tag:blogger.com,1999:blog-83745896925733839492024-03-05T12:46:02.178+08:00yOuThGenEraTion @ BAC 5Tan Cheng Linghttp://www.blogger.com/profile/05676503683750291218noreply@blogger.comBlogger19125tag:blogger.com,1999:blog-8374589692573383949.post-63378700271674279462009-07-12T00:22:00.033+08:002009-07-14T14:27:51.045+08:00Review A Local, Transactional E-Commerce SiteOne of Malaysia’s E-commerce sites that I found is <a href="http://www.bpfair.com/">http://www.bpfair.com/</a>. This is a site which I fascinated on it. Some reviews been done for your reading.<br /><br /><em><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_BFS-Hw8Io8mb5Y_B5_UbJVdmdb3L9EvjyXE5SM6RnuT4AqWxOc5Rw98KZi2Hzz3IlNdmTD44MxI5kXKsrSmrttaloQSOHW9cyJ3GiAhSfJYMfrKjYmtN4m1gHrteZF693MeGhDotPpOm/s1600-h/E-Catalogue.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 108px; FLOAT: right; HEIGHT: 400px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357240505460460866" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_BFS-Hw8Io8mb5Y_B5_UbJVdmdb3L9EvjyXE5SM6RnuT4AqWxOc5Rw98KZi2Hzz3IlNdmTD44MxI5kXKsrSmrttaloQSOHW9cyJ3GiAhSfJYMfrKjYmtN4m1gHrteZF693MeGhDotPpOm/s400/E-Catalogue.jpg" /></a>E-catalogue</em> – A list panel of various categories of items will found in left side. They are arranged according to different categories.<br /><br /><em>Search Engine</em> – You know exactly what you item but lazy find through e-catalogue? Search engine can ease you burden. Just type in the item name, and result will come out in few seconds. Result can too be shown either in tiles, thumbnail, or list, according to your preference.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ6B6qJxV9pP-4HmZ-R3piz20ZVuUAYIGO-2PUJw_EZ_4oByXtiBh99qrIGyej_DACMxme_XMbpQCp-r_W44e_ftGOjLrp7tz5qYtl_pnNiu_JgyzlBjKQLkNoKJbwmXgpLuRurHUejtkP/s1600-h/Search+Engine.jpg"><img style="WIDTH: 400px; HEIGHT: 35px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357240718896923986" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZ6B6qJxV9pP-4HmZ-R3piz20ZVuUAYIGO-2PUJw_EZ_4oByXtiBh99qrIGyej_DACMxme_XMbpQCp-r_W44e_ftGOjLrp7tz5qYtl_pnNiu_JgyzlBjKQLkNoKJbwmXgpLuRurHUejtkP/s400/Search+Engine.jpg" /></a> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyVorPihNfXSvhkwE3gJabqdlDZqHSHWL0Sdp1j5zA-tIdosJ65X5GQtd2x5TOkc8kTYyWuU1SvRialf_3MVLXPkOr7yzpktQwH3D26w-hXsvFOTTzLhX62IJ8iJxEgOPdkp4sshaQnAcl/s1600-h/Search+Engine+2.jpg"><img style="WIDTH: 131px; HEIGHT: 25px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357241184300314770" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyVorPihNfXSvhkwE3gJabqdlDZqHSHWL0Sdp1j5zA-tIdosJ65X5GQtd2x5TOkc8kTYyWuU1SvRialf_3MVLXPkOr7yzpktQwH3D26w-hXsvFOTTzLhX62IJ8iJxEgOPdkp4sshaQnAcl/s400/Search+Engine+2.jpg" /></a><br /><em>Top Sales</em> – In the right side, there is a column for displaying the rank for top sales items. If you wish to be one of the fashions, you may refer to the top sales rank there.<br /><br /><em>Description</em> – After clicking the item you like, you will able to see the details, description, and price of that particular item. You can also read the comment given by user or seller before buying it.<br /><em></em><br /><em>Bonus</em> – Every item will have its own reward point. The more you purchase, the more points you collect. Points can be used to enjoy a discount up to 10%. (<a href="http://www.bpfair.com/?page-memberrank.html">Click here</a>)<br /><br /><em></em><br /><em><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJrB5TF4x7M-dkvu_0l_OBKCjvNbSy_0aA8cuxipX0EAuyI_H8U4vBVjqlGVLKFkA9aFwzkdSUVeTh9elwogQq29tUi4yCFCsgOtm3Nbgk4zFvzy8tag-jychWg_j5hVDOPxjpUN5goUKo/s1600-h/Shopping+Cart.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 288px; FLOAT: left; HEIGHT: 364px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5358194537353137058" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJrB5TF4x7M-dkvu_0l_OBKCjvNbSy_0aA8cuxipX0EAuyI_H8U4vBVjqlGVLKFkA9aFwzkdSUVeTh9elwogQq29tUi4yCFCsgOtm3Nbgk4zFvzy8tag-jychWg_j5hVDOPxjpUN5goUKo/s400/Shopping+Cart.jpg" /></a>Shopping Cart</em> – For the items you like, you may just add them to the shopping cart. After done, all you need is just a click, and then all the transactions will complete at once. <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9oFN5694ziq0Qe6l6sGzkf0C1rtJK6PBB-f56wjrcnIQdxeP2fKi0-5i9rOw-Z0yk_6qOMkVzcAvRlhJgBvxwqBTgKDYqZ04nwrreU3_d5KGXMCBjt9Ncu6rwUtTbRYC_y67UBC1RvoAr/s1600-h/Shopping+Cart.jpg"></a><br /><br /><em>Payment</em> – User can do the payment through <a href="http://www.cimbbank.com.my/index.php?ch=subch_personal_ib&pg=pg_ibk_ibk&ac=79&tpt=cimb_bank">CIMB Bank</a>, <a href="http://www.maybank2u.com.my/">Maybank2u</a>, <a href="http://www.pbebank.com/en/en_content/personal/index.html">P</a><a href="http://www.pbebank.com/en/en_content/personal/index.html">ublic Bank</a>, or <a href="http://www.rhbbank.com.my/">RHB Bank</a>. These banks are the popular bank that most Malaysian familiar with.<br /><a href="http://www.cimbbank.com.my/index.php?ch=subch_personal_ib&pg=pg_ibk_ibk&ac=79&tpt=cimb_bank"><img style="WIDTH: 173px; HEIGHT: 38px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357242156201192562" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8ERZaKVKnDHJsuJWeVdV6feBJ-zxAlTjSOrvrnkKYVTSCeRnBJjH50Ws6uPieYY5Qagyvb-8Kw7gERknJ4Q8P_4d5rNeqOpqHnTHYStuaxR9V8YqRfqzQDscoq8T9I0-eMHdF2jTGVTsx/s400/Payment+-+CIMB.jpg" /></a> <a href="http://www.maybank2u.com.my/"><img style="WIDTH: 234px; HEIGHT: 38px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357242204916634098" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicHDGlSayjk2HcfgMDBgTL5ku76yIufS7I9KtUNLRoucVEuegzxZ5C5hckrVgFq5yKMSp_zPmdVNkW4ICFpm7VQTBR-3jRnxgsazt5VKCMZbNnNmnCtWO04JrXqTLSPtavznKLi6Jcz-dm/s400/Payment+-+Maybank.jpg" /></a><br /><a href="http://www.pbebank.com/en/en_content/personal/index.html"><img style="WIDTH: 188px; HEIGHT: 47px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357242254053118946" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNFtVdBomV2uzjLs7UBtJlWXlcHLa_VytjTDgmsUjUvgEhCQnUYWKzLy4gSqwektlL8GLQkMTcL12xXM4i1462N37dcx4jbCrO_c4YeGql3oQOv4z-Nj4ZIQ_Bnv7nj9ZIGQ06J0IL4isX/s400/Payment+-+Public+Bank.jpg" /></a> <a href="http://www.rhbbank.com.my/"><img style="WIDTH: 161px; HEIGHT: 48px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357242315388174706" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7wQGE0jVG6qdP53YGBr6Y4amOnn292bRxUEv30uhymOeitG5AYlQrD3-sJ2JbPiMVUQsHEAOyeKKwjp3BiZ_WUXVmHkbb9js7KlZlRgJ4zfl7g5b8oa7vkMkExzAVw8aGNyNYClR-7Pxb/s400/Payment+-+RHB.jpg" /></a><br /><em>Forum</em> – This is a place where user or customer can leave down their message or question, and they will get reply as soon as possible.<br /><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHIOlZtKPppwG_HCoBS2X0usQaFuIG654DJNwCVh_iKm3bVo4Kv3UyfA_31dSOhcHx3oZ5Yjk7v8ngBF6Ddh-VcUcndcCK2yXrc8dROWp8kSPgYW8T0FUgLo5dVltB5qVwZFWprIf_pXoB/s1600-h/Forum.jpg"><img style="WIDTH: 527px; HEIGHT: 113px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5357243140176187090" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHIOlZtKPppwG_HCoBS2X0usQaFuIG654DJNwCVh_iKm3bVo4Kv3UyfA_31dSOhcHx3oZ5Yjk7v8ngBF6Ddh-VcUcndcCK2yXrc8dROWp8kSPgYW8T0FUgLo5dVltB5qVwZFWprIf_pXoB/s400/Forum.jpg" /></a><br /><em>Customer Service</em> – Two floating windows will appear in left side when you scrolling down. For online service, you may access to it during working hours, through calling, MSN, or Skype. After working hours, you may access offline service by leaving message or call for it. <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgoTC4QsqmzXd8uMHDoYtJeGezz_slbn27SyPJLl_7kMQsuxO2Xh4drHbPygvOb0tcLNq33T2DAwYXU6LzeVfAb-RNYpsCCOAMAJPhdX0FXpxxSTlc_Zk0xhOTylszvMtL9_2UHIhoQtQa/s1600-h/Offline+Message.jpg"></a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTuyUBskDqBIjoC4728KAKhU6h-PZZ1rWWk-i3zytqW9j25HFnYBMVmqB3IR5ONm7YDsLWFOCvlcn1GEg2bl0PZrGIdV57NvndO7ngLqXiw0fsDSr4iApWUe7fFTJsNq2f5Gp66dQWF_Qs/s1600-h/Online+Service.jpg"></a><nbsp><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD5t4hFO_EqUQIWQpd7t6JUNMCz_t9tKIzCGau9n41fxBbl9kg_9WOlyP7Ufv47oLDBca-g0mkkt8_IPiXZwuPKHXbR-RHPb8TK_cBYSdovliu9hiOGREW2zWfjJaJEbRPNCnhBqvvWcR6/s1600-h/Offline+Message.jpg"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguAZnFrbR4spLT76cpVXcxPVUiX67-KqWpBW4We1FGZ2kysE1_3-hG8svOQ7jo_kjdLesiJNFSjMXYdlvV6U9d0XfL6Txoyv0c6HnngYJqo1mJClJGvV-Wy0NVEDJA4mz-mFzp14PMfjoB/s1600-h/Offline+Message.jpg"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE_4eGax5XfDtpjvJFsndV_YkByNntnSG1L2QHkJcOYGRHvYI8G3k3oFPdYwXn30DFaInANCNWRyAy52p4nI57nKsKIFuYMXZ5oNhZeicyh3f-EtBhalAOz9G9SFzFc-iisx-5VMvt43ek/s1600-h/Offline+Message.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 99px; FLOAT: right; HEIGHT: 229px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5358198236071897602" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE_4eGax5XfDtpjvJFsndV_YkByNntnSG1L2QHkJcOYGRHvYI8G3k3oFPdYwXn30DFaInANCNWRyAy52p4nI57nKsKIFuYMXZ5oNhZeicyh3f-EtBhalAOz9G9SFzFc-iisx-5VMvt43ek/s400/Offline+Message.jpg" /></a> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEVtS7F981VjeX5rmPCk8abm2H56EfHx3_LnDZRgDN2qq8oCXZarjmD3oD0BgO_5iS6uGV38S033HNbufdNMZB36TOqi-cEXsDuc8DJ3UKUTMJvtTlDCmRFCAm1dJv33PcN8hBdVxzNiJ-/s1600-h/Online+Service.jpg"><img style="WIDTH: 127px; HEIGHT: 201px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5358198506678205378" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEVtS7F981VjeX5rmPCk8abm2H56EfHx3_LnDZRgDN2qq8oCXZarjmD3oD0BgO_5iS6uGV38S033HNbufdNMZB36TOqi-cEXsDuc8DJ3UKUTMJvtTlDCmRFCAm1dJv33PcN8hBdVxzNiJ-/s400/Online+Service.jpg" /></a><br /><br />P.S: Logo and pictures being protected. For more details, please make yourself available at <a href="http://www.bpfair.com/">http://www.bpfair.com/</a>Tan Cheng Linghttp://www.blogger.com/profile/05676503683750291218noreply@blogger.com3tag:blogger.com,1999:blog-8374589692573383949.post-74802400982085752542009-07-06T22:26:00.001+08:002009-07-06T22:26:01.518+08:00*~Corporate Blogging: A New Marketing Communication Tool for Companies~*After discuss few topics with all of you, today I will like to share with all of you, what is corporate blogging.<span style="color: rgb(255, 0, 0);"> <span style="font-weight: bold;font-size:130%;" >Corporate blogging</span></span> is published and used by an organization to reach its organizational goals. It is used by a company to produce and support a blog to achieve business objectives and to be known with their services. Although there is few types of corporate blogging, but typically it is can be categorized as either external or internal blogs.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGRQaArz_Uf_POxPcWnGj8wPS8RvNCri6AJww52LbnIxRl02dhEnSeyCNyr7k06sqLdZqMKndxspZvrBJO1r3t41dVebO_7M5yS-aoqEr6T_5xeqBJLoUm4h-HsyyYvu4romNMqA_1d7eb/s1600-h/add_blog_facebook_notes_4.JPG"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 128px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGRQaArz_Uf_POxPcWnGj8wPS8RvNCri6AJww52LbnIxRl02dhEnSeyCNyr7k06sqLdZqMKndxspZvrBJO1r3t41dVebO_7M5yS-aoqEr6T_5xeqBJLoUm4h-HsyyYvu4romNMqA_1d7eb/s200/add_blog_facebook_notes_4.JPG" alt="" id="BLOGGER_PHOTO_ID_5353872716742083634" border="0" /></a><br /><br /><a href="http://en.wikipedia.org/wiki/Corporate_blog">http://en.wikipedia.org/wiki/Corporate_blog</a><br /><a href="http://www.idynn.com/archives/05/corporate-blogging-secrets-revealed/">http://www.idynn.com/archives/05/corporate-blogging-secrets-revealed/</a><br />(paragraph 5)<br /><br /><span style="font-size:130%;"><span style="color: rgb(204, 51, 204); font-weight: bold;">1) Internal Blogs</span></span><br />~ Is a blog that can be view by every employee and is generally accessed through corporate intranet.<br />~ It encourage<br /><span style="color: rgb(51, 0, 153);">- employees participation</span><br /><span style="color: rgb(51, 0, 153);">- free discussion of issue</span><br /><span style="color: rgb(51, 0, 153);">- collective intelligence</span> <span style="color: rgb(51, 0, 153);"><br />- direct communication between various layers of organization</span><br /><span style="color: rgb(51, 0, 153);">- a sense of community</span><br /><br />Further explanation:<br /><a href="http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html">http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html</a> (Internal Communication)<br /><a href="http://en.wikipedia.org/wiki/Corporate_blog">http://en.wikipedia.org/wiki/Corporate_blog</a><br />(Internal blogs)<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiY0yvucTQ-Z_3tJIoWU9GN69jS6LqDpLhsihKOwC1lDytDsfmYOm9jlPXUpVi_8pukpQtPnZnCoHzcUmOnMeomKN0Dk0FOFB6o40_SrKiOIstGCB4AlpicdvefXulCEJN7F8FgMCLdkfFS/s1600-h/turnerfullpage.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 190px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiY0yvucTQ-Z_3tJIoWU9GN69jS6LqDpLhsihKOwC1lDytDsfmYOm9jlPXUpVi_8pukpQtPnZnCoHzcUmOnMeomKN0Dk0FOFB6o40_SrKiOIstGCB4AlpicdvefXulCEJN7F8FgMCLdkfFS/s200/turnerfullpage.jpg" alt="" id="BLOGGER_PHOTO_ID_5353880352569202130" border="0" /></a><br /><span style="font-size:130%;"><span style="color: rgb(204, 51, 204); font-weight: bold;">2) External Blogs </span></span><br />- Is blog that is publicly available for company employees, teams, or spokespersons share their views.<br />- Also can be treated as public communication blog which it is used to communicate to prospects, clients, employees and the media. Press releases and project updates can be posted, as well as job opportunities or information that the company wants to distribute outside of the normal news channels.<br /><br />To read more detail about external blogs, you can click the link below:<br /><a href="http://en.wikipedia.org/wiki/Corporate_blog">http://en.wikipedia.org/wiki/Corporate_blog</a><br />(External blogs)<br /><a href="http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html">http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html</a><br />(Public Communication)<br /><br /><span style="font-size:130%;"><span style="color: rgb(255, 0, 0); font-style: italic; font-weight: bold;font-family:times new roman;" >Typically there is some famous type of corporate blogs, which is:</span></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMmFICTys4KfSpVyjw8-48j0esmxOhMrJAjPztuYLEzIse0BsgRXEIvL6b8EqXGRPBf9MhA9D86HiUIZrj3DeAgqAWTQ_bYfTr1kMh2zK8g1RutUX1KNBoJwiqWqKzzyRqZEdoPhEGtT44/s1600-h/tony-blog.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 164px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMmFICTys4KfSpVyjw8-48j0esmxOhMrJAjPztuYLEzIse0BsgRXEIvL6b8EqXGRPBf9MhA9D86HiUIZrj3DeAgqAWTQ_bYfTr1kMh2zK8g1RutUX1KNBoJwiqWqKzzyRqZEdoPhEGtT44/s200/tony-blog.jpg" alt="" id="BLOGGER_PHOTO_ID_5353879437352765586" border="0" /></a><br /><span style="color: rgb(0, 0, 153);">1) Company Blog</span> <span style="color: rgb(0, 0, 153);"><br />2) CEO Blog</span> <span style="color: rgb(0, 0, 153);"><br />3) Industry Blog</span> <span style="color: rgb(0, 0, 153);"><br />4) Department or Product Blog</span> <span style="color: rgb(0, 0, 153);"><br />5) Customer Service Blog</span><br /><br />For further explanation and also example for above those famous types of corporate blog, you can access to this link for some further reading:<br /><br /><a href="http://mariosundar.wordpress.com/2008/05/19/the-5-types-of-corporate-blogs-with-examples/">http://mariosundar.wordpress.com/2008/05/19/the-5-types-of-corporate-blogs-with-examples/</a><br />(The 5 Types Of Corporate Blog – with example)<br /><br /><span style="font-weight: bold; font-style: italic; color: rgb(255, 0, 0);font-size:130%;" >Why we have corporate blogging?????</span><br /><span style="color: rgb(0, 0, 153);">1. Become the Expert</span> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk5gr9O-EvTskupx4zoSXGR3yX6MnElo4Y8nmUm3fy4R6P8SJaN9bJKn1lFlvUEmHeD8M0qC2lNH7fdWOqgE23tOnNxCjBKiYDXUlQyMj7u9l2KKT_gblbLlla1041_f_R8nsmL5AYkReT/s1600-h/dcrn4l.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 178px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk5gr9O-EvTskupx4zoSXGR3yX6MnElo4Y8nmUm3fy4R6P8SJaN9bJKn1lFlvUEmHeD8M0qC2lNH7fdWOqgE23tOnNxCjBKiYDXUlQyMj7u9l2KKT_gblbLlla1041_f_R8nsmL5AYkReT/s200/dcrn4l.jpg" alt="" id="BLOGGER_PHOTO_ID_5353877216569981010" border="0" /></a><br /><span style="color: rgb(0, 0, 153);">2. Customer Relationships</span> <span style="color: rgb(0, 0, 153);"><br />3. Media Relations</span><br /><span style="color: rgb(0, 0, 153);">4. Internal Collaboration</span><br /><span style="color: rgb(0, 0, 153);">5. Knowledge Management</span><br /><span style="color: rgb(0, 0, 153);">6. Recruitment</span> <span style="color: rgb(0, 0, 153);"><br />7. Test Ideas or Products</span> <span style="color: rgb(0, 0, 153);"><br />8. Rank High in Search Engines</span><br /><br />Explanation of about can be access through this link<br /><a href="http://www.corporateblogging.info/basics/why/">http://www.corporateblogging.info/basics/why/</a><br />(Why blog for business)<br /><br /><span style="color: rgb(255, 102, 0);">There is some practices need to be account to make the corporate blog is being useful and benefits, which is:</span><br /><span style="color: rgb(0, 0, 153);">- Fine print</span><br /><span style="color: rgb(0, 0, 153);">- Know what you are doing</span><br /><span style="color: rgb(0, 0, 153);">- Create blogging policies</span> <span style="color: rgb(0, 0, 153);"><br />- Avoid the marketing blog</span> <span style="color: rgb(0, 0, 153);"><br />- Keep it fresh</span><br /><span style="color: rgb(0, 0, 153);">- Reinforce the company core value</span> <span style="color: rgb(0, 0, 153);"><br />- Encourage employees to use it</span><br /><br />Explanation of the practices above can be found in:<br /><a href="http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html">http://www.brookgroup.com/Resources/Internet-Marketing/Corporate-Blogging.html</a><br />(Secrets of Corporate Blogging)<br /><br /><span style="color: rgb(255, 0, 0);font-size:130%;" ><span style="font-weight: bold;">Top 15 sites of corporate blogging (Sept 2008)</span></span><br /><span style="color: rgb(0, 0, 153);">1. Google</span> <span style="color: rgb(0, 0, 153);"><br />2. Adobe</span> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMK14u7DZxHdtD7hAm9LjehZN_XbjZpuitycJB5FRmX1nikXN0e29L-xULVrXE45W81BwYgNlbBpTsYN5ptfMzQDJDUfXCaucr2Gsw9XrQr5EHZdq_hvDyw-0YLfR7Oy7JvWLu2kxMblDb/s1600-h/dellblog.