></div><div align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><span style="color:#ff6600;">4.Pay off smaller balances first.</span></strong><br />Most of the card holders will try to pay off their cards with larger balances first. It may make them feel stress and hard to repay the debts in short time. So, pay off the smaller balance first is recommended. This is because it will take less time and the payer will feel a sense of satisfaction when completed their goals and will increase their confidence and then make them easier to settle the higher balances. </span></span></div><br /><br /><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><span style="color:#ff6600;">5.Early education.</span></strong><br />The best method for prevention is teaching youngest generation about money before they are qualified for a credit card. Many statistics show that the students who entering college do not know how to balance a checkbook or having a personal finance class. Besides, for those who graduated, typically enter adulthood with thousands of dollars in student loans and credit card debt. In addition, advertisers markets target more to younger and younger children nowadays. It is essential to teach them about the lure of money and how to manage finances early. It can reduce the rate for children to fall into credit card debt problems when as an adult.</span></span></div><br /><div align="justify"><span style="font-family:times new roman;font-size:130%;">Prevention is better than cure. Thus, take prevention before having a credit card.<br /><br />Reference:<br /></span><a href="http://www.mozdex.com/prevent-credit-card-debt/"><span style="font-family:times new roman;font-size:130%;">http://www.mozdex.com/prevent-credit-card-debt/</span></a><span style="font-family:times new roman;font-size:130%;"><br /></span><a href="http://ezinearticles.com/?Understanding-Credit-Card-Debt-Problems&id=1225936"><span style="font-family:times new roman;font-size:130%;">http://ezinearticles.com/?Understanding-Credit-Card-Debt-Problems&id=1225936</span></a><span style="font-family:times new roman;font-size:130%;"><br /></span><a href="http://www.cardratings.com/howtoavoidcreditcarddebt.html"><span style="font-family:times new roman;font-size:130%;">http://www.cardratings.com/howtoavoidcreditcarddebt.html</span></a><span style="font-family:times new roman;font-size:130%;"> </span></div>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com4tag:blogger.com,1999:blog-7076671658705256834.post-82489845127229326872009-06-26T06:38:00.001-07:002009-07-11T06:24:43.213-07:00The Application of 3rd Party Certification Programme in Malaysia<div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#330099;"><strong>Third party certification</strong></span> is a process by which a product or service is reviewed by an independent third party to validate a set of standards, claims or criteria are being met. It provides a measure of conformity, satisfy customer demands and limit supplier risks by eliminating the expense of repeating testing. It is a kind of certification that gives confident to customers to surf internet due to the increased in phishing and spoofing attacks on the internet. For example, it can avoid online users’ computer system being spammed, hacked and attacked by malicious software such as virus, Trojan horse and worms. Besides, it can secure the confidential information of the online users such as IC number, passwords, credit card numbers, telephone number and etc. The most famous application of third party certification programme in Malaysia is provided by <em><span style="color:#cc33cc;">MSC Trushgate.com Sdn Bhd</span></em>. </span></span></div><p align="justify"><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 258px; DISPLAY: block; HEIGHT: 82px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351679212538989266" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SkT74686itI/AAAAAAAAAHU/q3Rb8ONm7Ws/s200/trustgate.JPG" /><strong><span style="color:#330099;">MSC Trustgate.com Sdn Bhd</span></strong> was incorporated on 1999 and is a licensed Certification Authority (CA) operating within the Multimedia Super Corridor. Certification Authority (CA) is the body that given the license to operate as a trusted third party in the issuance of digital certifications. The reasons for this incorporation are to meet the growing need for secure network communications and become the catalyst for the development of e-commerce, both locally and across the ASEAN region.<br /><br />Besides, MCS Trustgate.com Sdn Bhd is licensed under the <em>Digital Signature Act 1997 (DSA) </em>which is a Malaysian Law that sets a global precedent for the mandate of a CA. Thus, as a CA, MCS Trustgate.com Sdn Bhd’s core business is <em><span style="color:#33ccff;">providing digital certification services</span></em>, such as cryptographic products, digital certificates, and software development. For instance, the company has provided solutions and trusted services to help companies to build a secure network and application infrastructure for their electronic communications and transactions over the network. Furthermore, they also delivering high quality services by brought their recognitions with the government, enterprises and e-commerce sites. The example of products and services that provided by MCS Trustgate.com Sdn Bhd are SSL Certificate, Managed PKI, Personal ID, MyTRUST</span><a href="http://2.bp.blogspot.com/_87mczwseoR8/SkT86_TMUnI/AAAAAAAAAHc/Hc1jkcUM0mY/s1600-h/msc.JPG"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 200px; FLOAT: right; HEIGHT: 92px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351680347577537138" border="0" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SkT86_TMUnI/AAAAAAAAAHc/Hc1jkcUM0mY/s200/msc.JPG" /></span></a><span style="font-family:times new roman;font-size:130%;">, MyKard ID, SSL VPN and etc. Furthermore, MSC Trustgate.com Sdn Bhd are also is an affiliate of VeriSign in the South East Asia region and a member of VeriSign Trust Network.</span></p><br /><br /><br /><div align="justify"><span style="font-family:times new roman;font-size:130%;">The <em><span style="color:#33ccff;">vision</span></em> of MSC Trustgate.com Sdn Bhd is to enable organizations to conduct their business securely over the Internet, as much as what they have been enjoying in the physical world. This is due to the security is the primary concern of entering into the new Internet economy.<br /><br />In order to help all types of institutions and companies conducting their businesses over the Internet, MSC Trustgate.com Sdn Bhd provides the finest Public Key Infrastructure (PKI) for them. <strong><span style="color:#330099;">Managed Public Key Infrastructure (MPKI) service</span></strong> is a fully integrated enterprise platform designed to secure intranet, extranet, and Internet applications by combining maximum flexibility, scalability, and performance, with greater security and availability. This service allows enterprise to establish a robust PKI and Certification Authority (CA) system cost-effectively and quickly with complete control over security policies, certificate lifecycle management, authentication models and PKI hierarchies. </span></div><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 396px; DISPLAY: block; HEIGHT: 375px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351681004133817938" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/SkT9hNKaHlI/AAAAAAAAAHk/13s63XTuBFM/s200/PKI.gif" /> </span><p align="justify"><span style="font-family:times new roman;font-size:130%;">The service also enables lower operating costs and faster deployment while providing an open platform that integrates with off-the-shelf solutions. By using this service, many organizations can set up their own multiple digital certification program easily, quickly and economically. They can issue 250 or more digital certificates to partners, customers, employees or supplies. This solution helps to secure online transactions, sign them digitally and control the access to intranets and extranets.<br /></span></p><div align="justify"><br /><a href="http://4.bp.blogspot.com/_87mczwseoR8/SkT94DGtFfI/AAAAAAAAAHs/qk3zLPcY-Rw/s1600-h/mykay+PKI+(Mykey).gif"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 120px; FLOAT: left; HEIGHT: 280px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351681396570920434" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SkT94DGtFfI/AAAAAAAAAHs/qk3zLPcY-Rw/s200/mykay+PKI+(Mykey).gif" /></span></a><span style="font-family:times new roman;"><span style="font-size:130%;"><strong><em>MyKad</em></strong> is designed by government with PKI capability that allows its holder to conduct online transaction with privates sectors and government agencies. MCS Trustgate.com Sdn Bhd had provided <strong><span style="color:#330099;">MyKey</span></strong> which is the solution that allowing users to authenticate themselves online and to sign documents or to conduct transaction digitally. Moreover, MSC Trustgate.com Sdn Bhd is the main PKI developer and integrator for MyKad which offered different types of MyKey (MyKad PKI) modules for developers who desires to develop MyKad applications such as MyKey Application Programming Interface (API) and MyKad Client Kit.<br /></span></span></div><br /><div align="justify"><br /><strong><span style="color:#330099;"><span style="font-family:times new roman;font-size:130%;">About VeriSign </span><a href="http://3.bp.blogspot.com/_87mczwseoR8/SkT-lY1j4RI/AAAAAAAAAH0/dBmSA5vh2i8/s1600-h/verisign.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 200px; FLOAT: right; HEIGHT: 224px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351682175498707218" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SkT-lY1j4RI/AAAAAAAAAH0/dBmSA5vh2i8/s200/verisign.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;"><br /></span></span></strong><span style="font-family:times new roman;font-size:130%;">VeriSign, Inc. is the trusted provider of Internet infrastructure services for the networked world. Billions of times each day, it allows companies and consumers all over the world to engage in trusted communications and commerce through its SSL, identity and authentication, and domain name services. It has the ability to know and trust the parties with due to doing business and communicate in the networked world has become critical. </span></div><br /><div align="justify"><br /><span style="font-family:times new roman;font-size:130%;">Besides, VeriSign internet infrastructure has become the heart of the Internet by protecting valuable data and enabling key transactions. This is because VeriSign has facilitates 50 billion authoritative Domain Name System (DNS) queries a day since 1998 with 100% availability. It also intends to increase the capacity of the .com and .net DNS by 10 times by 2010 to provide the stability and security required for global online transaction. It has issued 2 million VeriSign® Identity Protection (VIP) credentials to consumers for strong authentication on a network of leading Web sites so that consumers will feel confident when the conduct online business transaction. </span></div><br /><p align="justify"><br /><strong><span style="color:#330099;"><a href="http://3.bp.blogspot.com/_87mczwseoR8/SkT_MzIlAuI/AAAAAAAAAH8/7_ed2FfmGbk/s1600-h/verisign.gif"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 128px; FLOAT: left; HEIGHT: 232px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351682852572693218" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SkT_MzIlAuI/AAAAAAAAAH8/7_ed2FfmGbk/s200/verisign.gif" /></span></a><span style="font-family:times new roman;font-size:130%;">VeriSign SSL Certificates</span></span></strong><span style="font-family:times new roman;font-size:130%;"> is the public encrypted key that Webmaster sends to CA which is a standard part of most web browser packages and web server when works with the Secure Sockets Layer (SSL) technology. It is the leading Secure Sockets Layer (SSL) Certificate Authority under MCS Trustgate.com Sdn Bhd which enables the security of communications, e-commerce and interactions for websites, extranets and internets. It means that VeriSign is used to enhance the security of server of the website and providing security solutions to protect organization’s consumers, website, networks and brand. It also increases customers’ confidence in conducting online business transaction due to the increased phishing and spoofing attacks on the Internet. VeriSign also will protects the organization’s website and make it easier for the visitors build trust on the organization because the encryption of sensitive information during online transaction is enabled .Each of it has unique, authenticated information about the certificate owner which his or her identity will be verified by Certificate Authority when it is issued. </span></p><br /><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 429px; DISPLAY: block; HEIGHT: 220px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351683494707074450" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/SkT_yLRWFZI/AAAAAAAAAIE/_E0K5XFaPHo/s200/digital+signature.JPG" /><br /></span><p align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><em><span style="color:#330099;">Digital certificate</span></em> is usually attached to an e-mail message or an embedded program in a web page in order to verify that user or website is who they claim to be. The general functions of digital certificate are user authentication, encryption and digital signatures. <span style="color:#cc33cc;">User authentication</span> will provide security by using username and password. <span style="color:#cc33cc;">Encryption</span> will make the data transmission secured through the information encrypted. So, recipient of the data is the person who only can receive the message. <span style="color:#cc33cc;">Digital signatures</span> are like the hand signature in the digital world which can ensure the integrity of the data. Therefore, the users will conduct online transaction confidently without fear of the personal data being stolen, transacting party denying any commercial commitments and information corrupted by third parties. Moreover, the digital certificate can assist in the development of internet based activities. </span></span></p><p align="justify"><br /><span style="font-family:times new roman;font-size:130%;">In conclusion, by applying the 3rd party certification is secured for e-shopping and enhance the trust and confident to the organizations’ website and products..