tag:blogger.com,1999:blog-86741129926340050822024-03-13T13:07:10.379+08:00E-MarketplaceOur take on E-CommerceAnonymoushttp://www.blogger.com/profile/09656654626904885136noreply@blogger.comBlogger19125tag:blogger.com,1999:blog-8674112992634005082.post-29276858965927440842009-02-20T21:22:00.001+08:002009-03-02T19:36:39.818+08:00E-Government in Malaysia: Its implementation so far and Citizen’s adoption strategies.<div style="text-align: center;"><span style="color: rgb(255, 0, 0);font-size:180%;" ><span style="font-weight: bold;">~Malaysia E-Government~</span></span><br /></div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP4ZGm2i-I1XZwLRIPDj1AmpyADvwyE5ziUFL-CgCfH8EKe96PwQ9qpebHHgemFeTNU0iTgKIKzUNn7u2CT5cNZgZXj35jLBZY8UE8TwvZnluD5Vg5YW0wjypSn9J1CK_GqukCrvQyDgQ/s1600-h/MalaysiaGov.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 284px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP4ZGm2i-I1XZwLRIPDj1AmpyADvwyE5ziUFL-CgCfH8EKe96PwQ9qpebHHgemFeTNU0iTgKIKzUNn7u2CT5cNZgZXj35jLBZY8UE8TwvZnluD5Vg5YW0wjypSn9J1CK_GqukCrvQyDgQ/s400/MalaysiaGov.jpg" alt="" id="BLOGGER_PHOTO_ID_5307870703157665746" border="0" /></a><br /><br /><br />E-government, short for electronic government is the use of information and communication technology to provide and improve government services, and among citizens, businesses and others.<br /><br />A tremendous effort has been made to enhance service delivery via electronic means since the 1990 announcement of the e-Government initiative for Malaysia. Most apparent is the construction of facilities and amenities to support the electronic flow of information to the public. Then, E-government launched and implemented since the initiation of Multimedia Super Corridor (MSC) by Malaysia Government in 1996. Since, it lead the country into the Information Age.It will help to improve how the government operates internally, enabling the government to be more responsive to the needs of its citizens.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkJieD9hCvKy30nVmZKFHhv8bwG13nkxvlmixtFzANskdnVkg2VAf9T6VZjyrWvBuvEbGLOILhohlnprp4eZeG9XSnYfH66qvIaSIfmI6zHXvy5pYsNLRhddqzBsJbw7qKEHo2HauHK6Q/s1600-h/brand.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkJieD9hCvKy30nVmZKFHhv8bwG13nkxvlmixtFzANskdnVkg2VAf9T6VZjyrWvBuvEbGLOILhohlnprp4eZeG9XSnYfH66qvIaSIfmI6zHXvy5pYsNLRhddqzBsJbw7qKEHo2HauHK6Q/s400/brand.gif" alt="" id="BLOGGER_PHOTO_ID_5307870855149669314" border="0" /></a><br /><br />E-government was one of the Seven Flagship Application introduced by MSC in order to lead the Malaysian towards the objectives of Vision 2020. However, there are seven pilot projects of the Electronic Government Flagship Application :<br /><br /><ol><li>Project Monitoring System (SPP II)</li><li>Human Resource Management Information System (HRMIS)</li><li>Generic Office Environment (GOE)</li><li>Electronic Procurement (EP)</li><li>Electronic Services (E-services)</li><li>Electronic Labour Exchange (ELX)</li><li>E-syariah</li></ol>Under these seven pilot projects, it is divided into three categories , one is Government to Citizens (G2C), the other is Government to Business (G2B), and Government to Government (G2G).<br /><br /><span style="font-weight: bold;font-size:130%;" >Government to Citizens</span><br /><br /><span style="font-style: italic;">1) Electronic Services (E-services)</span><br /><br />With e-services, anyone can now conduct transactions with Government agencies, such as Tenaga Nasional Berhad (TNB) and Telekom Malaysia Berhad (TM) through various convenient channels such as the eServices kiosks and internet. It eliminate the queuing, traffic jams or bureaucratic hassles and they can conduct transactions at their own wish and convenience.<br /><br /><span style="font-style: italic;">2) Electronic Labour Exchange (ELX)</span><br /><br />ELX is one stop-centre for labor market information, as supervised by the Ministry of Human Resource (MORH), to enable employers and job seekers to communicate on the same platform. Their objectives are :<br /><ul><li>Enable an effective and integrated job matching process.</li><li>Provide an effective center of labot market information and references.</li><li>To improve mobilisation of the nation's human resources and to ensure that manpower utilisation is optimized.</li></ul><br /><span style="font-style: italic;">3) E-Syariah </span><br /><br />E-syariah is the seventh project under the Electronic Government flagship application of the MSC. A case management system that integrates the processes related to management of cases for the Syariah Courts. And, the objectives are :<br /><ul><li>To improve the quality of services of the Syariah Courts</li><li>To improve the effectiveness of JKSM (Jabatan Kehakiman Syariah Malaysia) in coordinating and supervising related agencies under its jurisdiction.</li><li>To improve the productivity and efficiency of the management of the Syariah courts throughout the country.</li><li>To upload the splendors of Islam through the use of ICT (Information of Communication and Technology)<br /></li></ul><span style="font-weight: bold;"><span style="font-weight: bold;"><br />Government to Business (G2B)<br /><br /></span></span><span style="font-style: italic;">1)E-procurement</span><br /><br />An electronic procurement system, which enables suppliers to sell goods and services to the Government through the Internet. Suppliers "open shop" on the World Wide Web (WWW), advertise their pricing, process orders and deliveries. Its objectives includes :<br /><ul><li>Enables accountability and transparency.</li><li>Creates more skilled and knowledgeable workforce.</li><li>Equips the workforce with the latest technology at minimum cost.</li></ul><span style="font-style: italic;">2)Generic Office Environment (GOE)</span><br /><br />Powerful document and office management solution that enables users to effectively and efficiently manage their office environment. It is fully web-based and has been customized based on local developed package, DRDok. Its objectives includes :<br /><ul><li>Efficient preparation and storage of documents.</li><li>Fast search and retrieval of documents.</li><li>Effective and productive collaboration and sharing of information.</li><li>Secure and traceable access to documents.</li></ul><span style="font-weight: bold;">Government to Government (G2G)</span><br /><br /><span style="font-style: italic;">1) Human Resource Management Information System (HRMIS)</span><br /><br />HRMIS is integrated, technology-enabled Human Resource Management Information System for the Malaysian Public Service, incorporating Global Best Practices in HR that would enable the Public Service to successfully deal with the Challenges of the K-Economy(knowledge and the ability to use it to create new value and wealth). Objectives includes :<br /><ul><li>Effective staffing and right-sizing of civil service.</li><li>Up-to-date consolidated HR data for effective information planning.</li><li>Automate human resource anagerial and operational processes.</li><li>Improve paperless HRM capabilities.</li><li>Open and flexible system.</li><li>Better communication, horizontal integration, streamlined processes and single window access.</li></ul><span style="font-style: italic;">2) Project Monitoring System (SPP II)</span><br /><br />Online system that monitors the entire lifecycle of national programs, i.e. from project application to approval to implementation, mid-term review and completion. Its objectives includes:<br /><ul><li>To support and monitor entire lifecycle of Malaysia's 5-Year development program.</li><li>To have a quality projects.</li><li>To provide a platform for exchanging ideas and demonstrating best practices models in project implementation.</li><li>To have an effective decision making based on analysis/forecasting of project informaiton and auto-alert on problem projects (e.g. Budget overrun).</li></ul><br /><br /><span style="font-size:130%;"><span style="font-weight: bold;">Citizen’s adoption strategies</span></span><br /><br />The government should increase the awareness and gain more attentio<span style="font-size:100%;">n from citizens in the existing of their services provided in e-Governm</span><span style="font-size:100%;">ent.</span><span style="line-height: 115%;font-family:";font-size:100%;" lang="EN-US"><span style="font-family:arial;"> </span></span>Then, E-Government adoption requires that citizens show higher levels of satisfaction and security with the online service provided by the government. A higher level of customer satisfaction will increase the rate of e-Government adoption because the citizens are comfortable of the protected privacy and confidentiality of the user's information. Moreover, the service quality should be competitive with the other developed country in terms of speed, problem serving approach, and ease of use of the website. This is important as it provide and encourage long-term users to use the website frequently and cut-off paper work when the payment process can be made through online. Lastly, the government should do more advertising through radio and tv, and organising workshop in a strategic location in order to create awareness and convenience for problem solving as they are full-focus in providing the best services to its citizens.<br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG_UcN6N6oz4w5xsPXU5PphAvFBqxF5N6XxmDh_FEqp8GeJwsri3B_yjd5V_0-mQratscwnU9Be1I8rloXwtska6dl_Yk0ECvjXbwUwja5QtXPm2G_p-eHRMhFBh0KjqqEUDtPX-9SrhI/s1600-h/newlogo.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 250px; height: 108px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG_UcN6N6oz4w5xsPXU5PphAvFBqxF5N6XxmDh_FEqp8GeJwsri3B_yjd5V_0-mQratscwnU9Be1I8rloXwtska6dl_Yk0ECvjXbwUwja5QtXPm2G_p-eHRMhFBh0KjqqEUDtPX-9SrhI/s400/newlogo.jpg" alt="" id="BLOGGER_PHOTO_ID_5307871160913043650" border="0" /></a>HoCk LiaN @ SteveNhttp://www.blogger.com/profile/14578047751150471877noreply@blogger.com3tag:blogger.com,1999:blog-8674112992634005082.post-16943649725588321822009-02-20T15:04:00.006+08:002009-02-20T16:01:58.762+08:00Corporate Blogging: A new marketing communication tool for companies<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxqZB1NnV1FmmxcuAnDZ8Z5-ZbFq_c4ppqo6QjhX4BXwkKEjMwubC6lCPkZcmfp3A3gvpHZ7Daf16ug3Txn5cN4jeXFJ2rxImbE-kKHdosmKrkSTXnhU8sOLoh2XB6Naf3Hpkkt5mFxh68/s1600-h/2889870505_9aebec83bb.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxqZB1NnV1FmmxcuAnDZ8Z5-ZbFq_c4ppqo6QjhX4BXwkKEjMwubC6lCPkZcmfp3A3gvpHZ7Daf16ug3Txn5cN4jeXFJ2rxImbE-kKHdosmKrkSTXnhU8sOLoh2XB6Naf3Hpkkt5mFxh68/s320/2889870505_9aebec83bb.jpg" alt="" id="BLOGGER_PHOTO_ID_5304786659522946690" border="0" /></a><br /><br />With the increase in commodity prices and the slow economy, traditional marketing strategies might prove too costly with advertising and and marketing campaigns. However, you still need to get the public to know about your product or service. Why not take advantage of the networking ties and search engine benefits of a blog?<br /><br />What once started out as a way to share one's personal thoughts with the world has now become a great public relations and marketing tool.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RaGNl3WSPsT2shPfEr43ClhJSJgTwsyyTmaeRXucvC-WnCjzk4nAoqeAY0cx3ofBoWJfEmBrPuX79qxlfrP9Fbc3TXwVRf5y_hhj3alwsZ3owrvDMzfkT2c6OhKeuTvXt2gmz1qqCPsM/s1600-h/corporate_blogs.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 225px; height: 131px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0RaGNl3WSPsT2shPfEr43ClhJSJgTwsyyTmaeRXucvC-WnCjzk4nAoqeAY0cx3ofBoWJfEmBrPuX79qxlfrP9Fbc3TXwVRf5y_hhj3alwsZ3owrvDMzfkT2c6OhKeuTvXt2gmz1qqCPsM/s320/corporate_blogs.jpg" alt="" id="BLOGGER_PHOTO_ID_5304785001968463762" border="0" /></a><br />Corporate blogs are weblogs (blogs) published and used by an organization to reach its organizational goals. Blogs published and used by organizations for marketing purposes, however, are called Blog Marketing. These blogs differ from corporate websites because they feature daily or weekly posts, often around a single topic. Typically, corporations use blogs to create a dialog with customers and explain features of their products and services.<br /><br />Many organizations use blogs with their user community. This allows them to share and preview product features, functions, and benefits before the products are released. Blogs are an excellent way to gather feedback and to make sure products meet the needs of users. Blogs have become the next generation marketing tool to corporate websites which merely post collateral and do not provide any interactive feedback.<br /><br /><span style="font-family:Verdana;font-size:100%;"><span style="font-family:georgia;">Recently, major conglomerates have been using them as a marketing device to gain feedback from customers, discuss news or promote the latest softwares. The business world's posting pioneers say blogging helps them network, boost sales, and even lobby - at a fraction of the cost of traditional media. Many industries are now hiring full time employees to maintain the company blogs.<br /><br /></span><span style="font-family:georgia;"> Selective blogs, featuring content that offer insight and analysis are the subject matters readers want to make use of. According to EMarketer, the number one reason people read blogs is, “To get news and information I can’t find elsewhere.” Others like blogs because they’re easy to navigate and usually provide daily updates of information. It’s an innovative way to get news quickly and easily. </span></span><br /><br />People can look through blogs at their own leisure. They can revisit the blog by pasting the URL onto their web browser. This is a form of advertising and it is excellent because it will be sought by customers when they seek to visit it again and again. This is better than in the orthodox way where by TV or radio, the ad needs to reach the consumers.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA7MSonF8D-kyzmzYUyrrdGCoFGYl0rt-FfhVlsn8V3vEAjksD-98CLpcREt7EG0UfsNzPnNVhyphenhyphenGdMQLfY570VQu8W75p_QlnK1Kif5FQ-dv0SakA2mSwjyds-dBF48eVeaKZ3ZN4vQuWT/s1600-h/2765981920_61f81eb8be.