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 187px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMK14u7DZxHdtD7hAm9LjehZN_XbjZpuitycJB5FRmX1nikXN0e29L-xULVrXE45W81BwYgNlbBpTsYN5ptfMzQDJDUfXCaucr2Gsw9XrQr5EHZdq_hvDyw-0YLfR7Oy7JvWLu2kxMblDb/s200/dellblog.jpg" alt="" id="BLOGGER_PHOTO_ID_5353877222768167890" border="0" /></a><br /><span style="color: rgb(0, 0, 153);">3. Yahoo! Search</span> <span style="color: rgb(0, 0, 153);"><br />4. Facebook</span> <span style="color: rgb(0, 0, 153);"><br />5. Dell</span> <span style="color: rgb(0, 0, 153);"><br />6. Yahoo!</span> <span style="color: rgb(0, 0, 153);"><br />7. Linkedln</span> <span style="color: rgb(0, 0, 153);"><br />8. Southwest Airlines</span> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7fxTwy6LfdOPOX-8QrDjx6xSnTOJahaP6Osp_k7n0gOs2umD4WPOTfCT4snGd1kBJ8XvYf2n47uR30hNay_M_gmLz3hRtnKABJzRO-VSt7MVV_UNM0CU5AM5TyjTv2G1XeWm6bSb8cgV2/s1600-h/2214761843_416ec68f69.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 193px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7fxTwy6LfdOPOX-8QrDjx6xSnTOJahaP6Osp_k7n0gOs2umD4WPOTfCT4snGd1kBJ8XvYf2n47uR30hNay_M_gmLz3hRtnKABJzRO-VSt7MVV_UNM0CU5AM5TyjTv2G1XeWm6bSb8cgV2/s200/2214761843_416ec68f69.jpg" alt="" id="BLOGGER_PHOTO_ID_5353877214292414738" border="0" /></a><br /><span style="color: rgb(0, 0, 153);">9. General Motors</span> (wound up)<br /><span style="color: rgb(0, 0, 153);">10. Flickr</span> <span style="color: rgb(0, 0, 153);"><br />11. Mint</span> <span style="color: rgb(0, 0, 153);"><br />12. Marriott</span><br /><span style="color: rgb(0, 0, 153);">13. Lenovo</span> <span style="color: rgb(0, 0, 153);"><br />14. Kodak</span> <span style="color: rgb(0, 0, 153);"><br />15. Delta</span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWXOjTihIq6iM8ags1f7Ta9pDfU-RZNWMd4kXPDPWuhxCitPunLE-6sSheZ4fgzG5LstADiYAuxXPBt-FKWhMk17sANtv0j6mGdUwUY4A5F_mUcobD_Tq9Fo1bMlWW2ms_4K0iQNhvxl6g/s1600-h/southwest-airlines-blog.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 156px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWXOjTihIq6iM8ags1f7Ta9pDfU-RZNWMd4kXPDPWuhxCitPunLE-6sSheZ4fgzG5LstADiYAuxXPBt-FKWhMk17sANtv0j6mGdUwUY4A5F_mUcobD_Tq9Fo1bMlWW2ms_4K0iQNhvxl6g/s200/southwest-airlines-blog.jpg" alt="" id="BLOGGER_PHOTO_ID_5353879434181786786" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br />Link:<br /><a href="http://mariosundar.wordpress.com/2008/09/09/top-15-corporate-blogs-technorati-rankings-sep-08/">http://mariosundar.wordpress.com/2008/09/09/top-15-corporate-blogs-technorati-rankings-sep-08/</a>ANG BOON YONGhttp://www.blogger.com/profile/07267099735335331864noreply@blogger.com1tag:blogger.com,1999:blog-8374589692573383949.post-70019818572999020062009-07-06T14:58:00.010+08:002009-07-06T15:32:11.681+08:00E-Government in Malaysia: Its Implementation So Far and Citizen's Adoption Strategies<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKevFeLcUildLnJ9TxE-wNgFHXpiRDcrezDxzpazrSVpNyIJZs09tTzROg8vN47_H0hJaOvWxl5uUo0ueMy2SYw-696S70mT73dlpvz4Nb-DcsLcfWniHNMFDfwkzk12LXk3NGThO9GxE/s1600-h/e-gov.png"><img id="BLOGGER_PHOTO_ID_5355243062564076962" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 128px; CURSOR: hand; HEIGHT: 146px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKevFeLcUildLnJ9TxE-wNgFHXpiRDcrezDxzpazrSVpNyIJZs09tTzROg8vN47_H0hJaOvWxl5uUo0ueMy2SYw-696S70mT73dlpvz4Nb-DcsLcfWniHNMFDfwkzk12LXk3NGThO9GxE/s200/e-gov.png" border="0" /></a><br /><div>Hi everyone, today I will share with you all the information about the implementation of <span style="color:#cc33cc;">E-Government (E-Government)</span> in Malaysia. E-Government refer to the use of information and communication technology to provide and improve government services, transactions and interactions with citizens, business and other arms of government. It initiative was launched to lead the country into the Information Age.<br /><br /><br /><div><br /><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span></div><div><span style="color:#33cc00;"></span> </div><div><span style="color:#33cc00;"></span> </div><div><span style="color:#33cc00;"></span> </div><div><span style="color:#33cc00;"></span> </div><div><span style="color:#33cc00;">The 7 pilot projects of the Electronic Government Flagship Application are as</span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi20PH_kEwl1KDAZHto5EP3lRc6Dd_hs776QGGt4P8USt_ToNdt6G_DAIlHyTWaFIfyqaHNC6oFFCHXD4rKch9vfn3nmY86WUu6-l0Lwdcjx-BDUMsEX9EbtZFtIazx-sgFL1MUF_RBGw4/s1600-h/MalaysiaGov.jpg"><span style="color:#33cc00;"><img id="BLOGGER_PHOTO_ID_5355242383012223858" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 213px; CURSOR: hand; HEIGHT: 142px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi20PH_kEwl1KDAZHto5EP3lRc6Dd_hs776QGGt4P8USt_ToNdt6G_DAIlHyTWaFIfyqaHNC6oFFCHXD4rKch9vfn3nmY86WUu6-l0Lwdcjx-BDUMsEX9EbtZFtIazx-sgFL1MUF_RBGw4/s200/MalaysiaGov.jpg" border="0" /></span></a><span style="color:#33cc00;"> follows:</span><br />1. Project Monitoring System (SPP II)<br />2. Human Resource Management Information System (HRMIS)<br />3. Generic Office Environment (GOE)<br />4. Electronic Procurement (EP)<br />5. Electronic Services (E-Services)<br />6. Electronic Labour Exchange (ELX)<br />7. E-Syariah<br /></div><br /><div></div><br /><div>The primary delivery models of E-Government can be divided into:<br /><span style="color:#cc33cc;">~</span>Government-to-Citizen (G2C)<br /><span style="color:#cc33cc;">~</span>Government-to-Business (G2B)<br /><span style="color:#cc33cc;">~</span>Government-to-Government(G2G)<br /><br /><span style="color:#ff6666;">Government-to-Citizen</span><br /><span style="color:#cc33cc;">Electronic Services (E-Services)</span><br />With E-Services, citizens can conduct transactions with government agencies, such as Road Transport Department (RTD) and private utility companies such as Tenaga Nasional Berhad (TNB) and Telekom Malaysia Berhad (TMB) through various convenient channels (eg: eServices kiosks and Internet) .<br /><br /><span style="color:#cc33cc;">Electronic Labour Exchange (ELX)</span><br />ELX is one stop-centre for labor market information that supervises by the Ministry of Human Resource (MOHR) to enable employers and job seekers to communicate on the same platform.<br /><br /><span style="color:#cc33cc;">E-Syariah<br /></span>E-Syariah is a case management system that integrated processes related to management of the cases to the Syariah Courts. It eventually improve the quality of service in Syariah Courts as the Syariah judges are able to get access to past cases and obtain the information they need for particular case quicker that before.<br /><br /><br /><span style="color:#ff6666;">Government-to-Business</span><br /><span style="color:#cc33cc;">Electronic Procurement (EP)</span><br />EP system enables suppliers to sell goods and services to Government through the Internet. It would cover central contracts, tender and direct purchase. </div><div><br /><span style="color:#ff6666;">Government-to-Government<br /></span><span style="color:#cc33cc;">Human Resource Management Information System (HRMIS)</span><br />HRMIS provides single interface for government employees to perform human resource functions effectively and efficiently. It helps to standardize all human resource processes for federal, state, statutory body and local authority services.<br /><br /><span style="color:#cc33cc;">Generic Office Environment (GOE)</span><br />GOE is a powerful document and office management solution that enables users to effectively and efficiently manage their office environment. It facilitates efficient communication, allows collaboration across all workers and ensuring right information reach to right people in a timely manner.<br /><br /><span style="color:#cc33cc;">Project Monitoring System (SPP II)</span><br />SPP II is an online system that designs to monitors the entire lifecycle of national programs. It also provides a platform for exchanging ideas and demonstrating best practices models in information management and communication services.<br /><br />You can click to <a href="http://www.mait.com/admin/enews_images/MAIT%20Country%20Intelligence%20eNews96_37.pdf">http://www.mait.com/admin/enews_images/MAIT%20Country%20Intelligence%20eNews96_37.pdf</a> and <a href="http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf">http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf</a> for detail information about these 7 pilot projects.<br /><br /><span style="color:#33cc00;">Citizen’s Adoption Strategies<br /></span>In order to attract and encourage citizens to using the E-Government System, few strategies can be carrying out by Government:<br /><br /><span style="color:#cc33cc;">o</span> Enhance the security of those E-Government systems to built citizens’ confidence<br /><span style="color:#cc33cc;">o</span> Enactment of relevant rules, regulations and policies to govern the implementation of E-Government systems to safeguard, secure and protect the privacy of users<br /><span style="color:#cc33cc;">o</span> Organize activities such as advertisement and campaign to educate public about E-Government systems and the benefits that can gain from it<br /><span style="color:#cc33cc;">o</span> Simplify the procedures that need to follow by the users in using E-Government systems to increase users’ satisfaction<br /><span style="color:#cc33cc;">o</span> Provides E-Government websites with multiple language<br /><span style="color:#cc33cc;">o</span> Provides Internet access points and officers to assist the illiterates to benefits from E-Government services<br /><span style="color:#cc33cc;">o</span> Fulfill the needs of citizens by understand what are the other services and benefits that they want gain from E-Government system<br /><br /><br /><br /><br /><br /></div></div></div>Ho SiaW TinGhttp://www.blogger.com/profile/04450327066867462878noreply@blogger.com1tag:blogger.com,1999:blog-8374589692573383949.post-3818110512535468422009-07-04T14:32:00.029+08:002009-07-06T14:58:50.216+08:00e-learning in Malaysian Universities-Pros and Cons<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSc9mHpZumqDwhR4_OiQ2GHljd56o-dAzcXE2CmZ9VxIctGF7QgcZkyUbD9DdfWvnW87wunKk0v_EL-YSwawhb1_Kh7xa_wxIBi6LnHB0AGDj1_z67w9YDChtahPii_vlRkUPmH0NnLs4i/s1600-h/e-learning.jpg"><img id="BLOGGER_PHOTO_ID_5354591512388298770" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 163px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSc9mHpZumqDwhR4_OiQ2GHljd56o-dAzcXE2CmZ9VxIctGF7QgcZkyUbD9DdfWvnW87wunKk0v_EL-YSwawhb1_Kh7xa_wxIBi6LnHB0AGDj1_z67w9YDChtahPii_vlRkUPmH0NnLs4i/s200/e-learning.jpg" border="0" /></a>E-learning is a type of learning that used technology(software, application, computer) to support the learning process. The delivery mode of e-learning will be lack of face to face interaction due to the use of computer in conducting the learning. It usually will use by universities as a tool to offer their courses to student or it also used by an organization to provide training to their staff.<br /><br /><br /><br /><div><br /><br /><div></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio4a_El8r0-GL__G0CPt1wRAlXnQ9zgkCuhyptFnMXe-WVqKTe3W1BC7U3gDkGqVbVej7ApjrEbMSMSJIJWm_ndfl0cby2J-tqGMAbso3OPt3yVB20YApJky4MOwpaRXJKnyMwjaFj6Fd4/s1600-h/elearning.gif"><img id="BLOGGER_PHOTO_ID_5354591819093333938" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 110px; CURSOR: hand; HEIGHT: 122px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio4a_El8r0-GL__G0CPt1wRAlXnQ9zgkCuhyptFnMXe-WVqKTe3W1BC7U3gDkGqVbVej7ApjrEbMSMSJIJWm_ndfl0cby2J-tqGMAbso3OPt3yVB20YApJky4MOwpaRXJKnyMwjaFj6Fd4/s200/elearning.gif" border="0" /></a>Nowadays, Universities in Malaysia become more attentive to this type of learning. In the old days, television, transperancy and projector is used as a teaching material. However, with the introduction of the excellent software and hardware, e-learning has been gradually accepted by the public and become a convenient tool in pursuing their studies.<br /><br /><div></div><br /><br /><div>Many universities in Malaysia start to offer this type of learning method as they not only can take in more student either locally or internationally but also have income to maintain their position in this competitve world. This usually will happen in the private universities as they do not need a huge campus to allocate their students. Due to the competition, more and more universities nowadays are providing e-learning in conducting their course.</div><br /><div></div><br /><br /><div>Ther are several advantage of e-learning which are:<br /></div><br /><br /><div>a) <span style="color:#000099;">Foster the interaction among students and lecturers</span>, normally a lecturer cannot pay attention to everyone of the student in a lecture class as it was too big and due to time constraint. Besides, some students may also shame to post question when they do not understand the lecture.Thus, by using e-learning, lecturer can deal with that student individually and students will also be more comfortable in asking question.<br /></div><br /><div></div><br /><div>b)<span style="color:#000099;">Self-paced learning</span>, This mean that students actually can learn at the rate they prefer. In the case where a students is a slow learner, they can absorb the knowledge slowly whereas if this happen in traditional teaching method, the teaching pace would not be change just because you are a slow learner.<br /><img id="BLOGGER_PHOTO_ID_5354593608041135874" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 130px; CURSOR: hand; HEIGHT: 124px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikKSDmqwfIOuRT5GsQaqIsRrDrSlrXDM8rdPJm_FZbSit-9cM6IgumNkkYtdMTQ3EBDv3cwv8LaJnUSUq46tyqzsUe64UujrfcbPMwSfUQN2v1X33WAjO2rQ6fLTbs5c7FwDyGo6L0w3_n/s200/save+money.bmp" border="0" /><br />c)<span style="color:#000099;">Reduce costs and time</span>, Students can learn from anywhere without travelling to the universities as they can conducting the lesson from their home. This can save the travelling costs and time especially for the student who do not has enough budjet to further their studies in overseas. </div><br /><div></div><br /><br /><br /><br /><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwTcbK34nlKY6kt7LXhJ076sBOm7TgRMuX5jKG02BhezP0Pr2iVEbK-6sifbTXkvu2u_iT0t04iGeV-hX-_-CVjFcMoz0c0LgrR4XkQ451dlLz679zfUkvWEhwv2Opsd9YJgRcu3yoUvZ4/s1600-h/idea.jpg"><img id="BLOGGER_PHOTO_ID_5354593273618714018" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 113px; CURSOR: hand; HEIGHT: 94px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwTcbK34nlKY6kt7LXhJ076sBOm7TgRMuX5jKG02BhezP0Pr2iVEbK-6sifbTXkvu2u_iT0t04iGeV-hX-_-CVjFcMoz0c0LgrR4XkQ451dlLz679zfUkvWEhwv2Opsd9YJgRcu3yoUvZ4/s200/idea.jpg" border="0" /></a>d)<span style="color:#000099;">Gain diversify knowledge</span>, By using e-learning, we are able to learn different knowledge from different country. Thus, this can inspire the students to came out with creative or innovative ideas which it may be useful when they work for their organizations. </div><br /><br /><div></div><br /><div></div><br /><div>On the other hand, e-learning also has it disadvantage which are:<br /></div><br /><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxVOEMeOJA93a9uVTDn7tNztKR0mbXEwKNvX2MTBD6XjuK9vNnmCLkNRDZ6FUYFrF_RuM5cZpVkqZVzdtamUDVaAYk4soC7jyATlEF1xIF6UG0Zc_htZLTt61YEME9KfhRgHU_m7vCBzIW/s1600-h/loneliness.jpg"><img id="BLOGGER_PHOTO_ID_5354592579452901858" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 128px; CURSOR: hand; HEIGHT: 125px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxVOEMeOJA93a9uVTDn7tNztKR0mbXEwKNvX2MTBD6XjuK9vNnmCLkNRDZ6FUYFrF_RuM5cZpVkqZVzdtamUDVaAYk4soC7jyATlEF1xIF6UG0Zc_htZLTt61YEME9KfhRgHU_m7vCBzIW/s200/loneliness.jpg" border="0" /></a>a) <span style="color:#000099;">Reduce social and cultural interaction</span>, The impersonality of e-learning will let the students feel they are being isolated because lack of face to face communication. Instruction will not always help the students to solve the problem they face during the studies, but somestimes they also needs realistic assistance from the lecturer which they can feel they are being attach by the lecturer.<br /></div><br /><div></div><br /><div></div><br /><div>b)<span style="color:#000099;">Low motivation</span>, Student must be highly motivated and responsible in doing their work since this is a self-paced learning. In such case, those student with low motivation will not be able to catch up the lesson and fall behind.<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmNqfEZEPa5EgrA5MTPi71MRMDUcpKUi_AQlKJI5fo7B-gCVmako0_eY_MW1-oRgnf7kje22towlkctLIJfmgGPPENSIeTUhwdOQJxdwEgbU59ZhD0Yd_4I-1pYm8pA1_iZKQXlFHK4zUs/s1600-h/internet.jpg"><img id="BLOGGER_PHOTO_ID_5354592309331047362" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 137px; CURSOR: hand; HEIGHT: 117px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmNqfEZEPa5EgrA5MTPi71MRMDUcpKUi_AQlKJI5fo7B-gCVmako0_eY_MW1-oRgnf7kje22towlkctLIJfmgGPPENSIeTUhwdOQJxdwEgbU59ZhD0Yd_4I-1pYm8pA1_iZKQXlFHK4zUs/s200/internet.jpg" border="0" /></a><br />c)<span style="color:#000099;">Access</span>, since e-learning need an internet access, students sometime will feel frustated when the internet connection is slow or having a problem in accessing to a particular websites. Besides, they may facing a problem to deal with the complex learning application and difficulty in manage the computer files. </div><br /><div></div><br /><br /><div>d) <span style="color:#000099;">Practicability</span>, Because the lesson is learn through internet, so it is impossible to conduct practical work such as experiments through internet. Sometimes, students may feel boring and do not have a better understanding of the subject they learn.<br /></div><br /><div></div><br /><div></div><br /><div>Again...everything in this world has two aspect!!Although the conduct of e-learning in universities seem like constituting benefit to the students but in my opinion, it also act as a tool to increase their income in this competitive world where many universities are starting using e-learning in conducting the courses. If any of them fall behind, they may not be able to sustain but being kick off from this realistic world. So, is it e-learning brings more benefit to the students or the universities? Let you be the one who determining it.<br /></div><br /><div></div><br /><div><a href="http://www.asianjde.org/2006v4.1.Wong.pdf">Journal about fulltime students' and working adults' perception of e-learning in Malaysia</a>.