<br /><br /><br /><br /><br />Reference:<br /><br /></span><a href="http://msctrustgate.com/about_us.htm"><span style="font-family:times new roman;font-size:130%;">http://msctrustgate.com/about_us.htm</span></a><span style="font-family:times new roman;font-size:130%;"><br /></span><a href="http://www.mykey.com.my/Website/home.php"><span style="font-family:times new roman;font-size:130%;">http://www.mykey.com.my/Website/home.php</span></a><span style="font-family:times new roman;font-size:130%;"><br /></span><a href="http://www.verisign.com/corporate/information/index.html"><span style="font-family:times new roman;font-size:130%;">http://www.verisign.com/corporate/information/index.html</span></a><span style="font-family:times new roman;font-size:130%;"><br /></span><a href="https://www.msctrustgate.com/product/mpki.htm"><span style="font-family:times new roman;font-size:130%;">https://www.msctrustgate.com/product/mpki.htm</span></a></p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com5tag:blogger.com,1999:blog-7076671658705256834.post-40712312859206682942009-06-26T06:37:00.002-07:002009-07-11T07:20:06.231-07:00How to Safeguard Our Personal and Financial Data?<span class="Apple-style-span"><div style="TEXT-ALIGN: left; PADDING-BOTTOM: 3px; BORDER-RIGHT-WIDTH: 0px; MARGIN: 0px; PADDING-LEFT: 3px; WIDTH: auto; PADDING-RIGHT: 3px; FONT: 100% Georgia, serif; BORDER-TOP-WIDTH: 0px; BORDER-BOTTOM-WIDTH: 0px; BORDER-LEFT-WIDTH: 0px; PADDING-TOP: 3px"><p align="justify"><span style="font-family:times new roman;font-size:130%;">Privacy and confidentiality had always been an issue with the advancements in technology. The threat of privacy invasion by hackers leads to an increasing need in protecting important personal and financial data with effective measures. More often than not, the problems include stealing data for illegal usage either from database or when it is being transferred over the network. Listed below are the safeguards one can employ to reduce the risk of successive information abuse.</span></p><p align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Password protection<br /></span>· The most common protection consisting of alphabets and numbers<br />· Although this protection is still susceptible to automated attacks, it is still effective because it can slow down the attacker, which increase the probability that the attack will be detected and/or attacker abandon the attack and turn to easier targets<br />· To increase the strength of this protection, hard password should be used whereby it contains 6 or more character with at least 1 special character or digit and mixed case sensitivity, and not forming a name, date, acronym, or pronounceable word.</span></span></p><span style="font-family:Times New Roman;font-size:130%;"></span><p align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Firewall<br /></span>·A protected gateway that stands between the resources requiring protection and the “outside; a filter between private network and the internet<br />·To be effective, a firewall must guard all access to the internal network, including modem connections as well as remote network access.<br />· Always keep the firewall on.</span></span></p><span style="font-family:Times New Roman;font-size:130%;"></span><p align="justify"><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Encryption<br /></span>· The process a message is scramble in a difficult, expensive or time consuming way for an unauthorized person to decipher it.<br />· Can use either public or private key to encrypt and decrypt the message<br />· Provide security to both stored and transmitting data.</span></span></p><p><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Packet filters</span><br />· Rules that can accept/reject incoming packets based source and destination address and other identifying information<br />· If suspicious attachment were found to be accompanying an email, only the email will be accepted on the condition that the attachment is to be rejected.</span></span></p><p><span style="font-family:Times New Roman;font-size:130%;"></span><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Antivirus/Antispyware software<br /></span>· The number of known viruses is increasing exponentially, including viruses, worms, Trojan horses, trapdoors, and logic bombs.<br />· Hidden spyware are also being embedded into the data.<br />· Install antivirus and antispyware to detect these malicious codes and to remove it such as Norton AntiVirus, Doctor Spyware, Avira, AVG and etc.<br />· Free antivirus software can be easily obtained from the internet.<br />· Also, always keep the software updated to eliminate new malware of which the older version of the software is incapable of detecting it.</span></span><br /><br /><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Virtual Private Network</span><br />· Public internet is used to carry information but network remain private by using encryption to scramble for communication, authentication by ensuring information transmitted not altered, and access control to verify the identity of anyone using the network.<br />· Security is also given when using this safeguard</span></span></p><p><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Intrusion Detection System (IDS)<br /></span>· A special software which monitors the activity across a network or host computer,watching out for suspicious activity and taking automated action based on what it encounters<br />· Include shutting down the server if found necessary</span></span></p><p><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#009900;">Be educated</span><br />· Take time to keep update with the latest strategy in how hackers hack into database.<br />· Be aware of the popular phishing methods to prevent leaking sensitive information to third party accidentally.</span></span></p><p><span style="font-family:Times New Roman;font-size:130%;"></span><br /><span style="font-family:times new roman;font-size:130%;">All in all, practice using private communication lines when possible to limit public eavesdropping and potential intrusions, facilitate the usage of passwords, access restrictions, and user authentication to guard against unauthorized access and also secure systems with virus scanners, firewalls, and intrusion detection systems if possible. Never forget to read on the current issues of how data were being stolen.</span><br /><br /><span style="font-family:times new roman;font-size:130%;"><em>Source: CONCERNS ABOUT INTRUSIONS INTO REMOTELY ACCESSIBLE SUBSTATION CONTROLLERS AND SCADA SYSTEMS by Paul Oman and Edmund O. Schweitzer Deborah Frincke , retrieved from <a href="http://www.csds.uidaho.edu/deb/SCADA.pdf">http://www.csds.uidaho.edu/deb/SCADA.pdf</a></em></span></p></div></span>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com1tag:blogger.com,1999:blog-7076671658705256834.post-67444645913392150912009-06-26T06:37:00.001-07:002009-07-11T07:26:49.575-07:00Phishing: Examples and its Prevention Methods<a href="http://3.bp.blogspot.com/_87mczwseoR8/SkmTlVVGI8I/AAAAAAAAAKM/mXFl7nxL2kM/s1600-h/gjgfjgfjj.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 160px; DISPLAY: block; HEIGHT: 120px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5352971901696615362" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SkmTlVVGI8I/AAAAAAAAAKM/mXFl7nxL2kM/s400/gjgfjgfjj.jpg" /></span></a><span class="Apple-style-span"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><br /></span></span><div align="justify"><a href="http://3.bp.blogspot.com/_87mczwseoR8/SkmTCyeoW6I/AAAAAAAAAKE/jvIKUSJoMaA/s1600-h/rry.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 128px; FLOAT: right; HEIGHT: 160px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5352971308225813410" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SkmTCyeoW6I/AAAAAAAAAKE/jvIKUSJoMaA/s400/rry.jpg" /></span></a><span class="Apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;">Have you ever heard before the word phishing? I’m sure many of you didn’t hear it before and not even know what it means. Actually, phishing is a terms in the field of computer network security. <span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">“</span><span class="Apple-style-span" style="font-size:small;">Phishing</span><span class="Apple-style-span" style="font-size:small;">” is a form of </span><span class="Apple-style-span" style="font-size:small;">internet</span><span class="Apple-style-span" style="font-size:small;"> fraud that aims to steal personal valuable information such as credit cards, social security numbers, user name and IDs and passwords as well. Still not understand? Let us simplify it as </span><b><span class="Apple-style-span" style="font-size:small;">‘</span><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">P</span><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span style="FONT-WEIGHT: bold" class="Apple-style-span"><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">hishing</span></span><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;"> is TH</span><span style="FONT-WEIGHT: normal" class="Apple-style-span"><b><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">EFT</span></span><span class="Apple-style-span" style="font-size:small;">’</span></b><span class="Apple-style-span" style="font-size:small;">.</span></span></span></span></span></span></b></span></span></span><span class="Apple-style-span" style="font-family:times new roman;"><span style="font-size:130%;"><br /><br /></span></div></span></span><div><div><div align="justify"><span class="apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;">It has been increasingly common in nowadays c<span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">o</span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">mputer network users facing. So, how </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;"> really works out over the network? </span><span class="Apple-style-span" style="font-size:small;">Phishing</span><span class="Apple-style-span" style="font-size:small;"> usually will be appeared in the form out </span></span><span class="apple-style-span"><b><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">e-mail or instant messaging</span></span></b></span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">. If it is appear as the form of e-mail, they will usually use the well-known organization so that your alertness will be highly reduce in order for them to steal your personal information. </span><span class="Apple-style-span" style="font-size:small;">Phishing</span><span class="Apple-style-span" style="font-size:small;"> also might attempts through the website by giving services which you do not need an account.</span></span></span></span></span></span><span class="Apple-style-span" style="font-family:times new roman;"><span style="font-size:130%;"><br /><br /></span></div></span><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 160px; FLOAT: right; HEIGHT: 96px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5352970929719569506" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SkmSswbtbGI/AAAAAAAAAJ8/_fSVGf2qiQ8/s400/thumbnail.jpg" /><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">With the extremely high population of </span><span class="Apple-style-span" style="font-size:small;">internet</span><span class="Apple-style-span" style="font-size:small;"> users nowadays, </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;"> can appear to us in many </span></span><span class="apple-style-span"><b><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">different ways or methods</span></span></b></span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">. There are plenty types of </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;"> attacks such as deceptive </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;">, </span><span class="Apple-style-span" style="font-size:small;">malware</span><span class="Apple-style-span" style="font-size:small;">-based </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;">, key loggers and screen loggers, session hijacking, web Trojans, host file poisoning, system reconfiguration attacks, data theft, </span><span class="Apple-style-span" style="font-size:small;">DNS</span><span class="Apple-style-span" style="font-size:small;">-based </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;">, content-injection </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;">, man-in-the-middle </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;"> and search engine </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;">.</span></span></span></span><span class="Apple-style-span" style="font-family:times new roman;"><span style="font-size:130%;"><br /><br /></span></div></span><div><span class="apple-style-span" style="font-size:130%;"></span></div><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span">However, the most frequently use and common method of phishing is by sending fraudulent e-mails. </span><span class="apple-style-span"><b><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">So what to look for in order to identify a </span></span><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">p</span><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span style="FONT-WEIGHT: bold" class="Apple-style-span"><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;">hishing</span></span><span class="Apple-style-span" style="color:#cc0000;"><span class="Apple-style-span" style="font-size:small;"> e-mail?</span></span></span></span></span></b></span></span></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><div><span class="apple-style-span"><span style="font-family:times new roman;font-size:130%;"></span></span></div><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span">1) </span><span class="apple-style-span"><b><span class="Apple-style-span" style="color:#3333ff;"><span class="Apple-style-span" style="font-size:small;">Generic greeting</span></span></b></span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;"> – </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;"> e-mails are usually sent by spamming in massive batches. </span><span class="Apple-style-span" style="font-size:small;">Phishing</span><span class="Apple-style-span" style="font-size:small;"> criminals will use generic names like ‘Dear Customer’ so they can save the time rather than type all recipients’ names out. If the e-mails does not contain your full name, you need to be suspicious the reliability of that e-mail.