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 150px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA7MSonF8D-kyzmzYUyrrdGCoFGYl0rt-FfhVlsn8V3vEAjksD-98CLpcREt7EG0UfsNzPnNVhyphenhyphenGdMQLfY570VQu8W75p_QlnK1Kif5FQ-dv0SakA2mSwjyds-dBF48eVeaKZ3ZN4vQuWT/s320/2765981920_61f81eb8be.jpg" alt="" id="BLOGGER_PHOTO_ID_5304786657946558546" border="0" /></a><br />Some corporate blogs:<br /><ol><li><a href="http://boeingblogs.com/randy/">Boeing</a></li><li><a href="http://mystarbucksidea.force.com/ideaHome">Starbucks</a></li><li><a href="http://aws.typepad.com/">Amazon</a></li><li><a href="http://fastlane.gmblogs.com/">General Motors</a></li><li><a href="http://en.community.dell.com/blogs/direct2dell/default.aspx">Dell</a><br /></li></ol>Anonymoushttp://www.blogger.com/profile/09656654626904885136noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-8427660702455097572009-02-20T02:47:00.000+08:002009-02-24T07:53:58.843+08:00Things to take note to prevent E-auction fraud when a consumer participating in an E-auction<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA2l_N0BAf6ESUtddseM3ZmZzpcVF55UtgOljTdHktgvHhIe4LbJzYOVwC9PKpGvA8lmAJcUcgORkJNmxQ2Io2hQq3NLKF4_QVFMp4XvuQrFTvbwwiJmo_rDxsivYjvKM1GtM-pjcIwwQ/s1600-h/e-auction.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 195px; height: 297px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA2l_N0BAf6ESUtddseM3ZmZzpcVF55UtgOljTdHktgvHhIe4LbJzYOVwC9PKpGvA8lmAJcUcgORkJNmxQ2Io2hQq3NLKF4_QVFMp4XvuQrFTvbwwiJmo_rDxsivYjvKM1GtM-pjcIwwQ/s320/e-auction.jpg" alt="" id="BLOGGER_PHOTO_ID_5306070492695669922" border="0" /></a><span style="color: rgb(102, 102, 102);">Internet auction fraud is a growing epidemic worldwide, as online shopping has grown significantly every year that online shopping has been available. Most internet auction fraud cases involve straightforward scams where consumers allegedly win merchandise by being the highest bidder. All sounds good until they send the payment and never receive the merchandise.<o:p></o:p></span> <p class="MsoNormal" style=""><span style="color: rgb(102, 102, 102);">51,000 cases of internet fraud cases were reported in 2002. In 2008, that number ballooned to 105,000. The numbers are staggering, but everyone can lower their risk by knowing what auction fraud is, how to detect it, and how to prevent falling for it.<o:p></o:p></span><span id="more-189"></span></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -1in;"><b style=""><span style="color: rgb(102, 102, 102);"> Tips for preventing E-auction fraud:</span></b></p> <ol start="1" type="1"><li class="MsoNormal" style=""><b>Understand how the auction works.</b> Many online auctions simply list items that people want to sell. They don’t verify that the merchandise actually exists or that it is described accurately, and they can’t guaranty that the sellers will keep their promises. </li><li class="MsoNormal" style=""><b>Be careful if the seller is a private individual.</b> Many consumer protection laws don’t apply to private sales, though government agencies may take action if there are many complaints the same individual or criminal fraud is involved. <o:p></o:p></li><li class="MsoNormal" style=""><b>Be especially cautious when dealing with sellers in other countries.</b> If you have a problem, the physical distance, difference in legal systems, and other factors could make resolving it very difficult. </li><li class="MsoNormal" style=""><strong>Ask questions about the goods</strong>. Try to verify that a seller has the items in front of him consider the payment arrangements requested. Fraudsters will often insist on high-risk payment methods such as cash, cheque, wire transfer or cash transfer systems.</li><li class="MsoNormal" style=""><strong>Check out escrow services</strong> - especially if the other party insists on using a particular service. These sites are often well presented and appear genuine, but fraudulent sites may have a number of spelling and grammar mistakes. <o:p></o:p></li><li class="MsoNormal" style=""><b>Get the name and contact information of the seller.</b> The name, physical street address, email address, and phone number are helpful to have for checking the seller out and following up later if there is a problem. Don’t do business with anyone who refuses to provide that information. <o:p></o:p></li><li class="MsoNormal" style=""><b>Ask about delivery, returns, warranties and service before you pay.</b> Get a definite delivery time and insist that the shipment is insured. Ask about the return policy. If you’re buying electronic goods or appliances, find out if there is a warranty and how to get service. <o:p></o:p></li><li class="MsoNormal" style=""><b>Pay by credit card.</b> Under federal law, you can dispute the charges if you paid the seller with a credit card and the goods were never delivered or if they were misrepresented. If you are paying through an intermediary service, ask what happens in the case of disputes.</li><li class="MsoNormal" style=""><b style="">Protect your privacy</b>. Never provide your Social Security number, driver's license number, credit card number, or bank account information until you have checked out the seller and the online payment or escrow service, if you're using one, to ensure legitimacy. </li><li class="MsoNormal" style=""><b style="">Customer feedback</b>. Examine the feedback on the seller. <o:p></o:p></li></ol> <span style=";font-family:";font-size:12;" > <!--[endif]--></span>Wei Tienghttp://www.blogger.com/profile/18382359739172499261noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-33526294441841261462009-02-19T21:05:00.004+08:002009-02-19T22:04:03.941+08:00Review of a local e-commerce site<a href="http://canaanlandmusic.com/CANAANLAND_Logo.gif"><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 415px; CURSOR: hand; HEIGHT: 180px; TEXT-ALIGN: center" alt="" src="http://canaanlandmusic.com/CANAANLAND_Logo.gif" border="0" /></a><a href="http://canaanland.com.my/">Canaanland.com.my</a> is an online Christian bookstore selling bibles, books, music, gifts and more. They ship their products to anywhere in Malaysia although they do have a few physical stores also in the Klang Valley.<br /><br /><a href="http://www.malaysiavacationguide.com/images/canaanland.jpg"><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 300px; CURSOR: hand; HEIGHT: 225px; TEXT-ALIGN: center" alt="" src="http://www.malaysiavacationguide.com/images/canaanland.jpg" border="0" /></a> <a>The site downloads quite quickly and the navigation to other web pages within the site loads easily as well. When you first open the site, a bright orange header greets you. The website's design and layout is relatively simple yet organized so you will find what you are looking for easily. The colour and font selections are simple to read and easy on the eyes, which is an important thing to any users browsing a website.</a><br /><br /><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 194px; CURSOR: hand; HEIGHT: 150px; TEXT-ALIGN: center" alt="" src="http://www.timeoutkl.com/uploadfiles/image/Venues/Books/Big/bigimg_CanaanLand.jpg" border="0" /> Besides that, this website also provides a "shopping basket" and the number of items you have chosen in your basket will be shown, as well as the total amount of money you have spent so far. A visible search engine at the top of the page allows busy users to search for what they are looking for immediately. Canaanland accepts payment online through Visa, MasterCard and Maybank.<br /><br /><div>Other than shopping at this website, users can also check out job vacancies at their physical stores, sitemaps as well as contact them for any further enquiries. </div>Hannah Yanghttp://www.blogger.com/profile/11096162740102705337noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-96629755695958572009-02-14T16:49:00.000+08:002009-03-14T23:23:26.453+08:00Mobile payment system in Malaysia: It's potentials & consumer's adoption strategies<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrucOkJP28f_zU-Ey0Nnbjq4MOMwpdJYdcqynvCYB-laX08oSZuL0MtEp3kuXCImy4umOAry2YE5-GswkWCFBwaMgonI-xMy-OG3I7gw98NQWMdsWo3igi0TfvfWKHPH-c2F9V1TnYIuw/s1600-h/Mobile_Phone_Payment.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 190px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrucOkJP28f_zU-Ey0Nnbjq4MOMwpdJYdcqynvCYB-laX08oSZuL0MtEp3kuXCImy4umOAry2YE5-GswkWCFBwaMgonI-xMy-OG3I7gw98NQWMdsWo3igi0TfvfWKHPH-c2F9V1TnYIuw/s200/Mobile_Phone_Payment.jpg" alt="" id="BLOGGER_PHOTO_ID_5305586615785100258" border="0" /></a><div style="text-align: justify;"><span style="font-size:100%;"><span class="denseText"><br /><br />Mobile payment in Malaysia is new but fast-growing alternative payment method. </span></span>Mobile payment is the collection of money from a consumer via a mobile device such as their mobile phone, SmartPhone and Personal Digital Assistant (PDA) or other such device.<span style="font-size:100%;"><span class="denseText"> A mobile</span></span><br /><span style="font-size:100%;"><span class="denseText">phone can pay for a wide range of services and digital or hard goods such as songs, computer games, books and magazines.</span></span><br /><br />The most popular mobile payment system is Mobile Money, a PIN-based Mobile Payment Solution which allowing a registered users to pay for their goods and services at anytime , anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Services). The main advantages here is the consumer has the purchasing power whether to buy their desired goods and services whenever they like using their mobile phone without physically present at the store.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw895Vf6E06M5200jNz7EEEwFHa4g7J9sq-R8tfKOTAmZOnJlauLSDwWhkFeR4fjGuY7sA2MJjRlIXcPC8HeNINrgDTzQ-ZiWXb4fMxItkUjD05YAqDrvBP1hDnCTbMvnTHXMfy6lDP5k/s1600-h/mobile+money+logo.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 60px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw895Vf6E06M5200jNz7EEEwFHa4g7J9sq-R8tfKOTAmZOnJlauLSDwWhkFeR4fjGuY7sA2MJjRlIXcPC8HeNINrgDTzQ-ZiWXb4fMxItkUjD05YAqDrvBP1hDnCTbMvnTHXMfy6lDP5k/s400/mobile+money+logo.gif" alt="" id="BLOGGER_PHOTO_ID_5305587000109703906" border="0" /></a><br />The potentials of Mobile payment system are:<br /></div><ol style="color: rgb(0, 0, 0); text-align: justify;"><li><span style="font-size:100%;">Consumers prefer a <span style="color: rgb(255, 204, 51);">low-value transaction</span>. However, </span>it will continue to grow as consumer’s needs & confidence on mobile payment increased.</li><li>An <span style="color: rgb(255, 204, 51);">increasing companies</span> in Malaysia are <span style="color: rgb(255, 204, 51);">using m-payment system</span> in order to be more profitable.</li><li>Mobile payment providers have a <span style="color: rgb(255, 204, 51);">large market share</span> to grab on while the competition are relatively low in the newly developing stage in the market.</li><li><span style="color: rgb(255, 204, 51);font-size:100%;" >H</span><span style="font-size:100%;"><span style="color: rgb(255, 204, 51);">igh acceptability and adaptability</span> among consumers as the number of mobile users are increasing from year to year.</span></li></ol><div style="text-align: justify;">The adoption strategies will be :<br /></div><ol style="text-align: justify;"><li><span style="color: rgb(255, 0, 0);">Collaborate with banks and companies</span> in order to expand the ability to purchase goods and sevices via mobile which helps to enhance consumer's confidence and satisfaction.</li><li><span style="color: rgb(255, 0, 0);">Enhancing the security</span> during the purchasing transaction on goods and services.</li><li><span style="color: rgb(0, 0, 0);">Maintain the customer's loyalty</span> by providing the best satisfaction in terms of <span style="color: rgb(255, 0, 0);">security, services, and ease of use</span> of the system.</li><li><span style="color: rgb(255, 0, 0);">Gifts and rewards</span> offered from the company to m-payment consumers when they reach a certain level of purchasing of goods and services in order to <span style="color: rgb(0, 0, 0);">build consumer's confident</span>.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKjYO-oYs7AMJvsWS6EwDKzoOBn4_XQ-NVKTnoGR9ae-xvlrACj6twPYkfFNrT_rxEAOkhtBkpfjGTlaGFdMvmF9yNSaXUsoOQDuWgkhc9utQJ3_kA59ZR1yLgXRWV5jWyPFYDlPwt9jk/s1600-h/img_29613_mcheck_mobile.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKjYO-oYs7AMJvsWS6EwDKzoOBn4_XQ-NVKTnoGR9ae-xvlrACj6twPYkfFNrT_rxEAOkhtBkpfjGTlaGFdMvmF9yNSaXUsoOQDuWgkhc9utQJ3_kA59ZR1yLgXRWV5jWyPFYDlPwt9jk/s320/img_29613_mcheck_mobile.jpg" alt="" id="BLOGGER_PHOTO_ID_5305587265183579554" border="0" /></a></li></ol>HoCk LiaN @ SteveNhttp://www.blogger.com/profile/14578047751150471877noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-32431525920049904342009-02-13T17:10:00.002+08:002009-02-13T17:41:53.452+08:00The application of pre-paid cash card for consumers<div><a href="http://www.m-enable.com/images/pic_creditcard.jpg"><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 325px; CURSOR: hand; HEIGHT: 371px; TEXT-ALIGN: center" alt="" src="http://www.m-enable.com/images/pic_creditcard.jpg" border="0" /></a> This is how prepaid credit cards applications work– You put money on the card, which you can do over the counter, on the phone or online, and then you use the card to make purchases. You can continually put money onto the card if you want, but you cannot spend more than the balance you have left. This means there is no risk of running into debt as it has no credit or overdraft facility. A prepaid cash card looks like a credit or debit card, and gives users the ability to purchase products and services with a card. The total amount will be taken from your card immediately and the transaction is complete.<br /><br /><div>A popular prepaid cash card is the Octopus Card in Hong Kong. It is widely used in payment system for transportation, supermarkets, fast food restaurants, car parks as well as other point of sale application such as service stations and vending machines.