<br /></div><br /><div></div><br /><div>Reference:</div><br /><div></div><br /><div>1. <a href="http://cai.au.edu/concept/benefit.html">http://cai.au.edu/concept/benefit.html</a></div><br /><div>2. <a href="http://www.1stopbiztro.com/_mgxroot/page_10752.html">http://www.1stopbiztro.com/_mgxroot/page_10752.html</a></div><br /><div></div></div>Goh Mei Chinhttp://www.blogger.com/profile/03514783669125897469noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-21325849531801850612009-06-29T15:24:00.003+08:002009-06-29T15:48:36.575+08:00Mobile Payment System in Malaysia: Its Potentials and Consumers' Adoption StrategiesMobile payment<span style="color:#cc66cc;"> (m-payment)</span> systems have been developed in recent years to facilitate purchases of products, services and content in mobile and electronic commerce and also at physical points of sale. It is a point-of-sale payment made through a mobile device, such as cellular telephone, smartphone or personal digital assistant (PDA). Instead of paying cash, cheque or credit cards, a consumer can use m-payment to pay for a wide range of services and digital or hard goods.<br /><br /><span style="color:#33cc00;">Examples of M-payment systems that available in Malaysia and its potentials are:<br /></span><br /><span style="color:#cc66cc;">Mobile Money<br /></span>Hong Leong Bank has teamed up with a Malaysian company, Mobile Money International Sdn Bhd to bring its customers this innovative payment system. It unlocks the power of the mobile phone to make payments and allows card members to pay for goods and services using a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS. This unique method o<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2kEsgycUNWTnaS8Tp_-3XhoyXuOhyx8LSEfECvzCm6p_S8oiU8Q7XoIbCS1AaRdGauE604d_LYX7bYrh2_EesIgjFIfsUXrBM13YSUEn236f10xqDY74y-3MAQyTJtseqly6WvNiPZs4/s1600-h/mobilemoney_new.gif"><img id="BLOGGER_PHOTO_ID_5352651351880714930" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 113px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2kEsgycUNWTnaS8Tp_-3XhoyXuOhyx8LSEfECvzCm6p_S8oiU8Q7XoIbCS1AaRdGauE604d_LYX7bYrh2_EesIgjFIfsUXrBM13YSUEn236f10xqDY74y-3MAQyTJtseqly6WvNiPZs4/s200/mobilemoney_new.gif" border="0" /></a>f payment is called as “Mobile Money”. It is secure as the mobile phone is linked to the Hong Leong Mobile Credit Card account and the security PIN is set by the customer which used for approval of each payment. Its convenient will encourage more consumers to shop online which will definitely be a great boon to the e-commerce industry in Malaysia. For details, please refer to <a href="http://www.hlb.com.my/news/2005/corn148.jsp?flag=102005">http://www.hlb.com.my/news/2005/corn148.jsp?flag=102005</a> and <a href="http://www.neowave.com.my/mobilemoney_overview.asp">http://www.neowave.com.my/mobilemoney_overview.asp</a><br /><br /><br /><span style="color:#cc66cc;">TeleMoney<br /></span>TeleMoney is Malaysia’s first mobile payment service via multi-channel access for Internet and wireless transactions that launched in November 2001. Through TeleMoney, Malaysians can enjoy a secure and convenient method to conduct mobile commerce using a GSM cellular phone. It is a service free of banks and telco dependence. A consumer with a credit card or debit card with a cellular phone can register for this service. To register, a consumer only need to have a GSM phone and a TeleMoney personal identification number that connecting it to a credit card, debit card, stored valued card, bank account or even the phone account.<br /><br /><span style="color:#cc66cc;">Maxis FastTap<br /></span>Malaysian mobile operator Maxis launched the world’s first contacless mobile payment system based on NFC (Near Field Communications) technology on April 2009. This m-payment system is called as Maxis FastTap. It is an integrated mobile payment service established under a partnership with Nokia, Visa, Maybank and Touch ‘n Go and available only on the Nokia 6212 classic device. NFC is a short-range wireless technology that allows communications between devices at close range. It offers high levels of interoperability between devices and readers and global standard for contactless mobile payments with a wide range of features that allows credit card, debit card, ticketing and transportation payments to be integrated into a mobile phone. For details, please refer to<br /><a href="http://www.telecoms.com/10397/maxis-brings-nfc-payments-to-malaysia">http://www.telecoms.com/10397/maxis-brings-nfc-payments-to-malaysia</a> and <a href="http://mis-asia.com/news/articles/worlds-first-contactless-mobile-payment-system-launches-in-malaysia">http://mis-asia.com/news/articles/worlds-first-contactless-mobile-payment-system-launches-in-malaysia</a><br /><br /><span style="color:#cc66cc;">Mobile Wallet</span><br />Mobile wallet is mobile phone that has functionality to replace a traditional wallet and m<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3lKyd7GZKIPMzW1fJG12Q4oUEaSCVaqTlzELBnLIGnI-3ahHhxufRx-CfYBn3gbLxT0gCHXv0j9XS3wxPXxCWRP9F5SZJgcTZ9xBCKmYhPN93xSUut7Ht6aYLrnlYabhICcbRkEn8NjE/s1600-h/Jan07_Mwallet.jpg"><img id="BLOGGER_PHOTO_ID_5352652082298834242" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 137px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3lKyd7GZKIPMzW1fJG12Q4oUEaSCVaqTlzELBnLIGnI-3ahHhxufRx-CfYBn3gbLxT0gCHXv0j9XS3wxPXxCWRP9F5SZJgcTZ9xBCKmYhPN93xSUut7Ht6aYLrnlYabhICcbRkEn8NjE/s200/Jan07_Mwallet.jpg" border="0" /></a>ore. It stores personal and sensitive information like passport, credit card information, PIN codes, online shopping accounts, booking details and insurance policies that can be encrypted or password-protected. This technology aims to reduce the number of items that people need to carry around. With mobile wallet, consumer can use their mobile phone to pay transactions at merchants that accept mobile payments. The user just needs to upload digital cash from a credit card to their mobile phone and swipe their mobile phone at payment counters. For details, please refer to <a href="http://www.mobileworld.com.my/v1/content/view/219/62/">http://www.mobileworld.com.my/v1/content/view/219/62/</a><br /><br /><div></div><div>The developments of m-payment systems have simplified our busy life and making consumers’ everyday lives more convenient. It is predicted to have a bright future as m-commerce becomes more popular. Even it is still new and in developing process in Malaysia, but it is believed that the use of m-payment system will becomes a part of Malaysian daily routine. However, the acceptance of mobile payment systems depends on many factors including usability, costs, security and convenience issues.<br /><br /><span style="color:#33cc00;">In order to attract and encourage consumers to using the m-payment systems, few strategies can be carrying out:<br /><br /></span><span style="color:#cc66cc;">o </span>Organize activities such as advertisement and campaign to educate public about mobile payment systems and how the systems work<br /><span style="color:#cc66cc;">o</span> Enhance the security of those m-payment systems to built users confidence<br /><span style="color:#cc66cc;">o</span> Simplify the procedures that need to follow by the users in using m-payment systems to increase users’ satisfaction.<br /><span style="color:#cc66cc;">o</span> Collaborate with more banks to facilitate and widen the use of m-payment around the world<br /><span style="color:#cc66cc;">o</span> Lower down the costs that will be charge for each transactions that made through m-payment systems<br /><br /><span style="color:#33cc00;">Other References:<br /></span><a href="http://www.prlog.org/10138966-commerce-on-the-go-mobile-payment-systems-and-solutions.html">http://www.prlog.org/10138966-commerce-on-the-go-mobile-payment-systems-and-solutions.html</a><br /><a href="http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html">http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html</a><br /><a href="http://www.zdnetasia.com/news/communications/0,39044192,39001884,00.htm">http://www.zdnetasia.com/news/communications/0,39044192,39001884,00.htm</a></div>Ho SiaW TinGhttp://www.blogger.com/profile/04450327066867462878noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-80366099590461510952009-06-28T21:53:00.006+08:002009-06-29T15:41:47.238+08:00~* Electronic Currency*~Hello, it has been one week time I never update my blog, last two week I have share with all of you about revenue model of some e-commerce website and discuss with all of you whether there are some threat of internet or how safe of our data is. I think it make all of you understand even more how online transactions work and how we can be safe by using it. Today, I will like to share further with all of you again, which it is about how actually those payments being make for those transactions online? If all of you still confuse how online transactions make the payments and receive the payment, here got some useful information for all of you. Actually those payment make or transfer is calls Electronic Currency.
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVgIml4WcM3_WR5sps9fXDSOsfosm7C1PgqxIhyrf7SnSCRFeK8GEBePIvkQ0_-FS1iJ2ysK9XzzSJdNEU16pQguui6MgGnoM-whiOZMXMBgcs0xE2U9zKB2EgtLN9C_NC3DW4dty7i23V/s1600-h/electronic-money.jpg"><img id="BLOGGER_PHOTO_ID_5350153333980985234" style="WIDTH: 184px; CURSOR: pointer; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVgIml4WcM3_WR5sps9fXDSOsfosm7C1PgqxIhyrf7SnSCRFeK8GEBePIvkQ0_-FS1iJ2ysK9XzzSJdNEU16pQguui6MgGnoM-whiOZMXMBgcs0xE2U9zKB2EgtLN9C_NC3DW4dty7i23V/s200/electronic-money.jpg" border="0" /></a>
<br />
<br /><span style="FONT-WEIGHT: bold; COLOR: rgb(102,0,204)">Electronic Currency</span> (also known as electronic money, digital currency, digital money, electronic cash, digital cash, and digital money) is the money or scrip which is exchange electronically, which is through use of computer network, internet and also digital stored value systems. In more detail, e-currency means the money that can use for shopping, do investment via internet by through credit card payment or some other payment methods. There are few popular example of electronic currency which is:
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwBQs1f7U5hw2UZUnvfe9r7FxciXmUwnQJLyusH7GVjF-sVP3jpCIrlod-VCN0aeJ_jQUz7Uy8hr3aUBZbFx4-nT5X_ab-9Q4FIyVgXcwfAbqMesYmk6wEeKWBEMBzZmhHt1YWh7KG3_7s/s1600-h/liberty_reserve.gif"><img id="BLOGGER_PHOTO_ID_5350154823999025058" style="FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 143px; CURSOR: pointer; HEIGHT: 72px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwBQs1f7U5hw2UZUnvfe9r7FxciXmUwnQJLyusH7GVjF-sVP3jpCIrlod-VCN0aeJ_jQUz7Uy8hr3aUBZbFx4-nT5X_ab-9Q4FIyVgXcwfAbqMesYmk6wEeKWBEMBzZmhHt1YWh7KG3_7s/s200/liberty_reserve.gif" border="0" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9C9iFlqTQPf0tMbpp2VgUTgI21-F04ps0PeU6kfI1RJtZKzgekyvv3AC1daYVierLjcsM7mIWbrpCLCvyNkDMZUZteJAIU49r5vE3rYNIy6m1BNFvjlJtgA_ZLaUm10DYOdRpVb6I0pTa/s1600-h/e-bullion-200.jpg"><img id="BLOGGER_PHOTO_ID_5350154831889602898" style="FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9C9iFlqTQPf0tMbpp2VgUTgI21-F04ps0PeU6kfI1RJtZKzgekyvv3AC1daYVierLjcsM7mIWbrpCLCvyNkDMZUZteJAIU49r5vE3rYNIy6m1BNFvjlJtgA_ZLaUm10DYOdRpVb6I0pTa/s200/e-bullion-200.jpg" border="0" /></a>
<br /><span style="COLOR: rgb(51,51,153)">~Webmoney</span> <span style="COLOR: rgb(51,51,153)">
<br />~1MDC</span> <span style="COLOR: rgb(51,51,153)">
<br />~ e-gold</span> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8R834-9c_canSyesLZHWzKrH0qCMkyi7Wn5iTFoQiRzEjvy2i-GmD9P-MYvuE4Nb6AXpnzx2HLHgtDlUjurCtfq8_4ywdCjX1jHulLdnY73OufIi4GJiYcRDGeNygj618sdEWQqkRvZXP/s1600-h/webmoney.jpg"><img id="BLOGGER_PHOTO_ID_5350154831902703554" style="FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8R834-9c_canSyesLZHWzKrH0qCMkyi7Wn5iTFoQiRzEjvy2i-GmD9P-MYvuE4Nb6AXpnzx2HLHgtDlUjurCtfq8_4ywdCjX1jHulLdnY73OufIi4GJiYcRDGeNygj618sdEWQqkRvZXP/s200/webmoney.jpg" border="0" /></a>
<br />
<br /><span style="COLOR: rgb(51,51,153)"></span>
<br />
<br /><span style="COLOR: rgb(51,51,153)"></span>
<br />
<br /><span style="COLOR: rgb(51,51,153)"></span>
<br />
<br /><span style="COLOR: rgb(51,51,153)"></span>
<br />
<br /><span style="COLOR: rgb(51,51,153)"></span>
<br />
<br /><span style="COLOR: rgb(51,51,153)"></span>
<br />
<br /><span style="COLOR: rgb(51,51,153)">~e-bullion</span> <span style="COLOR: rgb(51,51,153)">
<br />~ Pecunix</span> <span style="COLOR: rgb(51,51,153)">
<br />~ Liberty Reserve</span>
<br />
<br />
<br />Typically it has <span style="FONT-WEIGHT: bold; COLOR: rgb(255,0,0); FONT-STYLE: italic">two major types of electronic currency</span>, which major different is the backed base, the types is describe below:
<br />
<br />1) <span style="COLOR: rgb(51,102,255)">Backed by Precious Metal </span>– such as e-gold which it is backed by gold <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjX1B6Ha9xUxb_AzqW3NyAMhgVPgXTXLbdhpdbJ7oEMkihBw2dk4E0paauDnDSTi-AH2g128NzW66nDIiqamOCxFifmQDDZ2NZSssEcCrV7a43LNUcERmRfzEFkTBoXZh4l-4rhN01tyl3/s1600-h/egold526.gif"><img id="BLOGGER_PHOTO_ID_5350156573705702114" style="FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 130px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjX1B6Ha9xUxb_AzqW3NyAMhgVPgXTXLbdhpdbJ7oEMkihBw2dk4E0paauDnDSTi-AH2g128NzW66nDIiqamOCxFifmQDDZ2NZSssEcCrV7a43LNUcERmRfzEFkTBoXZh4l-4rhN01tyl3/s200/egold526.gif" border="0" /></a>
<br />2) <span style="COLOR: rgb(51,102,255)">Backed by Hard Currency</span> – example like Paypal
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtkVAMCFJtEZUd9onbqzBSIjy0FxStZhovoe1rB7VM3OQ_DTre0BOfSumXhCP9STT4YsrrLXFlRMDUcMd5p1YI8O1DUObxlo4Ux7yPDUyqzgh8ophGGImT3584dOuVcF_aZgqyO_yYqXpB/s1600-h/paypal-bus.jpg"><img id="BLOGGER_PHOTO_ID_5350155764552068082" style="FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 200px; CURSOR: pointer; HEIGHT: 122px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtkVAMCFJtEZUd9onbqzBSIjy0FxStZhovoe1rB7VM3OQ_DTre0BOfSumXhCP9STT4YsrrLXFlRMDUcMd5p1YI8O1DUObxlo4Ux7yPDUyqzgh8ophGGImT3584dOuVcF_aZgqyO_yYqXpB/s200/paypal-bus.jpg" border="0" /></a>
<br />
<br />
<br />This is the link that got further explanation of the type of electronic currency:
<br />
<br />
<br /><a href="http://www.giexc.com/">http://www.giexc.com/</a>
<br />
<br />There are some major <span style="FONT-WEIGHT: bold; COLOR: rgb(255,0,0); FONT-STYLE: italic">characteristic of electronic currency</span> which is:
<br />
<br />• The transfer of electronic currency is instant and ‘real time’ and cannot be reversed. It is just same like when you have purchase a cup of drink from a restaurant and you had pay for it, after that if u suddenly feel regret and would want to refund back for the payment, it is impossible because the transactions are final and not reversible in this kind of situation, so same situation apply by using electronic currency.
<br />
<br />• Secondly, the transfer of electronic currency is private and anonymous for the sender and receiver, it means that normally it would not show the real identification of the sender and receiver and generally the account titles shown during transaction are numbers, nick names or email addresses. Additionally, just like actual cash, the source of the funds is never disclosed to the receiver.
<br />
<br />Further explaination:
<br /><a href="http://www.nowpublic.com/what_is_digital_currency_digital_money_real_cash">http://www.nowpublic.com/what_is_digital_currency_digital_money_real_cash</a>
<br />
<br /><span style="FONT-WEIGHT: bold; COLOR: rgb(255,0,0); FONT-STYLE: italic">Requirement of Electronic Currency</span>
<br /><span style="COLOR: rgb(0,0,153)">1) Security</span>
<br /><span style="COLOR: rgb(0,0,153)">2) Anonymity </span>
<br /><span style="COLOR: rgb(0,0,153)">3) Scalability</span> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXI0CC-s3gMZiDZwMTRiMgfl5uCk4d1xk5Y0dKrMutzlyPLcy9qWbe6Vp4wW-tKbc_U0NcUC09f5axfgVoLXTuAzBDO-nkq_yYUMHAcHcDtpOO3t0X-DeqR33Py2GujO7NuAf4-A_c6Scs/s1600-h/anonymous.jpg"><img id="BLOGGER_PHOTO_ID_5350154827383381602" style="FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 167px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXI0CC-s3gMZiDZwMTRiMgfl5uCk4d1xk5Y0dKrMutzlyPLcy9qWbe6Vp4wW-tKbc_U0NcUC09f5axfgVoLXTuAzBDO-nkq_yYUMHAcHcDtpOO3t0X-DeqR33Py2GujO7NuAf4-A_c6Scs/s200/anonymous.jpg" border="0" /></a>
<br /><span style="COLOR: rgb(0,0,153)">4) Acceptability</span>
<br /><span style="COLOR: rgb(0,0,153)">5) Off-line Operation</span>
<br /><span style="COLOR: rgb(0,0,153)">6) Transferability</span> <span style="COLOR: rgb(0,0,153)">
<br />7) Hardware Independent</span>
<br />
<br />For the explanation and example of above requirements of electronic currency, you can refer to this link file:
<br />
<br /><a href="http://clifford.neuman.name/papers/pdf/9311_netcash-medvinsky-neuman-cccs93.pdf">http://clifford.neuman.name/papers/pdf/9311_netcash-medvinsky-neuman-cccs93.pdf</a>
<br />
<br />After share with all of you about the types, characteristics and requirements of the electronic currency, now I would like to share about benefits and limitation or disadvantages using electronic currency.
<br />
<br /><span style="FONT-WEIGHT: bold; COLOR: rgb(255,0,0)">Benefits</span>
<br /><span style="COLOR: rgb(153,51,153)">1) Convenient</span>
<br />- provides users a quick, simple and safe way for shopping instead of showing their credit card information to merchant who they do not know
<br />- offer a variety of services without having to handle physical cash or checks. Customers do not have to wait in lines; this provides a lower-hassle environment.
<br />- Debit cards and online bill payments allow immediate transfer of funds from an individual's personal account to a business's account without any actual paper transfer of money. It saves up the time of process and doing paper work.
<br />
<br /><span style="COLOR: rgb(153,51,153)">2) Low Transactions Cost</span>
<br />- Unlike other businesses that eat up your profit with exorbitant fees, electronic currency trading allows you to do business with minimal fees giving you more profit and more money for you.
<br />
<br /><span style="COLOR: rgb(153,51,153)">3) Anonymity and Detection of Double Spender</span>
<br />- Highly confidential for users ID and also information and real-time checking of all transactions make the possibility of multiple expenditures negligible.