</span></span></span></span></div><div align="justify"><span style="font-family:Times New Roman;font-size:130%;"></span></div><div><span class="apple-style-span"><span style="font-family:times new roman;font-size:130%;"></span></span></div><div><span style="font-family:times new roman;"><span class="apple-style-span" style="font-size:130%;"></span></span></div><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span">2) </span><span class="apple-style-span"><b><span class="Apple-style-span" style="color:#3333ff;"><span class="Apple-style-span" style="font-size:small;">Forged link</span></span></b></span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;"> – usually there will be a link for you to link directly to the websites, but it might not link to the real organization or bank. When you see the websites that begin with “https”, then it is safe for you to enter your personal information, the “s” stands for secure.</span></span></span></span></div><div><span style="font-family:Times New Roman;font-size:130%;"></span></div><div><span style="font-family:times new roman;"><span class="apple-style-span" style="font-size:130%;"></span></span></div><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span">3) </span><span class="apple-style-span"><b><span class="Apple-style-span" style="color:#3333ff;"><span class="Apple-style-span" style="font-size:small;">Requests personal information</span></span></b></span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;"> – the main purpose criminal spamming </span><span class="Apple-style-span" style="font-size:small;">phishing</span><span class="Apple-style-span" style="font-size:small;"> e-mail is to cheat you by providing your personal information. So whenever you receive e-mail t</span></span>hat request for personal information, it is probably a phishing e-mail.</span></span></div><div align="justify"><span style="font-family:Times New Roman;font-size:130%;"></span></div><div><span style="font-family:times new roman;"><span class="apple-style-span" style="font-size:130%;"></span></span></div><div align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span">4) </span><span class="apple-style-span"><b><span class="Apple-style-span" style="color:#3333ff;"><span class="Apple-style-span" style="font-size:small;">Sense of urgency</span></span><span class="Apple-style-span" style="font-size:small;"> </span></b></span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">– </span></span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">Criminals will attempt to get your personal information in a hurry. They wanted you to update or provide personal information as soon as possible so that your account will not be suspended or closed. This will make the victims act fast in order to ‘save’ their account. Beware of this sense of urgency.</span></span></span></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><div><span class="apple-style-span"><b><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="Apple-style-span" style="color:#ff0000;">Examples of </span><span class="Apple-style-span" style="color:#ff0000;"><span class="Apple-style-span" style="font-size:small;">Phishing</span></span><span class="Apple-style-span" style="color:#ff0000;"><span class="Apple-style-span" style="font-size:small;"> are as below:</span></span></span></span></b></span><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><br /></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><p style="TEXT-JUSTIFY: inter-ideograph; TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="color:#ff0000;"><b><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><img src="http://4.bp.blogspot.com/_87mczwseoR8/Skj2a2N2XZI/AAAAAAAAAIc/UJs91tLgLAY/s400/17.jpg" /></span></b></span></p><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><p style="TEXT-JUSTIFY: inter-ideograph; TEXT-ALIGN: justify" class="MsoNormal"><strong><span style="font-family:times new roman;font-size:130%;color:#ff0000;"></span></strong></p><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><p style="TEXT-JUSTIFY: inter-ideograph; TEXT-ALIGN: justify" class="MsoNormal"><a href="http://3.bp.blogspot.com/_87mczwseoR8/SkmRkRciSDI/AAAAAAAAAJc/Y5qPe-dulWg/s1600-h/123.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 160px; FLOAT: left; HEIGHT: 112px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5352969684450953266" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SkmRkRciSDI/AAAAAAAAAJc/Y5qPe-dulWg/s400/123.jpg" /></span></a><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><br /><br /></span></p><span class="Apple-style-span" style="font-size:130%;"><div><br /><br /><br /><br /><br /></div></span><div><span style="font-family:times new roman;font-size:130%;"></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><div><span style="font-family:times new roman;font-size:130%;"></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><div><span style="font-family:times new roman;font-size:130%;"></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><div><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><img src="http://4.bp.blogspot.com/_87mczwseoR8/Skj2wu-n30I/AAAAAAAAAIk/ZzoAw6VmAdY/s400/pay%2Bpal.gif.png" /> </span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><div><span style="font-family:times new roman;font-size:130%;"></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><p style="TEXT-JUSTIFY: inter-ideograph; TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="color:#ff0000;"><b><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><img src="http://1.bp.blogspot.com/_87mczwseoR8/Skj3AjOA6hI/AAAAAAAAAIs/g3IG0CvbxXY/s400/y.jpg" /></span></b></span></p><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><p style="TEXT-JUSTIFY: inter-ideograph; TEXT-ALIGN: justify" class="MsoNormal"><strong><span style="font-family:times new roman;font-size:130%;color:#ff0000;"></span></strong></p><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><p style="TEXT-JUSTIFY: inter-ideograph; TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="color:#ff0000;"><b><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><img src="http://4.bp.blogspot.com/_87mczwseoR8/Skj4Whi3QVI/AAAAAAAAAI8/M15BTJJN5P8/s400/maybank.jpg" /></span></b></span></p><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><p style="TEXT-JUSTIFY: inter-ideograph; TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></p><span class="Apple-style-span" style="font-size:130%;"><div><br /></div></span><div><a href="http://1.bp.blogspot.com/_87mczwseoR8/SkmGHbfMTiI/AAAAAAAAAJU/zU8t8IHxCbs/s1600-h/Picture2.png"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 320px; FLOAT: left; HEIGHT: 297px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5352957094302338594" border="0" alt="" src="http://1.bp.blogspot.com/_87mczwseoR8/SkmGHbfMTiI/AAAAAAAAAJU/zU8t8IHxCbs/s320/Picture2.png" /></span></a><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><br /><br /><br /></span></div><span class="Apple-style-span" style="font-size:130%;"><div><br /><br /><br /><br /><br /></div></span><p><span style="font-family:times new roman;font-size:130%;"></span></p><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span class="Apple-style-span" style="font-size:small;"><br /></span><span style="font-size:130%;"><span style="font-family:times new roman;"></span></span></div><div><span style="font-family:times new roman;"><br /><span style="font-size:130%;"></span></span></div><div><span style="COLOR: rgb(255,0,0); FONT-WEIGHT: bold" class="Apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;">Prevention Methods of Phishing:<span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span class="Apple-style-span" style="font-size:small;">Actually, there are few technical methods to prevent phishing attackers. The approaches are as follow:</span></span></span></span></span></div><div><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:black;">1</span><b><span style="color:navy;"><span class="Apple-style-span" style="font-size:small;">) Educate users</span></span></b><span style="color:black;"><span class="Apple-style-span" style="font-size:small;"> – whenever you received an e-mail that urges you to provide or update your personal information such as username, password, IDs, credit card, social security numbers, date of birth and others as well. Normally, there is high probability that it is phishing e-mail, because bank or company will not request their customers by sending an e-mail. Users need to be alert when receive phishing-alike e-mails.</span><span class="Apple-style-span" style="font-size:small;"><span style="color:black;"></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:black;">2) </span><b><span style="color:navy;"><span class="Apple-style-span" style="font-size:small;">Detect and block the phishing websites in time</span></span></b><span style="color:black;"><span class="Apple-style-span" style="font-size:small;"> – users must learn how to detect whether it is a phishing site or not. Users can detect it by using the web master of a legal website to scans the root DNS for suspicious sites. Users can also trace back the downloader of web pa</span><span class="Apple-style-span" style="font-size:small;">ges at the web server.</span><span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;"><span style="color:black;"></span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span"><span style="color:black;">3</span></span><span class="apple-style-span"><b><span style="color:navy;"><span class="Apple-style-span" style="font-size:small;">) </span></span><span style="color:navy;"><span class="Apple-style-span" style="font-size:small;">Enhance the security of the websites</span></span></b><span style="color:black;"><span class="Apple-style-span" style="font-size:small;"> – Banks and owners of e-commerce business need to use hardware devices to enhance the security to prevent phishing attacks. For example, when every time customer purchasing through online, they are required to insert their credit card into card reader and key in the correct password in order to perform transactions. Or another way is to implement the biometrics systems, customers are require to perform voice, fingerprint or iris for confirmation of customers’ identification.</span><span class="Apple-style-span" style="font-size:small;"><span style="color:black;"></span></span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span class="apple-style-span"><span style="color:black;"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:black;">4) </span><b><span style="color:navy;"><span class="Apple-style-span" style="font-size:small;">Block the phishing e-mails by various spam filters</span></span></b><span style="color:black;"><span class="Apple-style-span" style="font-size:small;"> - by using Microsoft’s Caller ID and Sender Policy Framework (SPF), it helps to verify whether the e-mail is sent from an authorized server. And it also determines whether that e-mail got use spoofed e-mail address. If the</span><span class="Apple-style-span" style="font-size:small;"> </span><span class="Apple-style-span" style="font-size:small;">e-mail address is fake, then Internet service can determine that it is a spam e-mail.</span><span class="Apple-style-span" style="font-size:small;"><span style="color:black;"></span></span></span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span class="apple-style-span"><span style="color:black;"><span style="color:black;"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:black;">5</span><b><span style="color:navy;"><span class="Apple-style-span" style="font-size:small;">) Install online anti-phishing software in user’s computers</span></span></b><span style="color:black;"><span class="Apple-style-span" style="font-size:small;"> – by installing anti-phishing software, if the visited site is on the blacklist, then anti-phishing tool will warns the users immediately. The advantage is that developers of this software are able to update the blacklist in time to protect users from phishing attacks. Besides, there is another tool for users to be use; the tool will check the security of visited websites. It will perform check on the domain name, URL whether it is similar to a well-known domain name. The toolbar will notify users whether the website is verified and trusted.</span></span></span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span"><span class="Apple-style-span"><br /><span style="font-family:times new roman;font-size:130%;"></span></span></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span class="apple-style-span"><span style="color:black;"><span style="color:black;"><span style="color:black;"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">References:</span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span class="apple-style-span"><span style="color:black;"><span style="color:black;"><span style="color:black;"><a href="http://www.google.com.my/search?hl=en&defl=en&q=define:Phishing&ei=IJRISuDcJ5KZkQXg1an5CQ&sa=X&oi=glossary_definition&ct=title"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www.google.com.my/search?hl=en&defl=en&q=define:Phishing&ei=IJRISuDcJ5KZkQXg1an5CQ&sa=X&oi=glossary_definition&ct=title</span></a><span class="Apple-style-span" style="font-size:small;"><a href="http://www.phishtank.com/what_is_phishing.php"></a></span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span class="apple-style-span"><span style="color:black;"><span style="color:black;"><span style="color:black;"><a href="http://www.phishtank.com/what_is_phishing.php"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www.phishtank.com/what_is_phishing.php</span></a><span class="Apple-style-span" style="font-size:small;"><a href="http://www.pcworld.com/businesscenter/article/135293/types_of_phishing_attacks.html"></a></span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span class="apple-style-span"><span style="color:black;"><span style="color:black;"><span style="color:black;"><a href="http://www.pcworld.com/businesscenter/article/135293/types_of_phishing_attacks.html"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www.pcworld.com/businesscenter/article/135293/types_of_phishing_attacks.html</span></a><span class="Apple-style-span" style="font-size:small;"><a href="http://research.microsoft.com/en-us/um/people/chguo/phishing.pdf"></a></span></span></span></span></span></span></span></span></span></b></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="apple-style-span"><b><span style="color:red;"><span style="COLOR: rgb(0,0,0); FONT-WEIGHT: normal" class="Apple-style-span"><span style="color:black;"><span style="color:black;"><span class="apple-style-span"><span style="color:black;"><span style="color:black;"><span style="color:black;"><a href="http://research.microsoft.com/en-us/um/people/chguo/phishing.pdf"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://research.microsoft.com/en-us/um/people/chguo/phishing.pdf</span></a></span></span></span></span></span></span></span></span></b></span></p></div></div></div>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com1tag:blogger.com,1999:blog-7076671658705256834.post-24028872098283257972009-06-25T08:14:00.000-07:002009-07-11T07:54:34.694-07:00A review on a post on Internet Security from My E-Commerce blog<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_87mczwseoR8/SkSPU3B7yDI/AAAAAAAAAHM/pMV_KkPM0pw/s1600-h/malware.jpg"><img style="text-align: justify;margin-top: 0pt; margin-right: 0pt; margin-bottom: 10px; margin-left: 10px; float: right; cursor: pointer; width: 200px; height: 166px; " src="http://1.bp.blogspot.com/_87mczwseoR8/SkSPU3B7yDI/AAAAAAAAAHM/pMV_KkPM0pw/s200/malware.jpg" alt="" id="BLOGGER_PHOTO_ID_5351559845755209778" border="0" /></a><div style="text-align: justify;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:large;">