</div><br /><a href="http://www.netbanker.com/Images/octopus_card.png"><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 278px; CURSOR: hand; HEIGHT: 166px; TEXT-ALIGN: center" alt="" src="http://www.netbanker.com/Images/octopus_card.png" border="0" /></a> In Malaysia, we have our own prepaid cash card- Touch 'n Go. The Touch ‘n Go card is an electronic purse that can be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme parks.<br /><a href="http://roydotcom.files.wordpress.com/2007/03/img_card1.jpg"><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 271px; CURSOR: hand; HEIGHT: 174px; TEXT-ALIGN: center" alt="" src="http://roydotcom.files.wordpress.com/2007/03/img_card1.jpg" border="0" /></a>Therefore with prepaid debit card, it helps in controlling an individual's spending as purchases are limited to the balance in the card or account, making it a wiser option overall.</div>Hannah Yanghttp://www.blogger.com/profile/11096162740102705337noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-15499527938521748722009-02-13T15:35:00.005+08:002009-02-17T13:13:26.248+08:00Credit card debts: Causes and Prevention<span style="color:#3366ff;"><strong>CAUSES:</strong></span> <img id="BLOGGER_PHOTO_ID_5302184160780067698" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 350px; CURSOR: hand; HEIGHT: 292px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGnzwnst1eI2LYOz1zgu4hux0lT0V41zdijwhwG_1j9MtSH9WaEG0iLJhx_dvhetSrEDVcpLKpxHaNPYRw1zJg1d5OC1lc_Y1QrfPAqMKdwIlY17f-mfuOwf4R6qWyg_6rEDXhwjf_2zc/s400/prison.gif" border="0" /><br />There are many reasons why people end up with more debt than they can possibly handle on their own. One of the main causes of personal debt is misuse of credit cards.<br /><br /><span style="color:#ff0000;">1)</span> <span style="color:#ff0000;">Don’t have credit card education.<br /></span>Many people get their first credit card as soon as they are allowed to, when they are 18 or sometimes even younger. Many young people see credit cards as "free money" and buy up everything that they want without showing any concern of how they are actually going to pay for it.<br /><span style="color:#ff0000;">2)</span> <span style="color:#ff0000;">Emergence of online shopping</span><br />With the economy making for a leaner wallet this year, consumers will still likely continue to overspend while surfing the Internet. The reason attribute to overspending on online shopping due to it become more user friendly and convenient to the user. Whenever the users have possessed a credit card, they can just buy the things through online.<br /><br /><span style="color:#ff0000;">3) Encouragement of credit card companies</span><br />Even the credit cards have encouraged you to spend money with no worries wherever you go, but the credit card companies have always sent the advertising to assaults you. Card companies often send their consumers all sorts of flyers and deals in the mail that give those individuals rewards and privileges that depend on spending more. It is often these things that hamper their ability to save their money.<br /><span style="color:#ff0000;"><br />4) Lifestyle maintenance<br /></span>College tuition, cars and mortgages, luxuries house etc are the big expense along the way. Many people focus on one area of finances, neglecting the other so badly that there's not enough money to go around once these life events arise. Therefore, people may then rely on credit to get by.<br /><br /><strong><span style="color:#3366ff;">PREVENTION: </span></strong><br /><br />1) Keep a running tally in writing of your weekly or monthly spending versus you budget, and update it before each purchase.<br /><br />2) Use an online bank account to keep score of your spending. Keep your credit card receipts when you make purchases. At the end of each day or couple of days, use an online bank account to pay the credit card company for the amount you spent. Seeing your balance fall in line with your credit card spending should help you to keep to a budget, and eliminate risk that you overspend during the month.<br /><br />3) Limit your credit card use to certain categories of spending. Use your credit card to pay only when there's no risk you will overspend. So use it for regular bills, groceries, and expenses where you trust yourself. For areas where you suspect you overspend or spend on impulse, use cash.<br /><br />"Spending less than you make is what's important."<img id="BLOGGER_PHOTO_ID_5302185467318464306" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 208px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWahNB_AkPHfHQjKZizMi7ZWkbqvjOK1dtQS7sY87AUjSxqTHVHjcFwSnx9vpfCB-nbiT7knXEi5evMhyphenhyphen13bal91qeWQHbYA8L13Zd52aV1O7vv9uNVSB-zSZjWVP7ZsPDZVuZ1jGbFA8/s320/windowslivewriterhellokittychargecard-d4cchello-kitty-credit-card4.jpg" border="0" />Wei Tienghttp://www.blogger.com/profile/18382359739172499261noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-58249550053913710492009-02-11T17:13:00.001+08:002009-02-19T19:13:04.183+08:00Electronic Currency<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhEAZ0ixkTnS4knB9ExW0jjKSogvzBa3QvKparu1uSeexYwNeiYvhT1cnWt31bqs51nTnOB_BhnEaQF0zmKFzBTVGq1pHTH_XoLpzYWl4qji4SuBMIgaVxsDKgGgqOC3GkxKdyynCLmIHz/s1600-h/illust_k.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 119px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhEAZ0ixkTnS4knB9ExW0jjKSogvzBa3QvKparu1uSeexYwNeiYvhT1cnWt31bqs51nTnOB_BhnEaQF0zmKFzBTVGq1pHTH_XoLpzYWl4qji4SuBMIgaVxsDKgGgqOC3GkxKdyynCLmIHz/s320/illust_k.gif" alt="" id="BLOGGER_PHOTO_ID_5304446203756662562" border="0" /></a><br />Banks have been able to move currency electronically for decades, only recently that the average consumer had the capability to use electronic transfers in any meaningful way. With the advancement in technology and more computer savvy individuals, global interaction is made available at vastly reduced costs. The Internet and E-commerce have become an increasingly commercial area, where daily payments are rendered for goods, information, services and investment. As a result, electronic payments are becoming the central part to online business between customer and seller.<br /><br />Electronic money refers to digital currency that you can use on the Internet to buy and sell goods, services and investments by transmitting a number from one computer to another, where it typically involves use of computer networks, the Internet and digital stored value system. These transactions are carried out electronically, transferring funds from one party to another, by either a debit or credit. These funds are instantly cleared and secured by using strong encryption, thus eliminating the payment risk to the consumer.<br /><br />One major type of Electronic money is the Integrated Circuit Card (ICC). ICC could be broken down further into 2 types - Contact ICC and Contactless ICC.<br /><br /><span style="color: rgb(255, 102, 0);font-size:180%;" >Contact ICC</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHrdLnFcradO4f7czaAH4hPPh8AL7dCpIMClg3zkb9pO7sL91LaxuX_XDM63eKc6_li6jKtVNIs_uwVALm3SfX7aq6XWfVPrtK3O0yAPaewI5vh9R9rk6-AhBhZ18J5SV9ypsBfIDdv25F/s1600-h/250px-Differentsmartcardpadlayouts.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 243px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHrdLnFcradO4f7czaAH4hPPh8AL7dCpIMClg3zkb9pO7sL91LaxuX_XDM63eKc6_li6jKtVNIs_uwVALm3SfX7aq6XWfVPrtK3O0yAPaewI5vh9R9rk6-AhBhZ18J5SV9ypsBfIDdv25F/s320/250px-Differentsmartcardpadlayouts.jpg" alt="" id="BLOGGER_PHOTO_ID_5304458220200787634" border="0" /></a><br />Contact smart cards have a contact area, comprising several gold-plated contact pads, that is about 1 cm square. When inserted into a reader, <span style="text-decoration: underline;"></span> the chip makes contact with electrical connectors that can read information from the chip and write information back. The cards do not contain batteries; energy is supplied by the card reader.<br /><br />Examples of Contact ICC's:<br /><ol><li>Credit cards</li><li>Malaysian MyKad</li><li>ATM cards</li></ol><span style="font-size:180%;"><br /><span style="color: rgb(255, 102, 0);">Contactless ICC</span></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo9VmT2QyK0my4CJ4GhIQArObqwvxCXVrJFqP3MSHZVcerAG8_lAxJGbX0YZ_v-hS_0P1cULBC-03529hp0NWWh6zz7-zBrPum970Ga088Ke85qDv58MdV4ibP1iB6JoOJl10q6cXAeeqQ/s1600-h/499px-Compass_Card_Validator.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 266px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjo9VmT2QyK0my4CJ4GhIQArObqwvxCXVrJFqP3MSHZVcerAG8_lAxJGbX0YZ_v-hS_0P1cULBC-03529hp0NWWh6zz7-zBrPum970Ga088Ke85qDv58MdV4ibP1iB6JoOJl10q6cXAeeqQ/s320/499px-Compass_Card_Validator.png" alt="" id="BLOGGER_PHOTO_ID_5304459269351415746" border="0" /></a><br />The chip communicates with the card reader through Radio Frequency Identification (RFID) induction technology (at data rates of 106 to 848 kbit/s). These cards require only close proximity to an antenna to complete transaction. They are often used when transactions must be processed quickly or hands-free, such as on mass transit systems, where smart cards can be used without even removing them from a wallet.<br /><br />Examples of Contactless ICC's:<br /><ol><li>Hong Kong's Octopus Card</li><li>Malaysia's Touch n Go Card</li><li>San Diego's Compass Card</li></ol><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2-8gpEzNXPXyqb9kuQ5Mcn1AWbRxEPqN5rmnw1JFuSltqxHMNxlpd7QZOiC6C8uGh4Sau8ZI3ZBuiVPXVtHsLaZn8LR_rrapoNFhPF9J8QeU0VgsDZ_wZjDz1lIZvXye9F9WjuNY9AuK2/s1600-h/2983495081_9a8f52b2f2.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2-8gpEzNXPXyqb9kuQ5Mcn1AWbRxEPqN5rmnw1JFuSltqxHMNxlpd7QZOiC6C8uGh4Sau8ZI3ZBuiVPXVtHsLaZn8LR_rrapoNFhPF9J8QeU0VgsDZ_wZjDz1lIZvXye9F9WjuNY9AuK2/s320/2983495081_9a8f52b2f2.jpg" alt="" id="BLOGGER_PHOTO_ID_5304446208416965858" border="0" /></a><br /><span style="color: rgb(0, 204, 204);font-size:180%;" >Advantages of E-Currency</span><br /><span style="font-size:130%;"><br /><span style="color: rgb(153, 255, 153);">Flexibility</span></span><br /><br />There is no need, for example, to carry several cards: one card can simultaneously be an ID, a credit card, a stored-value cash card, and a repository of personal information such as telephone numbers or medical history. Such a card can be easily replaced if lost, and, because a PIN number (or other form of security) must be used to access information, is totally useless to people other than its legal bearer. At the first attempt to use it illegally, the card would be deactivated by the card reader itself.<br /><br /><span style="color: rgb(153, 255, 153);font-size:130%;" >Security</span><br /><br />They are encryption devices, so that the user can encrypt and decrypt information without relying on unknown, and therefore potentially untrustworthy, appliances such as ATMs. ICC's are very flexible in providing authentication at different level of the bearer and the counterpart. Finally, with the information about the user that ICC's can provide to the other parties, they are useful devices for customizing products and services.<br /><br />Other general benefits of sICC's are: <ul><li>Portability </li><li>Increasing data storage capacity </li><li>Reliability that is virtually unaffected by electrical and magnetic fields. </li></ul><span style="color: rgb(204, 51, 204);font-size:180%;" ><br />Limitations of ICC's</span><br /><span style="font-size:130%;"><br /><span style="color: rgb(255, 204, 204);">Security</span></span><br /><br />VISA and MasterCard developed a new standard, SET, in early 1996 in an attempt to get the entire industry on a standard of encryption. Additionally, there are standards such as DES which have been around for years, usable in all forms of encryption which are being used in ICC's. But still some ICC's are not inviolate. Mondex, a maker of banking ICC's, solves this problem by making its transactions possible only between Mondex cards. But in order for ICC's to reach their full potential, they must be able to interact with a host of interfaces. And they must do so securely.<br /><br /><span style="color: rgb(255, 204, 204);font-size:130%;" >Public Perception</span><br /><br />People must believe that the cards are secure. This depends to a great extent upon actual security, but people must also be convinced of it. And once people are comfortable that the card is secure, they must still be confident that a stalker isn't somewhere collecting and analyzing all of the information gleaned from the ICC's use.<br /><br /><span style="color: rgb(255, 204, 204);font-size:130%;" >Product Complements</span><br /><br />While ICC's themselves are fairly cheap, card readers are not. However, in an effort to make ICC's more pervasive, companies such as Netscape and Microsoft are proposing putting software in packages they make. Additionally, Gemplus has created a new pocket reader and other companies are considering adding readers to keyboards.Anonymoushttp://www.blogger.com/profile/09656654626904885136noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-90146395613357599592009-02-06T14:04:00.006+08:002009-02-06T14:28:55.358+08:00Phishing: Examples and its prevention methods.<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdk-N95PvktgmWE9z0zR9acKREy9nmpLvBzcUJKdwfm5ZL1-t2HlYfL1xm8MxQiyyVLRLDv6985jWAgWPf29YQN8ks-ytuc19Loc_pc1dk9ZMKFiheENe0dG2H0gfMS7AgYg7RYfh1CyE/s1600-h/phishing-1.jpg"><img id="BLOGGER_PHOTO_ID_5299567520622469314" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 188px; CURSOR: hand; HEIGHT: 200px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdk-N95PvktgmWE9z0zR9acKREy9nmpLvBzcUJKdwfm5ZL1-t2HlYfL1xm8MxQiyyVLRLDv6985jWAgWPf29YQN8ks-ytuc19Loc_pc1dk9ZMKFiheENe0dG2H0gfMS7AgYg7RYfh1CyE/s200/phishing-1.jpg" border="0" /></a><br /><div><span style="font-size:130%;"><strong><span style="color:#3333ff;"></span></strong></span></div><div><span style="font-size:130%;"><strong><span style="color:#3333ff;">What is Phishing and its Examples</span></strong>.