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjerjYLWf_9jyYxjOFXUkkQFgrmB6bB4VkpvMpBvRR2E6LSv4V1GkiqDtHEpYKSUeaUqRpk0T4XlQp9Al5QtE1h5yz9XthCBPfBGTXEI0VNvfYDFqHbU9OXFQty1l8AJ7tsAN5AWrO6tggH/s1600-h/globalization5.gif"><img id="BLOGGER_PHOTO_ID_5350155756684522690" style="FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 200px; CURSOR: pointer; HEIGHT: 162px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjerjYLWf_9jyYxjOFXUkkQFgrmB6bB4VkpvMpBvRR2E6LSv4V1GkiqDtHEpYKSUeaUqRpk0T4XlQp9Al5QtE1h5yz9XthCBPfBGTXEI0VNvfYDFqHbU9OXFQty1l8AJ7tsAN5AWrO6tggH/s200/globalization5.gif" border="0" /></a><span style="COLOR: rgb(153,51,153)">4) Globalization</span>
<br />- allows access to a global market where not restricted and controlled by local currencies.
<br /><span style="FONT-WEIGHT: bold; COLOR: rgb(255,0,0)">
<br />
<br />
<br />
<br />
<br />
<br />
<br />Disadvantages or limitation:</span>
<br />
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie14JT_FyDh8R831PRPCi-Kmdxu_QtdB2ci6OkNqf96I8yQwKQn5FJkW4e_FXslBipzHl1_eUy0sUwQauzAqPedTpR0pkYdv8SofKWEBT4r65ttikfI7zgy1_wCOGu3I7rCNynQJ4dzn8p/s1600-h/cybercrime.jpg"><img id="BLOGGER_PHOTO_ID_5350155747529925074" style="FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 146px; CURSOR: pointer; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie14JT_FyDh8R831PRPCi-Kmdxu_QtdB2ci6OkNqf96I8yQwKQn5FJkW4e_FXslBipzHl1_eUy0sUwQauzAqPedTpR0pkYdv8SofKWEBT4r65ttikfI7zgy1_wCOGu3I7rCNynQJ4dzn8p/s200/cybercrime.jpg" border="0" /></a><span style="COLOR: rgb(51,204,0)">1) Fraud or Criminal Activities</span>
<br />- hacking into bank accounts and illegal retrieval of banking records has led to a widespread invasion of privacy and has promoted identity theft.
<br />
<br /><span style="COLOR: rgb(51,204,0)">2) Failure of Technology</span>
<br />- such as network breakdown, defected by virus or worm, power failure that cause loss of data and record may be one of the issue of electronic currency.
<br />
<br /><span style="COLOR: rgb(51,204,0)">
<br />
<br />
<br />
<br />3) Privacy </span>
<br />- it is still an issue of how safe the confidential information of a credit card or debit card holders to be protected and personal information will not be misuse.
<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgokVBhqhftqU-w-QbBhn0GTjGSMZzrHryTIzsqSurgN5WXWRlF9oaG5SEKz29NtkAoCHhkGbQAlZigT1TFQxwSOVANupZBWWzfImRdsHVG9FeivkE4x8TOr_W432RtNoOrVhImLxzc4v5k/s1600-h/35396-constansoft_computer_privacy.jpg"><img id="BLOGGER_PHOTO_ID_5350153338675869874" style="WIDTH: 188px; CURSOR: pointer; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgokVBhqhftqU-w-QbBhn0GTjGSMZzrHryTIzsqSurgN5WXWRlF9oaG5SEKz29NtkAoCHhkGbQAlZigT1TFQxwSOVANupZBWWzfImRdsHVG9FeivkE4x8TOr_W432RtNoOrVhImLxzc4v5k/s200/35396-constansoft_computer_privacy.jpg" border="0" /></a>
<br />
<br /><span style="COLOR: rgb(51,204,0)">4) Costly to Implemented and Massive Databases </span>
<br />- Additional required of hardware is quite costly for installation and the bank have to maintain a detailed and confidential database which required them to have massive databases.
<br />
<br />Below are some link that describe further about the Advantages and Disadvantages of electronic commerce, anyone interest can surf for it and understand it further.
<br />
<br />• <a href="http://www.romow.com/business-blog/benefits-of-e-currency-trading/">http://www.romow.com/business-blog/benefits-of-e-currency-trading/</a>
<br />• <a href="http://www.iit.edu/~peacjen/cs485/ecash2.htm">http://www.iit.edu/~peacjen/cs485/ecash2.htm</a>
<br />• <a href="http://www.buzzle.com/articles/advantages-and-disadvantages-of-electronic-cash.html">http://www.buzzle.com/articles/advantages-and-disadvantages-of-electronic-cash.html</a>
<br />• <a href="http://www.businesspme.com/uk/articles/trade/90/Electronic-money---advantages-and-disadvantages.html">http://www.businesspme.com/uk/articles/trade/90/Electronic-money---advantages-and-disadvantages.html</a>
<br />•<a href="http://www.learncurrencytradingonline.com/electronic-currency-trading.htmlrrencytime.com/gistablot.html"> http://www.learncurrencytradingonline.com/electronic-currency-trading.html</a>
<br />
<br />
<br /><style><!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:791169386; mso-list-type:hybrid; mso-list-template-ids:358490558 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.25in; mso-level-number-position:left; margin-left:.25in; text-indent:-.25in; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;</style><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:791169386; mso-list-type:hybrid; mso-list-template-ids:358490558 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.25in; mso-level-number-position:left; margin-left:.25in; text-indent:-.25in; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin</style>
<br /><p style="text-indent: -0.25in; margin-left: 0.25in;" class="MsoNormal"><!--[if !supportLists]--><span style="font-family:Symbol;"><span style="font-size:0;"><span style=";font-family:';font-size:7;"></span></span></span>
<br /></p></div></style>
<br />ANG BOON YONGhttp://www.blogger.com/profile/07267099735335331864noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-29388450060389089652009-06-27T17:23:00.029+08:002009-06-29T15:39:30.017+08:00Credit card debts: Causes and preventions<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgopqbndOmfqvswo0FRd6lzKI38GnnGlonqmthvfGEcsMhXWox1FdRHQyp-gk9qyULbhyT4Q0qHmDhdgaizGuiASk7_AZHGxRhX_5z1n96vaQGktJGSlZl6-BXS21sJR4gmd4dmdndmXNlV/s1600-h/cardgame.jpg"><img id="BLOGGER_PHOTO_ID_5351946599847513490" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 257px; CURSOR: hand; HEIGHT: 252px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgopqbndOmfqvswo0FRd6lzKI38GnnGlonqmthvfGEcsMhXWox1FdRHQyp-gk9qyULbhyT4Q0qHmDhdgaizGuiASk7_AZHGxRhX_5z1n96vaQGktJGSlZl6-BXS21sJR4gmd4dmdndmXNlV/s320/cardgame.jpg" border="0" /></a>Nowadays, credit card becomes a common instruments where many peoples now use it to pay for their bill in their daily use. Actually, the procedures and terms for applying credit card in nowadays is much simplier if compare to the past time. This may due to the competition between financial institutions where they try to attract more customers by lower down their interest rates and conditions. It is not surprising if you can found out that a person can hold 5 credit cards at the same time. However, everything in this world is double sided which are the application of credit card become easier now but it is not easy for the card holders to settle their debts. So, this week let me hare with you all the causes and preventions of credit cards debts.<br /><div><div><div><div><br /><div><span style="color:#cc33cc;">CAUSES:</span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span> </div><div><span style="color:#6666cc;">Income vs Expenses</span> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEnyMoF07t5XWc0KL56Jp4rPsP3bsPFqCCDF9cQKN0854ADPKuoGrdB9iNSldo3O3UwgxbyKXeELfWwjny3cQHfJO8er5nszojQWxQ3U9uhJUjnBN0GluTNI2uT1RW4XFGN_z4wxPKAmEN/s1600-h/balance.jpg"><img id="BLOGGER_PHOTO_ID_5351949575060755858" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 150px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEnyMoF07t5XWc0KL56Jp4rPsP3bsPFqCCDF9cQKN0854ADPKuoGrdB9iNSldo3O3UwgxbyKXeELfWwjny3cQHfJO8er5nszojQWxQ3U9uhJUjnBN0GluTNI2uT1RW4XFGN_z4wxPKAmEN/s200/balance.jpg" border="0" /></a><br /></div><span style="color:#666666;"></span><div><span style="color:#666666;"></span></div><div><span style="color:#666666;">A person must spend their income according to their expenses. Peoples alway think that they are able to pay for the bills when they want to buy something that is more expensive which the things is not really a "<span style="color:#ff0000;">NEED</span>" but a "<span style="color:#ff0000;">WANTS</span>". Many such cases happen in Taiwan where STUDENTS are too follow blindly nowadays fashion causing them to be in the red. They bought a lot of branded goods to satisfy their vanity. Some even owe RM100K to the bank.</span><br /></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span> </div><div><span style="color:#6666cc;">Little saving</span><br /></div><span style="color:#666666;"></span><div><span style="color:#666666;"></span></div><div><span style="color:#666666;">Many people nowadays do not save money for their future needs. They think that they can obtain short term loan from the bank easily if they need any financial assistance. Due to this thinking, they will always spend first without considering they are able to pay for the debts in the future. Besides, because of the little savings, they will not have enough money to deal with emergency. Again, credit card become the fatest way to loan money.</span><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1ln5MxnLtgNWrrRbDD3RhPma3Dvz6bct66a4jJRwthv2zdzqsUxFeD6zl7IWIUOZbypvWeEcfSfpctGsnQas3bTrYXudmtP9g30dRS3VABhtb_3DGH6Y5q6UnJSdanL-QPMFvO4b_ocYL/s1600-h/global-unemployment.jpg"><img id="BLOGGER_PHOTO_ID_5351947782375349986" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 190px; CURSOR: hand; HEIGHT: 158px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1ln5MxnLtgNWrrRbDD3RhPma3Dvz6bct66a4jJRwthv2zdzqsUxFeD6zl7IWIUOZbypvWeEcfSfpctGsnQas3bTrYXudmtP9g30dRS3VABhtb_3DGH6Y5q6UnJSdanL-QPMFvO4b_ocYL/s200/global-unemployment.jpg" border="0" /></a><span style="color:#6666cc;">Unemployment</span><br /></div><div><span style="color:#666666;"></span></div><div><span style="color:#666666;"></span></div><div><span style="color:#666666;"></span> </div><div><span style="color:#666666;">Unemployed person normally will depend on their credit cards to pay for their spending as this is the only way for them to survive. If they still spend extravagantly for a long time then they will have accumulated too much debt which they do not have ability to pay for it. Lastly, they will end up by declared bankruptcy.</span></div><br /><div><br /></div><br /><div></div><div><span style="color:#6666cc;">Pay only the minimum</span> </div><br /><div><span style="color:#666666;">Some credit card holders will choose to pay part of their debts. This normally will step up their debts because of the interest that imposed on the late payment. Thus, that money paid by them actually is paying for the interest but not for the principal. If thing keep going for long time, then the debt will increase more and more.</span> </div><br /><div><span style="color:#cc33cc;">PREVENTIONS:</span></div><br /><div><span style="color:#6666cc;">Have a good money management <div><span style="color:#cc33cc;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5YROg6-P0yCzPDaxxgEM8iBSb6B6rQHPdQrWKROL5vQHCRQSOxqLe3J5pV4TkxT9q5KYYxZaKfN1zoUkaw06hbBk0ZNEwhUPeQG19ESavUl6LUcpg1utNOnuHUxNf3FNhDBACswQVO9EH/s1600-h/money.jpg"><img id="BLOGGER_PHOTO_ID_5351948335520568898" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 115px; CURSOR: hand; HEIGHT: 129px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5YROg6-P0yCzPDaxxgEM8iBSb6B6rQHPdQrWKROL5vQHCRQSOxqLe3J5pV4TkxT9q5KYYxZaKfN1zoUkaw06hbBk0ZNEwhUPeQG19ESavUl6LUcpg1utNOnuHUxNf3FNhDBACswQVO9EH/s200/money.jpg" border="0" /></a></span></div></span></div><div></div><br /><div><span style="color:#666666;">A person will need to have a good spending plan to keep track of their bills. This will help them to identify where is their money is going. Actually, it is good to form this habit because it can control their expenses where they only buy thing that they need.</span> </div><div></div><div></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghxdrkm_85N2CJ0hb12sB89BQH9inXaEnVssg-TVfMSs8r7UbPguuVNVFd5WARNMpuTTNsfnwayWuCmPd8n1CASoRrErmYrr2jTYjUBRp1vJ4W_OS4sFTwLQmWIkOpm7Zc_7iaASorAeLg/s1600-h/45543_rainy_day_md.gif"><img id="BLOGGER_PHOTO_ID_5351948618861154786" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 155px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghxdrkm_85N2CJ0hb12sB89BQH9inXaEnVssg-TVfMSs8r7UbPguuVNVFd5WARNMpuTTNsfnwayWuCmPd8n1CASoRrErmYrr2jTYjUBRp1vJ4W_OS4sFTwLQmWIkOpm7Zc_7iaASorAeLg/s200/45543_rainy_day_md.gif" border="0" /></a><span style="color:#6666cc;">Save money</span><br /></div><br /><div><span style="color:#666666;">Always save money...This is because cash is the most liquidity asset which it can be used when there is an emergency and future needs. Having enough saving for a rainy day is always a worthwhile investment.You will be more thankful if you have enough money on hand in case of emergency.</span></div><br /><div><br /></div><br /><div><span style="color:#666666;"></span></div><div><span style="color:#6666cc;">Pay on time</span><br /><span style="color:#666666;"></span></div><div><span style="color:#666666;"></span></div><div><span style="color:#666666;"></span></div><div><span style="color:#666666;"></span> </div><div><span style="color:#666666;">Never made late payment to any debt whether is your credit card debts or your car and housing loan. This is because the interest is calculated based on the daily balances. Pay on time will help you to save money on interest. Do not look down on the interest because it may be the main killer in settling your debts.</span><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUOBrvQ2636oFmD7XxND8D1PKxLZUtPqd-fP6Q2_ckI-qFSZWOt2WAdQ-IocxzBHq5rEq7rrPfOOMYsClApEWFh14ENVS09tq3SG2I1MUHliW29ZXlskq7sueVWECx72OXZp-pYufAHm2E/s1600-h/shopaholic.jpg"><img id="BLOGGER_PHOTO_ID_5351950143490826738" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 121px; CURSOR: hand; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUOBrvQ2636oFmD7XxND8D1PKxLZUtPqd-fP6Q2_ckI-qFSZWOt2WAdQ-IocxzBHq5rEq7rrPfOOMYsClApEWFh14ENVS09tq3SG2I1MUHliW29ZXlskq7sueVWECx72OXZp-pYufAHm2E/s200/shopaholic.jpg" border="0" /></a></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span> </div><div><span style="color:#6666cc;">Self-control</span><br /></div><span style="color:#666666;"></span><div><span style="color:#666666;">Do not be a shopaholic!!! Buy whenever you needs but not useless things. Limit the "<span style="color:#ff0000;">plastic</span>" in your wallet or purse. This will restrain you from being overspend. Spend according to your income but not the fashion.</span><br /></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span></div><div><span style="color:#6666cc;"></span> </div><div><span style="color:#6666cc;">Choose the right card</span><br /></div><div><span style="color:#666666;">Customers must read the terms and conditions carefully especially the fine print before they apply for the credit cards. This is because some financial institutions will imposed extra charges which you would not realized of it. You must understand everything from your interest rates and fees to how to earn rewards from your credit card. This can let you prevent from being charge more for your credit cards.More on this topic: <a href="http://www.cardratings.com/howtochoosetherightcreditcard.html"><span style="color:#000099;">http://www.cardratings.com/howtochoosetherightcreditcard.html</span></a></span> </div><br /><div></div><div><span style="color:#cc66cc;">Reference:</span></div><br /><div>1. <a href="http://www.3debtconsolidation.com/top10-causes.html"><span style="color:#000099;">http://www.3debtconsolidation.com/top10-causes.html</span></a></div><br /><div>2. <a href="http://www.cardratings.com/howtoavoidcreditcarddebt.html"><span style="color:#000099;">http://www.cardratings.com/howtoavoidcreditcarddebt.html</span></a></div></div></div></div></div>Goh Mei Chinhttp://www.blogger.com/profile/03514783669125897469noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-38184961797840598462009-06-22T14:56:00.012+08:002009-06-25T11:19:26.496+08:00The Application of 3rd Party Certification Programme in MalaysiaThird parties refer to Certificate Authority (CA) who issue digital certificates to verify that a particular website is representing its company. One of the famous application of 3rd party certification programme in Malaysia is provided by the <span style="color:#3366ff;">MSC Trustgate.com Sdn Bhd</span>. MSC Trustgate.com Sdn Bhd was incorporated in 1999 as a licensed Certification Authority (CA) in Malaysia under Digital Signature Act 1997. It aims at catalyzing the growth of e-commerce by creating a trusted e-environment that helps businesses to expand in the new economy. It provides security solutions and trusted services to help companies build a secure network application infrastructure for their electronic transactions and communications over the network. The services that provides by Trustgate are SSL Certificate, Managed PKI, Digital ID, MyTRUST, MyKAD PKI, SSL VPN, Managed Security Services, VeriSign Certified Training.<br /><br /><br /><div align="left"><br /></div><p><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 260px; DISPLAY: block; HEIGHT: 63px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5350049909452329186" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfjuOBBXQR8eY8RaI6HrrOt4aLL5wdWLdW92R75BAouWb59O-NuOkGFiM92Iydowx70-lsVCz81B-ilPo-KGyux5YoAljHok0L-d2hc8c2kK06YnDpPPo_61vqiD2pOPZlaQHO3Pljw6c/s200/clip_image001.jpg" /><br /><span style="color:#cc66cc;">SSL Certificate<br /></span>Trusgate provides two SSL Certificates due to the increase of phishing attacks on the Internet. It helps the customers to ensure that they are dealing with trusted parties and their information traveled over the Internet was reaches at intended recipients. The two certificates are Global Server ID and Secure Server ID. Global Server ID adopts today's strongest encryption <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwEgk-9CNt9wtKa2GNTEhB6hq0nX6gNYCoRdFxPvizaXnvQtFXn39uRQdiapOM7O5kJcjkl3mqcPDJ4X5wkrrzyb6pCnz-yLfvRFTgawzuEpavlSwpN-oh4hWjU-XCGSE6gYdMFFC3Kd4/s1600-h/verisign.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 150px; FLOAT: right; HEIGHT: 77px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5350050354765946066" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwEgk-9CNt9wtKa2GNTEhB6hq0nX6gNYCoRdFxPvizaXnvQtFXn39uRQdiapOM7O5kJcjkl3mqcPDJ4X5wkrrzyb6pCnz-yLfvRFTgawzuEpavlSwpN-oh4hWjU-XCGSE6gYdMFFC3Kd4/s200/verisign.jpg" /></a>commercially available for secure communications via Server Gated Cryptography (SGC) technology while Secure Server ID protect the transfer of sensitive data on network using a minimum of 40-bit and up to 256-bit encryption. It includes VeriSign that provides security solutions to protect the network and consumers of the organization.<br /><br /><span style="color:#cc66cc;">Managed Public Key Infrastructure (MPKI)<br /></span>MPKI service is a fully integrated enterprise platform designed to secure intranet, extranet, and Internet applications by combining maximum flexibility, performance, and scalability with high availability and security. The service allow enterprise to quickly and cost-effectively establish a robust PKI and Certification Authority (CA) system with complete control over security policies, PKI hierarchies, authentication models, and certificate lifecycle management.<br /><br /><span style="color:#cc66cc;">Digital ID</span><br />The use of Digital ID to sign and encrypt the transactions can ensure that the confidential information is secured. Digital ID is an electronic credentials that uses private key and public key to facilitate the following operations:<br /><br />Authentication –<span style="color:#33cc00;"> <em>you are who you claim you are</em></span><br />Privacy – <em><span style="color:#33cc00;">your confidential data remains private</span></em><br />Authorization – <em><span style="color:#33cc00;">control user access rights to important data</span></em><br />Integrity – <em><span style="color:#33cc00;">be sure data is not altered behind your back</span></em><br />Non-repudiation – <em><span style="color:#33cc00;">have the evidence in the event of a dispute</span><br /><br /></em><span style="color:#cc66cc;">MyTRUST</span><br />SIM card can turns into a Mobile Digital Identity for secure mobile banking and other financial services with MyTRUST. Mobile digital signature provides non-repudiation on transactions under the Digital Signature Act, 1997. It runs on Wireless PKI platform and Mobile Operator infrastructure. PKI-enabled SIM cards are preloaded with MyTrust application and a digital certificate from a licensed Certification Authority. Therefore, users are able to digitally sign any transaction easily and conveniently via their mobile phone.<br /><br /><span style="color:#cc66cc;">MyKad PKI (<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzWHO_AfOPSe-YWvNvyoPSGPUP2qsBsoU17lbkLqGhj-Ie4VsHOcL6elmCseBN9S0_vzeduK04a0_5uTVqnoyc10GNGrU1uMh3v8j5CL-aa-UK0b5y7YfvDyuMvKcAqBUqTmD9oXv_aqk/s1600-h/clip_image002.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 106px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5350051351177800962" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzWHO_AfOPSe-YWvNvyoPSGPUP2qsBsoU17lbkLqGhj-Ie4VsHOcL6elmCseBN9S0_vzeduK04a0_5uTVqnoyc10GNGrU1uMh3v8j5CL-aa-UK0b5y7YfvDyuMvKcAqBUqTmD9oXv_aqk/s200/clip_image002.jpg" /></a>MyKey)</span><br />MyKey is the MSC Trustgate.com Sdn. Bhd.’s Digital Certificate which is loaded into MyKad. It is governed by Malaysia’s Digital Signature Act 1997 and is accepted by the Malaysian government. Mykey allows its users signed document digitally. The document is treated as a legal binding document as it is with a handwritten signature.<br /></p><p></p><p><br /><span style="color:#cc66cc;">SSL Virtual Private Network (SSL VPN)<br /></span>SSL VPN provides secure remote access based on the web security standard SSL (Secure Socket <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikXa8umrvEkQ5WnzAHqNQhyphenhyphens1UpK7e26gqZL0zNBP-dSPuPQbwtwcYFMsWovmFjaDVt44nLhyZ0lBXBRmAhtGed9dbOgdYgmAmwYOSkrFHgTTz-PuqsUzLKRRKrQijsDXwJBXQm15XXAw/s1600-h/ssl.