<br /></span></span></div><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CSTEVEN%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:usefelayout/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1578325383; mso-list-type:hybrid; mso-list-template-ids:1171934192 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} @list l1 {mso-list-id:1767731642; mso-list-type:hybrid; mso-list-template-ids:2010256204 67698693 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l1:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; font-family:Wingdings;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} table.MsoTableGrid {mso-style-name:"Table Grid"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; border:solid windowtext 1.0pt; mso-border-alt:solid windowtext .5pt; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-border-insideh:.5pt solid windowtext; mso-border-insidev:.5pt solid windowtext; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p style="text-align: justify;color: rgb(204, 0, 0); font-weight: bold; " class="MsoNormal"><span class="Apple-style-span" style="font-size:large;">Reviewing post: "More than 1 million computer viruses in circulation now”</span></p> <p class="MsoNormal"><o:p><span class="Apple-style-span" style="font-size:large;"> </span></o:p></p><meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CDOCUME%7E1%5CSTEVEN%7E1%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:usefelayout/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal" style="text-align: justify;"><a href="http://ecommerze.blogspot.com/search/label/Internet%20Security"><span class="Apple-style-span" style="font-size:large;">http://ecommerze.blogspot.com/search/label/Internet%20Security</span></a></p> <p class="MsoNormal" style="text-align: justify;"><o:p><span class="Apple-style-span" style="font-size:large;">
<br /></span></o:p></p> <p class="MsoNormal" style="text-align: justify;text-indent: 0.5in; "><span class="Apple-style-span" style="font-size:large;">Symantec bi-annual Internet Security Threat Report in 2008 show that more than a million of computer viruses, worms and trojans in circulation for last twelve month. It is the efforts of the cyber criminal groups to put up the malwares to foll the anti-virus programmes.</span></p> <p class="MsoNormal" style="text-align: justify;text-indent: 0.5in; "><span class="Apple-style-span" style="font-size:large;">In year 2007, Symantec detected more than 711,912 new malicious code threat which brings the total number of malicious programs that Symantec anti-virus programs detect to 1,122,311. On the other hand, it shows that almost two thirds of all malware were created during 2007. </span></p> <p class="MsoNormal" style="text-align: justify;text-indent: 0.5in; "><span class="Apple-style-span" style="font-size:large;">Most of the malicious programs are targeted at the various versions of Microsoft's Windows operating system such as Window XP and Window 2000. S</span></p> <p class="MsoNormal" style="text-align: justify;text-indent: 0.5in; "><span class="Apple-style-span" style="font-size:large;">Some security firms reported a significant increase in the number of viruses online</span></p> <ul style="margin-top: 0in;" type="disc"><li class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;">Panda Software indicated that it was getting more than 3000 sample of malware everyday.</span></li><li class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;">Security software testing organisation AV Test reported that a total of 5.49 million unique samples of malicious software were detected in 2007 which is 5 times higher than 2006.</span></li><li class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;">Finnish security firm F-Secure highlighted a doubling increase in the number of pieces of malware it detected in 2007 as compared to 2006.</span></li></ul> <p class="MsoNormal"><o:p><span class="Apple-style-span" style="font-size:large;"> </span></o:p></p> <p class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;">Common types of malware software:</span></p> <table class="MsoTableGrid" style="text-align: justify;border-top-width: medium; border-right-width: medium; border-bottom-width: medium; border-left-width: medium; border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border- border-collapse: collapse; color:initial;" border="1" cellpadding="0" cellspacing="0"> <tbody><tr> <td style="border: 1pt solid windowtext; padding: 0in 5.4pt; width: 77.4pt;" valign="top" width="103"> <p class="MsoNormal"><span class="Apple-style-span" style="font-size:large;">virus</span></p> <p class="MsoNormal"><o:p><span class="Apple-style-span" style="font-size:large;"> </span></o:p></p> </td> <td style="border-style: solid solid solid none; border- border-width: 1pt 1pt 1pt medium; padding: 0in 5.4pt; width: 365.4pt;color:windowtext windowtext windowtext -moz-use-text-color;" valign="top" width="487"> <p class="MsoNormal"><span class="Apple-style-span" style="font-size:large;">A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.</span></p> </td> </tr> <tr> <td style="border-style: none solid solid; border- border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 77.4pt;color:-moz-use-text-color windowtext windowtext;" valign="top" width="103"> <p class="MsoNormal"><span class="Apple-style-span" style="font-size:large;">Trojan Horse</span></p> <p class="MsoNormal"><o:p><span class="Apple-style-span" style="font-size:large;"> </span></o:p></p> </td> <td style="border-style: none solid solid none; border- border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 365.4pt;color:-moz-use-text-color windowtext windowtext -moz-use-text-color;" valign="top" width="487"> <p class="MsoNormal"><span class="Apple-style-span" style="font-size:large;">A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves</span></p> </td> </tr> <tr> <td style="border-style: none solid solid; border- border-width: medium 1pt 1pt; padding: 0in 5.4pt; width: 77.4pt;color:-moz-use-text-color windowtext windowtext;" valign="top" width="103"> <p class="MsoNormal"><span class="Apple-style-span" style="font-size:large;">worm</span></p> <p class="MsoNormal"><o:p><span class="Apple-style-span" style="font-size:large;"> </span></o:p></p> </td> <td style="border-style: none solid solid none; border- border-width: medium 1pt 1pt medium; padding: 0in 5.4pt; width: 365.4pt;color:-moz-use-text-color windowtext windowtext -moz-use-text-color;" valign="top" width="487"> <p class="MsoNormal"><span class="Apple-style-span" style="font-size:large;">A program or algorithm that replicates itself over a computer network and usually performs malicious actions</span></p> </td> </tr> </tbody></table> <p class="MsoNormal"><o:p><span class="Apple-style-span" style="font-size:large;"> </span></o:p></p> <p class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="font-size:large;">References:</span></p> <ul style="margin-top: 0in;" type="square"><li class="MsoNormal" style="text-align: justify;"><a href="http://news.bbc.co.uk/2/hi/technology/7340315.stm"><span class="Apple-style-span" style="font-size:large;">http://news.bbc.co.uk/2/hi/technology/7340315.stm</span></a></li><li class="MsoNormal" style="text-align: justify;"><a href="http://news.bbc.co.uk/2/hi/technology/7232752.stm"><span class="Apple-style-span" style="font-size:large;">http://news.bbc.co.uk/2/hi/technology/7232752.stm</span></a></li><li class="MsoNormal" style="text-align: justify;"><a href="http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp"><span class="Apple-style-span" style="font-size:large;">http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp</span></a></li></ul> <p class="MsoNormal"><o:p> </o:p></p> PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com2tag:blogger.com,1999:blog-7076671658705256834.post-8433386314860162342009-06-19T07:38:00.000-07:002009-07-11T06:58:04.854-07:00An example of an E-commerce failure and its causes<div align="justify"><a href="http://4.bp.blogspot.com/_87mczwseoR8/SjuoNgFY-jI/AAAAAAAAAGM/CIPh7T86AUo/s1600-h/Webvan_200.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 200px; DISPLAY: block; HEIGHT: 150px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5349053932336904754" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SjuoNgFY-jI/AAAAAAAAAGM/CIPh7T86AUo/s200/Webvan_200.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;"> There are many dot-com failures which are pet.com, mvp.com, boom.com and etc. The dot-com failure that will be discussed here is Webvan.com.<br /><br /></span><a href="http://4.bp.blogspot.com/_87mczwseoR8/SjumNcNt9jI/AAAAAAAAAFs/UGFrESUTDMg/s1600-h/webvan.JPG"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 197px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5349051732274837042" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SjumNcNt9jI/AAAAAAAAAFs/UGFrESUTDMg/s200/webvan.JPG" /></span></a><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#003333;"><strong><em>Webvan.com</em></strong></span> was founded in 1999 by Louis Borders. It was a website that sold groceries such as bread and vegetables in the US. It had spent around $1bn within 18 months to build its own infrastructure to deliver groceries in a number of cities, spent almost half of a billion by going public and bought over one of its largest competitors-HomeGrocer. However, by 2001, it had announced went into bankruptcy and caused 2,000 its employees lost their jobs.<br /><br /><br />There are many reasons for Webcan.com failures:<br /><br />1) <span style="color:#993399;">An incorrect business model</span><br /></span></span><a href="http://3.bp.blogspot.com/_87mczwseoR8/SjumenOfJTI/AAAAAAAAAF0/wi1xpUZMdTo/s1600-h/5_webvan.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 111px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5349052027288626482" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SjumenOfJTI/AAAAAAAAAF0/wi1xpUZMdTo/s200/5_webvan.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;">The company was presumed that it was a technology business and not a grocery business.<br /></span><div><div><div><br /><br /><br /><div><span style="font-family:times new roman;font-size:130%;"></span></div><br /><div><span style="font-family:times new roman;font-size:130%;">2) <span style="color:#993399;">Lack of management experience</span><br />Webcan.com was an online super-market but it was run by consultant, officers and directors who lack of management knowledge and retail food experience in the supermarket industry. Even its CEO George Shaheen did not have little or no food related experience and its founders, Louis Borders was an expert in selling book, but books do not expire or spoil. </span></div><div><span style="font-family:times new roman;"><br /><span style="font-size:130%;"></span></span></div><div align="justify"><span style="font-family:times new roman;font-size:130%;">3) </span><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#993399;">Lack of understanding of the sociology and psychology of retailing food<br /></span>Webvan.com’s management did not understand the style of consumers shop for foods. Most of the consumers like to go to supermarkets to look at, feel and </span></span><a href="http://3.bp.blogspot.com/_87mczwseoR8/SjunAfgksEI/AAAAAAAAAF8/rNyZVmo2Blk/s1600-h/Webvan2.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 200px; FLOAT: right; HEIGHT: 141px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5349052609332555842" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SjunAfgksEI/AAAAAAAAAF8/rNyZVmo2Blk/s200/Webvan2.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;">touch the merchandise. They like to speak to the grocer, wine department manager or butcher to negotiate the price or get more information about the merchandise. Besides, Webvan.com tried to implement a total customer satisfaction model by delivery the merchandise ordered to customers within 30 minutes. However, they did not consider that many working customers would like their groceries to be delivered at home at night. </span></div><div><br /><span style="font-family:times new roman;font-size:130%;">4) </span><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#993399;">Erroneous target marketings<br /></span>Webvan.com had targeted on wrong customers, it targeted on soccer moms and upscale suburban families. The most obvious potential customers for Webvan’s services were senior citizens, mothers with very young children, college students, handicapped individuals and late-night workers. </span></span></div><div><br /><span style="font-family:times new roman;font-size:130%;">5) <span style="color:#993399;">Lack of demographic understanding</span><br />Webvan.com’s major warehouses were located in Atlanta and Los Angeles, where the citizen are used to driving and rather drive to a shop or a store to get the groceries than to wait for delivery at home. Only those couples who both work and who hailed from congested metropolitan areas suited to Webvan.com’s idea.