<br /></span>Phishing is a scam in which the attacker sends an email purporting to be from a valid financial or eCommerce provider, which generally looks and feels much like the valid eCommerce or banking site.<br />Often phishing spam messages will use legitimate 'From:' email addresses, logos, and links to reputable businesses such as Citibank, PayPal, eBay in the message. But the message instructs you to click on a web link that sends you to a fake website where you are asked to provide personal information such as your name, address, phone number, date of birth, and bank or credit card account number. Providing this kind of information can leave consumers at risk for identity theft.<br /><br />We may see the phishing scam in the e-mail messages, social networking website, fake website that accepts donations for charity, instant message program and even on your cell phone or other mobile devices.<br /><br />Fake, copycat Web sites are also called spoofed Web sites. They are designed to look like the legitimate site, sometimes using graphics or fonts from the legitimate site. They might even have a Web address that's very similar to the legitimate site you are used to visiting.<br /><br />These are few examples of phishing scams:<br /></div><img id="BLOGGER_PHOTO_ID_5299563185218769842" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 296px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9oQ4IsbdBe9RdKtkXOkUmkmdnCVZjXOhA2fES-xeK7fyyqtwAD5Z6UcfxJ3t_a9xR_z2u9qDZyfmtORTmMZX6pEJjMEqfQkSOKcFdjeprPNJ1aOISYUuX6G0-lZx9yPcq4zMnVyGp2xw/s320/paypal_phish.jpg" border="0" /> This PayPal phishing scams tries to trick recipients by pretending to be some sort of security alert. Claiming that someone 'from a foreign IP address' attempted to login to your PayPal account, the email urges recipients to confirm their account details via the link provided.<br /><br /><img id="BLOGGER_PHOTO_ID_5299562773358245698" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 301px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_y-fwu8ZPpOszW-uG67P4204yrj3IR_sCuo27gJVtx4ovpfJLaL59BBnUHKFQZ5jvWevEwmEK7hxiMfg2-AZkxLMYdg0zV63QMrEJJ1_atwO5ho5L1FFkfYGbKvCG_t5YAgBxkHF-4-o/s320/citibank_phish.jpg" border="0" /> The attacker claims to be acting in the interests of safety and integrity for the online banking community. Of course, in order to do so, you are instructed to visit a fake website and enter critical financial details that the attacker will then use to disrupt the very safety and integrity they claim to be protecting.<br /><br /><img id="BLOGGER_PHOTO_ID_5299562476485807090" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 318px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbAIJW-ymXEYB21B9a70Rn4HqnzEi59-2F26H1WvyydaEC6q74RiHCKnTNlkBjreWOy8J4ycwag3bkeh8P1bULUcRDQBc-A3jx2in__yq_2H1MZ4ByyDKh1u43rmCUJZhP-pDb_8uDfzM/s320/ebay_phish.jpg" border="0" />This eBay phishing email includes the eBay logo in an attempt to gain credibility. The email warns that a billing error may have been made on the account and urges the eBay member to login and verify the charges.<br /><br /><strong><span style="font-size:130%;color:#3333ff;">Prevention Methods</span><br /></strong>It is easy to uncover a crude phishing scam. For example, if you get an email from a bank you’ve never opened an account at, then don’t follow the link and enter your personal information. Now, if you actually have an account at the institution it gets more interesting.<br />Besides that, user must avoid filling out forms in e-mail messages. You can't know with certainty where the data will be sent and the information can make several stops on the way to the recipient.<br />If you click on a link in an e-mail message from a company be aware that many scam artists are making forgeries of company's sites that look like the real thing. Verify the legitimacy of a web address with the company directly before submitting your personal information.<br /><br />Here are some common phrases where e-mail message or phone message may be a phishing scam:<br /><br /><span style="color:#ff0000;">"Verify your account."<br /></span>Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail.<br /><span style="color:#ff0000;">"You have won the lottery."<br /></span>The lottery scam is a common phishing scam known as advance fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Microsoft.<br /><span style="color:#ff0000;">"If you don't respond within 48 hours, your account will be closed."<br /></span>These messages convey a sense of urgency so that you'll respond immediately without thinking. A phishing e-mail message might even claim that your response is required because your account might have been compromised.<br /><br />The best way to avoid becoming a phishing scam victim is to use your best own adjustment. No financial institution with any sense will email you and ask you to provide all of your sensitive information. In fact, most institution are informing customers that “ we will never ask you for your personal information via phone or email.Wei Tienghttp://www.blogger.com/profile/18382359739172499261noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-38474560440036049202009-02-05T22:22:00.000+08:002009-02-10T08:53:10.197+08:00The Application of 3rd Party Certification Program in Malaysia<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6lXc01c4RLdkdPbrTfYItPYiL5qfgogt1YBbsEhxU9iQhgt8L173k-51_qxVf57dj7xlvjKviM2RJsr7ivFHXH9nkaZVa6nMwhV-X2hDVknLfaB5UxV_F1otvY2Li0Iwm2Y2jzCnMOW0/s1600-h/t2-logo.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 357px; height: 94px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6lXc01c4RLdkdPbrTfYItPYiL5qfgogt1YBbsEhxU9iQhgt8L173k-51_qxVf57dj7xlvjKviM2RJsr7ivFHXH9nkaZVa6nMwhV-X2hDVknLfaB5UxV_F1otvY2Li0Iwm2Y2jzCnMOW0/s200/t2-logo.jpg" alt="" id="BLOGGER_PHOTO_ID_5300817383704249858" border="0" /></a><br />Third party certification is an assessment carried out to ensure compliance with a publicly available technical specification. Importantly, the assessment is carried out by an independent, third party organization that is qualified and licensed to issue certification when the assessment is successfully completed. <p>This means that rather than an organization or company claiming to comply with industry standards, they have taken their commitment to quality further and invited in an external third party to verify that their product or service does indeed comply with the industry standards.<br /></p><p>The most popular application of 3rd party certification in Malaysia is provided by the MSC Trustgate.com Sdn. Bhd. <style>- /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman";} @page Section1 {size:612.0pt 792.0pt; margin:72.0pt 90.0pt 72.0pt 90.0pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --></style>MSC Trustgate.com Sdn Bhd is a licensed Certification Authority (CA) operating within the Multimedia Super Corridor. MSC Trustgate was incorporated in 1999 to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region.<br /></p> <p> Trustgate is licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development. It provides security solutions for individuals, enterprises, government, and e-commerce service providers using digital certificates, digital signatures, encryption and decryption as this is the primary concern of entering into the new Internet economy.</p><p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi04sgNpf1kQ5v2tuxQg0C9-kM4aLv8262LFzRwOT_4vlhDhqfTKjqx_SUiNn2JTAdSi2hR6uNVSAUE8fwSkGDdntffwh-d4Hws3_nH23dfJPZVHEUZ6vzBVf_UqDY4lmbF6CsL7L7nXzc/s1600-h/logo_2.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 232px; height: 94px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi04sgNpf1kQ5v2tuxQg0C9-kM4aLv8262LFzRwOT_4vlhDhqfTKjqx_SUiNn2JTAdSi2hR6uNVSAUE8fwSkGDdntffwh-d4Hws3_nH23dfJPZVHEUZ6vzBVf_UqDY4lmbF6CsL7L7nXzc/s400/logo_2.gif" alt="" id="BLOGGER_PHOTO_ID_5300820792514597634" border="0" /></a></p><p>Among the products and services that they provide are Secure Sockets Layer (SSL) Certificate Authority, Managed PKI, Personal ID, MyTRUST, MyKad ID and etc. In addition, MSC Trustgate has been appointed as Asia's first VeriSign Authorised Training Centre. Under this partnership, MSC Trustgate.com and APIIT (Asia Pacific Institute of Information Technology) jointly facilitate the delivery of VeriSign’s high-end Security and E-Commerce programmes. VeriSign is the leading Secure Sockets Layer (SSL) Certificate Authority which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network.</p><p><br /></p><p>The Diagram below shows how Verisign tackle spamming and it's solutions:<br /></p><p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpv-hrrWSLqk95-lRaoGsU2_G2WkG5NRRDg8J1nso3jxG1hbDpTei78XTImS0ZD22hm3C_ojLtPvf3ynS3-tkR16mNKTY1_cv1155-gd6iqIndzGwj7_9F9vh019pyGj0tQyulqbhSCmg/s1600-h/VerisignSlamming.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 385px; height: 296px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpv-hrrWSLqk95-lRaoGsU2_G2WkG5NRRDg8J1nso3jxG1hbDpTei78XTImS0ZD22hm3C_ojLtPvf3ynS3-tkR16mNKTY1_cv1155-gd6iqIndzGwj7_9F9vh019pyGj0tQyulqbhSCmg/s400/VerisignSlamming.jpg" alt="" id="BLOGGER_PHOTO_ID_5300820505453353234" border="0" /></a></p><p><br /></p><p>Therefore, it is important to apply 3rd certification programme as it provides a safe and secure Internet protection. More e-consumer can now shop and purchase online care-free while their personal information or confidentiality is protected</p><p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKyBbImKHEfIW6xxb2Q9_CI5w7m8k3bwkcOEPGff2lr2YSR3cP2xHwgCECvuzs5udzjIe134ERzeBag8X3pJeVu-6J5WKaf-TvldC9z6tjtpSDdk-7R13uzlsZorUEf1_oEegURQcT9b8/s1600-h/Verisign.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 100px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKyBbImKHEfIW6xxb2Q9_CI5w7m8k3bwkcOEPGff2lr2YSR3cP2xHwgCECvuzs5udzjIe134ERzeBag8X3pJeVu-6J5WKaf-TvldC9z6tjtpSDdk-7R13uzlsZorUEf1_oEegURQcT9b8/s200/Verisign.jpg" alt="" id="BLOGGER_PHOTO_ID_5300819007870471810" border="0" /></a>.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxSd3rCyLmftbC46yLDmROxzLvBhMi92VgqPdaR2QveAnJdpsutqUjE3rBt_VIS6x290WLZCZ4Gkr8_kjnHs1g8r0vsFjmz8UmqmjrYc_VMG74RVAy0w6Y15E0dsAwHUf-djS8wZzU4do/s1600-h/logo_2.gif"><br /></a></p>HoCk LiaN @ SteveNhttp://www.blogger.com/profile/14578047751150471877noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-29092161418921475642009-02-05T20:28:00.000+08:002009-02-06T21:49:55.220+08:00The threat of online security: How safe is our data?<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAx5VoivXEpG-LNoyoLZmQHOXteOQv8auVWLItzh3kJAZfcNW2tVZtpioN7Y75YvEtwW7tYqaWIL6_9hDKMyX0lVGBiSsM-4vDX25-Ap46ErCV3ISUBrlS9wPZh5E-UHbbm1qdQvhC2Kfs/s1600-h/security2.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 266px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAx5VoivXEpG-LNoyoLZmQHOXteOQv8auVWLItzh3kJAZfcNW2tVZtpioN7Y75YvEtwW7tYqaWIL6_9hDKMyX0lVGBiSsM-4vDX25-Ap46ErCV3ISUBrlS9wPZh5E-UHbbm1qdQvhC2Kfs/s320/security2.gif" alt="" id="BLOGGER_PHOTO_ID_5299664010743356642" border="0" /></a><br />Do you truly believe that your data is safe? You might think so. Unfortunately, there are threats online that keep knocking on your door until you let them in - intentionally or not. Once they are in your computer system, they will cause havoc and may result in you losing all your data.<br /><br />Therefore, online security has become an enormous concern when surfing the net. And with good reason. These threats to online security may cripple your computer system and halt business activities which means losing precious data and time. Besides that, these threats evolve over time and always find a way to better the security softwares we have installed in our computer systems. Therefore, there is always a need to update security softwares to keep our data safe from these threats.<br /><br />The following are some of the threats to online security:<br /><br /><span style="font-size:130%;"><span style="font-weight: bold;">Malware</span></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimds9QyuXWchXcQNiKp_otWaVw5nnHrbD1nsu_8WpZtqlqkGc2zuHQSzPYICUM8upLqwhnT9qnEnQPHFc3R8n6JU8LSzL7oJZl5P1Hf5XlzIbEQhDAsZrJllnq6Gquk6bm6_gLzMPijAsz/s1600-h/malware.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 253px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimds9QyuXWchXcQNiKp_otWaVw5nnHrbD1nsu_8WpZtqlqkGc2zuHQSzPYICUM8upLqwhnT9qnEnQPHFc3R8n6JU8LSzL7oJZl5P1Hf5XlzIbEQhDAsZrJllnq6Gquk6bm6_gLzMPijAsz/s320/malware.jpg" alt="" id="BLOGGER_PHOTO_ID_5299675791401087042" border="0" /></a><br />A <span style="font-weight: bold;">MAL</span>icious soft<span style="font-weight: bold;">WARE</span> or malware constitutes any software written for malicious reasons that infiltrates a computer without authorization and performs some nefarious function. Malware can come in many varieties and perform a myriad of functions. it is this carefully engineered software that performs attacks on an automated level among millions of compromised machines around the world, that makes it the centerpoint of the modern cybercrime landscape. Malware includes computer viruses, worms, trojan horses, most rootkits, spyware, and other malicious and unwanted software.<br /><br /><span style="font-weight: bold;font-size:130%;" >Botnets</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhDhVWwuVInTjOWggRaNWXfslFPocIhVwlE6jkhaceMZeMZjFEVOUSiWaAonpFnjBQECRV-u9qj3hvummFbSxELWdz0jHrPv0mSd7nb1f-t-tvvX3j1f8nS1kEIDIoS9q7uPXE_zCl7a9y/s1600-h/495px-Zombie-process.svg.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 265px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhDhVWwuVInTjOWggRaNWXfslFPocIhVwlE6jkhaceMZeMZjFEVOUSiWaAonpFnjBQECRV-u9qj3hvummFbSxELWdz0jHrPv0mSd7nb1f-t-tvvX3j1f8nS1kEIDIoS9q7uPXE_zCl7a9y/s320/495px-Zombie-process.svg.png" alt="" id="BLOGGER_PHOTO_ID_5299672666240569858" border="0" /></a><br />A ro<span style="font-weight: bold;">BOT</span> <span style="font-weight: bold;">NET</span>work or botnet is a huge number of hijacked Internet computers that have been set up to forward traffic, includig spam and viruses, to other computers on the Internet. The computer is compromised via a Trojan that often works by opening an Internet Relay Chat (IRC) channel that waits for commands from the person in control of the botnet. The very nature of botnets gives criminals plenty of power on the internet at large. With control over so many compromised systems, herders can now engage in quite more damaging activities than the internet has seen before.