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 115px; FLOAT: right; HEIGHT: 86px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5350051607138047362" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikXa8umrvEkQ5WnzAHqNQhyphenhyphens1UpK7e26gqZL0zNBP-dSPuPQbwtwcYFMsWovmFjaDVt44nLhyZ0lBXBRmAhtGed9dbOgdYgmAmwYOSkrFHgTTz-PuqsUzLKRRKrQijsDXwJBXQm15XXAw/s200/ssl.jpg" /></a>Layer). SSL VPN can be configured to access multiple intranet sites with single sign-on. Users can get access to intranet, e-mail and business system from wherever they are and whatever device they choose. Besides, it provides an advanced policy management component to authenticate users and type of device they are using.<br /></p><p><br /><span style="color:#cc66cc;">Managed Security Services</span><br />Valuable business resources that are accessible over the network need to be protected against misuse <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjedJX5TReqvYIwUOOcbgRfqOAyF-R10f7t59Y_JOyR18L5W9wa5OyrDQeOc7NGAShSSxQpmgnqYJNfUGpUni1oGJ4J1WglDanWOFSYfMEeWuzgbg3M8dqFgW8HvYWLdbcf5sasBvOc894/s1600-h/mss.gif"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 83px; FLOAT: left; HEIGHT: 74px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5350051990805999602" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjedJX5TReqvYIwUOOcbgRfqOAyF-R10f7t59Y_JOyR18L5W9wa5OyrDQeOc7NGAShSSxQpmgnqYJNfUGpUni1oGJ4J1WglDanWOFSYfMEeWuzgbg3M8dqFgW8HvYWLdbcf5sasBvOc894/s200/mss.gif" /></a>to ensure the business runs smoothly. Trustgate provides full set of security solutions to help companies build a secure and reliable environment for their organization. Trustgate’s consultants have extensive experience in implementing IT security and conform to SAS 70 standard. They are committed to deliver effective security infrastructure to protect organization’s network from attacks.<br /></p><p><br /><span style="color:#cc66cc;">Verisign Certified Training</span><br />Trustgate has been appointed as Asia's first VeriSign Authorised Training Centre. Under the partnership, Trustgate and APIIT (Asia Pacific Institute of Information Technology) jointly facilitate the delivery of VeriSign’s high-end Security and E-Commerce programmes.<br /><br /><span style="color:#cc33cc;"><span style="color:#ff6666;">The projects that have been implemented by Trustgate in Malaysia included:</span><br /></span><span style="color:#ff6666;">~</span><span style="color:#00cccc;">E-banking Security Deployment<br /></span><span style="color:#ff6666;">~</span><span style="color:#00cccc;">E-procurement Integration<br /></span><span style="color:#ff6666;">~</span><span style="color:#00cccc;">User Authentication and Customer Clearance Approval System</span><br /><span style="color:#ff6666;">~</span><span style="color:#00cccc;">PKI for Online Transaction Payment System</span><br /><span style="color:#ff6666;">~</span><span style="color:#00cccc;">PKI Development & Integration for Malaysia’s National Identification Card “MyKad”</span><br /><span style="color:#ff6666;">~</span><span style="color:#00cccc;">PKI Infrastructure for E-government and E-business Transactions</span><br /><span style="color:#ff6666;">~</span><span style="color:#00cccc;">Secure Document Storage System</span><br /><span style="color:#ff6666;">~</span><span style="color:#00cccc;">Project Management and Application System Development</span><br /><span style="color:#ff6666;">~</span><span style="color:#00cccc;">Security Consultancy & Outsourcing Services<br /></span><br /><span style="color:#cc33cc;">Reference:<br /></span><a href="http://www.mykey.com.my/Website/home.php">http://www.mykey.com.my/Website/home.php</a><br /><a href="http://www.trademal.com/global/index.php/id/17463/key/trustgate/MSC_Trustgate_com_Sdn_Bhd/index.html">http://www.trademal.com/global/index.php/id/17463/key/trustgate/MSC_Trustgate_com_Sdn_Bhd/index.html</a> <a href="http://www.msctrustgate.com/">http://www.msctrustgate.com/</a></p>Ho SiaW TinGhttp://www.blogger.com/profile/04450327066867462878noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-71938629399224863242009-06-21T02:25:00.005+08:002009-06-22T22:21:47.366+08:00How To Safeguard Our Personal And Financial DataIt’s cool of storing a lot of music, movie, photo, working paper, and some secret inside our computer. However, we will feel shock when we suddenly notice our personal things being uploaded in some website, or lost of data inside the computer. How it actually happened???<br /><br /><a href="http://edition.cnn.com/2009/BUSINESS/06/10/Internet.search.terms/index.html#cnnSTCText"><span style="FONT-WEIGHT: bold">How data lost?</span></a><br />When a normal people like us having our first computer, first of all, we will think of applying for internet connection. This makes the opening, and our human’s action continues the tragedy. When opening internet browser, we will go search for something that we want. However, if you ever typed in “word unscrambler, lyrics, myspace, free music downloads, phelps, game cheats, printable fill-in puzzles, free ringtones and solitaire”, any of these term will probably carried the chance for your computer to get hit by “<a href="http://en.wikipedia.org/wiki/Malware">malware</a>”, that might steal away your computer data.<br /><br /><span style="FONT-WEIGHT: bold">Impact of data lost</span><br />Lost of data might cause losses either in physical or reputation. If our financial data being stolen, it is possible that our money will be just used by anonymous for their own transaction. For businessman, every customer data that had lost might cause an uncountable loss in business.<br /><br />If personal data get stolen, it is just like the incident happened in November 2006. A Hong Kong male artist, <a href="http://en.wikipedia.org/wiki/Edison_Chen">Edison Koon-Hei Chen</a> was involved in <a href="http://en.wikipedia.org/wiki/Edison_Chen_photo_scandal">sex photo scandal</a> of his with 6 others females. Although this incident brings him the hottest search result in <a href="http://www.google.com/">Google search engine</a> for year 2008, however, his reputation had already become a bad one.<br /><br /><span style="FONT-WEIGHT: bold">Common methods to safeguard personal and financial data</span><br />The most common ways to safeguard our data are through <a href="http://www.internetrti.com/support/rti2000/kb/webhelp/RTI_kb/Password_and_Encryption_Key_Safeguard_Financial_Data_Transmitted_Across_RTInet.htm">encryption, password</a> or <a href="http://banking.about.com/od/checkingaccounts/g/pinnumber2.htm">PIN</a>. With a password, we can protect from letting others access our computer and account. A further protection is installing <a href="http://support.microsoft.com/kb/317321">antivirus </a>to prohibit viruses attacking. To protect home network from offensive website and hacker, it is recommended that enable the <a href="http://www.howstuffworks.com/firewall.htm">Window Firewall</a>.<br /><br />The latest technology to protect data is through <a href="http://ctl.ncsc.dni.us/biomet%20web/BMOverview.html">biometric</a>, which will recognize owner’s <a href="http://www.emory.edu/BUSINESS/et/biometric/Fingerprint.htm">fingerprint</a>, <a href="http://www.emory.edu/BUSINESS/et/biometric/Optical.htm">optical</a>, <a href="http://www.emory.edu/BUSINESS/et/biometric/Facial.htm">facial structure</a>, <a href="http://www.emory.edu/BUSINESS/et/biometric/Voice.htm">voice</a>, <a href="http://www.emory.edu/BUSINESS/et/biometric/Signature.htm">signature</a>, or <a href="http://www.emory.edu/BUSINESS/et/biometric/Keystroke.htm">keystroke</a>. Everyone in this world had his own unique physiological and behavioral characteristic, therefore, using biometric for identify and verify purpose can be a higher secure than password and PIN.<br /><br /><span style="FONT-WEIGHT: bold">Other methods to safeguard personal and financial data</span><br />We always said that, there’s better prevent than cure. For me, I more prefer take precaution rather than take action. For a normal user for you and me, here, I’m willing to share the way I safeguard my data.<br /><br />First time when sign in to MSN messenger, it warns that “Never give out your password or credit card number in an instant message conversation”. We should follow this instruction, because it was trying to protect us from financial aspect. If you using a shared computer, it is recommend that do not save your message as MSN history, so that other won’t know what you had chatted about.<br /><br />In a MSN conversation, sometimes, your friend might send some file for you. For your benefit, it is recommend that you should ask your friend what is that file. A small tip for you, if you able to close the chat window when there’s a file in pending status, that file usually not a file from your friend, but a virus link. Sometimes, when your friend sends you a link (e.g.: http://SweetStufff.com :D, click here www.mebeholdgo.in), <span style="FONT-WEIGHT: bold; COLOR: rgb(0,0,0)">NEVER CLICK THAT!</span> Unless you’d get the confirmation from your friend to do so.<br /><span style="FONT-WEIGHT: bold; COLOR: rgb(255,0,0); FONT-STYLE: italic">P.S: DO NOT CLICK on that 2 links, any damages or losses is not liable.</span><br /><br />It’s enjoying when you can access Wi-Fi in hotspot. However, when connected to these shared connection, you should bear in mind that you might get the chance to let other access to your network and personal information. So, it’s better for you not to online in the hotspot.<br />(Refer to <a href="http://www.cnn.com/2009/TRAVEL/business.travel/05/28/computer.security/">http://www.cnn.com/2009/TRAVEL/business.travel/05/28/computer.security/</a>)<br /><br />When surfing website, we should aware of any pop-up advertisement. Any careless action will just cause the tragedy, think before you do. For credit card user, you are advised that make a routine review on the transaction made, so that can discover any unusual transaction at once.<br /><br />Remember to set a schedule for your antivirus to update its database to the latest version. Although there is some free antivirus in open-source, it is recommended that spend some money to purchase original version antivirus. You will shock of the scan result after scanning it.<br /><br />Too much I can write for it, however, too little I can think out right now. So, if there is any problem, you are most welcome to leave your comment here. I’ll reply whenever I read it…<br /><br />Extra Informations:<br />1) US is started to concern on this issue, further information can refer to:<br /><a href="http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCText">http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCText</a><br />Video<br /><style></style><a href="http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCVideo">http://edition.cnn.com/2009/POLITICS/05/29/cyber.czar.obama/index.html#cnnSTCVideo</a><br /><script src="http://i.cdn.turner.com/cnn/.element/js/2.0/video/evp/module.js?loc=int&vid=/video/politics/2009/05/29/obama.cyber.security.long.cnn" type="text/javascript"></script><noscript></noscript><br /><br />2) How to Safeguard Your Personal Data – Before, During and After a Breach<br /><a href="http://www.eweek.com/c/a/Security/How-to-Safeguard-Your-Personal-Data-Before-During-and-After-a-Breach/">http://www.eweek.com/c/a/Security/How-to-Safeguard-Your-Personal-Data-Before-During-and-After-a-Breach/</a><br /><br />3) Digital Shredder Premium (Easily, Securely & Permanently Erase Confidential Data)<br /><a href="http://www.dtransfer.com/products/data-deletion/digital-shredder-premium/">http://www.dtransfer.com/products/data-deletion/digital-shredder-premium/</a><br /><br />4) Safeguarding Your Data<br /><a href="http://www.msisac.org/awareness/news/2007-03.cfm">http://www.msisac.org/awareness/news/2007-03.cfm</a>Tan Cheng Linghttp://www.blogger.com/profile/05676503683750291218noreply@blogger.com2tag:blogger.com,1999:blog-8374589692573383949.post-39240311751491768492009-06-20T20:58:00.015+08:002009-06-22T14:56:24.361+08:00Phishing: Examples and its prevention method.Hi…everyone! Welcome to our blog AGAIN... This week, I am going to tell you all about the threat and attack that the e-commerce will face in this modern day. Even though, E-commerce has let our life more convenience nowadays, however, it also bring some problem to us where many deceivers actually make use of it on their self benefits. Thus, many users nowadays complaint that they have been cheated when they made any transaction through the internet.<br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCJM6vWoDsqJrYB4vPk3KKLgGglTtKtoG9oV6Nh6i3lNGaw_UtOR-eew-JQ1y5rdeTnnIS2U7K7ybMy6F0JBR0VM2B7T0ZOV-BM7w23As0lZUAmJNCOGIJQC_p-dYZtMSGUzpedLATjn8I/s1600-h/images.jpg"><img id="BLOGGER_PHOTO_ID_5349398443693945522" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 115px; CURSOR: hand; HEIGHT: 103px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCJM6vWoDsqJrYB4vPk3KKLgGglTtKtoG9oV6Nh6i3lNGaw_UtOR-eew-JQ1y5rdeTnnIS2U7K7ybMy6F0JBR0VM2B7T0ZOV-BM7w23As0lZUAmJNCOGIJQC_p-dYZtMSGUzpedLATjn8I/s200/images.jpg" border="0" /></a>One of the most popular threats nowadays is called <span style="color:#cc0000;">PHISHING</span>. The pronunciation of Phising is same as fishing. It is an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to deceive the user into disclosing their private information that will be used for theft purposes. The e-mail usually will contain a link that direct the user to visit a website where they are asked to update their personal information, such as passwords, credit card numbers, and bank account numbers.<br /><br />Phishing not only happen by sending email messages, but it actually exists in many wa<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBI_DwOTp1KjzNI1PyO5XOcRw3PVLElxnyzHwHwg3Gt1wLWbCXpw7R8eqSI41L1af6fVnrOS7RKYUu-4sD9objPeBuRCOxRPUDeZ8HSyO7JQfI9jKqm92vl0PWT06i-prc59myZLoYZObg/s1600-h/phishing.gif"></a>ys. <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXfisE0FRewlw9bbyqV_gSe7Z1FlEoto-GWlk2YDO_1YGpCjdNug1YQcM83HjR2uYGlmkVbNJXO6IKTuJp9YJjULqPue1xVGC-9upHUCFZcG7QcNb74yDh1gsdz4pTswQ-6O6vakL9JoJ2/s1600-h/phishing.gif"><img id="BLOGGER_PHOTO_ID_5349409556211098530" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 229px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXfisE0FRewlw9bbyqV_gSe7Z1FlEoto-GWlk2YDO_1YGpCjdNug1YQcM83HjR2uYGlmkVbNJXO6IKTuJp9YJjULqPue1xVGC-9upHUCFZcG7QcNb74yDh1gsdz4pTswQ-6O6vakL9JoJ2/s320/phishing.gif" border="0" /></a>The other examples are:<br /><br />a) On a social networking website.<br />b) On a fake website that accept donations for charity.<br />c) On a website that imitate your familiar website that you would not be realized of it.<br />d) In your instant message program<br />e) On your cell phone or mobile device.<br /><br />Now, even has a new type of phishing which is spear phising. It focuses on a single user or a department within an organization. The e-mail message appears to be legitimately addressed from someone within the organization normally in a position of trust such as head of human resources or IT. From there, the employees are being requested for their login IDs and passwords. Once data is gained, the hackers can entry into secured networks and steal the data. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can steal their data as well.<br /><br />So, to prevent this attack happen on ourselves, we need to learn how to spot a phishing scam. Normally, phishing scam will contain several elements:<br /><img id="BLOGGER_PHOTO_ID_5349408362564493074" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 266px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifRkgfVA_kBN9dpm2Z26RpEC0o3A2rUcBVsGItw8-67UVg8D3cRu32aLoI89PoyRzrUvuzKGB4_QyefA7NZ33aaJbvFLvXQ6-M-XGkB8xedayTA1Jl9ztpn40f58WNP2byEI9toNvJqh1-/s320/citi.bmp" border="0" /><br />a) The "From Field" shows the e-mail is send by the legitimate companies which normally appear as your bank or financial institution or a company you regularly to deal with such as e-bay, Paypal or Microsoft. User need to be very careful in looking out the senders as those deceivers can make use of the company name easily.<br /><br /><br />b) The e-mail will usually contain logos or images that have been taken directly from the legitimate Web site of the company. So, the existence of logo does not necessarily means that the e-mail is send by legitimate company. However, there will be some logos that are not an exact match to the company's logo or contain spelling errors. In such case, user should be alert that this a fake e-mail.<br /><br /><br />c) The e-mail will contain a clickable link which suggests you to use the inserted link to validate your information. When you rest your mouse on the link, it will show the real website address to which you will go. Note that the hyperlink usually does NOT point to the URL of the legitimate company. Somehow, the link will contain percentage signs followed by numbers or “@” signs, or random names. Besides, the deceivers will use web addresses that resemble the name of the legitimate company but slightly altered by adding or omitting letters. For example, the address "www.microsoft.com" could appear as, www.micosoft.com , www.mircosoft.com<br /><br /><br /><br />d) It contains several phrases such as:<br />I) verify your account<br />II) You have won the lottery<br />III) If you don't respond within XX hours, your account will be closed<br /><br />So, you all know what phishing mail look like. Now, it is the time to learn the prevention method.<br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTYQ-IuvgD01yREbeNMx4P3XbA6zXKun1_fBfeWdYLXSktHpU_TfBFMHWWS6Ei_Cp3JdV-8FWB3kMGGicG_AL9nTO1toUF-mxpTU7CccBNEDOiFl70CDR6qGlRTdVWuaFUHN-SeRZKOXDZ/s1600-h/screenshot2.gif"><img id="BLOGGER_PHOTO_ID_5349400819242093810" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 164px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTYQ-IuvgD01yREbeNMx4P3XbA6zXKun1_fBfeWdYLXSktHpU_TfBFMHWWS6Ei_Cp3JdV-8FWB3kMGGicG_AL9nTO1toUF-mxpTU7CccBNEDOiFl70CDR6qGlRTdVWuaFUHN-SeRZKOXDZ/s200/screenshot2.gif" border="0" /></a>a) We should always be alert to any email with urgent requests for personal financial information. Normally, a bank or other organization would not request your personal information through e-mail. However, there is digitally signed e-mail [more on: <a href="http://www.antiphishing.org/smim-dig-sig.html">http://www.antiphishing.org/smim-dig-sig.html</a>] which send by bank. These e-mails normally are more reliable and certified by third party which shown in the picture. However, it is more safety if you can contact the bank or related authority and confirm with them.<br /><div><div><div><div><div><div></div><br /><div>b) Don't click on the links in an email or instant message to get to any web page if you suspect the message might not be authentic or you don't know who the sender is.<br /></div><br /><div>c) Avoid filling out forms in email messages that ask for personal financial information instead you should only communicate information such as credit card numbers or account information via a secure website or the telephone.<br /></div><br /><div>d) Make it a habit to enter the address of any banking, shopping, auction, or financial transaction website yourself and not depend on displayed links. This is because phisers can mimic the legitimate URL which can lead you to the forge website.<br /></div><br /><div>e) Installing a Web browser which contains phising filter to protect you from phishing websites. You can get a free browser toolbar from: <a href="http://www.earthlink.net/earthlinktoolbar">http://www.earthlink.net/earthlinktoolbar</a><br /></div><br /><div>f) Log into your online accounts and change the password regularly.<br /></div><br /><div>g) Check your bank, credit and debit card statements to ensure that all transactions are legitimate regularly.<br /></div><br /><div>h) Report to the legitimate company if you received a phising e-mail. Otherwise, you can report to <a href="mailto:reportphishing@antiphishing.org">reportphishing@antiphishing.org</a>. which is an anti-phishing organization.<br /><br />Nowadays, the crime rate in the internet has increased gradually. So, we need to alert to the happening around us regularly to prevent us from being cheated and of course being a brilliant customer in nowadays is important as well. I hope this information can provide a useful guide to you all. </div><br /><div></div><br /><div>Reference:<br /></div><br /><div>1)<a href="http://www.webopedia.com/DidYouKnow/Internet/2005/phishing.asp"><span style="color:#000099;">http://www.webopedia.com/DidYouKnow/Internet/2005/phishing.asp</span></a></div><br /><br /><div>2) <a href="http://www.antiphishing.org/consumer_recs.html"><span style="color:#000099;">http://www.antiphishing.org/consumer_recs.html</span></a><span style="color:#000099;"> </span></div><br /><br /><div>3) <a href="http://www.phishinginfo.org/protect_authentication.html"><span style="color:#000099;">http://www.phishinginfo.org/protect_authentication.html</span></a></div></div></div></div></div></div>Goh Mei Chinhttp://www.blogger.com/profile/03514783669125897469noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-35737232234025038882009-06-17T22:04:00.018+08:002009-06-25T11:17:07.611+08:00~*The Threat of Online Security : How Safe is Our Data*~Since last week I explain about those revenue models of website transaction, I think now all of you will feel whether online transaction is it reliable and furthermore data that we insert to the net is it protected. <span style="font-size:0;"></span>According to the research I had made, there will not be 100 percent protected of our data and it show that actually there are still a lot <span style="font-size:0;"></span>of security issue to the net access and data storage by using computer. It is not only unsafe of our personal data, business data and private information, it also cause government data being hack by hacker. As an example, in June year 2006, US Pentagon faced theft of amazing amount of government data which causes by spoof e-mailing. Sensitive data housed on Defense systems was accessed, copied and sent back to the intruder. It took 3 weeks time for them to recover to normal operation and cost 4 million for reset the security. For further information about this case, you can refer to below link.