<br /><br /><br />Reference:<br /></span><a href="http://en.wikipedia.org/wiki/Webvan"><span style="font-family:times new roman;font-size:130%;">http://en.wikipedia.org/wiki/Webvan</span></a><span style="font-family:times new roman;font-size:130%;"><br /></span><a href="http://www.turnaround.org/Publications/Articles.aspx?objectID=1802"><span style="font-family:times new roman;font-size:130%;">http://www.turnaround.org/Publications/Articles.aspx?objectID=1802</span></a><span style="font-family:times new roman;font-size:130%;"><br /><a href="http://crave.cnet.co.uk/gadgets/0,39029552,49296926-6,00.htm">http://crave.cnet.co.uk/gadgets/0,39029552,49296926-6,00.htm</a> </span></div><div> </div></div></div></div><br /></div>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com2tag:blogger.com,1999:blog-7076671658705256834.post-86698711255152985872009-06-19T03:40:00.001-07:002009-07-11T07:32:37.164-07:00An Example of an E-commerce Success and its Causes - Dell<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_87mczwseoR8/SjvU6zzLeKI/AAAAAAAAAGs/3wdAHdN0iSY/s1600-h/2.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 146px; DISPLAY: block; HEIGHT: 146px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5349103089234966690" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SjvU6zzLeKI/AAAAAAAAAGs/3wdAHdN0iSY/s400/2.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;"> </span><div style="TEXT-ALIGN: left" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#3333ff;"><strong><em>Dell, Inc</em></strong></span>, one of the world’s largest corporations that make a huge success in the online marketplace which is also known as e-commerce. Dell, the company’s name simply comes from the founder, Michael Dell. Michael Dell starts his own business at the age of 19years old. Amazingly, he started up PC’s Limited with just $1000 American dollars in 1984. What come across his mind is that he wanted to sell personal computers directly to the customers and without the third party as an agent. <span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">In 1988 PC's Limited had a name change to "Dell Computer Corporation".</span></span> Guess what? Nowadays, Dell, Inc. had made annual sales of up to $50 billion American dollars.</span></span></div><div style="TEXT-ALIGN: left" align="justify"><span style="font-family:Times New Roman;"></span> </div><p style="TEXT-ALIGN: justify" class="MsoNormal"><span style="font-size:130%;"><?xml:namespace prefix = o /><o:p><span style="font-family:times new roman;">How Dell, Inc. actually made a succe</span></o:p><o:p><span style="font-family:times new roman;">ss in the world of e-commerce? Dell, Inc. offer a broad range of business line, such as desktop computer systems, laptop, servers and networking products, mobility products, software and peripherals and enhanced services. By selling computer systems directly to customers, it can <span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">eliminates retailers that add unnecessary time and cost. By doing so, Dell, Inc. had saved up a huge amount of cost for unnecessary expenses especially the cost of enterprise hardcopy printing.</span></span></span></o:p></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span style="font-family:Times New Roman;font-size:130%;"><o:p></o:p></span> </p><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 85px; FLOAT: right; HEIGHT: 129px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5349043034264348530" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SjueTJmap3I/AAAAAAAAAC8/DuxdvNrFjx4/s200/images1.jpg" /></span><span class="apple-style-span"><o:p><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">In addition, Dell, Inc is well known</span></o:p></span><span class="apple-style-span"><o:p><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"> for its continually improving operational performance that will lead the company to a higher level of success. Dell's customer-focused direct business model is a soul of Dell. It has become the culture of Dell to serve their best for customers in unique environment as a team.</span></o:p></span><br /><p><span class="apple-style-span"><o:p><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"></span></o:p></span> </p><p><span class="apple-style-span"><o:p><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">Seems Dell, Inc adopts the Just-In-Time syste</span></o:p></span><span class="apple-style-span"><o:p><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">ms for the inventory level. Dell also focuses on how to improve the relationships among business partners such as supplier chain for goods/materials, delivery agent. This is to ensure goods/materials are provided on the ground of just-in-time and products can deliver to customer in timely basis.</span></o:p></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal" align="justify"><span class="apple-style-span" style="font-family:Times New Roman;font-size:130%;"><o:p></o:p></span> </p><p style="TEXT-ALIGN: justify" class="MsoNormal" align="justify"><span class="apple-style-span"><o:p><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">In order to survive and operating a success business in the world of e-commerce, Dell, Inc. needs to implement its effective e-commerce strategies and manage the supply chain through internet efficiently. The factors of success for Dell are as follow:</span></o:p></span></p><p style="TEXT-ALIGN: left" class="MsoNormal"><span class="apple-style-span"><o:p><span class="Apple-style-span" style="font-size:small;"></span><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span"><span style="font-family:Symbol;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span></span><span class="apple-style-span"><b><span class="Apple-style-span" style="font-size:small;color:#00cccc;">Dell Delivery Service</span></b></span></span></span></o:p></span></p><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="COLOR: rgb(0,0,238); -webkit-text-decorations-in-effect: underline" class="Apple-style-span"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 117px; DISPLAY: block; HEIGHT: 102px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5349103097766536274" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SjvU7TlQ5FI/AAAAAAAAAG8/g2Y_lrOH0I4/s400/images.jpg" /></span> </span></span><p style="TEXT-ALIGN: left" class="MsoNormal" align="justify"><span class="apple-style-span"><o:p><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">By buying products from Dell through online, delivery services will be given and reach to customer with just 7-10 working days. Dell, Inc. even provides custom delivery services, which means Dell will arrange the services according to your needs. The services are like scheduled delivery services, pre-delivery services and destination services. Buyer no longer need to worry when delivery arrived can’t able to get it instantly.</span><span class="apple-style-span"><span style="font-family:Symbol;"><span class="Apple-style-span" style="font-size:small;"></span></span></span></span></b></span></o:p></span></p><p style="TEXT-ALIGN: left" class="MsoNormal"><span class="apple-style-span"><o:p><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;"><span class="apple-style-span"><span style="font-family:Symbol;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span></span><span class="apple-style-span"><b><span class="Apple-style-span" style="font-size:small;"><span style="color:#66ffff;"><span style="color:#33ccff;">Mass Customized Products</span><span style="FONT-WEIGHT: normal" class="Apple-style-span"></span></span></span></b></span></span></span></span></b></span></o:p></span></p><p style="TEXT-ALIGN: left" class="MsoNormal" align="justify"><span class="apple-style-span"><o:p><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;">Customers can customize Dell’s products based on different individual needs. For example, individual would like a bigger storage space for his laptop; he can customize/upgrade the hard disk drive through Dell’s website. These enable to meet different customers need and requirement and have the flexibility to scale and adjust service levels quickly.<span style="font-family:Symbolcolor:black;"><span style="mso-list: Ignore"></span></span></span></span></span></b></span></span></b></span></o:p></span></p><p style="TEXT-ALIGN: left" class="MsoNormal"><span class="apple-style-span"><o:p><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="font-family:Symbolcolor:black;"><span style="mso-list: Ignore">·<span style="FONT: 7pt 'Times New Roman'"> </span></span></span><b><span style="color:#33ccff;">Cheaper Price</span></b></span></span></span></b></span></span></b></span></o:p></span></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="TEXT-DECORATION: none" href="http://3.bp.blogspot.com/_87mczwseoR8/SjvVzQf8CyI/AAAAAAAAAHE/jDLmgJZSNes/s1600-h/1.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 150px; FLOAT: right; HEIGHT: 113px; CURSOR: pointer; TEXT-DECORATION: underline" id="BLOGGER_PHOTO_ID_5349104059011566370" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/SjvVzQf8CyI/AAAAAAAAAHE/jDLmgJZSNes/s400/1.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;"> </span><p style="TEXT-ALIGN: left" class="MsoNormal" align="justify"><span class="apple-style-span"><o:p><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">Dell, Inc. has been save cost due to doing business through internet. It helps Dell to save the cost of shop rental, warehouse, document printing and etc. This has been an advantage for Dell, Inc. Dell manage to offer customer a good quality product with adorable price while customer purchase it through online transactions.</span><span style="font-family:Symbol;"><span class="Apple-style-span" style="font-size:small;"></span></span></span></b></span></b></span></span></b></span></o:p></span></p><p style="TEXT-ALIGN: left" class="MsoNormal"><span class="apple-style-span"><o:p><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span class="apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><b><span style="FONT-WEIGHT: normal" class="Apple-style-span"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="font-family:Symbol;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><b><span class="Apple-style-span" style="font-size:small;color:#33ccff;">Customer Service</span></b></span></span></span></b></span></b></span></span></b></span></o:p></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal" align="justify"><span class="Apple-style-span" style="font-size:small;"></span><span style="font-family:times new roman;"><span style="font-size:130%;">Due to it is online transaction, buyer will have worries about transaction security, product delivery, warranty and maintenance, before and after sales services and etc. However, Dell had done it well when dealing with customers in this aspect. Dell, Inc. <span class="apple-style-span"><span class="Apple-style-span" style="font-size:small;">offers an effective online customer service through personalized web pages and the establishment of customer interaction centre</span></span>. By doing so, there is a direct customer relationship with customers that make them feel confident with Dell’s services.<o:p></o:p></span></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><o:p><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">All this above is the key factor why Dell success in the online marketplace. In these recent years, Dell started to conduct its business in the physical world. The reason is in order to compete in the market and target a new market range of customers which usually purchase product ‘offline’.</span></o:p></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">References:</span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span style="font-family:times new roman;font-size:130%;"></span></p><span class="Apple-style-span"><p class="MsoNormal"><span class="apple-style-span"><span style="color:black;"><a href="http://www.woopidoo.com/biography/michael-dell/index.htm"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www.woopidoo.com/biography/michael-dell/index.htm</span></a></span></span><span class="apple-style-span"><span style="color:black;"></span></span></p><p class="MsoNormal"><span class="apple-style-span"><span style="color:black;"><a href="http://www.dell.com/content/topics/global.aspx/about_dell/company/products_services/prods_servs?~ck=ln&c=us&l=en&lnki=0&s=corp"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www.dell.com/content/topics/global.aspx/about_dell/company/products_services/prods_servs?~ck=ln&c=us&l=en&lnki=0&s=corp</span></a><span class="Apple-style-span" style="font-size:small;"><a href="http://www.fundinguniverse.com/company-histories/Dell-Inc-Company-History.html"></a></span></span></span></p><p class="MsoNormal"><span class="apple-style-span"><span style="color:black;"><a href="http://www.fundinguniverse.com/company-histories/Dell-Inc-Company-History.html"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www.fundinguniverse.com/company-histories/Dell-Inc-Company-History.html</span></a><span class="Apple-style-span" style="font-size:small;"><a href="http://dspace.mit.edu/handle/1721.1/34778"></a></span></span></span></p><p class="MsoNormal"><span class="apple-style-span"><span style="color:black;"><a href="http://dspace.mit.edu/handle/1721.1/34778"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://dspace.mit.edu/handle/1721.1/34778</span></a><span class="Apple-style-span" style="font-size:small;"><a href="http://www1.ap.dell.com/content/topics/global.aspx/corp/soulofdell/en/index?c=ap&l=en&s=corp&~ck=mn"></a></span></span></span></p><p class="MsoNormal"><span class="apple-style-span"><span style="color:black;"><a href="http://www1.ap.dell.com/content/topics/global.aspx/corp/soulofdell/en/index?c=ap&l=en&s=corp&~ck=mn"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www1.ap.dell.com/content/topics/global.aspx/corp/soulofdell/en/index?c=ap&l=en&s=corp&~ck=mn</span></a><span class="Apple-style-span" style="font-size:small;"><a href="http://www.grin.com/e-book/66929/key-factors-of-successful-e-commerce-what-hp-can-learn-from-dell"></a></span></span></span></p><p class="MsoNormal"><span class="apple-style-span"><span style="color:black;"><a href="http://www.grin.com/e-book/66929/key-factors-of-successful-e-commerce-what-hp-can-learn-from-dell"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">http://www.grin.com/e-book/66929/key-factors-of-successful-e-commerce-what-hp-can-learn-from-dell</span></a></span></span></p></span><p><span style="font-family:times new roman;font-size:130%;"></span></p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com1tag:blogger.com,1999:blog-7076671658705256834.post-19267771647945940092009-06-19T02:46:00.001-07:002009-07-29T23:36:18.743-07:00History and Evolution of E-Commerce<div style="TEXT-ALIGN: justify" align="justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">E-commerce can be defined as a </span></span><span style="COLOR: rgb(102,0,204)"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">modern business methodology</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"> that addresses the needs of organizations, merchants, and consumers to cut costs while improving the quality of goods and services and the increasing speed of service delivery, by using Internet.