<br /><br /><span style="font-size:130%;"><span style="font-weight: bold;">Virus</span></span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLQgDadG6Fv4wuYu-yKB8LzmMDDSjWMDDBsk5ezmEhJcWYlG8MbomlFNnldm1PibyHTKhTZRGTL6PpK7V1ORMjeWOqA9cv5bcjpzPNsH-5h7bS92qKq9IwVSokbMBGy7OyAdgM0r-n2AWl/s1600-h/computer_with_virus_1.gif"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 234px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLQgDadG6Fv4wuYu-yKB8LzmMDDSjWMDDBsk5ezmEhJcWYlG8MbomlFNnldm1PibyHTKhTZRGTL6PpK7V1ORMjeWOqA9cv5bcjpzPNsH-5h7bS92qKq9IwVSokbMBGy7OyAdgM0r-n2AWl/s320/computer_with_virus_1.gif" alt="" id="BLOGGER_PHOTO_ID_5299677555012739634" border="0" /></a><br /><p>Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. </p><p>Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.</p>Amount of viruses detected by various anti-virus software last year:<br /><br /><table align="center" border="1" cellpadding="2" cellspacing="1"><tbody><tr><td valign="center" align="center" bgcolor="black"><span style="color: white;"> <strong>vendor</strong></span> </td><td valign="center" align="center" bgcolor="black"> <span style="color: white;"> <strong>detected</strong></span> </td><td valign="center" align="center" bgcolor="black"> <span style="color: white;"> <strong>total</strong></span> </td><td valign="center" align="center" bgcolor="black"> <span style="color: white;"> <strong>percent</strong></span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">AntiVir</span> </td><td valign="center" align="center"> <span class="smaller">26,457,598</span> </td><td valign="center" align="center"> <span class="smaller">28,024,135</span> </td><td valign="center" align="center"> <span class="smaller">94.41%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">Avast-Commercial</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">12,425,965</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">13,437,873</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">92.47%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">Norman</span> </td><td valign="center" align="center"> <span class="smaller">25,264,055</span> </td><td valign="center" align="center"> <span class="smaller">27,467,379</span> </td><td valign="center" align="center"> <span class="smaller">91.98%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">F-Prot6</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">17,295,119</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">19,004,580</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">91.01%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">Sophos</span> </td><td valign="center" align="center"> <span class="smaller">3,345,699</span> </td><td valign="center" align="center"> <span class="smaller">3,691,679</span> </td><td valign="center" align="center"> <span class="smaller">90.63%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">NOD32</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">25,329,840</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">28,024,135</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">90.39%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">AVG7</span> </td><td valign="center" align="center"> <span class="smaller">25,262,433</span> </td><td valign="center" align="center"> <span class="smaller">28,024,135</span> </td><td valign="center" align="center"> <span class="smaller">90.15%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">F-Secure</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">25,148,742</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">28,024,135</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">89.74%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">Ikarus</span> </td><td valign="center" align="center"> <span class="smaller">9,275,581</span> </td><td valign="center" align="center"> <span class="smaller">10,476,608</span> </td><td valign="center" align="center"> <span class="smaller">88.54%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">TrendMicro</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">11,703,755</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">13,437,873</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">87.10%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">QuickHeal</span> </td><td valign="center" align="center"> <span class="smaller">10,190,639</span> </td><td valign="center" align="center"> <span class="smaller">11,846,198</span> </td><td valign="center" align="center"> <span class="smaller">86.02%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">DrWeb</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">23,856,884</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">28,009,899</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">85.17%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">VirusBuster</span> </td><td valign="center" align="center"> <span class="smaller">13,881,573</span> </td><td valign="center" align="center"> <span class="smaller">16,859,499</span> </td><td valign="center" align="center"> <span class="smaller">82.34%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">Vexira</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">13,877,493</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">16,859,499</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">82.31%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">Clam</span> </td><td valign="center" align="center"> <span class="smaller">12,232,194</span> </td><td valign="center" align="center"> <span class="smaller">15,305,470</span> </td><td valign="center" align="center"> <span class="smaller">79.92%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">BitDefender</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">22,070,962</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">28,024,135</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">78.76%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">Kaspersky</span> </td><td valign="center" align="center"> <span class="smaller">20,835,947</span> </td><td valign="center" align="center"> <span class="smaller">28,024,135</span> </td><td valign="center" align="center"> <span class="smaller">74.35%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">McAfee</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">12,332,904</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">16,744,538</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">73.65%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">VBA32</span> </td><td valign="center" align="center"> <span class="smaller">18,326,900</span> </td><td valign="center" align="center"> <span class="smaller">26,958,740</span> </td><td valign="center" align="center"> <span class="smaller">67.98%</span> </td></tr><tr><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">Panda</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">7,661,487</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">12,300,516</span> </td><td valign="center" align="center" bgcolor="#66ccff"> <span class="smaller">62.29%</span> </td></tr><tr><td valign="center" align="center"> <span class="smaller">G-Data</span> </td><td valign="center" align="center"> <span class="smaller">1,186,992</span> </td><td valign="center" align="center"> <span class="smaller">3,679,871</span> </td><td valign="center" align="center"> <span class="smaller">32.26%</span></td></tr></tbody></table><br /><br />It is shocking to know that our computer system is exposed to these malicious threats. It is of the utmost importance to always have your anti-virus software updated because these threats can adapt to changes and evolve through time.<br /><br />The following are some ways to keep these threat at bay:<br /><br /><ol><li><span style="color: rgb(255, 102, 0);">Always ensure that the Internet firewall is running.</span> Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.</li><li><span style="color: rgb(204, 51, 204);">Subscribe to industry standard anti-virus software.</span> In the case of a breach in security, these anti-virus software could trap the viruses and alert users of the breach and take the necessary steps to eliminate the viruses.</li><li><span style="color: rgb(51, 51, 255);">Never open an e-mail attachment from someone you don't know</span>.<br /></li><li style="color: rgb(153, 51, 0);">Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.</li></ol>Finally, as the saying goes - <span style="color: rgb(153, 153, 153);">prevention is better than cure. </span>Anonymoushttp://www.blogger.com/profile/09656654626904885136noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-9325287741268826312009-02-05T19:10:00.007+08:002009-02-05T20:00:32.429+08:00how to safeguard our personal and financial data?Identity fraud and financial account fraud are not new. Criminals used to gain access to individual’s sensitive personal information with low-tech primary methods such as stealing their mail. But the methods used by criminals to gain access to the personal information that makes these crimes possible are changing with our times. Criminals are now turning to more technologically sophisticated methods of gathering and exploiting personal information.<br /><br />Therefore, necessary steps to protect the security of individuals' information has to be taken seriously. A few of these safeguards will be discussed below.<br /><br /><br /><p><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRyfdBms15lRGF1TO2OSxvBhlD4S6TyVOOj-0fnBotebfYUthoLGyqXv37fWFQm4UeBZErcrjnY7tRcO9L12PSKcYqk8FrnbkyxxCHROqIh9VvYmLCPfIm74dS_yzvmu5okcjMGkgy0ABS/s1600-h/images.jpg"><img id="BLOGGER_PHOTO_ID_5299281073210901890" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 250px; CURSOR: hand; HEIGHT: 142px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRyfdBms15lRGF1TO2OSxvBhlD4S6TyVOOj-0fnBotebfYUthoLGyqXv37fWFQm4UeBZErcrjnY7tRcO9L12PSKcYqk8FrnbkyxxCHROqIh9VvYmLCPfIm74dS_yzvmu5okcjMGkgy0ABS/s320/images.jpg" border="0" /></a> Firstly, and also most traditionally, is to create strong passwords and PIN numbers to protect data from being assessed by using a combination of alphabets and numerics. </p><p><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMho15NWwECJCLJGSrD_KaqH5vrtVGZJ3TxgEMByFSH31OCjNsVVr-Wq73HroKDAKe8g0C26jtj5mWtG05SBvkpZvPyMKd1ik8ZD7tLfQafJiBn1T-QDcKLgSFH6cwQfg3HswVZhxanMBN/s1600-h/worst-computer-viruses-100x60.jpg"><img id="BLOGGER_PHOTO_ID_5299279074589394642" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 291px; CURSOR: hand; HEIGHT: 120px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMho15NWwECJCLJGSrD_KaqH5vrtVGZJ3TxgEMByFSH31OCjNsVVr-Wq73HroKDAKe8g0C26jtj5mWtG05SBvkpZvPyMKd1ik8ZD7tLfQafJiBn1T-QDcKLgSFH6cwQfg3HswVZhxanMBN/s320/worst-computer-viruses-100x60.jpg" border="0" /></a>Besides that, it is crucially important to not only install but constantly update antispyware and antivirus programs. Popular programs include <a href="http://www.norton.com/">Norton AntiVirus</a> and <a href="http://www.avg.com/">AVG Antivirus</a>.</p>Other than that, installing a firewall is also another good safeguard as a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Most computers today come with firewalls integrated into their operating systems.<br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIiawW3PSPZ140D5LU4dJ5bYqsy2M-hNFOLVUX5k8t3-n1Xngnba5qRdNJ8bi4ABUG7e64Fyqoa-PAOU_I2dqPW7SDJgjw81GLGKrx42h1F4fGAn6etmg5h8CdvP4Ws7HJDxTMfktqSw-w/s1600-h/firewall.gif"><img id="BLOGGER_PHOTO_ID_5299278797322690594" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 381px; CURSOR: hand; HEIGHT: 185px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIiawW3PSPZ140D5LU4dJ5bYqsy2M-hNFOLVUX5k8t3-n1Xngnba5qRdNJ8bi4ABUG7e64Fyqoa-PAOU_I2dqPW7SDJgjw81GLGKrx42h1F4fGAn6etmg5h8CdvP4Ws7HJDxTMfktqSw-w/s320/firewall.gif" border="0" /></a>Another safeguard would be to avoid assessing personal and financial information in public places such as cafes and restaurants. This can encourage hackers to hack into your confidential data and steal information from anywhere on the network.<br /><br /><div>The internet is a great source of information, but obviously also a great danger. However, if appropriate safeguards are taken, it is possible to protect personal and financial data.</div>Hannah Yanghttp://www.blogger.com/profile/11096162740102705337noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-85089230716964408012009-01-30T22:20:00.009+08:002009-01-30T23:28:24.151+08:00How E-Commerce can reduce cycle time, improve employees' empowerment and facilitate customer support<span style="color: rgb(255, 102, 0); font-weight: bold;font-size:130%;" >Reduced Cycle Time</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihczi-tUWc4JMHPaDUNL9XA7tVbFnKnhn2-g5VkK1pOSHbeG7KEmfWUT42me015hHJXF6fm0B_vfEl7moOd2Tmx64YV4BP4a9UkQ5fwR7ZnLSS0R6ciedMikDpiKdHMJuM3e0a3u_GBQm-/s1600-h/cycle_time.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 238px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihczi-tUWc4JMHPaDUNL9XA7tVbFnKnhn2-g5VkK1pOSHbeG7KEmfWUT42me015hHJXF6fm0B_vfEl7moOd2Tmx64YV4BP4a9UkQ5fwR7ZnLSS0R6ciedMikDpiKdHMJuM3e0a3u_GBQm-/s320/cycle_time.jpg" alt="" id="BLOGGER_PHOTO_ID_5297108764819185106" border="0" /></a><br />Cycle time is the amount of time a particular organization takes to complete any process. Such processes include, collecting accounts receivables, returning a quotation, and getting product out into the marketplace. The latter, is probably the most common in e-commerce. According to a report published by the FedEx Center for Cycle Time Research at the University of Memphis, "All too often in organizations, less than 3% of the elapsed time performing a process has anything to do with real work." The rest is spent on "scheduling, waiting, needless repetition, getting lost (and) getting found."