<br />
<br />
<br /><p class="MsoNormal"><?xml:namespace prefix = o /><o:p></o:p><a href="http://www.govexec.com/story_page.cfm?filepath=/dailyfed/0308/030508j1.htm&oref=search">http://www.govexec.com/story_page.cfm?filepath=/dailyfed/0308/030508j1.htm&oref=search</a></p>
<br />
<br /><p class="MsoNormal">
<br /></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhWOOUbEtstkL6oJSF4UEGjnWAWmJsLTmxPSvSRiC87IXtR8MAx-5tgkdnMpPOgzZNRfrxWvaThfGQ_YNYhnOqmLpQD8TBThq4B-sN1PpoqPeyK-lzXekqltmY9gw9CT9Z2TBG_ixEWbV3/s1600-h/pentagon.jpg"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 200px; DISPLAY: block; HEIGHT: 148px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5348302113247807106" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhWOOUbEtstkL6oJSF4UEGjnWAWmJsLTmxPSvSRiC87IXtR8MAx-5tgkdnMpPOgzZNRfrxWvaThfGQ_YNYhnOqmLpQD8TBThq4B-sN1PpoqPeyK-lzXekqltmY9gw9CT9Z2TBG_ixEWbV3/s200/pentagon.jpg" /></a>
<br /><p class="MsoNormal"><a href="http://www.govexec.com/story_page.cfm?filepath=/dailyfed/0308/030508j1.htm&oref=search">
<br /></a></p>
<br /><p class="MsoNormal"><o:p></o:p></p>
<br /><p class="MsoNormal">From the example show above, even the world most advance country in technology which is US also being hack for their government data, it show that actually our data is not that safe due to a lot threat of online security. Even we set password for our data, but it have two-pronged problem by using password, because they offer a false sense of security and are actually easy to bypass, guess or steal. Security issue and threat is a very sensitive issue to the company which doing business online. Now, I will like to share with all of you about few threat that will causes of lost of data and some ways we can use to protect data and minimize the chance of losing important data.</p>
<br /><p class="MsoNormal"><o:p></o:p></p>
<br /><p class="MsoNormal"><u><span style="color:red;">
<br /></span></u></p>
<br /><p class="MsoNormal"><u><span style="color:red;"><strong>1. Hacker</strong></span></u></p>
<br /><p class="MsoNormal">
<br /><u><span style="color:red;"><o:p></o:p></span></u></p>
<br /><p class="MsoNormal"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDz2Q0LxQOcY1qgtN9U10CQS4XtqYKcFvEkiyMxW_LKhoMlzGkoBRagHAHRcv2Ji7WdEyPfXpETneECcikV-Uk-pP5UPD5IbxMJJq-fPNe53ggBx0wswRTNONLkvcG9YLuT7XyTzxg9D_o/s1600-h/GhostysHackerSoftware.jpg"><img style="MARGIN: 0pt 10px 10px 0pt; WIDTH: 200px; FLOAT: left; HEIGHT: 144px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5348299563733007410" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDz2Q0LxQOcY1qgtN9U10CQS4XtqYKcFvEkiyMxW_LKhoMlzGkoBRagHAHRcv2Ji7WdEyPfXpETneECcikV-Uk-pP5UPD5IbxMJJq-fPNe53ggBx0wswRTNONLkvcG9YLuT7XyTzxg9D_o/s200/GhostysHackerSoftware.jpg" /></a>- Person who breaks into computers, usually by gaining access to administrative controls.</p>
<br /><p class="MsoNormal">- Mostly is for hacking data of political issue and also for criminal purposes.</p>
<br /><p class="MsoNormal">- Further explanation of different type of hacker is available at</p>
<br /><meta content="text/html; charset=utf-8" equiv="Content-Type">
<br /><meta name="Generator" content="Microsoft Word 11">
<br /><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} a:link, span.MsoHyperlink {color:blue; text-decoration:underline; text-underline:single;} a:visited, span.MsoHyperlinkFollowed {color:purple; text-decoration:underline; text-underline:single;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style>
<br /><p class="MsoNormal"><a href="http://en.wikipedia.org/wiki/Hacker_%28computer_security%29">http://en.wikipedia.org/wiki/Hacker_%28computer_security%29</a></p>
<br /><p class="MsoNormal"><a href="http://en.wikipedia.org/wiki/Hacker_%28computer_security%29">
<br /></a></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUH-FwqsoUGPzVQW2tEMLDMq8N9zHRwlblGjJBQfV_hGk5xt7XMrqerWvm8TJo18Pcs_LLfkXXpKYBFWdib9FArgqMqexglE1cImQZY7PcXa7M_Q7OKyym-SSj4nZy4kkPf1SkL2OXXU4Y/s1600-h/hacker11.jpg"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 200px; DISPLAY: block; HEIGHT: 186px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5348298043139115634" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUH-FwqsoUGPzVQW2tEMLDMq8N9zHRwlblGjJBQfV_hGk5xt7XMrqerWvm8TJo18Pcs_LLfkXXpKYBFWdib9FArgqMqexglE1cImQZY7PcXa7M_Q7OKyym-SSj4nZy4kkPf1SkL2OXXU4Y/s200/hacker11.jpg" /></a>
<br /><p class="MsoNormal"><o:p></o:p></p>
<br /><p class="MsoNormal">- Example of famous hacker in the world </p>
<br /><p class="MsoNormal">1. Kevin Mitnick - <a href="http://www.takedown.com/bio/mitnick.html">http://www.takedown.com/bio/mitnick.html</a></p>
<br /><p class="MsoNormal">2.<span style="font-size:0;"> </span>Jonathan James - <a href="http://en.wikipedia.org/wiki/Jonathan_James">http://en.wikipedia.org/wiki/Jonathan_James</a></p><p class="MsoNormal">
<br /></p><p class="MsoNormal"><u><span style="color:red;"><strong>2. Virus and Worm<o:p></o:p></strong></span></u></p>
<br /><p class="MsoNormal">- Can infect desktop computers, laptops and network servers and reach our PCs from email, web sites, downloaded files and loadable media</p>
<br /><p class="MsoNormal">- It will disable our computer, add, modify and delete files or reformat the hard disk, steal addresses and etc.</p>
<br /><p class="MsoNormal">
<br /></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMaLluCmB-hdqxr0PBRdabZnwH7RKXxJ70niQx8hkni38CcwKikqB6yd37KcTVlRGivuud47S_IcMu4dADukU0-ArkcSQHEPKLdvcBfioRhHaicpyGsXOYpcYXknC5aD_iz0Lopc9athEV/s1600-h/troian_virus_worm_429035.jpg"><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 200px; DISPLAY: block; HEIGHT: 141px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5348298047729976402" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMaLluCmB-hdqxr0PBRdabZnwH7RKXxJ70niQx8hkni38CcwKikqB6yd37KcTVlRGivuud47S_IcMu4dADukU0-ArkcSQHEPKLdvcBfioRhHaicpyGsXOYpcYXknC5aD_iz0Lopc9athEV/s200/troian_virus_worm_429035.jpg" /></a>
<br /><p class="MsoNormal"><o:p></o:p></p>
<br /><p class="MsoNormal"><u><span style="color:red;"><strong>3. Trojan Horse<o:p></o:p></strong></span></u></p>
<br /><p class="MsoNormal">- installed on a computer and allow remote attacker via “backdoor” when the computer user online and access or destroy any information stored. Alternatively, the Trojan can be programmed to automatically send any information on our PCs back to the attacker. Information that might be stolen is states in the website I provide below: </p>
<br /><p class="MsoNormal"><a href="http://www.guard-privacy-and-online-security.com/how-do-you-stay-safe-on-the-internet.html">http://www.guard-privacy-and-online-security.com/how-do-you-stay-safe-on-the-internet.html</a></p>
<br /><p class="MsoNormal"><o:p></o:p></p>
<br /><p class="MsoNormal"><u><span style="color:red;">
<br /></span></u></p>
<br /><p class="MsoNormal"><u><span style="color:red;"><strong>4. Spyware</strong></span></u></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnpSIGgueStqaEKNKZ9HomakZjBlub8i5ch1lxGvW3iMPFIXPT94yZzmrxD081aLmIabJa4aIj1l6xJEPZXtVIqTM-icGNBD3MtPqm5sP1Dufylzo_JG_IinW5W0pivd_S5rEcVIBSl5PL/s1600-h/image6.jpg"><img style="MARGIN: 0pt 0pt 10px 10px; WIDTH: 166px; FLOAT: right; HEIGHT: 200px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5348302754573787314" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnpSIGgueStqaEKNKZ9HomakZjBlub8i5ch1lxGvW3iMPFIXPT94yZzmrxD081aLmIabJa4aIj1l6xJEPZXtVIqTM-icGNBD3MtPqm5sP1Dufylzo_JG_IinW5W0pivd_S5rEcVIBSl5PL/s200/image6.jpg" /></a>
<br /><p class="MsoNormal">- can scan our hard drive and search programs for <span style="font-size:0;">sensitive information</span> like credit card, bank information and personal details.</p>- It can change our browser's home page, scan browser history for web sites visited and monitor Internet activity we have did. The information will <span style="font-size:0;">transmit to the attacker</span>.
<br />
<br /><p class="MsoNormal"><o:p></o:p></p>
<br /><p class="MsoNormal"><u><span style="color:red;">
<br /></span></u></p>
<br /><p class="MsoNormal"><u><span style="color:red;"><strong>5. Natural Disaster<o:p></o:p></strong></span></u></p>
<br /><p class="MsoNormal">- other than those hacker and viruses, data also will lost due to fire, lightning strike, floods, hurricane, earthquake, tornados and solar flares.</p><p class="MsoNormal">
<br /></p><p class="MsoNormal"><b><span style="COLOR: rgb(153,51,0)"><span style="FONT-STYLE: italic">Even though our data is prove to be unsafe but there still some way to prevent lost of data:</span><o:p></o:p></span></b></p><p class="MsoNormal">
<br /></p><p class="MsoNormal"><u><span style="color:blue;"><strong>1. Antivirus software
<br /></strong></span></u></p>
<br /><p class="MsoNormal">
<br /><u><span style="color:blue;"><o:p></o:p></span></u></p>
<br /><p class="MsoNormal"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdXSC7VB9zUhM_DgCmnvG22Tl306SzPBGz3qr8vQRkONntSCpccLRdz2dZAe5MFDpWVz6dqurUZe_ZWlluiSOES23RmNqknPpeMwPMKgu-LGaj7O67bugTLR1ckSWHkmEACawks0Txw0zc/s1600-h/1221749462_antivirus_update.jpg"><img style="MARGIN: 0pt 10px 10px 0pt; WIDTH: 200px; FLOAT: left; HEIGHT: 168px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5348299556718690978" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdXSC7VB9zUhM_DgCmnvG22Tl306SzPBGz3qr8vQRkONntSCpccLRdz2dZAe5MFDpWVz6dqurUZe_ZWlluiSOES23RmNqknPpeMwPMKgu-LGaj7O67bugTLR1ckSWHkmEACawks0Txw0zc/s200/1221749462_antivirus_update.jpg" /></a>- Example like Mc Afee, Norton Antivirus, Kaspersky, Grisoft AVG, and etc.</p>
<br /><p class="MsoNormal">- But <span style="color:fuchsia;">MAKE SURE it is UPDATED!!!<o:p></o:p></span></p>
<br /><p class="MsoNormal"><span style="color:red;"><o:p></o:p></span></p>
<br /><p class="MsoNormal"><u><span style="color:blue;">
<br /></span></u></p><p>
<br /><u><span style="color:blue;"></span></u> </p><p>
<br /> </p><p class="MsoNormal"><u><span style="color:blue;"><strong></strong></span></u></p><p class="MsoNormal"><u><span style="color:blue;"><strong></strong></span></u></p><p class="MsoNormal"><u><span style="color:blue;"><strong></strong></span></u></p><p class="MsoNormal"><u><span style="color:blue;"><strong></strong></span></u></p><p class="MsoNormal"><u><span style="color:blue;"><strong></strong></span></u></p><p class="MsoNormal"><u><span style="color:blue;"><strong>2. Online Backup or </strong><?xml:namespace prefix = st1 /><st1:place st="on"><strong><st1:placename st="on">Database</st1:placename> </strong><st1:placetype st="on"><strong>Center
<br /></p></strong></st1:placetype></st1:place></span></u>
<br />
<br /><p class="MsoNormal"><u><span style="color:blue;"><strong>3. Firewalls (normally come with window)<o:p></o:p></strong></span></u></p>
<br />
<br /><p class="MsoNormal">- Example: <a href="http://www.symantec.com/sabu/nis/npf/"><span style="TEXT-DECORATION: none;color:#000000;" >Norton Personal Firewall</span></a> (part of Norton Internet Security), <a href="http://www.zonelabs.com/"><span style="TEXT-DECORATION: none;color:#000000;" >Zone Labs ZoneAlarm</span></a> (a free version is available), <a href="http://www.mcafee.com/myapps/firewall/ov_firewall.asp"><span style="TEXT-DECORATION: none;color:#000000;" >McAfee</span></a>, <a href="http://smb.sygate.com/products/spf_standard.htm"><span style="TEXT-DECORATION: none;color:#000000;" >Sygate</span></a> and <a href="http://www.tinysoftware.com/"><span style="TEXT-DECORATION: none;color:#000000;" >Tiny</span></a>.