</span></span></span></div><div style="TEXT-ALIGN: justify" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify" align="justify"><span style="font-size:130%;"></span></div><div style="TEXT-ALIGN: justify" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;">In the early 1970, E-commerce applications were start developed with innovation such as:</span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span style="COLOR: rgb(204,102,204)" class="Apple-style-span"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"><br /><span style="font-size:130%;"></span></span></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span style="COLOR: rgb(204,102,204)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">Electronic Funds Transfer (EFT)</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"> </span></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">The funds can be transfer electronically from one organization to another </span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">EFT was limited to large corporation, financial institutions, and other daring businesses.</span></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span style="COLOR: rgb(204,102,204)" class="Apple-style-span"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"><br /><span style="font-size:130%;"></span></span></span></span></div><div style="TEXT-ALIGN: justify"><span style="COLOR: rgb(204,102,204)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;">Electronic Data Interchange (EDI)</span></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">EDI used to electronically transfer routine documents which expanded electronic transfers from financial transactions to other types of transaction processing. </span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">It enlarged the pool of participating companies from financial institutions to many types of businesses such as retailers, manufacturers, services.</span></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span style="COLOR: rgb(204,102,204)" class="Apple-style-span"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"><br /><span style="font-size:130%;"></span></span></span></span></div><div style="TEXT-ALIGN: justify"><span style="COLOR: rgb(204,102,204)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;">Interorganizational System (IOS)</span></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">A system which allows the flow of informations to be automated between organizations in order to reach a desired supply-chain management system that enables the development of competitive organizations. </span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">In year 1984, the term ecommerce mean the p</span></span><span style="COLOR: rgb(102,0,204)"><strong><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">rocess of execution of commercial transactions electronically</span></span></strong></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"> with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) which provide an opportunity for users to exchange business information and make electronic transactions.</span></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">One of a America website name </span></span><span style="COLOR: rgb(51,204,0)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">Compuserve</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"> has offers online retail products to its customers in 1992. Moreover, this service gives people the first chance to buy products off their computer.</span></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"><br /><span style="font-size:130%;"></span></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">Nestcape was exist in year 1994. It has providing users a simple browser to surf the Internet and a safe online transaction technology called </span></span><span style="COLOR: rgb(51,255,51)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">Secure Sockets Layer</span></span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;">.<br /><br /></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">One year later, two of the biggest names in e-commerce are launched which are </span></span><span style="COLOR: rgb(153,51,0)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">Amazon.com and eBay.com</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">. These websites become more popular and famous for the sellers and buyers because sellers can post their product details and photos in the website and buyers easy and convenience to launch it.</span></span></span></div><p style="TEXT-ALIGN: justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">In year 1998, </span></span><span style="COLOR: rgb(153,51,0)"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">Digital Subscriber Line (DSL)</span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span"> was created and provided fast, always-on Internet service to subscribers across California. This prompts people to spend more time, and money, online.</span></span></span></p><p><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></p><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;">Retail spending over the Internet reaches $20 billion regarding Business.com in year 1999.It shows that more people are starting to use the internet for their daily transactions.<br /><br /></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify" align="justify"><span style="font-size:130%;"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">The U.S government extended the mor</span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span">atorium on Internet taxes until at least 2005. </span></span></span><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;">Nowadays, the largest electronic commerce is Business-to-Business (B2B) which is the businesses involved in B2B sell their products and services to other businesses. In 2001, this form of e-commerce had around $700 billion in transactions.<br /><br /></span></span></div><div style="TEXT-ALIGN: justify" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify" align="justify"><span style="font-size:130%;"></span></div><div style="TEXT-ALIGN: justify" align="justify"><span style="font-size:130%;"></span></div><div style="TEXT-ALIGN: justify" align="justify"><span style="font-size:130%;"></span></div><div style="TEXT-ALIGN: justify" align="justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;"></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-family:'times new roman';"><span class="Apple-style-span" style="font-size:130%;">"Web 2.0" refers to a second generation of web development and design, that facilitates communication, secure information sharing, interoperability, and collaboration on the World Wide Web. Web 2.0 concepts have led to the development and evolution of web-based communities, hosted services, and applications such as social-networking sites, video-sharing sites, wikis, blogs, mashup and folksonomies.</span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span"><span style="WHITE-SPACE: pre" class="Apple-style-span"><br /></span></span><p style="font-family:times new roman;"><span style="font-size:130%;">Web 2.0 websites typically include some of the following features or techniques:<br /></span></p><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><br /><p class="MsoNormal"><b><span style="font-size:130%;">Search<?xml:namespace prefix = o /><o:p></o:p></span></b></p><p style="TEXT-INDENT: 0.5in" class="MsoNormal"><span style="font-size:130%;">The ease of searching information through keyword search.</span></p><p class="MsoNormal"><b><span style="font-size:130%;">Links<o:p></o:p></span></b></p><p style="TEXT-INDENT: 0.5in" class="MsoNormal"><span style="font-size:130%;">Ad-hoc guides to other relevant information.</span></p><p class="MsoNormal"><b><span style="font-size:130%;">Authoring<o:p></o:p></span></b></p><p style="MARGIN-LEFT: 0.5in" class="MsoNormal"><span style="font-size:130%;">The ability to create constantly updating content over a platform that is shifted from being the creation of a few to being constantly updated, interlinked work. In blog, content is cumulative in that posts and comments of individuals are accumulated over time.<o:p></o:p></span></p><p class="MsoNormal"><b><span style="font-size:130%;">Tags<o:p></o:p></span></b></p><p style="MARGIN-LEFT: 0.5in" class="MsoNormal"><span style="font-size:130%;">Categorization of content by creating tags such as simple, one-word user-determined descriptions to facilitate searching and avoid rigid, pre-made categories.<o:p></o:p></span></p><p class="MsoNormal"><b><span style="font-size:130%;">Extensions<o:p></o:p></span></b></p><p style="MARGIN-LEFT: 0.5in" class="MsoNormal"><span style="font-size:130%;">Powerful algorithms that leverage the Web as an application platform as well as a document server.<o:p></o:p></span></p><p class="MsoNormal"><b><span style="font-size:130%;">Signals<o:p></o:p></span></b></p><p style="MARGIN-LEFT: 0.5in" class="MsoNormal"><span style="font-size:130%;">The use of </span><a title="RSS" href="http://en.wikipedia.org/wiki/RSS"><span style="font-size:130%;">RSS</span></a><span style="font-size:130%;"> technology to rapidly notify users of content changes.<o:p></o:p></span></p><br /><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><br /><p style="TEXT-INDENT: 0.5in" class="MsoNormal"><o:p><span style="font-size:130%;"></span></o:p></p><p class="MsoNormal"><b><span style="font-size:130%;">Examples of Web 2.0<o:p></o:p></span></b></p><table style="BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; BORDER-COLLAPSE: collapse; MARGIN-LEFT: 77.4pt; BORDER-TOP: medium none; BORDER-RIGHT: medium none" class="MsoTableGrid" border="1" cellspacing="0" cellpadding="0"><tbody><tr><td style="BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: windowtext 1pt solid; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><b><span style="font-size:130%;">Web 1.0 <o:p></o:p></span></b></p></td><td style="BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: windowtext 1pt solid; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><b><span style="font-size:130%;">Web 2.0<o:p></o:p></span></b></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">DoubleClick</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">Google</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">AdSense Ofoto</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">Flickr</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">Akamai</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">BitTorrent</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">mp3.com</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">Napster</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">Britannica Online</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">Wikipedia</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">personal websites</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">blogging</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">evite</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">upcoming.org and EVDB</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">domain name speculation</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">search engine optimization</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">page views</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">cost per click</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">screen scraping</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">web services</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">publishing</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">participation</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">content management systems</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">wikis</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">directories (taxonomy</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">tagging ("folksonomy")</span></p></td></tr><tr><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: 1pt solid; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 2in; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="192"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">stickiness</span></p></td><td style="BORDER-BOTTOM: 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEFT: 5.4pt; WIDTH: 153pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: 1pt solid; PADDING-TOP: 0in" valign="top" width="204"><p style="TEXT-ALIGN: center" class="MsoNormal" align="center"><span style="font-size:130%;">syndication</span></p></td></tr></tbody></table><br /><span class="Apple-style-span"><span style="WHITE-SPACE: pre" class="Apple-style-span"><span style="font-family:times new roman;font-size:130%;">Reference:<br /></span></span></span><ul><li><a href="http://en.wikipedia.org/wiki/Web_2.0"><span style="font-size:130%;">http://en.wikipedia.org/wiki/Web_2.0</span></a></li><li><a href="http://oreilly.com/web2/archive/what-is-web-20.html"><span style="font-size:130%;">http://oreilly.com/web2/archive/what-is-web-20.html</span></a><span style="font-size:130%;"><br /></span></li></ul><span class="Apple-style-span" style="font-size:100%;"><span style="WHITE-SPACE: pre" class="Apple-style-span"><br /></span></span></div><div style="TEXT-ALIGN: justify"><span class="Apple-style-span" style="font-size:100%;"><span style="WHITE-SPACE: pre" class="Apple-style-span"><br /></span></span></div><div style="TEXT-ALIGN: justify"><span style="font-family:times new roman;font-size:100%;"></span></div>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0tag:blogger.com,1999:blog-7076671658705256834.post-89769668722146445432009-06-19T02:14:00.000-07:002009-07-11T07:31:29.298-07:00The Comparison of Revenue Model for Google, Amazon.com and eBay<div style="TEXT-ALIGN: left" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="color:#336666;"><strong>Revenue models</strong></span> are techniques used to generate profits, and its component consists of sales, transaction fees, subscription fees, advertising fees, affiliate fees and other revenue sources.