<br /><br />However, with the emergence of e-commerce and the advances in technology, cycle time could be reduced. For example, obtaining music, one needs to go to the music store to get a physical copy of the album before the emergence of e-commerce. Now with e-commerce, one only needs a computer system and Internet connection to obtain those music digitally. E-commerce reduced delivery time of digitized products and services to mere seconds. Furthermore, e-commerce could eliminate activities that are non-value added.<br /><br />Activities such as documentation and administrative works could be reduced by more than 90%. Everything is made through computer systems. Employees need not search around for information and walk around the office to pass product orders. All is done via e-commerce.<br /><br /><div style="text-align: center;">---------------------------------------------<br /></div><br /><span style="color: rgb(51, 51, 255); font-weight: bold;font-size:130%;" >Improved Employee Empowerment</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidyLBsr5e45ZOMZhGMvmoTe4DwmVS2omS0DNzeWIRGBL6mdAdljb5m-4-yrNjWtI7n7nUjb8q960Hz9Rk9JWgRF1-S06fALDWJFz6NexBPXjhDM3PXLaxWFTZJAt2wjZoef4nNw_xxnVMS/s1600-h/business-card.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 228px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidyLBsr5e45ZOMZhGMvmoTe4DwmVS2omS0DNzeWIRGBL6mdAdljb5m-4-yrNjWtI7n7nUjb8q960Hz9Rk9JWgRF1-S06fALDWJFz6NexBPXjhDM3PXLaxWFTZJAt2wjZoef4nNw_xxnVMS/s320/business-card.jpg" alt="" id="BLOGGER_PHOTO_ID_5297108957287672546" border="0" /></a><br />Employee empowerment is the extent of authority given to the employee to make decisions independently by the organization. This is enabled when the company adopts a decentralization decision making process. It gives the employees more freedom.<br /><br />With e-commerce, almost everything is made available with a click of the mouse. Such as, customer history, product information, delivery mode, payment mode, promotion and discounts. Employees could make decision on the spot without consulting their superiors. This means that sales could be finalised and closed faster. Hence, making more sales.<br /><br /><div style="text-align: center;">--------------------------------------------------<br /></div><br /><span style="color: rgb(153, 51, 153); font-weight: bold;font-size:130%;" >Facilitate Customer Support</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh20kWDEGlcVJXU5xBjMSP6-eI-JB7q5zULiSGNJvo-jsZAMdWIoUyY7iYPPjucWMl_WPLMrRf5OILXttNVahyphenhyphen9uj7FS034R6njyiev8PucmRInbISqMCn0wl8FmRc3k3QGR43XYrMtwOxk/s1600-h/customer_support.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 250px; height: 188px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh20kWDEGlcVJXU5xBjMSP6-eI-JB7q5zULiSGNJvo-jsZAMdWIoUyY7iYPPjucWMl_WPLMrRf5OILXttNVahyphenhyphen9uj7FS034R6njyiev8PucmRInbISqMCn0wl8FmRc3k3QGR43XYrMtwOxk/s320/customer_support.jpg" alt="" id="BLOGGER_PHOTO_ID_5297107652262734290" border="0" /></a><br />E-commerce enables the organization to provide value-added services and update to recurring customers and new customers alike. With the information in the organization's database, it could recommend the right products to the right customers.<br /><span style="font-size:130%;"><br />For example:</span><br />I bought the items below from Amazon.com.<br /><br /><table width="100%" align="center" border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td colspan="4" valign="top" width="99%"><table width="100%" align="center" border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td valign="top" width="10" align="left" bgcolor="#ddddcc"><img src="https://images-na.ssl-images-amazon.com/images/G/01/x-locale/css/checked-icon._V47082019_.gif" width="27" border="0" height="22" /></td> <td bg="" style="color: rgb(221, 221, 204);" valign="center" width="20%" height="28" nowrap="nowrap"><span style="color: rgb(102, 0, 0);"><b class="sans">Shipment #1: Shipped on November 30, 2008</b></span> </td> <td valign="bottom" width="79%" align="right" bgcolor="#ddddcc"> <a href="http://www.blogger.com/gp/orc/returns/items/select?ie=UTF8&marketplaceID=ATVPDKIKX0DER&orderID=002-1116824-7737833"><img alt="Need to return an item?" src="https://images-na.ssl-images-amazon.com/images/G/01/x-locale/common/buttons/return-an-item-tan._V47081496_.gif" width="151" align="absmiddle" border="0" height="22" /></a> </td> <td valign="top" width="10" align="right" bgcolor="#ddddcc"><img src="https://images-na.ssl-images-amazon.com/images/G/01/x-locale/common/tan-top-right-round-corner._V47081490_.gif" width="10" border="0" height="28" /></td></tr></tbody></table></td></tr></tbody></table> <table width="100%" align="center" bgcolor="#ddddcc" border="0" cellpadding="0" cellspacing="0"> <tbody> <tr bgcolor="#ddddcc"> <td valign="top" bgcolor="#ddddcc"> <table width="100%" align="center" bgcolor="#ddddcc" border="0" cellpadding="0" cellspacing="3"> <tbody> <tr bgcolor="#eeeedd"> <td colspan="2" valign="top"> <table width="100%" border="0" cellpadding="5" cellspacing="0"> <tbody> <tr bgcolor="#eeeedd"> <td><b>Shipping estimate:</b>November 30, 2008<br /><img src="https://images-na.ssl-images-amazon.com/images/G/01/x-locale/common/icons/arrow_subordinate._V47081670_.gif" width="13" border="0" height="10" /> <b>Delivery estimate:</b>December 23, 2008 <span class="tiny">(<a onclick="return amz_js_PopWin(this.href,'AmazonHelp','width=340,height=340,resizable=1,scrollbars=1,toolbar=1,status=1');" href="http://www.amazon.com/exec/obidos/tg/browse/-/3043211/pop-up" target="AmazonHelp">More about estimates</a>)</span><br />1 package via Expedited Int'l Shipping<br /></td></tr></tbody></table></td></tr> <tr> <td valign="top" width="210" bgcolor="#ffffff"> <table width="100%" bgcolor="#ffffff" border="0" cellpadding="5" cellspacing="0"> <tbody> <tr bgcolor="#ffffff"> <td valign="top"><b>Shipping Address:</b><br />Amy Loke<br />No. 2, Jalan 5/38C,<br />Taman Sri Kepong Baru<br />Kuala Lumpur, Kuala Lumpur 52100<br />Malaysia<br /><br /><b>Shipping Speed:</b><br />Expedited International Shipping<br /></td></tr></tbody></table> <hr size="1" width="210" color="#ffffff" noshade="noshade"> </td> <td valign="top" width="100%" align="right" bgcolor="#ffffff"> <table width="100%" border="0" cellpadding="0" cellspacing="2"> <tbody> <tr valign="top"> <td valign="top"><b>Items Ordered</b> </td> <td valign="top" align="right"><b>Price</b> </td></tr> <tr><input value="1" name="originalQuantity.qlrhsumroilx" type="hidden"> <td valign="top">1 of: <b><a href="http://www.amazon.com/gp/product/0316043133">Twilight: The Complete Illustrated Movie Companion</a> </b>[Paperback]<br />By: Mark Cotta Vaz<br /><span class="tiny">Sold by: Amazon.com, LLC<br /></span></td> <td colspan="2" valign="top" align="right">$10.19<br /></td></tr> <tr> <td> <table width="93%" align="right" border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="small" valign="top">- 1 item(s) Gift options: None<br /></td></tr></tbody></table></td></tr> <tr> <td colspan="2" valign="top" align="middle"><br /></td></tr> <tr><input value="1" name="originalQuantity.qlrhsumrnolx" type="hidden"> <td valign="top">1 of: <b><a href="http://www.amazon.com/gp/product/0312387059">The Twilight Companion: The Unauthorized Guide to the Series</a> </b>[Paperback]<br />By: Lois H. Gresh<br /><span class="tiny">Sold by: Amazon.com, LLC<br /></span></td> <td colspan="2" valign="top" align="right">$10.36<br /></td></tr> <tr> <td> <table width="93%" align="right" border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="small" valign="top">- 1 item(s) Gift options: None<br /></td></tr></tbody></table></td></tr> <tr> <td colspan="2" valign="top" align="middle"><br /></td></tr></tbody></table><br /><hr size="3" color="#ddddcc" noshade="noshade"> <table border="0" cellpadding="0" cellspacing="1"> <tbody> <tr valign="top"> <td align="right" nowrap="nowrap">Item(s) Subtotal:</td> <td align="right" nowrap="nowrap">$20.55</td></tr> <tr valign="top"> <td align="right" nowrap="nowrap">Shipping & Handling:</td> <td align="right" nowrap="nowrap">$25.97</td></tr> <tr valign="top"> <td align="right" nowrap="nowrap"><br /></td> <td align="right" nowrap="nowrap">-----</td></tr> <tr valign="top"> <td align="right" nowrap="nowrap">Total Before Tax:</td> <td align="right" nowrap="nowrap">$46.52</td></tr> <tr valign="top"> <td align="right" nowrap="nowrap">Sales tax:</td> <td align="right" nowrap="nowrap">$0.00</td></tr> <tr valign="top"> <td align="right" nowrap="nowrap"><br /></td> <td align="right" nowrap="nowrap">-----</td></tr> <tr valign="top"> <td align="right" nowrap="nowrap"><b>Total for this Shipment:</b></td> <td align="right" nowrap="nowrap"><b>$46.52</b></td></tr> <tr valign="top"> <td align="right" nowrap="nowrap"><br /></td> <td align="right" nowrap="nowrap">-----</td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table><br /><br />A few weeks later, Amazon.com sent me an email recommending a product relevant to the goods that I've bought.<br /><table width="654" align="center" bgcolor="#ffffff" cellpadding="0" cellspacing="0"> <tbody> <tr> <td style="font-size: 10px; color: rgb(153, 153, 153); line-height: 16px; font-family: verdana,arial,sans-serif;"><br /></td></tr> <tr> <td height="10"><img src="http://g-ec2.images-amazon.com/images/G/01/mk/da/s.gif" width="1" height="10" /></td></tr></tbody></table> <table width="654" align="center" bgcolor="#ffffff" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <table style="width: 441px; height: 46px;" cellpadding="0" cellspacing="0"> <tbody> <tr> <td width="205"><a href="http://www.amazon.com/gp/r.html?R=25HFWFWJ5SWHB&C=1BSTO2AIXGRE0&H=FJpIULV9ABiXyEnmYSajSAwXw6kA&T=C&U=http://www.amazon.com/ref%3Dpe_31530_11097850_pe_logo" target="_blank"><img alt="amazon.com" src="http://g-ec2.images-amazon.com/images/G/01/ma8/d1/p1n.gif" width="205" border="0" height="45" /></a></td> <td valign="bottom" width="449" align="right"> <table width="449" cellpadding="0" cellspacing="0"> <tbody> <tr> <td valign="bottom" width="445" align="right"><span style="color: rgb(0, 75, 145); line-height: 15px;font-family:arial,verdana,sans-serif;font-size:85%;" >Let them choose from millions of items</span> <span style="font-size:85%;"><a style="font-size: 12px; color: rgb(204, 102, 0); line-height: 15px; font-family: arial,verdana,sans-serif; text-decoration: none;" href="http://www.amazon.com/gp/r.html?R=25HFWFWJ5SWHB&C=1BSTO2AIXGRE0&H=cwAubxATBEhJC8FQLCOuaAdXUa4A&T=C&U=http://www.amazon.com/gp/product/ref%3Dpe_31530_11097850_pe_gc/?ASIN%3DB00067L6TQ" target="_blank"><b>› Amazon.com Gift Cards</b></a></span></td></tr> <tr> <td colspan="2" height="3"><img src="http://g-ec2.images-amazon.com/images/G/01/mk/da/s.gif" width="1" height="3" /></td></tr></tbody></table> <table style="width: 449px; height: 23px;" bgcolor="#146eb4" cellpadding="0" cellspacing="0"> <tbody> <tr> <td valign="bottom" width="160" align="middle"><a style="font-size: 12px; color: rgb(255, 255, 255); line-height: 15px; font-family: arial,verdana,sans-serif; text-decoration: underline;" href="http://www.amazon.com/gp/r.html?R=25HFWFWJ5SWHB&C=1BSTO2AIXGRE0&H=shI4jNUU4NwnZAPN8N00GdEkxQYA&T=C&U=http://www.amazon.com/gp/yourstore/home/ref%3Dpe_31530_11097850_pe_yourstore/" target="_blank">Your Amazon.com</a></td> <td valign="bottom" width="130" align="middle"><a style="font-size: 12px; color: rgb(255, 255, 255); line-height: 15px; font-family: arial,verdana,sans-serif; text-decoration: underline;" href="http://www.amazon.com/gp/r.html?R=25HFWFWJ5SWHB&C=1BSTO2AIXGRE0&H=pKAPdoLH83tQGOXFvdtoXQnFtI0A&T=C&U=http://www.amazon.com/gp/goldbox/ref%3Dpe_31530_11097850_pe_goldbox/" target="_blank">Today's Deals</a></td> <td valign="bottom" width="159" align="middle"><a style="font-size: 12px; color: rgb(255, 255, 255); line-height: 15px; font-family: arial,verdana,sans-serif; text-decoration: underline;" href="http://www.amazon.com/gp/r.html?R=25HFWFWJ5SWHB&C=1BSTO2AIXGRE0&H=fTFb7UImy8ElZPfuvD5WxoNYBAEA&T=C&U=http://www.amazon.com/gp/site-directory/ref%3Dpe_31530_11097850_pe_dir_gw/" target="_blank">See All Departments</a></td> <td rowspan="2" width="15" align="right"><img src="http://g-ec2.images-amazon.com/images/G/01/ma8/d1/p3.gif" width="15" height="23" /></td></tr> <tr> <td colspan="3" height="2"><img src="http://g-ec2.images-amazon.com/images/G/01/mk/da/s.gif" width="1" height="2" /></td></tr></tbody></table></td></tr> <tr> <td colspan="2" height="5"><img src="http://g-ec2.images-amazon.com/images/G/01/ma8/d1/p4.gif" width="654" height="5" /></td></tr> <tr> <td colspan="2" height="12"><img src="http://g-ec2.images-amazon.com/images/G/01/mk/da/s.gif" width="1" height="12" /></td></tr></tbody></table> <table style="width: 467px; height: 248px;" cellpadding="0" cellspacing="0"> <tbody> <tr> <td id="EC_maincopy" valign="center" align="left"><span style="line-height: 16px; color: rgb(51, 51, 51);font-family:verdana,arial,sans-serif;font-size:78%;" >Dear Amazon.com Customer,<br /><br />As someone who has purchased Stephenie Meyer books, "Twilight" music, or "Twilight" accessories, or searched for "Twilight" at Amazon.com, you might be interested in "Twilight" on DVD, available to pre-order only at Amazon.<br /><br />Also, learn more about the film, buy movie merchandise, and watch our interview with Robert Pattinson at the "Twilight" Store: www.amazon.com/twilight.