<br /></p><p class="MsoNormal"><u><span style="color:blue;"><strong>4. Adware and Spyware Protection</strong></span></u><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7T5lC1TImJyOc5V_s6hX4Di4S3BTiRdXqnJsI6qjOUb_4NONl-GkGCl6MS5_CwM6MlGIIhHATRMZnx8SIFNYuTl2BzIII77j8HAy0txtBi1gHh3BESWjpy50jBF-JmYpXJ8DVQdKMOgvn/s1600-h/00000113866-LavasoftAdAwareSEPlus-large.jpeg"><img style="MARGIN: 0pt 0pt 10px 10px; WIDTH: 200px; FLOAT: right; HEIGHT: 200px; CURSOR: pointer" id="BLOGGER_PHOTO_ID_5348300342214710866" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7T5lC1TImJyOc5V_s6hX4Di4S3BTiRdXqnJsI6qjOUb_4NONl-GkGCl6MS5_CwM6MlGIIhHATRMZnx8SIFNYuTl2BzIII77j8HAy0txtBi1gHh3BESWjpy50jBF-JmYpXJ8DVQdKMOgvn/s200/00000113866-LavasoftAdAwareSEPlus-large.jpeg" /></a>
<br /><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CUsers%5CUser%5CAppData%5CLocal%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml">
<br /></p><p class="MsoNormal">- Example: <a href="http://www.lavasoftusa.com/software/adaware/"><span style="TEXT-DECORATION: none;color:#000000;" >Lavasoft A</span></a><span style="TEXT-DECORATION: none;color:#000000;" >dAware</span> and <a href="http://www.safer-networking.org/en/spybotsd/"><span style="TEXT-DECORATION: none;color:#000000;" >SpyBot Search and Destroy</span></a>.</p>
<br /><p class="MsoNormal"><u><span style="color:blue;"><strong>5. Management Effort</strong></span></u></p><p class="MsoNormal"><strong><u><span style="color:#0000ff;"></span></u></strong></p><p class="MsoNormal">- Place the database in higher floor in the building to avoid disaster and also set security access to avoid unauthorized person go in the database. Furthermore, CCTV is set at database room and password encryption be use to protect data being access or hack. </p><p class="MsoNormal"></p><p class="MsoNormal"></p><p class="MsoNormal"></p><p class="MsoNormal"></p><p class="MsoNormal">Refences:</p>
<br /><p class="MsoNormal"><a href="http://www.remotedatabackups.com/why/disaster_prevention.htm">http://www.remotedatabackups.com/why/disaster_prevention.htm</a> (way of prevention)</p>
<br /><p class="MsoNormal"><a href="http://www.remotedatabackups.com/why/risks_natural.htm">http://www.remotedatabackups.com/why/risks_natural.htm</a> (natural disaster) </p>
<br /><p class="MsoNormal"><a href="http://www.guard-privacy-and-online-security.com/how-do-you-stay-safe-on-the-internet.html">http://www.guard-privacy-and-online-security.com/how-do-you-stay-safe-on-the-internet.html</a> (Viruses, Worm, Spyware, Trojan horse)</p>
<br /><p class="MsoNormal"><a href="http://www.ecommercetimes.com/story/31171.html?welcome=1213803356&wlc=1245069883">http://www.ecommercetimes.com/story/31171.html?welcome=1213803356&wlc=1245069883</a> (password problem)</p>
<br />
<br /><p class="MsoNormal"><o:p></o:p></p>
<br />
<br /><p class="MsoNormal"><o:p></o:p></p>ANG BOON YONGhttp://www.blogger.com/profile/07267099735335331864noreply@blogger.com1tag:blogger.com,1999:blog-8374589692573383949.post-48153314308749087232009-06-15T22:10:00.005+08:002009-06-15T23:27:35.964+08:00An example of an E-Commerce success and its causesWhen talking about E-commerce, first thing that come to our mind is to run a trading through online via internet. However, if you asking me an example of an E-commerce success, there will be no doubt for me to say that, <a href="http://www.amazon.com/">Amazon.com</a>!<br /><br />Why Amazon would be one of the successful E-commerce? According to a <a href="http://blog.compete.com/2009/01/20/amazon-prime-holiday-shopping/">study </a>by <a href="mailto:mpace@compete.com">Matt Pace</a>, except the auction site (<a href="http://www.ebay.com/"><span style="color: rgb(255, 0, 0);">e</span><span style="color: rgb(0, 0, 153);">B</span><span style="color: rgb(255, 255, 51);">a</span><span style="color: rgb(51, 255, 51);">y</span></a>), Amazon is the top online retailer in the year 2008!<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinlGGKNp01PCkMjW5ZnQYIyg5zcsT3wfh6RG0c3u0qCqSuOvrR7yxarYkVwS64qUNQ4kyMXfnrweczxkoCIFjL4hRGkwBC-VbHt6JHD56jjVdn6MnWbiDLYBaQc61j7u-sdWufNNzMCOk2/s1600-h/Amazon+Diagram.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 194px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinlGGKNp01PCkMjW5ZnQYIyg5zcsT3wfh6RG0c3u0qCqSuOvrR7yxarYkVwS64qUNQ4kyMXfnrweczxkoCIFjL4hRGkwBC-VbHt6JHD56jjVdn6MnWbiDLYBaQc61j7u-sdWufNNzMCOk2/s320/Amazon+Diagram.jpg" alt="" id="BLOGGER_PHOTO_ID_5347556791230738162" border="0" /></a><br />Other than that, there is too a diagram to support on why Amazon able to be the top retailer in E-commerce, which is the session share and the visits per person that conducted in December 2008.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieP091tYjXFm1a73yVKu6w2uApcd-AQaX-Qg7i0SoEk_EYsOkDuDcmZFUed6xijY8SMaruji1lKkvMbekk2YIIRgihbn_5KpGgqc4yh0PD2XtIj7ZhGcMtO6PUVFVHUcyblSM3cwmrQVs7/s1600-h/Amazon+Share.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 254px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieP091tYjXFm1a73yVKu6w2uApcd-AQaX-Qg7i0SoEk_EYsOkDuDcmZFUed6xijY8SMaruji1lKkvMbekk2YIIRgihbn_5KpGgqc4yh0PD2XtIj7ZhGcMtO6PUVFVHUcyblSM3cwmrQVs7/s320/Amazon+Share.jpg" alt="" id="BLOGGER_PHOTO_ID_5347556960023373714" border="0" /></a>We had known that Amazon is one of the successes E-commerce, now, let's find out why it deserves such a victory.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0ZiFGugucRmJr9sm25Fs6XYZdHZyYhgXlGtJ8OPYF8VlEZ-YY41RXmeiLy-xckMgfhtd3Afok3EXW-UYP5Y-IbJTmDJyJkr8cQBLSCnFbbRClpJfKHc0WESclOQyumMwAoFXt2Bj-z4RM/s1600-h/Departments.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 150px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0ZiFGugucRmJr9sm25Fs6XYZdHZyYhgXlGtJ8OPYF8VlEZ-YY41RXmeiLy-xckMgfhtd3Afok3EXW-UYP5Y-IbJTmDJyJkr8cQBLSCnFbbRClpJfKHc0WESclOQyumMwAoFXt2Bj-z4RM/s320/Departments.jpg" alt="" id="BLOGGER_PHOTO_ID_5347569940147975522" border="0" /></a><br /><br /><br /><br />I wonder if you ever tried to make your surf in <a href="http://www.amazon.com/">Amazon.com</a>, however, it will not be a big issue of not surfing it before. First of all, I like the way Amazon categorized its products in 12 main departments. Inside these departments, we can easily find the product we wished to purchase. There are a lot of product available, such as books, movies, MP3, computers, electronic devices, home accessories, grocery, toys, motor vehicles, and some other which will out of your expectation. All these can be found out in Amazon!<br /><br /><br /><br /><br /><br /><br /><br />Second thing that Amazon can last until now is, it provided the shipping delivery globally. Although its head quarter was located at Seattle, Washington, USA; however, for us Malaysian, we still able to make our purchase there. Amazon provided a couple of country lists for users to check how was the charges per shipment and per item. It too provided the standard shipping days for every different countries. Amazon will get a competitive advantage as it globalizes its business.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKDPxtPWC3jHbQuFlfCoHRHjOjP-GLBH95BniUp7j9msyHw8YvVmjxVWHIoY7eBq7VW7LgeNftlmzL9jlu_2KH63McoWezCLxMG6SlU1sz7iZQyHTO0bVYXV7CtQE7kReSSfSwG0l2QS6f/s1600-h/Shipment.jpg"><img style="cursor: pointer; width: 320px; height: 219px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKDPxtPWC3jHbQuFlfCoHRHjOjP-GLBH95BniUp7j9msyHw8YvVmjxVWHIoY7eBq7VW7LgeNftlmzL9jlu_2KH63McoWezCLxMG6SlU1sz7iZQyHTO0bVYXV7CtQE7kReSSfSwG0l2QS6f/s320/Shipment.jpg" alt="" id="BLOGGER_PHOTO_ID_5347572615586474130" border="0" /></a><br /><br /><br />Other than that, Amazon itself too provided some features and services. Not just products, even services also can be found in Amazon, such as broadband services, financial services, photo services, and travel services. A variety of services are provided, all you need to do is to move ur cursor and click on the item, further details can be found after you click on it. Not just that, you too can refer some reviews that had been posted by other users in the website too!<br /><br />There's one important thing that been used in Amazon, as other E-commerce website did so, which is the Shopping Cart.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgib7ZkTKsh7BKRlV9Znl1_3lKWuTJHPzYS1GJP3a4bajC_B-bzg-JbKYr9cB90rL-CCeC-t2lBZPEgAA49C9CiKE1wGoDooeQyJUppWZL-WJCY8P4yv_4EGO9DEOpKr4oMGKXYYC7zeVzA/s1600-h/Shopping+Cart.jpg"><img style="cursor: pointer; width: 108px; height: 40px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgib7ZkTKsh7BKRlV9Znl1_3lKWuTJHPzYS1GJP3a4bajC_B-bzg-JbKYr9cB90rL-CCeC-t2lBZPEgAA49C9CiKE1wGoDooeQyJUppWZL-WJCY8P4yv_4EGO9DEOpKr4oMGKXYYC7zeVzA/s320/Shopping+Cart.jpg" alt="" id="BLOGGER_PHOTO_ID_5347573492851322402" border="0" /></a> Without a shopping cart, it will be troublesome as we need to complete each single transaction, before we continue on the next item. With the aid of shopping cart, it enables us to do our shopping all at once, and complete the transactions in one shot. Time had just been save with shopping cart~<br /><br />Headache of don't know what category your item belong? Or you have certain specific item to purchase on? All these will not be a problem, as Amazon too provided a search engine, which enable users to type in their needs, to ease them from searching 1 page by 1 page.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgxyGItJhLxQwkeQRWlqCPuUE4O1stdQR9rv5Ap3ae62PHbITDh3r2BieWH8tWs5Znh9DSNGOQ7v9HiO-IbmgHRBLEdn14M-2a4py4yryJKEqHVbq22Zek8cQxAAiCVeZNyyaIFCAy8nUd/s1600-h/Search+Engine.jpg"><img style="cursor: pointer; width: 641px; height: 28px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgxyGItJhLxQwkeQRWlqCPuUE4O1stdQR9rv5Ap3ae62PHbITDh3r2BieWH8tWs5Znh9DSNGOQ7v9HiO-IbmgHRBLEdn14M-2a4py4yryJKEqHVbq22Zek8cQxAAiCVeZNyyaIFCAy8nUd/s400/Search+Engine.jpg" alt="" id="BLOGGER_PHOTO_ID_5347575825372780914" border="0" /></a><br />If you had overlooked some items in previous shopping, nevermind, Amazon had inserted a column of your recent history. So, we just browse our history at there rather than click on "Back" button on our Internet Explorer.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPXr-Jaqk7MIdmLA7zyWYhuZXpTQQVEdNlyJXRwSJTaHXNtvcsNY1K3U7oe0Cy-NLS3aQ3cQcoMIFJlCHQIVtT0f_MnrTbH4tXTjEWC62d5Sa6F14LwmWIJtbJS8T8lFV73BPlpFbqOovu/s1600-h/History.jpg"><img style="cursor: pointer; width: 644px; height: 215px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPXr-Jaqk7MIdmLA7zyWYhuZXpTQQVEdNlyJXRwSJTaHXNtvcsNY1K3U7oe0Cy-NLS3aQ3cQcoMIFJlCHQIVtT0f_MnrTbH4tXTjEWC62d5Sa6F14LwmWIJtbJS8T8lFV73BPlpFbqOovu/s400/History.jpg" alt="" id="BLOGGER_PHOTO_ID_5347575625075362914" border="0" /></a><br /><br />Several conveniences can be enjoyed in Amazon, and it too keeps upgrading the server to fulfill every single need of our users. So, without any hesitate, let's type in <a href="http://www.amazon.com/">www.amazon.com</a> and sign up an account for your shop today!! :-DTan Cheng Linghttp://www.blogger.com/profile/05676503683750291218noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-42784933849096982382009-06-15T14:43:00.005+08:002009-06-15T15:36:34.694+08:00An example of an E-Commerce Failure and its CausesThere are some successful virtual e-commerce companies such as eBay, Amazon.com and so on. However, there are also a large number of failures of e-commerce companies that are failed to continue their business through e-commerce. One of the shinning examples is kozmo.com.<br /><br /><br /><p><img id="BLOGGER_PHOTO_ID_5347442255299793602" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 229px; CURSOR: hand; HEIGHT: 90px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLMUH2OsV2uEkikti7ccz4k-q_DGJzoP8kq9Ilz27IOK1LdfyCHJ2_HsGX7f6HDBSmCr4JnstcwJx0JrIOx4wl5sUebVdmJaC08pf1Y6P6NSiPOV1a_54u-EOdwN23tpuRrGFCb67QCzo/s320/kozmocom.gif" border="0" /><br />Kozmo.com was a short-lived online store and delivery service that provided fast and friendly service. It was founded by young investment bankers Joseph Park and Yong Kang in 1997 when they wanted goodies from a convenience store delivered to their door. They started the business in March 1998 at New York City. The great idea of this company was that you could order anything at anytime and they will delivered direct to your house within one hour with free of delivery charge for any item.<br /><br />At the height of its business, the company operated in Atlanta, Chicago, Houston, San Francisco, Seattle, Portland, Boston, New York, Washington, D.C., San Diego, and Los Angeles in July 2007. It was popular with college student and young professionals. However, Kozmo.com ended it services in March 2001. The causes of failures are:<br /><br />(i) <span style="color:#3333ff;">Cost > Revenue</span><br />This is the main cause that brings to the failure of Kozmo. Kozmo offered free delivery charge and competitive prices to their customers for every product even the customer only buy a pack of snack. In case, the cost of delivery is more than the revenue that their earned. Kozmo was suffered sustainable financial loss due to the reason. Even though a $10 minimum charge was introduced after this, but that didn't stop it from closing in March 2001. Kozmo is learned too late that its primary attraction of free delivery charge to all customers was also its undoing.<br /><br />(ii) <span style="color:#3333ff;">Target consumers</span><br />Kozmo make a worst decision that stop to catering their main client which are middle class college-student due to the thought of target more upscale customer base who could afford expensive products. Indeed, college students were the customers that make up almost 76% of their sales.<br /><br />(iii) <span style="color:#3333ff;">Withdraw of investor</span><br />Investors promised to give a private funding of $30million to Kozmo but later on an investor had backed out of a $6million commitment. This has caused the merger deal with Los Angeles-based PDQuick collapsed when the funding that was promised to PDQuick did not materialize. </p><p>(iv) <span style="color:#3333ff;">Ambitious business plan and lack of planning</span><br />The company had overly ambitious plans for expansion and didn't stop them down quickly once capital dried up. Besides, Park and Kang were relatively inexperienced to manage an e-commerce business. They may have overestimated the amount of revenue it could gain from the market. The revenues that Kozmo generated from sales were insufficient to cover all the business expenses.<br /><br />As a conclusion, in order to success an e-commerce business, only has a creative idea without proper plans is insufficient. The use of business strategies, effectiveness in cost control, strong organizational, and efficiency in customer relationship management to meet the demands of its valuable customers are the key elements contribute to the success of e-commerce.</p><p><span style="color:#ff99ff;">References:</span></p><p><a href="http://www.thestandard.com/news/2008/05/29/where-are-they-now-kozmo-com">http://www.thestandard.com/news/2008/05/29/where-are-they-now-kozmo-com</a><br /><a href="http://en.wikipedia.org/wiki/Kozmo.com">http://en.wikipedia.org/wiki/Kozmo.com</a><br /><a href="http://news.cnet.com/2100-1017-255710.html">http://news.cnet.com/2100-1017-255710.html</a><br /><a href="http://www.cnet.com/1990-11136_1-6278387-1.html">http://www.cnet.com/1990-11136_1-6278387-1.html</a><br /><a href="http://www.businessweek.com/bwdaily/dnflash/apr2001/nf20010416_207.htm">http://www.businessweek.com/bwdaily/dnflash/apr2001/nf20010416_207.htm</a><br /></p>Ho SiaW TinGhttp://www.blogger.com/profile/04450327066867462878noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-36530750425246116772009-06-14T20:23:00.006+08:002009-06-15T14:26:44.990+08:00The history and revolution of e-commerce<div><img id="BLOGGER_PHOTO_ID_5347158736089948722" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 291px; CURSOR: hand; HEIGHT: 84px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRzZ1YOaiKUcoTz7H0Se53MZykYP0uDeilm28ufPFPaOgIeAgp3zTS1R-AOTujk4lPppkPJQGV-OBFwCToXkV8r5wN27xeiZ-MHwgG38eTaH3YJFTfxKiVeiyFcAQomvhBfb1STMgdfI6B/s200/evolution%2520of%2520man%2520from%2520chimp%2520to%2520computer%5B1%5D.jpg" border="0" /><br /><div>We often heard people saying about “e-com” nowadays, but do you all know what e-com stands for? E-com actually is <span style="color:#ff0000;">e-commerce</span> which means a technological-mediated exchange between parties whenever is individuals, organization or both. The exchange (e.g. product, services and information) may made either intra- or inter-organizational.<br /><br />Apart from knowing the definition, of course we also need to know a little about the history and revolution of e-commerce. In the early year of 1844, telegraph is use to send message throughout the world where e-commerce has not yet be emerged. Even though computer has existed in 1930an but the sharing of electronic data among geographically dispersed co<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlWV2qQMnTU58QNXz9bMGfjC9IOFZc3kzH0NRDiHgDSGJcsEgpvlfmHWGZsAfAZ0DQ_BBpew2ER8TPF6oIkEjLMGqpq1FxNS8jjBiDb8aNtJ71M0GGgpaUmPESQoUor6BYWDSl6DyUQam1/s1600-h/images.jpg"><img id="BLOGGER_PHOTO_ID_5347160201255382274" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 127px; CURSOR: hand; HEIGHT: 101px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlWV2qQMnTU58QNXz9bMGfjC9IOFZc3kzH0NRDiHgDSGJcsEgpvlfmHWGZsAfAZ0DQ_BBpew2ER8TPF6oIkEjLMGqpq1FxNS8jjBiDb8aNtJ71M0GGgpaUmPESQoUor6BYWDSl6DyUQam1/s200/images.jpg" border="0" /></a>mputer still cannot be implement. This happen because the software application of certain producer is not compatible with another producer. Thus, this hinders the data exchange between the computers that were not running the same computer software.<br /><br />Things become different when there is an extended uses of electronic fund transfer (EFT) which was introduced in 1970s. This enables the financial institution and organization to transfer their fund to their associates, business partner or employees. In 1980s, another system was invented which is Electronic Data Exchange (EDI). This allows the inter-company exchanges of document (purchase order, invoices). EDI has reduced cost on producer and distributor sides by the enhancement of purchase processes which they can optimize their stock in correlate with the demand. However, there are disadvantages where this system is expensive to maintain and hard to compatible with other software.<br /><br />A significant change happens during the yearly 1990. <strong>Tim-Berners Lee</strong> has written the first web-Browser which is World Wide Web (WWW), more about: <span style="color:#cc33cc;"><a href="http://en.wikipedia.org/wiki/World_Wide_Web">http://en.wikipedia.org/wiki/World_Wide_Web</a></span><br />; The US government allowed public access to the internet; and introduction of software named Netscape was introduced in 1994 which provides user a simple browser to serve the internet. This truly global network has created a market for a business where there are two big online stores <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP2lYvXyLgRJypRjRYB9Epzvb4saKGVc1ehE3-7dcUUeK2Mzl3W_RsCQyB6GSpgXGq0hfkJFj0Vc8lguvqIqgoq9ugF1OURbR5Y_oFyFy5CB7aG9lw-ZIIxPb4Y9pf2165Aaf8JHC7jlr3/s1600-h/www.jpg"><img id="BLOGGER_PHOTO_ID_5347161173106568626" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 107px; CURSOR: hand; HEIGHT: 107px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhP2lYvXyLgRJypRjRYB9Epzvb4saKGVc1ehE3-7dcUUeK2Mzl3W_RsCQyB6GSpgXGq0hfkJFj0Vc8lguvqIqgoq9ugF1OURbR5Y_oFyFy5CB7aG9lw-ZIIxPb4Y9pf2165Aaf8JHC7jlr3/s200/www.jpg" border="0" /></a>which is Amazon and E-bay was launched in 1995 and more and more offline store start their business on line. This happen because the WWW provides a user friendly interface and it actually can altered the way the information in the internet is presented such as they can add pictures, video, animation, music and hyperlink in their web page.<br /><br />In conclusion, e-commerce has expanded from B2B to B2C, C2B, and C2C in recently years. As we can see, more and more organization are started to conduct their business through internet. This included McDonald, Dominos Pizza which provide on-line order services or the other example is Maybank which provides on-line banking service (Maybak2U). E-commerce seems to be a potential way to conduct a business in a technological world nowadays. However, security issues may always happen in an internet world. So, in order to expand the use of e-commerce, more attention needs to be emphasized in that aspect to light up the future of e-commerce. </div></div>Goh Mei Chinhttp://www.blogger.com/profile/03514783669125897469noreply@blogger.com0tag:blogger.com,1999:blog-8374589692573383949.post-55922258433819079072009-06-11T19:01:00.019+08:002009-06-15T22:16:07.140+08:00~*Revenue Model of Google, Amazon and ebay*~<p class="MsoNormal" style="color: rgb(51, 102, 255);">hi hi everyone, this is my second post since I have introduce to all of you a little about myself, hope after reading that all of you will understand me more. Time past very fast, I already attended my second e-commerce lecture class and I found it is quite a interest subject that can let me gain more knowledge about what e-commerce is. So, today I would like to share with all of you about the revenue models of e-commerce, which I feel for business student it is quite a interested topic to know how those website generate revenue by the services they provide. Revenue models specifically describe different techniques used in generating income from the publisher's websites. The major revenue models is following:<o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br />1. Sales Revenue Model<br />2. Transactions Fees Revenue Model<br />3. Subscription Fees Revenue Model<br />4. Advertising Fees Revenue Model<br />5. Affiliate Fees Revenue Model<br /><br />The explanation of those models can be found in below this website<br /><u><a href="http://ecommerze.blogspot.com/2007/04/making-money-online-e-commerce-revenue.html">http://ecommerze.blogspot.com/2007/04/making-money-online-e-commerce-revenue.html</a><br /></u><br />Now, I will like explain some website and what are their revenue models such as Google, Amazon, and also eBay.<br /><br /><u><span style="color: rgb(255, 102, 102);">1. Google</span><br /></u>Google is an website that major in offer targeted advertising and Internet search solution and the income that earn by Google is normally is from advertising so it is adopt the Advertising Fees revenue models. Part of the revenue is earn by Google AdWords. Google AdWords is a pay per click advertising program of Google designed to allow the advertisers to present advertisements to people, and normally it is shown under "Sponsored link" on the right side of the screen or something is just above the main search result. It is an online advertising payment model in which payment is based on qualifying click-throughs. An advertiser has to pay every time his advertisement receives a click.