</span></span></div><div style="TEXT-ALIGN: center"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="TEXT-DECORATION: none" href="http://2.bp.blogspot.com/_87mczwseoR8/SjufkN0A-4I/AAAAAAAAADU/wM2wSI8Sk5Q/s1600-h/images3.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 126px; DISPLAY: block; HEIGHT: 89px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5349044426964532098" border="0" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SjufkN0A-4I/AAAAAAAAADU/wM2wSI8Sk5Q/s200/images3.jpg" /></span></a></div><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">Google rake in a total of US$ 21.8 billion in revenue for in 2008. In a flash, the breakdowns of revenues in figures and percentage are: </span></p><ol><li><div style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 0.5in" class="MsoNormal"><span style="font-family:times new roman;font-size:130%;"><span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"></span></span>Advertising- 97% (21.1 billion)</span></div></li><li><div style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 0.5in" class="MsoNormal"><span style="font-family:times new roman;font-size:130%;"><span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"></span></span>licensing and other revenues -3% (667 million) </span></div></li></ol><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">which consist of:</span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpFirst"><span style="font-family:times new roman;font-size:130%;">1.<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span><b><span style="color:#7030a0;"><span class="Apple-style-span" style="font-size:small;">Subscription fees</span></span></b> whereby monthly or yearly fixed amount is paid to get services. Services offered by Google include internet ad serving and management services to advertisers and ad agencies</span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:GeneralGG-330;" >2.<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><b><span style="color:#7030a0;"><span class="Apple-style-span" style="font-size:small;">Advertising fees</span></span></b> where payment is derived from advertiser for placing ads in both Google websites and Google Network websites. Example of this is <span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">Google AdSense</span><b><span class="Apple-style-span" style="font-size:small;">, </span></b><span class="Apple-style-span" style="font-size:small;">an online programs that aids in distribution of advertisers’ AdWords ads for display as well as programs to deliver ads on television and radio broadcasts. This program includes: </span><span class="Apple-style-span" style="font-size:small;"><?xml:namespace prefix = o /><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 1in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:Symbol;" >·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">AdSense for search (display relevant search results) as well as for content (display ads relevant to content on Google websites). </span></span><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">Advertisers will pay each time a user click on it, unless they choose the pay based on cost-per-impression pricing. </span><span class="Apple-style-span" style="font-size:small;"><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 1in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:Symbol;" >·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">Google TV Ads enables advertisers, operators and programmers to buy, schedule, deliver and measure ads on television. Fees will be charged each time an ad is displayed on television.</span></span><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;"><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 1in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:Symbol;" >·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">Google Audio Ads enables th</span></span><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">e distribution of advertisers’ ads for broadcast on radio programs</span><span class="Apple-style-span" style="font-size:small;"><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:GeneralGG-330;" >3.<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;color:#6600cc;">Affiliate fees</span></span></b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;"> whereby commissions is earned for referring customers to client’s website. Google Adwords</span><b><span class="Apple-style-span" style="font-size:small;"> (</span></b></span>an automated online program that allows advertisers to place <span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">targeted text-based or banner ads on its websites)</span><b><span class="Apple-style-span" style="font-size:small;"> </span></b><span class="Apple-style-span" style="font-size:small;">clearly illustrates the type of fees earned in this section, which are:</span><span class="Apple-style-span" style="font-size:small;"><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 1in" class="ListParagraphCxSpMiddle" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:Symbol;" >·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">cost-per-click basis</span></span></b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;"> - payment due when a user clicks on any of its ads</span><span class="Apple-style-span" style="font-size:small;"><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 1in" class="ListParagraphCxSpMiddle" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:Symbol;" >·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">cost-per-impression</span></span></b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;"> - payment due when a user clicks on any of its ads. Alternatively, payment depending on the number of times advertiser ads appear on its websites as specified by the advertiser</span><span class="Apple-style-span" style="font-size:small;"><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in; MARGIN-LEFT: 1in" class="ListParagraphCxSpLast" align="justify"><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%;font-family:Symbol;" >·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span></span><b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;">cost-per-click pricing</span></span></b><span style="LINE-HEIGHT: 115%"><span class="Apple-style-span" style="font-size:small;"> - advertisers will be charged every time a user clicks on one of the ads which appear next to the search results</span><span class="Apple-style-span" style="font-size:small;"><o:p></o:p></span></span></span></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">Detailed information can be obtained via http://investor.google.com/fin_data.html</span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_87mczwseoR8/Sjufz0weGjI/AAAAAAAAADc/m6uC5RI8THQ/s1600-h/images5.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 143px; DISPLAY: block; HEIGHT: 60px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5349044695116683826" border="0" alt="" src="http://3.bp.blogspot.com/_87mczwseoR8/Sjufz0weGjI/AAAAAAAAADc/m6uC5RI8THQ/s200/images5.jpg" /></span></a><span style="font-family:times new roman;font-size:130%;">As one of the leading e-commerce platforms in the world, E-bay delivered 8.5 billion in revenues in 2008 <span style="color:black;"><span class="Apple-style-span" style="font-size:small;">from e-commerce, payments (PayPal and Bill Me Later) and Internet voice communications(Skype). Revenue generated from non sales totaled to US$1 billion. </span></span>E-bay’s model revenue include:</span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpFirst"><span style="font-family:times new roman;font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> <span style="color:#6600cc;"><strong>Sales</strong></span></span></span><span style="color:#6600cc;"><strong> </strong></span>– revenue from marketplaces, where sales transaction of goods and services takes place as well as online auction where bids are placed via internet.</span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span><b><span class="Apple-style-span" style="font-size:small;color:#6600cc;">Advertising fees</span></b> – ads of text and graphical, global classifieds sites including LoQUo.com, Intoko, and Netherlands-based Marktplaats.nl, and Kijiji</span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span><b><span class="Apple-style-span" style="font-size:small;color:#6600cc;">Other revenue sources</span></b> – interest earned from banks on certain PayPal customer account balances, interest and fees earned on the Bill Me Later loan portfolio and from contractual arrangements with third parties that provide services to all of E-bay users</span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span><b><span class="Apple-style-span" style="font-size:small;color:#6600cc;">Subscription fees</span></b>- Skype, one of the business unit generates revenue through its premium offerings, such as calls (using its software) made to and from landline and mobile phones; voicemail; call forwarding; and personalization, including ringtones and avatars. Fees are charged to users to connect Skype’s VoIP product to traditional fixed-line and mobile telephones. These fees are charged on a per-minute basis or on a subscription basis</span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpLast"><span style="font-family:times new roman;font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span><b><span class="Apple-style-span" style="font-size:small;color:#6600cc;">Transaction fees</span></b> - commission is paid on volume of transaction. For E-bay, net transaction revenues are derived primarily from listing and final value fees paid by sellers.</span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">Detailed information can be obtained via http://files.shareholder.com/downloads/ebay/663797116x0x281367/1b773a7c-8c14-45b8-915a-1716ca37dda0/eBay_2008AR.pdf</span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_87mczwseoR8/SjugDmNURKI/AAAAAAAAADk/D6zOF4IkZBk/s1600-h/images4.jpg"><span style="font-family:times new roman;font-size:130%;"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 120px; DISPLAY: block; HEIGHT: 103px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5349044966089049250" border="0" alt="" src="http://4.bp.blogspot.com/_87mczwseoR8/SjugDmNURKI/AAAAAAAAADk/D6zOF4IkZBk/s200/images4.jpg" /></span></a><span style="font-family:times new roman;"><span style="font-size:130%;"><span style="LINE-HEIGHT: 115%; mso-bidi-mso-bidi-font-weight: bold">Amazon delivered<b><span class="Apple-style-span" style="font-size:small;"> </span></b></span><span style="LINE-HEIGHT: 115%;color:black;" ><span class="Apple-style-span" style="font-size:small;">$645 million in revenue for 2008.</span></span><span style="LINE-HEIGHT: 115%; mso-fareast-Times: "><span class="Apple-style-span" style="font-size:small;"> Amazon core business resides in its retails websites where wide range of products and services to customers are being sold. Thus its revenue model is quite simple:</span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpFirst"><span style="font-family:times new roman;"><span style="font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> <strong><span style="color:#cc66cc;">Sales</span></strong></span></span> - <span style="LINE-HEIGHT: 115%; mso-fareast-Times: "><span class="Apple-style-span" style="font-size:small;">purchased merchandise and content for resale from vendors and products offered by third party sellers</span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpMiddle"><span style="font-family:times new roman;"><span style="font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span><b><span style="LINE-HEIGHT: 115%; mso-fareast-Times: "><span class="Apple-style-span" style="font-size:small;color:#cc66cc;">Advertising fees</span></span></b><span style="LINE-HEIGHT: 115%; mso-fareast-Times: "><span class="Apple-style-span" style="font-size:small;"> - miscellaneous marketing and promotional offers, such as online advertising, where Amazon is not the seller but instead earn fixed fees, revenue share fees, per-unit activity fees, or some combination thereof</span></span></span></span></p><p style="TEXT-ALIGN: justify; TEXT-INDENT: -0.25in" class="ListParagraphCxSpLast"><span style="font-family:times new roman;"><span style="font-size:130%;">·<span style="FONT: 7pt 'Times New Roman'"><span class="Apple-style-span" style="font-size:small;"> </span></span><b><span style="LINE-HEIGHT: 115%; mso-fareast-Times: "><span class="Apple-style-span" style="font-size:small;color:#cc33cc;">Other revenue sources</span></span></b><span style="LINE-HEIGHT: 115%; mso-fareast-Times: "><span class="Apple-style-span" style="font-size:small;"><span style="color:#993399;">-</span> shipping revenues, co-branded credit card agreements</span></span></span></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;">More information can be obtained from :</span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"><span class="Apple-style-span" style="font-family:times new roman;font-size:130%;"><a href="http://phx.corporate-ir.net/External.File?item=UGFyZW50SUQ9MjAyN3xDaGlsZElEPS0xfFR5cGU9Mw==&t=1">http://phx.corporate-ir.net/External.File?item=UGFyZW50SUQ9MjAyN3xDaGlsZElEPS0xfFR5cGU9Mw==&t=1</a></span></p><p style="TEXT-ALIGN: justify" class="MsoNormal"> </p>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0tag:blogger.com,1999:blog-7076671658705256834.post-26302733240610435062009-06-11T16:29:00.000-07:002009-07-07T09:01:49.039-07:00To Get Know More About Steven Chua<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_87mczwseoR8/SjGVrgtoLrI/AAAAAAAAACk/G60Y4DlvhD4/s1600-h/DSC00144.JPG"></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_87mczwseoR8/SjGVrgtoLrI/AAAAAAAAACk/G60Y4DlvhD4/s1600-h/DSC00144.JPG"><img id="BLOGGER_PHOTO_ID_5346218807413714610" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: pointer; HEIGHT: 240px; TEXT-ALIGN: center" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SjGVrgtoLrI/AAAAAAAAACk/G60Y4DlvhD4/s320/DSC00144.JPG" border="0" /></a><br />Are you looking these pictures?what you will think??do you think i am fierce and hard to close??