<br /><br /><table cellpadding="0" cellspacing="0" height="27"> <tbody> <tr> <td width="10" height="27"><img alt="" src="http://g-ec2.images-amazon.com/images/G/01/m11/d20/bl.gif" width="10" height="27" /></td> <td background="http://g-ec2.images-amazon.com/images/G/01/m11/d20/bg.gif"> <table cellpadding="0" cellspacing="0"> <tbody> <tr> <td bgcolor="#1c408b" height="2"><img src="http://g-ec2.images-amazon.com/images/G/01/correios/1002_halloween/spacer.gif" width="1" height="2" /></td></tr> <tr> <td style="font-size: 12px; font-family: verdana;" valign="center" background="http://g-ec2.images-amazon.com/images/G/01/m11/d20/bg2.gif" bgcolor="#ffc435" height="23" nowrap="nowrap"> <a style="font-weight: bold; font-size: 12px; color: rgb(0, 0, 102); font-family: verdana; text-decoration: none;" href="http://www.amazon.com/gp/r.html?R=25HFWFWJ5SWHB&C=1BSTO2AIXGRE0&H=Ey1Efy5eLZ9WlPJo50XrY9ArRwYA&T=C&U=http://www.amazon.com/gp/product/ref%3Dpe_31530_11097850_pe_00_head/?ASIN%3DB001P5HRMI" target="_blank" rel="nofollow">Check out the DVD</a> </td></tr> <tr> <td bgcolor="#1c408b" height="2"><img src="http://g-ec2.images-amazon.com/images/G/01/correios/1002_halloween/spacer.gif" width="1" height="2" /></td></tr></tbody></table></td> <td width="25" height="27"><img alt="" src="http://g-ec2.images-amazon.com/images/G/01/m11/d20/br.gif" width="25" height="27" /></td> <td width="10"><img src="http://g-ec2.images-amazon.com/images/G/01/mk/da/s.gif" width="10" height="1" /></td></tr></tbody></table></span></td> <td width="4"><img src="http://images/spacer.gif" width="4" height="1" /></td> <td valign="top" align="right"><a href="http://www.amazon.com/gp/r.html?R=25HFWFWJ5SWHB&C=1BSTO2AIXGRE0&H=aPfUH0DU1ypXhyVKGw2SsPljJxkA&T=C&U=http://www.amazon.com/gp/browse.html/ref%3Dpe_31530_11097850_pe_01_head/?node%3D1240753011" target="_blank"><img src="http://ecx.images-amazon.com/images/I/518rNOWZ4UL._AA240_.jpg" border="0" /></a></td></tr> <tr> <td colspan="3" height="12"><img src="http://images/spacer.gif" width="1" height="12" /></td></tr></tbody></table></td></tr></tbody></table><br />With the help of e-commerce, the organization could lock customers in by giving them what they want and what they might want in the future by analyzing their buying habits.Anonymoushttp://www.blogger.com/profile/09656654626904885136noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-64546916615994616942009-01-30T22:16:00.001+08:002009-01-31T16:19:33.883+08:00An example of an E-Commerce failure and its causes<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil_G5Q0EQ3cEQiPZefKoE-KXfBNdazCli6cvC0TUlmY4pVxZv78IVpk-fJsjzEqz3kM7Ry_gRipztbazlW2qKn-FEhHQMlcUwpogRmGz39XLhKO8fcESoH0DJwDeNU1jBlMTw1EwZYCiQ/s1600-h/GetAttachment3.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 182px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil_G5Q0EQ3cEQiPZefKoE-KXfBNdazCli6cvC0TUlmY4pVxZv78IVpk-fJsjzEqz3kM7Ry_gRipztbazlW2qKn-FEhHQMlcUwpogRmGz39XLhKO8fcESoH0DJwDeNU1jBlMTw1EwZYCiQ/s320/GetAttachment3.jpg" alt="" id="BLOGGER_PHOTO_ID_5297360021109539122" border="0" /></a><br />Pets.com was an online business that sold pet accessories and supploes direct to consumers over the Web. It was launched in August 1998 and went into liquidation within 9 months. It was also well-known for its wildly popular sock puppet spokesdog.<br /><br />After its start by Greg McLemore, the site and domain was purchased in early 1999 by leading venture firm, Hummer Windblad, and executive Julie Wainwright. Amazon.com was involved in Pets.com's forst round of venture funding. Pets.com would eventually buy out one online competitor, Petstore.com in June.<br /><br />The company rolled out a regional advertising campaign using a variety of media (TV, print, radio and eventually a Pets.com magazine). It started with a five-city advertising campaign rollout and then expanded the campaign to 10 cities by Christmas, 1999. The company succeeded wildly in making its mascot, the Pets.com sock puppet, well known. The puppet, performed by Michael Ian Black (alumnus of MTV's surrealist comedy sketch show, The State), was a simple sock puppet with button eyes, flailing arms, a stick microphone emblazoned with 'Pets.com", and a Timex watch around its neck.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ72ZiIpFtQ5PKpmnYQOATj6VXYKnrgw1ajn0UPjFIgXFdrOE2rHRW-4hKddmfeQ2BUgr58jWOTaoypx9COyi2m1upDeu3qz3IEaS33MNiSDQnxjkdF_2vAimRPUogq_HhGW_2p0DnoNk/s1600-h/GetAttachment2.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 214px; height: 246px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ72ZiIpFtQ5PKpmnYQOATj6VXYKnrgw1ajn0UPjFIgXFdrOE2rHRW-4hKddmfeQ2BUgr58jWOTaoypx9COyi2m1upDeu3qz3IEaS33MNiSDQnxjkdF_2vAimRPUogq_HhGW_2p0DnoNk/s320/GetAttachment2.jpg" alt="" id="BLOGGER_PHOTO_ID_5297367864904841698" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin6KbM4IUH0iNd_vSAQOGonn-uKPpSil-vL6DZzpTyHiRP8X1FC9VJVOFTep_dDkBIsaV6c7THX7tmVNIbobpHs-6aiYB4Mqr9aWep5DkEnSQWyfVDPBoSrt5tyDxUy_wHRVP3CN5ykEs/s1600-h/GetAttachment.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 267px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin6KbM4IUH0iNd_vSAQOGonn-uKPpSil-vL6DZzpTyHiRP8X1FC9VJVOFTep_dDkBIsaV6c7THX7tmVNIbobpHs-6aiYB4Mqr9aWep5DkEnSQWyfVDPBoSrt5tyDxUy_wHRVP3CN5ykEs/s320/GetAttachment.jpg" alt="" id="BLOGGER_PHOTO_ID_5297367863437595266" border="0" /></a><br />Tthe Pets.com design was extremely well received, garnering several advertising awards. in January 2000, the company aired its first national commercial as a Super Bowl ad which cost the company $1.2 million and introduced the country to their answer as to why you should stop at an online pet store: "Because Pet's Can't Drive!" That as was ranked #1 by the USA Today's Ad Meter and had the highest recall of any ad that ran during the Super Bowl. The company went public in February 2000; the former Nasdaq stock symbol was IPET. It was the last dot-com to go public before the bubble burst.<br /><br />Pets.com did make significant investments in infrastructure such as their warehousing; these investments resulted in the company needing critical mass of customers to break even. Pets.com's management maintained that the company needed to get to a revenue run rate that supported this infrastructure buildout. They believed that the revenue target was close to $300 million to hit the breakevem point and that it would take a minimum of 4 to 5 years to hit that run rate. This tim period was based on growth of the Internet shopping and the percentage of pet owners that shopped on the Internet.<br /><br />By fall of 2000, and in light of the venture capital situation after the bursting og the dot-com bubble, the Pets.com management and board realized that they would not be able to raise further capital. They aggressively undertook actions to sell the company. PetSmart offered less than the net cash value of the company, and Pets.com's board turned down that offer. The company announced they were closing their doors on the afternoon of November 6, 2000, mere hours before the 2000 United State presidential election.<br /><br /><span style="font-size:130%;">A few of the causes:</span><br /><ol><li><span style="font-weight: bold; color: rgb(204, 0, 0);">Unsustainable business model and unachievable expectations.</span> Basically, Pets.com bet everything on the market. It acquired ;arge amounts of funding from venture capitalists without demonstrating any background of achievements or success. Pets.com assumed that the market and its revenues would grow quickly enough before the funding money was used up. This e-tailer may have also overestimated the number of online customer it could gain in the pet market</li><li><span style="font-weight: bold; color: rgb(51, 51, 255);">Pets.com went public too soon and spent money too quickly.</span> It spent excessively on marketing and advertising. Pets.com advertised more heavily than any other online pet e-tailer. This excessive advertising did not only benefit Pets.com, rather it helped the entire online pet industry to increase sales. Hence, making its own competition.</li><li><span style="font-weight: bold; color: rgb(0, 102, 0);">Pets.com failed to position itself in an effective manner.</span> Pets.com jst offered prodcts that could be more easily obtained at a nearby mall and pet information about health, grooming. beahavior and such did not justify a virtual shopping trip. It also decided to compete with low prices just like its competitors that led to the selling of merchandise at prices below cost for the duration of its operations.</li></ol>HoCk LiaN @ SteveNhttp://www.blogger.com/profile/14578047751150471877noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-28369676201054522992009-01-30T21:46:00.004+08:002009-01-31T00:25:35.763+08:00An example of E-Commerce success and its cause<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis4448fobn_tVYHNiZ2wqCc-kRkl5gD6i2t16R9NdaY2usS4cDruJA4f9oGqSljqJ3RsT6eptjLSGMMfUQ3FJxDfWIuvdmVU7o84N9taWCR30YC9jNdOu7fgKsXFoj7655WxsLI3MuW6NJ/s1600-h/303284582_26b443535f.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 229px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis4448fobn_tVYHNiZ2wqCc-kRkl5gD6i2t16R9NdaY2usS4cDruJA4f9oGqSljqJ3RsT6eptjLSGMMfUQ3FJxDfWIuvdmVU7o84N9taWCR30YC9jNdOu7fgKsXFoj7655WxsLI3MuW6NJ/s320/303284582_26b443535f.jpg" alt="" id="BLOGGER_PHOTO_ID_5297088235669350978" border="0" /></a><br />eBay is a revolutionary example of an E-Commerce success story. eBay.com is an online auction and shopping website in which people and businesses could buy and sell goods and services worldwide. It is managed by eBay Inc., an American Internet company. Besides the US, eBay has established localized websites in more than thirty countries. Skype, a well-known software which allows users to make telephone calls, instant messaging, file transfer and video conferencing online is also owned by eBay Inc.<br /><br />Kevin Pursglove from eBay thinks that one of the causes of eBay's success is it really allows people to connect with some very fond and special early childhood memories such as collecting baseball cards, Barbie dolls or doll houses. He also states that people really enjoy the experience of a 'shopping bazaar' when they look around for merchandise.<br /><br />Besides that, the bidding process also draws customers as everybody, whether they admit it or not, likes a bargain. And eBay's auction format gives customers exactly that. eBay has also grown to be a very practical place to buy and sell collectibles and commodities.<br /><br />eBay has also gone a step further by listening to their users and develop as well as provide new services in addition to the ability to just buy and sell. The new services inlide everything from allowing users to list their items by a photograph in the eBay gallery, the feedback forum, establishing categories that deal with higher priced items and collectibles and automobiles.<br /><br />Localized eBay sites are also set up in a way that allows people to trade and buy un appropriate language of the contry and deal in the appropriate currency of the country. eBay also has many strategic partnerships, the chief among them is America Online. The company had made arrangements with smaller sites that go back several years as an exchange to encourage people to come into the eBay website. This obviously is a strategic move that has benefited eBay.<br /><br />There are possibly many other reasons why this online auction website has achieved the success it has today, but the bottom line is eBay knows the value of personal attention to its customers, evem in the virtual environment. As Pursglove puts it," Our primary goal and mission is to be an online person-to-person community, and that's really where we're going to stay focused."Hannah Yanghttp://www.blogger.com/profile/11096162740102705337noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-31746046587621479382009-01-30T21:43:00.003+08:002009-02-03T13:45:35.327+08:00The history and evolution of E-Commerce<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9YRJv-DNbcKQ16WpuyNfuOGIcxHwsh_Iz5d7o8gtQV-eNyEAENpMMX22m5vS1O91o2NpR0XuJsCKV4DMAS1E2wzzeuZh-gQ-v8cz83wzNfA562-w98lAbMb5gcdQcEbPbIQDRM2kiu8E/s1600-h/ecomm.jpg"><img id="BLOGGER_PHOTO_ID_5298433454383479858" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 274px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9YRJv-DNbcKQ16WpuyNfuOGIcxHwsh_Iz5d7o8gtQV-eNyEAENpMMX22m5vS1O91o2NpR0XuJsCKV4DMAS1E2wzzeuZh-gQ-v8cz83wzNfA562-w98lAbMb5gcdQcEbPbIQDRM2kiu8E/s320/ecomm.jpg" border="0" /></a><br /><div><div>In the 21st century, one of the most popular and common activities on the Web is shopping. The reason contribute to this is because you can shop at your leisure, anywhere, anytime, and even when you are wearing your pajamas provided you have the computer with Internet connection facilities. Therefore, people from all around the world can have trading activities or exchange of goods with each other, and this is what people call E-Commerce.<br /><br />The term e-commerce meant the processof commercial transaction being executed electronically with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) in the late 1970s. E-commerce became possible in 1991 when the Internet was opened to commercial use. The year of 1995 could not be forgotten as it marked the beginning of two giants in the e-commerce business - Amazon and eBay, which do not need any introduction these days.<br /><br />Indeed, e-commerce has evolved from online billboards to a fully functional, personalized shopping experience over the past decade. While there were admittedly a few bumps along the road, the holidat shopping season from 1994 through 2004 is full of crucial milestones of Internet pioneers and technology innovators.<br /><br />As we are the online users, we will buy some goods through the Internet as well. this has created more choices for us which are not only limiting to our country's borders.<br /><br />From e-commerce's history and evolution, we know that as technologies change, e-commerce have attracted a lot of customer to purchase their goods online conveniently.<br /><br />Therefore, we must thank Amazon and eBay's founders for their effort that make buying and selling through the Internet an enjoyable experience.</div></div>Wei Tienghttp://www.blogger.com/profile/18382359739172499261noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-8881556728683698222009-01-23T20:33:00.000+08:002009-02-06T23:15:32.637+08:00ME- Wei Tieng<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoI-R2W0Uh5Z4Hw-oykF8HAhyphenhyphenLZfmCF1VeVW8BTXmWd-pNQFpLT-L9Ktm-6e7Xj-SeWBdR1NW_V2V-qrWdZ8idAva5Jrs5sFN1M9CmTLet0knHVr4mR1S3YdPGK2PycBft5mAAUGrGO2k/s1600-h/100_1213.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoI-R2W0Uh5Z4Hw-oykF8HAhyphenhyphenLZfmCF1VeVW8BTXmWd-pNQFpLT-L9Ktm-6e7Xj-SeWBdR1NW_V2V-qrWdZ8idAva5Jrs5sFN1M9CmTLet0knHVr4mR1S3YdPGK2PycBft5mAAUGrGO2k/s400/100_1213.JPG" alt="" id="BLOGGER_PHOTO_ID_5299690969211135074" border="0" /></a>hi,everyone...my name is wei tieng, one of the member from this blog's assignment. Step back to 3 years ago,when i first joining Utar, i was still a foundation student. however, if i lucky enough and able to pass through all the subjects in this year, if la... i can say i am going to graduate already...hehe...<br /><br />i am a pure local, my house is just located in Balakong(Taming Jaya), and why i say so is because both of my parents are also local people, where their hometown is also located in Balakong. So, during CNY, i dont have to travel all day long to reach my lovely hometown, because i can just reach in 5 minutes...<br /><br />Erm, i like out-going activities, where i like to hang out with friends for movies, shopping...and a lots...as long as it is fun! i was still remembered that during the last sem break, i went to genting once a week with friends. the most unforgetful things was we can even go at 2am in the morning...haha...although i like to hang out with friends, but i still will focus on my academic too, for me, what is important is "Play hard,Study Hard".<br /><br />This blog is just like what my group mate said,is more to academical. this blog is quite meaningful to me as this is the first blog which i created since i never create any blog before this. so, i hope everybody can leave their comment, whether is good or bad, it will be pleasing to us. i am so happy that i can cooperate with my groupmate well, i really appreciate it!lastly,i hope that everyone can graduate in this year with the flying result!<br /><br />thanks!<br /><br />the top 5 website that i view most and activities:<br /><br />1. www.google.com-searching for information either in academic or non academic.<br />2.www.hotmail.com-check for daily mail.<br />3.www.jbtalks.cc-online buying clothes and accessories.<br />4.www.utar.edu.my-check for new updates, results,timetables.<br />5,www.sogou.com- downloading songs.Wei Tienghttp://www.blogger.com/profile/18382359739172499261noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-23321315862868536952009-01-21T18:16:00.002+08:002009-02-13T23:40:09.618+08:00hannah & herself<div align="left"><span style="COLOR: rgb(102,51,255);font-size:130%;" >Hola everyone!</span><br /><br />This blog is mainly for academical purposes but also for anyone with an interest in e-commerce! I'm <span style="font-size:130%;"><span style="COLOR: rgb(51,204,0)">Hannah Yang Mei Ern</span>,</span> one of the four authors of E-Marketplace. I turned 21 a week ago and coincidentally, during Chinese New Year. It was great, as not only the celebrations doubled, but also the angpows;)<br /><br />I was born in Kuala Terengganu, a place in Malaysia famous for it's white sandy beaches and delicious Malay food (think nasi dagang and kerepok lekor). I'm a final year student in accounting in UTAR.<br /><br />My hobbies include watching movies, listening to songs, spending quality time with family and friends and of course, filling my tummy with delicious food=) I'm blessed to be born in a country with such a wide selection of yummy food.<br /><br /></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_by-qlKfAy8DqiN7ruwhoeZSTh69cviWBmKvlZTXa7S6JPpeFCl-k65WgoXvUJYmkNbCubS5mRUtuWlNK7Oq9y4dlnakeNlfNTA9Xv8TbXHLzVbv7oE9FoS3BTiRsJ5Ox2cEYq5HxKOcT/s1600-h/n606163552_1435110_629.jpg"><img id="BLOGGER_PHOTO_ID_5299256541759475106" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 240px; HEIGHT: 320px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_by-qlKfAy8DqiN7ruwhoeZSTh69cviWBmKvlZTXa7S6JPpeFCl-k65WgoXvUJYmkNbCubS5mRUtuWlNK7Oq9y4dlnakeNlfNTA9Xv8TbXHLzVbv7oE9FoS3BTiRsJ5Ox2cEYq5HxKOcT/s320/n606163552_1435110_629.jpg" border="0" /> </a><p align="center"></p><p align="center"><em><span style="font-size:85%;">that's me with my very adorable 2 year old cousin.</span></em> </p><p align="left">The <span style="COLOR: rgb(255,0,0);font-size:130%;" >top five websites</span> I visit the most would be:</p><p align="left">(1) <a href="http://gmail.com/"><em>Gmail.com</em></a> to check my e-mails daily.</p><p align="left">(2) <a href="http://google.com.my/"><em>Google.com.my</em></a> to search for academical/non academical information.</p><p align="left">(3) <a href="http://wble.utar,edu.my/"><em>Wble.utar.edu.my</em></a> for additional notes for classes.</p><p align="left">(4) <a href="http://facebook.com/"><em>Facebook.com</em></a> to remind me of friends' birthday and of course, to keep in touch with them;)</p><p align="left">(5) <a href="http://youtube.com/"><em>Youtube.com</em></a> for videos.<br /></p><p align="left">My top internet activities would be as mentioned above. Other than that, I also go online to read what's in the news, chat with friends via MSN and also to blog at my personal not-so-academical blog at <a href="http://hannahyg.blogspot.com/"><em>randomness at its best</em></a><em>.</em></p><p align="left">That's all for now. Feel free to leave a comment and wait for more updates from us!</p>Hannah Yanghttp://www.blogger.com/profile/11096162740102705337noreply@blogger.com0tag:blogger.com,1999:blog-8674112992634005082.post-65637765616099753752009-01-21T14:41:00.004+08:002009-02-09T23:44:59.025+08:00Hock Lian@Steven<div align="center"><span style="color: rgb(51, 51, 255);font-size:130%;" >-About Me-</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwrvVwkaD91kTsHFp3r20BJIyitiCg0vla9fCTyiyVKv6FQHZp5V49uPD35EODLVK0eAWA1qtNg6TKSvTjMLJ27cT5uxnpKpSknMfEWg9tCpFBpTXbJ4WcmoQTltIr-weETcsmmWSl94M/s1600-h/DSC00170.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 150px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwrvVwkaD91kTsHFp3r20BJIyitiCg0vla9fCTyiyVKv6FQHZp5V49uPD35EODLVK0eAWA1qtNg6TKSvTjMLJ27cT5uxnpKpSknMfEWg9tCpFBpTXbJ4WcmoQTltIr-weETcsmmWSl94M/s200/DSC00170.JPG" alt="" id="BLOGGER_PHOTO_ID_5299329294472348098" border="0" /></a><br /></div><div align="center"><span style="font-size:180%;"><span style="color: rgb(255, 102, 0);"><span style="font-size:130%;">~HOCK LIAN</span>~</span></span></div><div align="center"><br /><span style="font-size:130%;">Welcome, <strong>Ladies & Gentlemen !!!</strong></span><br /><br /></div><div align="left">1s of all, welcome to our blog(E-marketplace), which contribute by a group from extraordinary member which consist of <span style="color: rgb(102, 0, 204);font-size:130%;" >Hannah Yang</span> , <span style="color: rgb(255, 153, 255);">Wei Tieng</span>, <span style="color: rgb(0, 153, 0);">Wai Fong</span>, and me myself <span style="color: rgb(255, 102, 0);">Hock Lian</span>..<br /><br /></div><div align="left"></div><div align="left"></div><div align="left">Alright, I'm done introducing the <strong><span style="color: rgb(255, 102, 102);font-size:130%;" >beauties</span></strong> and the <span style="color: rgb(51, 51, 255);font-size:130%;" >prince</span> in my group.. It's all about me now..<br /><br /></div><div align="left"></div><div align="left"></div><div align="left">My name is <span style="color: rgb(255, 102, 0);"><span style="font-size:130%;"><strong>Woon Hock Lian</strong><span style="color: rgb(0, 0, 0);">,</span></span> <span style="color: rgb(0, 0, 0);">currently pursuing final year degree in Bachelor of Commerce(HONS) Accounting in University Tunku Abdul Rahman(UTAR).</span></span>I loves sports, football, futsal, basketball. Besides, I love to watch movies..<br /><br /></div><div align="left"></div><div align="left">I start to be active(talkative) when the environment start to be quiet and formal, because I doesn't like a quiet and dumb environment, a cheerful day instead..Because quiet and null environment makes me sleepy and boring.. I like to make people smile and laugh whenever I can , because i enjoyed it, smile is the most precious image of our ownselves we ever had.. So , <span style="color: rgb(255, 204, 0);font-size:130%;" >KEEP SMILING</span> , guys..</div><div align="left"><br />I love to hang out with my buddies , especially mamak stall because i got a bunch of "football-crazy" buddies who defend themselves that their favourite team is the BEST club in the world. For me , <span style="color: rgb(204, 0, 0);font-size:130%;" >MANCHESTER UNITED</span> la of course , nothing but my <span style="color: rgb(204, 0, 0);">GLORY GLORY RED DEVIL..</span></div><div align="center"><br /></div><div align="center"><span style="color: rgb(0, 0, 0);">Top 5 Websites that I visited the most is :</span></div><div align="center"> </div><div align="center"> </div><div align="center"></div><div align="center"></div><div align="center"></div><div align="center"></div><div align="center"></div><div align="center"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFDFYrJS7ReO375MtkJwoQdEDekK9opV1PW2MOCRoSvf-zRtuQ_9X403vmeVlFEzFvuEFU9fb0cau7_KiqY89FEcB8zdpVzHxnUwHVVwJS80UREVk6DX860aJ-YOwZMtP9ELfnuIGv-Bg/s1600-h/google.jpg"><img id="BLOGGER_PHOTO_ID_5299218510930714546" style="width: 150px; height: 60px;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFDFYrJS7ReO375MtkJwoQdEDekK9opV1PW2MOCRoSvf-zRtuQ_9X403vmeVlFEzFvuEFU9fb0cau7_KiqY89FEcB8zdpVzHxnUwHVVwJS80UREVk6DX860aJ-YOwZMtP9ELfnuIGv-Bg/s200/google.jpg" border="0" /></a></div><div align="center"><br /></div><div align="center">1) <a href="http://www.google.com.my/"><span style="color: rgb(255, 0, 0);">http://www.google.com.my/</span></a> --> Click and Go.. One of the best search engine through internet, and it's EASY to use. </div><div align="center"> </div><div align="center"><br /></div><div align="center"></div><div align="center"></div><div align="center"></div><div align="center"><br /></div><img id="BLOGGER_PHOTO_ID_5299219887174379810" style="margin: 0px auto 10px; display: block; width: 92px; height: 72px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNHkZz8VlNIpRgK17Dk3qf76pZv4-R91PaQA-4SnJNDNvO5ZRq_VymNFmezTg1t3Xmryx4EcOFxAasvQGoLGJC6x0k4VWk3BV0csms5Iqf6Nx56GHEU_ciSXgUVKkk2ZVtT7vZyEaop1U/s200/yahoo+mail.jpg" border="0" /> <p align="center">2)<span style="color: rgb(255, 0, 0);"> </span><a href="http://www.mail.yahoo.com/"><span style="color: rgb(51, 255, 255);"><span style="color: rgb(255, 0, 0);">http://www.mail.yahoo.com</span>/</span></a> --> Check E-mails, to get updated with university's homework and keep in touch with friends.<br /><br /></p><div align="center"></div><p></p><p><br /><br /><br /></p><img id="BLOGGER_PHOTO_ID_5299220864162176674" style="margin: 0px auto 10px; display: block; width: 137px; height: 70px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7up1G_Ev-locpCxvdU2kxuU5DDV6hO5zTzTbGOeGxZYruc9hWf2qxwdz6pTCyGQjRhihsa_Nx4AexGyF-BX_-V3QPDPaWYG60gyuytU9k5f7WToDhKMniwQZDI0h-x0nojAxA9Br1x9c/s200/cnn.jpg" border="0" /><br /><br /><div align="center">3) <a href="http://www.cnn.com/"><span style="color: rgb(255, 0, 0);">http://www.cnn.com/</span></a> --> Get up-to-date daily on the world's happening.</div><p><br /><br /><br /></p><div align="center"><img id="BLOGGER_PHOTO_ID_5299221550764455842" style="margin: 0px auto 10px; display: block; width: 125px; height: 94px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6ibzFpnrqqlEMRbX-_PkU868cDfoZy3EkcpvJ0NQUOT6-lUMhH2XkO_hJH5vsM14JUE_uX-5CNd6GOnTn1Om7ks_Oi-yk-MOxITd4p-JR9qwWoFqpWo15cYchd7yyjb1j_FrmDMi9Wn4/s200/youtube.jpg" border="0" /><br /><br /><div align="center">4) <a href="http://www.youtube.com/"><span style="color: rgb(255, 0, 0);">http://www.youtube.com/</span></a> --> My entertainment, the best website for entertainment (music, MV, Video clips, Movie trailer, etc). </div><div align="center"> </div><div align="center"> </div><div align="center"> </div><div align="center"></div><div align="center"></div><div align="center"></div><div align="center"></div><div align="center"></div><div align="center"></div><div align="left"></div><div align="left"></div><div align="left"><br /></div><div align="center"><img id="BLOGGER_PHOTO_ID_5299222130987256658" style="margin: 0px auto 10px; display: block; width: 150px; height: 56px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9BpkZ44mOYNdvE3GCYYH_Vv8wm3MO6ZeYtKBUeFxgCS58MMGWfNsXPfWjgtz0lE6Slb0xOHv8JapqbXeiFQxARzxaDoILzoQp_BhX7gOraZhNZ6fL7SJc5UaOWys7U7TPbhfvba9hAdg/s200/facebook.jpg" border="0" /><br />5) <a href="http://www.facebook.com/"><span style="color: rgb(255, 0, 0);">http://www.facebook.com/</span></a> --> Update my profile and to stay in touch with friends and buddies.<br /></div><br /><br /><br /></div><div align="center"></div><div align="center">My top 5 I<span class="blsp-spelling-error" id="SPELLING_ERROR_0">nternet</span> activities would be: </div><br /><ol><li><span class="blsp-spelling-error" id="SPELLING_ERROR_1">Cheking</span> e-mails - This is important as it provide me information regarding university's recent activities</li><li>Listening Songs - "Music is My Soul" . </li><li>Football - I can play and get update for <span class="blsp-spelling-error" id="SPELLING_ERROR_2">EPL</span> players and fixtures.</li><li>Assignments, Thesis - Seek Google for help.</li><li>World and Local Happening - I can read the news from <span class="blsp-spelling-error" id="SPELLING_ERROR_3">internet</span>. (e.g <span class="blsp-spelling-error" id="SPELLING_ERROR_4">thestar</span>.com , <span class="blsp-spelling-error" id="SPELLING_ERROR_5">cnn</span>.com)</li></ol><p>That's all from me and please do not hesitate to drop any comment(s) , your comment will be much appreciated. Thanks.. </p><p>Last but not least, I would like to wish everyone <span style="color: rgb(255, 0, 0);font-size:130%;" ><strong>ALL THE BEST</strong></span> especially to <span style="color: rgb(0, 0, 0);">my group members , my tutorial group-mates</span>, as well as all Utar friend as we're graduating this year!!!</p><p></p>HoCk LiaN @ SteveNhttp://www.blogger.com/profile/14578047751150471877noreply@blogger.com0