<br />If your answer is YES, i am very sorry to say that your answer is totally incorrect.<br /><br /><div align="center"><strong><em><span style="font-size:130%;color:#ff0000;">Dont use your first impression to determine his personality</span></em></strong></div><div align="center"><strong><em></em></strong> </div><div align="center"><strong><em></em></strong></div><div align="left">Hi everybody, my name call Chua Tian Huat. In my hometown, my friends always call me "Chua". However when i was study at UTAR, KL, i want everybody always remember me so that i was create a nickname for myself- <em>Steven. </em>I live at Muar, Johor but my KL friends always told me stay at JB, i also dont know why. (their perception maybe always think that JOHOR=JB ).<em> </em></div><div align="left"><em></em>Nowaday i am studying Bachelor of Commerce (Hons) Accounting year 3 semester 1 at Sungai Long Campus. In the first year at here, i may have a bit regret to choose this course because it is a most difficult course for this campus. However, after i close my eyes, i was study at here for 2 years. </div><div align="left">Moreover, i am a hyperactive internet user that I can sit in front of the computer to more than 12 hours. When i saw my E-Commerce assignment question, one of the question is "what internet activities i usually use?". Guy always like to use the internet to playing online games, so am I. I also use the internet to search the data for my study. Beside I like to watch the Taiwanese Drama, i will use the internet to download the movies for me to watch during free time. MSN, this is a common communication tool for your parents and friends nowaday. It has become my "Necessary" items for me to chat with my oversea friends and campus friends. I was began to study the news by using online because it is free-of-charge (FOC).</div><div align="left">Top 5 website i visited the most is PP Stream, ChinaPress.com, Facebook, Friendster and Utar WBLE. Sometimes i am lazy to wait the movie to download, i will use the PP Stream to watch the latest Taiwanese Drame. ChinaPress.com is provided all updated news for me to read and it also FOC . The information in the ChinaPress.com is very resourceful. i was played Friendster when i was study in Foundation, i can always keep in touch with my friend by using it. Nowaday, most of the people are know what is Facebook? i was use it to add my friends, upload the images, chat with my friends, and play online games such as Pet Society and Restaurant City. Because i am the courserep for G9 to G14, i need to always log in to WBLE to get the updated notes to print for my coursemates. I also post some questions in the forum.</div><div align="left"></div><div align="center"></div>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0tag:blogger.com,1999:blog-7076671658705256834.post-71259471609921240542009-06-11T09:05:00.001-07:002009-07-07T09:01:49.039-07:00Get to know more about Yew...<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_87mczwseoR8/SjFI5EYF7hI/AAAAAAAAABQ/Fs1xOsqEbsg/s1600-h/1_433659290m.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 200px; height: 266px;" src="http://1.bp.blogspot.com/_87mczwseoR8/SjFI5EYF7hI/AAAAAAAAABQ/Fs1xOsqEbsg/s320/1_433659290m.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5346134377930026514" /></a><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"><br /></span></span><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">Hi, Chang Onn Yew here, prefer you guys just to call me Yew.</span></span><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"> I'</span></span><span class="Apple-style-span" style="border-collapse: collapse; "><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">m a very simple person but yet still extraordinary. I'm a guy who is easy going, friendly, like to play sports just like any others boy will do. But sometimes I might become emotional if someone really piss me off, so try not to do so..haha. Almost all of my friends, family, relatives will always saying that I'm TOO skinny. It seems like being a 'trademark' for me. Well, trying to gain weight might be a challenge for me.</span></span></span><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"><br /></span></span></span></div><div><span class="Apple-style-span" style="font-family:'trebuchet ms';"><span class="Apple-style-span" style="font-size:small;"></span></span><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">When it comes to sport, football definitely is my favourite. I started to play football since I'm 9 years old. Besides, gaming is also one of the entertainment to spend my time to reduce my boringness. I always wish to travel around the world just with my backpack. How cool whats that to become a backpacker.</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"><br /></span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">Currently I'm studying at UTAR to pursue my first degree which is Bachelor of Accounting. Never think of to become an accountant in the future(ops!). So here are my </span></span><b><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">Top 5 Websites I Visited The Most:</span></span></b></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><a href="http://apple.com/trailers"><span class="Apple-style-span" style="color:#3366FF;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">apple</span></span></span></a><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"> - search for the latest movies' trailer</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><a href="http://google.com/"><span class="Apple-style-span" style="color:#3366FF;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">google</span></span></span></a><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"> - whatever information we need, just 'google it'</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><a href="http://youtube.com/"><span class="Apple-style-span" style="color:#3366FF;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">youtube</span></span></span></a><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"> - usually search for music/funny video clip</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><a href="http://nikeskateboarding.com/"><span class="Apple-style-span" style="color:#3366FF;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">nikeskateboarding</span></span></span><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"> </span></span></a><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">- look for my latest favourite shoes</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><a href="http://www.utar.edu.my/"><span class="Apple-style-span" style="color:#3366FF;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">utar intranet</span></span></span></a><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"> - update myself with the information and activities provided</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"><br /></span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><b><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">Top 5 Internet Activities:</span></span></b></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">-check my mail</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">-google whatever that just come accross my mind</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">-search is there any new movie to be release</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">-chatting through msn</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">-gaming</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"><br /></span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">Thats all for this time, follow by the coming week, me and my group members will post some usefull information related to e-commerce. Remember to support us!</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"><br /></span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">P/S: agree with what pei ni said, how come we named this blog Pirates in UTAR, sounds very weird. Can we change it or create a new one?haha XD</span></span></span></div><div><span class="Apple-style-span" style="border-collapse: collapse;"><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';"><br /></span></span></span></div><div><span class="Apple-style-span" style=" border-collapse: collapse; "><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="font-family:'trebuchet ms';">Yew</span></span></span></div>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0tag:blogger.com,1999:blog-7076671658705256834.post-15864971315059242802009-06-11T08:12:00.000-07:002009-07-07T09:01:49.039-07:00Pirates In UTARHey, I am Chew Pei Ni, an ordinary Malaysian citizen living quietly in Selangor. Like any other females of my age, I am still studying at this point of my life. As an undergraduate in University Tunku Abdul Rahman picking up accountancy, I hope, and will be jobless by May 2010. Before my "forced retirement", I aim to equip myself with all the necessary armors to fight for my survival in the workforce. My family is like an ancient court: I am answerable only to a dictatorial emperor and a loving empress while I rule over 3 mischievous but taller than me jesters and a dog (cheh).<br /><br />No doubt, I like to eat, sleep and play! Other than that, I also enjoy traveling, reading, dancing and etc. Basically, all activities are my hobbies (I think), except those detrimental to my health and well-being, like smuggling and humantrafficking(but I must admit that the money involved is very, very tempting...*evil grin*)<br /><br />My internet activities are basically searching for information, keeping in touch with my friends, watching online movies, listening to online music as well as gaming! With internet, information is but a click away. You will be amazed by the volume and type of information you can get by typing a very simple and innocent word...try googling your name to test it out^^I like watching movies and listening music via the internet, I bet mountains of people are practicing this and even downloading it illegally. Why? Because it is Free-Of-Charge!!!Seriously violating the copyright and patent right happily. It's obvious why we named this blog Pirates In UTAR. We don't steal gold, snatch pretty maidens or manslaughter. We just..you know...(laugh out loud)<br /><br />PS:when I mention "we", it means my whole group lor~ahahaPIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0tag:blogger.com,1999:blog-7076671658705256834.post-14711509568221708132009-06-09T16:20:00.000-07:002009-07-08T07:13:18.453-07:00Introduction of myself - Gan Chui Wei<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_87mczwseoR8/SjFLM8TfmwI/AAAAAAAAABg/onIqdZ1Nlmg/s1600-h/Picture%2B100.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 202px; FLOAT: left; HEIGHT: 269px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5346136918383893250" border="0" alt="" src="http://2.bp.blogspot.com/_87mczwseoR8/SjFLM8TfmwI/AAAAAAAAABg/onIqdZ1Nlmg/s320/Picture%2B100.jpg" /></a> <img src="http://3.bp.blogspot.com/_87mczwseoR8/Si4c76RPwhI/AAAAAAAAAAk/vuSGNXtOYMo/s320/657768iebuox106u.gif" /> <img src="http://2.bp.blogspot.com/_87mczwseoR8/Si4c7uu_3DI/AAAAAAAAAAc/3e7IS2KEeFA/s320/657768iebuox106u.gif" /> <div>My name is <span style="color:#6633ff;">Gan Chui Wei</span>, from <span style="color:#6666cc;">BAC 11</span>, year 3 sem 1 student(Universiti Tunku Abdul Rahman at Sungai Long). I'm taking E-commerce for this semester, so I and my group members(Chew Pei Ni, Steven Chua Tian Huat, Chang Onn Yew) have to create blog and posts here. Hope you guys can enjoy our posts that posted at here. <div><div><div><div><br /><div align="justify">At first, i would like to introduce myself to you all. My name is Chui Wei, can call me Angel. My hometown named Tanjog Karang, located between Sekinchan and Kuala Selangor. It takes about 2 hours if travel by car from Sungai Long to my hometown. My hobbies are <span style="color:#6666cc;">online, listen music,read book, and sleep</span>. The top 5 websites that i visited the most are: <span style="color:#000099;"><a href="http://www.blogger.com/www.facebook.com"><span class="Apple-style-span" style="color:#3366ff;">Facebook</span></a><span class="Apple-style-span" style="color:#3366ff;">, </span><a href="http://wble.utar.edy.my/"><span class="Apple-style-span" style="color:#3366ff;">WBLE</span></a><span class="Apple-style-span" style="color:#3366ff;">, </span><a href="http://www.blogger.com/www.dygod.com"><span class="Apple-style-span" style="color:#3366ff;">Dygod</span></a><span class="Apple-style-span" style="color:#3366ff;">, </span><a href="http://www.blogger.com/www.friendster.com"><span class="Apple-style-span" style="color:#3366ff;">Friendster</span></a> </span><span style="font-size:0;">and</span><span style="color:#000099;"> <a href="http://www.blogger.com/www.google.com"><span class="Apple-style-span" style="color:#3366ff;">Google</span></a></span>. I like to visit Facebook and Friendster because i can find my secondary and primary friends and contact them through these websites. For Dygod, i can download movie and Hong Kong's series that are the latest to watch. By searching Wble and Google, i can download some notes from wble and search information for my assignment and thesis. My top 5 internet activities are search information for my study, download movie, playing restaurant city and pet society on Facebook, read news from online newspaper and searching for latest songs. </div><div align="justify"><br /></div><div align="justify">As a year 3 student, i started my research project with the topic "<span style="color:#cc0000;">Examinig Malaysian consumer's perception toward investing in Islamic banking</span>". Anyone if have any additional or relevant information about this area, can send e-mail (<a href="mailto:gcw329@hotmail.com"><span class="Apple-style-span" style="color:#3366ff;">gcw329@hotmail.com</span></a>) to me or leave your information at comment box. Thanks for helping me.</div><br /><br /><div align="justify">Hope you all can enjoy posts that posted by my group members and me.</div><br /><div align="justify">Chui Wei<br /></div><br /><br /><br /><br /><div align="justify"></div></div></div></div></div></div>PIRATES in UTARhttp://www.blogger.com/profile/14979324322959386202noreply@blogger.com0