</p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="color: rgb(51, 102, 255);" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj03lafLLA5eFULUxDX5kAgqkSYnrJ1VFgKSNSHuFKFPUdhmozjlEvGpkE88cb6EJuOKKvTx60t13iuXy5Apxti9awHdKDVtS6B4BrOK5s838TbnxpjROrXTOp_5V3o_dKTIJZj8Yt72qxr/s1600-h/google-adwords.jpg"><img id="BLOGGER_PHOTO_ID_5346065755400031922" style="margin: 0px auto 10px; display: block; width: 200px; cursor: pointer; height: 183px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj03lafLLA5eFULUxDX5kAgqkSYnrJ1VFgKSNSHuFKFPUdhmozjlEvGpkE88cb6EJuOKKvTx60t13iuXy5Apxti9awHdKDVtS6B4BrOK5s838TbnxpjROrXTOp_5V3o_dKTIJZj8Yt72qxr/s200/google-adwords.jpg" border="0" /></a> <p class="MsoNormal" style="color: rgb(51, 102, 255);"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghPFgXvqi-MBnlvve3bylHP1cYR-Qav9Gh4X9i6hyphenhyphenvJkTUvmsye_r4tHR1X5uzCTRnW5C1OuN8JCsrbyvzHFeQKm9afaHsvl_GWACX-8wqXTt9WfiNv1TaCO1sTxz-5fyO52fnuyPioqjL/s1600-h/google-adwords.jpg"><span style="text-decoration: none;"><v:stroke joinstyle="miter"><v:formulas><v:f eqn="if lineDrawn pixelLineWidth 0"><v:f eqn="sum @0 1 0"><v:f eqn="sum 0 0 @1"><v:f eqn="prod @2 1 2"><v:f eqn="prod @3 21600 pixelWidth"><v:f eqn="prod @3 21600 pixelHeight"><v:f eqn="sum @0 0 1"><v:f eqn="prod @6 1 2"><v:f eqn="prod @7 21600 pixelWidth"><v:f eqn="sum @8 21600 0"><v:f eqn="prod @7 21600 pixelHeight"><v:path extrusionok="f" gradientshapeok="t" connecttype="rect"><o:lock ext="edit" aspectratio="t"><v:imagedata href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghPFgXvqi-MBnlvve3bylHP1cYR-Qav9Gh4X9i6hyphenhyphenvJkTUvmsye_r4tHR1X5uzCTRnW5C1OuN8JCsrbyvzHFeQKm9afaHsvl_GWACX-8wqXTt9WfiNv1TaCO1sTxz-5fyO52fnuyPioqjL/s200/google-adwords.jpg" src="file:///C:%5CUsers%5CUser%5CAppData%5CLocal%5CTemp%5Cmsohtml1%5C01%5Cclip_image001.jpg"></v:imagedata></o:lock></v:path></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:formulas></v:stroke></span></a><span style="color: rgb(0, 0, 255);"></span><o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);">Besides, Google also generated revenue by Google Answer last time. I means last time It is because google no longer earn from goolge answer anymore due to the web already collapse. Froogle is a service from Google that makes it easy to find information about products for sale online, while Google answer allow customers to ask questions, offer a price for an answer for the question they ask, and researchers answer them. Google keeps 25% of the payment, and the rest send to the Researchers. <o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="color: rgb(51, 102, 255);" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidp5aAnh6YMsZ3nOm_pLHG1m-ybDhMEEBAmXKmdYiadvR0qbMcldQ4G1B4VYpoHMqYATDz4ZU57ikmgFDJinpO4sCYbmRW6tPI8yA13gk54NSU5T-BbYHffO4kNS4iGxm0EryHkO7CJH53/s1600-h/146101-answer.jpg"><img id="BLOGGER_PHOTO_ID_5346066742242532738" style="margin: 0pt 0pt 10px 10px; float: right; width: 200px; cursor: pointer; height: 150px;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidp5aAnh6YMsZ3nOm_pLHG1m-ybDhMEEBAmXKmdYiadvR0qbMcldQ4G1B4VYpoHMqYATDz4ZU57ikmgFDJinpO4sCYbmRW6tPI8yA13gk54NSU5T-BbYHffO4kNS4iGxm0EryHkO7CJH53/s200/146101-answer.jpg" border="0" /></a> <p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /><v:imagedata href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6TazBdmAZLxJuDgpsf2iCUvT_6975COqUXd5knA7pegIYq7WvOquRv_fkvDfV2O8-AJkVNhO56SUCI1CMasVk0ruwmlKurggj1ynm2qT8vZgEfKrihMjKftZ9c4y4Z2VxBUGnCZp_rSZU/s200/146101-answer.jpg" src="file:///C:%5CUsers%5CUser%5CAppData%5CLocal%5CTemp%5Cmsohtml1%5C01%5Cclip_image002.jpg"></v:imagedata></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="color: rgb(51, 102, 255);" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjIT4Zp2euwfddn7AWfE-SwNEPn020SyxQgJeWCrZHYNg3VyL0POvok5_nEjqUFfuxYfqehZJCn6c1jWqH9d905NOY_likDQ_uZb5_jJSCxZ8A7uWprdfK1DuvhfCa-C7o-4R-n4ACXsbX/s1600-h/froogle.gif"><img id="BLOGGER_PHOTO_ID_5346065759665055026" style="margin: 0px auto 10px; display: block; width: 200px; cursor: pointer; height: 159px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjIT4Zp2euwfddn7AWfE-SwNEPn020SyxQgJeWCrZHYNg3VyL0POvok5_nEjqUFfuxYfqehZJCn6c1jWqH9d905NOY_likDQ_uZb5_jJSCxZ8A7uWprdfK1DuvhfCa-C7o-4R-n4ACXsbX/s200/froogle.gif" border="0" /></a> <p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><o:p></o:p></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="color: rgb(51, 102, 255);" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyQBatG0uHupqb8WI218lkz9XmQstSLIBjt7P4_HGkm7prHthKJwwmHrWlxYGq4X8bH42V5jqxV5LvSzfkTp7M64EuSqzFOCCG_Yd0_MGHL1BmszQ_oFRfil_tke3LINasPviOoNNCkfVL/s1600-h/amazon+logo.jpg"><img id="BLOGGER_PHOTO_ID_5346065764608661826" style="margin: 0px auto 10px; display: block; width: 200px; cursor: pointer; height: 79px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyQBatG0uHupqb8WI218lkz9XmQstSLIBjt7P4_HGkm7prHthKJwwmHrWlxYGq4X8bH42V5jqxV5LvSzfkTp7M64EuSqzFOCCG_Yd0_MGHL1BmszQ_oFRfil_tke3LINasPviOoNNCkfVL/s200/amazon+logo.jpg" border="0" /></a> <p class="MsoNormal" style="color: rgb(51, 102, 255);"><o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_iKw72zNyF_EQXWurZDXnb6IoDHNAr-ZgtPacsq6QOsveu8iIBAomxRbt4wjYW-tGdbSh2t5yMDGqzYwBfxY5vOR_UBxxQB8SRh5vVvzihDnsiT8Fs7nTR89krsBOpQLxrVKOk8tkA0lG/s1600-h/froogle.gif"><span style="text-decoration: none;"><v:imagedata href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_iKw72zNyF_EQXWurZDXnb6IoDHNAr-ZgtPacsq6QOsveu8iIBAomxRbt4wjYW-tGdbSh2t5yMDGqzYwBfxY5vOR_UBxxQB8SRh5vVvzihDnsiT8Fs7nTR89krsBOpQLxrVKOk8tkA0lG/s200/froogle.gif" src="file:///C:%5CUsers%5CUser%5CAppData%5CLocal%5CTemp%5Cmsohtml1%5C01%5Cclip_image005.png"></v:imagedata></span></a><span style="color: rgb(0, 0, 255);"></span><o:p><a href="http://organicspam.com/google_revenue_model.asp">http://organicspam.com/google_revenue_model.asp</a></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><o:p></o:p></p><p class="MsoNormal" style="color: rgb(255, 102, 102);">2. Amazon</p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /><o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMQJAAv17XaHglebVIYtwHOIgyWWVa5onLAEamprycrlO6J8i_yZvOTqig42supJsh9XYryqcyfJ5SjoOJQq3QdoKx0dzMbrTXBqS38zY742twD35Xgts-vG1gviaCuJSdLl7w9uwKhqEa/s1600-h/Amazon.com_HomePage.gif"><img id="BLOGGER_PHOTO_ID_5346066308190480290" style="margin: 0pt 10px 10px 0pt; float: left; width: 200px; cursor: pointer; height: 135px;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMQJAAv17XaHglebVIYtwHOIgyWWVa5onLAEamprycrlO6J8i_yZvOTqig42supJsh9XYryqcyfJ5SjoOJQq3QdoKx0dzMbrTXBqS38zY742twD35Xgts-vG1gviaCuJSdLl7w9uwKhqEa/s200/Amazon.com_HomePage.gif" border="0" /></a>It is American based multinational electronic commerce company and it started since 90s and started as a online bookstore but soon diversified to product lines of<span style="color: rgb(51, 102, 255);"> </span><a title="VHS" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/VHS"><span style="text-decoration: none;">VHS</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="DVD" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/DVD"><span style="text-decoration: none;">DVD</span></a><span style="color: rgb(51, 102, 255);">, music </span><a title="Compact disc" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Compact_disc"><span style="text-decoration: none;">Cd's</span></a><span style="color: rgb(51, 102, 255);"> and </span><a title="MP3" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/MP3"><span style="text-decoration: none;">MP3s</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="Computer software" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Computer_software"><span style="text-decoration: none;">computer software</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="Video game" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Video_game"><span style="text-decoration: none;">video games</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="Consumer electronics" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Consumer_electronics"><span style="text-decoration: none;">electronics</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="Clothing" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Clothing"><span style="text-decoration: none;">apparel</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="Furniture" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Furniture"><span style="text-decoration: none;">furniture</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="Food" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Food"><span style="text-decoration: none;">food</span></a><span style="color: rgb(51, 102, 255);">, </span><a title="Toys" style="color: rgb(51, 102, 255);" href="http://en.wikipedia.org/wiki/Toys"><span style="text-decoration: none;">toys</span></a><span style="color: rgb(255, 255, 102);"><span style="color: rgb(51, 102, 255);">,</span> </span>etc. The revenue model of Amazon is different from the google, it is because Amazon main business activities is selling product online, so the revenue generate normally is under Sales Revenue Model and Transactions Fees Revenue Model. Amazon based on the selling price, transaction fee, and variable closing fee. will determined how much commission fees to be charge and in order to earn revenue from it.</p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="color: rgb(51, 102, 255);" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSGdZzNY98fQLcDeZon16r0vAMwnM3ZysgpVt5zspBaNcCiLcvNUtWTREyxxFhPkH0Kabz810tpdfSDWzmdK2vShyqb7RxQCwYdZi22YmYTdXU1mY5Sm8Au6FbUFk8t1c2WmIF7Dd-R-cb/s1600-h/amazoncom-warehouse.jpg"><img id="BLOGGER_PHOTO_ID_5346066739894010210" style="margin: 0pt 0pt 10px 10px; float: right; width: 200px; cursor: pointer; height: 150px;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSGdZzNY98fQLcDeZon16r0vAMwnM3ZysgpVt5zspBaNcCiLcvNUtWTREyxxFhPkH0Kabz810tpdfSDWzmdK2vShyqb7RxQCwYdZi22YmYTdXU1mY5Sm8Au6FbUFk8t1c2WmIF7Dd-R-cb/s200/amazoncom-warehouse.jpg" border="0" /></a> <p class="MsoNormal" style="color: rgb(51, 102, 255);"><o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><p class="MsoNormal" style="color: rgb(51, 102, 255);">In addition, Amazon also using Affiliates Revenue Model to generate revenue by their website. It is the first online business that set up an affiliate marketing program. allows website owners to create an online store on their site but it does not allow website owners to sell their own products directly. Website owners can pick products from Amazon’s store and earn referral fees on the products purchased by their readers. The fee structure product price ranges from 4% to 10% of the product price. </p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><a href="http://en.wikipedia.org/wiki/Amazon.com">http://en.wikipedia.org/wiki/Amazon.com</a><br /><br /><u><span style="color: rgb(255, 102, 102);">3. eBay</span><br /></u>eBay is an online auction and shopping website in which people and businesses buy and sell a broad variety goods and services worldwide. The primary sales took places by online auctions but it also includes a substantial segment of listings in the "Buy It Now" category. eBay generate revenue by Insertion Fees, Final Value Fees, Promotional Fees, plus several optional adornment fees, all based on various factors and scales.<o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><u3:p></u3:p>Below is the explanation of those fees:</p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="color: rgb(51, 102, 255);" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEial4oDwwewWPYCU23ylL7Nw937xqBcrdJj2REU3WrOuLqICj3GXXCG58b14tpcFqPg0vLVuWRFQFe_umVd75QUsx4mu6jtGEvA5IVubmdfl_kktLQiNWjmWL-MqC9HQ0YIW5cYs-uR9v-P/s1600-h/Media_Images_SampleOutputs_ebay.com_full.jpg"><img id="BLOGGER_PHOTO_ID_5346067470323401938" style="margin: 0px auto 10px; display: block; width: 138px; cursor: pointer; height: 200px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEial4oDwwewWPYCU23ylL7Nw937xqBcrdJj2REU3WrOuLqICj3GXXCG58b14tpcFqPg0vLVuWRFQFe_umVd75QUsx4mu6jtGEvA5IVubmdfl_kktLQiNWjmWL-MqC9HQ0YIW5cYs-uR9v-P/s200/Media_Images_SampleOutputs_ebay.com_full.jpg" border="0" /></a> <p class="MsoNormal" style="color: rgb(51, 102, 255);"><u3:p></u3:p>1. Insertion Fees – Fees charged when items listed on eBay and it is nonrefundable.<o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><u3:p></u3:p>2. Promotional Fees – Fees charged when additional listing options that help attract attention for an item.<o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><u3:p></u3:p>3. Final Value Fees – This is the commission charged to the seller once the auctions is end. <o:p></o:p></p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><u3:p></u3:p><br /></p><p class="MsoNormal" style="color: rgb(51, 102, 255);">eBay also generate revenue by direct advertisement means it also include Advertising Fees Revenue Model. The acquisition of PayPal, whose products allow the exchange of money over the Internet, brings additional transaction based fee revenue.</p><p class="MsoNormal" style="color: rgb(51, 102, 255);"><br /></p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" style="color: rgb(51, 102, 255);" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq6_sqK3gisCMEpLIoxNiSe0iLNbwWIuPi4N1rwTrSm13JbnZrzpvw03JzuSM46o-yH5pWZ4hpCDlprdZ6TRvAaJ79LDs0HGAf7dnN1U2mGA90p2-ZFmwLSd8JqDI0HOFrNiqCvMw968tp/s1600-h/paypal-big.jpg"><img id="BLOGGER_PHOTO_ID_5346067801485582050" style="margin: 0px auto 10px; display: block; width: 191px; cursor: pointer; height: 200px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiq6_sqK3gisCMEpLIoxNiSe0iLNbwWIuPi4N1rwTrSm13JbnZrzpvw03JzuSM46o-yH5pWZ4hpCDlprdZ6TRvAaJ79LDs0HGAf7dnN1U2mGA90p2-ZFmwLSd8JqDI0HOFrNiqCvMw968tp/s200/paypal-big.jpg" border="0" /></a> <p class="MsoNormal" style="color: rgb(51, 102, 255);"><o:p></o:p></p><a href="http://en.wikipedia.org/wiki/Ebay">http://en.wikipedia.org/wiki/Ebay</a>ANG BOON YONGhttp://www.blogger.com/profile/07267099735335331864noreply@blogger.com4tag:blogger.com,1999:blog-8374589692573383949.post-61557148212272150472009-06-04T10:27:00.004+08:002009-06-12T22:39:04.022+08:00About myself<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///C:%5CUsers%5CUser%5CAppData%5CLocal%5CTemp%5Cmsohtml1%5C01%5Cclip_filelist.xml"><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:usefelayout/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:宋体; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:SimSun; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} @font-face {font-family:"\@宋体"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 680460288 22 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:宋体;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal"><span style="color: blue;">Hi, everyone! I am Mei Chin who stays in Semenyih. I am an accounting student who is pursuing third year of my degree course. Reason for choosing this course was still a very blurred question for me to answer. Erm…actually I am not interesting in any scientific and literary subject. By the way, calculation is the only things that I interested with. Thus, the only choice that I have to choose is accounting. However, when I get into deeper about accounting course, I realized that it is not easy as I think which cause me a little regret in choosing it. Obviously, there is no way out and I am persuading myself now that I have to be persistent to finish my accounting courses in Utar, Sg. Long.
<br />
<br />After go through this few year of university life, I realized that stress often happen in our daily life especially when we are preparing for exam and doing assignment. Thus, I usually will overcome this problem by spending some times on my hobbies. Dancing is important for me. It like a magic. Every time when I was frustrated, I will dance for around an hour. Mystically, I feel relax and happy with a carefree minds after doing so.
<br />
<br />I often online at night. The first thing I do when I log in to my computer is click on the messenger icon. Hehe.... It time for me to chat now. Actually, I think MSN a a good media for us to keep in touch with our old friend. By using it, I can know whether my friend is doing well or we can keep updated to our recently activities OR in other words, we are gossiping about our friend. Besides, I also will log into my hotmail. Hotmail.... A very interesting place where we can update ourselves to event that happen surrounding us. Sometimes, it contains mail that alerts us to be careful about some "modern" tricks that done by those offenders. Apart from that, it also told us some miraculous things that happen around the world. This make me feel interesting in reading my e-mail. The best thing is we not only can know so much novelty things but also can share with our friend by forwarding the e-mail.
<br />
<br />Another web that i will surf is friendster.com. Although everyone now is switching from friendster to facebook but I prefer to stay with friendster because facebook for me is a little of complicated. This is also a very good place for me to search for my primary friend who has lost contact with me. Luckily, I am able to find 10 people of my primary school friends. I was so happy where we are able to organize a reunion dinner for our primary classmate.
<br />
<br />Besides of the web that i stated above, I will also surf youtube.com. Youtube, a GOOD GOOD place for me to watch for latest music video of my idol and the most important things is it is free of charge. I can download their latest album and keep updated with their latest news. As a student, I survive hard to make sure that I am not over budget every month. Moreover, an album although not considered very expensive but for me, the cost of an album is equal to my 4 days boarding fees. So youtube help me to save a lot.
<br />
<br />As a teen girl, I love shopping. So, I also will surf any website (eg. cct fashion.com) that sells clothes or accessories. I start to get in touch with online shopping when I work in a manufacturing company during my semester break. The colleague there recommend me to shop online because it is cheaper compare to the store outside and the best thing is the design is from Korea and Taiwan that seldom can find in Malaysia. Initially, I not very interested in it because I may think that doing transaction through network may be lack of security and risky. However, after the continually persuading from my colleague I take an action to get through it. The result is I quite satisfy the service perform by the online store where it provided an efficient delivery where we can get our good after 3 days we have made the payment. Besides, the clothes that we received is 100% according to our specification and the picture shown in the website. However, before shop through online, we must make sure the reliability of the website and the best payment method is pay through pay-pal where it is an independent company that provide a strong security when making the payment. It will be better to shop in an online store if it is recommended by your friend or other reliable sources.
<br />
<br />This is all I want to share with you all about myself. Thanks for reading it.<o:p></o:p></span></p> Goh Mei Chinhttp://www.blogger.com/profile/03514783669125897469noreply@blogger.com1tag:blogger.com,1999:blog-8374589692573383949.post-55574790050018995152009-06-04T10:25:00.012+08:002009-06-15T15:48:38.093+08:00~About me~<span style="COLOR: rgb(51,51,255);font-size:130%;" >My name is Ho Siaw Ting,which is a simple girl born in Kajang but lives in Semenyih. I am 21 years old in year 2009. I am born from a big family, which consists of 9 members including me. My family consists of my parent, 1 brother, 5 sisters and me. I am now studying at Universiti Tunku Abdul Rahman and taking Bachelor of Commerce (Hons) Accounting. I was already completed 2 years of study and just have 1 year remaining.</span><span style="font-size:130%;"><br /><br /></span><span style="COLOR: rgb(51,51,255);font-size:130%;" >Besides, I was taking accounting subject since secondary. One of the reasons that I choose this subject is due to the influence of my family. Most of my sisters are graduated from accounting diploma and it has a big influence on me because this let me feel that i should take accounting subject too. In other hand, based on history experiences, I realised that I am more expert in calculation subject compared to others. I always get better result in the subjects that required significant calculation. The reasons above make me decided to choose accounting in my degree study. I hope I can graduate my degree with first class honour but I understand that good result is always followed by hard study.</span><span style="font-size:130%;"><br /><br /></span><span style="COLOR: rgb(51,51,255);font-size:130%;" >My hobbies are singing, gathering with friends and reading meaningful articles. Singing is a very useful way to release those stress that I faced in study. Take sometime to chit chat with friends also is another way to reduce stress. I like to read meaningful articles because I can learned a lot meaningful theory that can apply in daily life.</span><span style="font-size:130%;"><br /><br /></span><span style="COLOR: rgb(51,51,255);font-size:130%;" >The top 5 websites that I visited the most are YAHOO, GOOGLE, HOTMAIL, FRIENDSTER and MSN. YAHOO and GOOGLE are very useful websites that help me to search for important information. These two websites are the most important sources used to complete my assignment. Furthermore, I always log in to HOTMAIL to read the messages and articles that send by Friends. I will forward the articles to my friends too if I find out the articles is meaningful and useful to others. However, due to the contribution of assignments, tutorial questions, mid-term test and final examination, my HOTMAIL unread inbox has break the record of all my friends and reached to the number of</span><span style="font-size:130%;"><strong style="COLOR: rgb(51,51,255)"> 2500</strong></span><span style="COLOR: rgb(51,51,255);font-size:130%;" > now. Hope it won't break the space provided by HOTMAIL. Besides,</span><span style="font-size:130%;"><em style="COLOR: rgb(51,51,255)"> </em></span><span style="COLOR: rgb(51,51,255);font-size:130%;" >I will access FRIENTSTER too when my daily usage time is allowed. It let me view my friends' photo albums whose are seldom contacted to know their recent condition and write some comments to them. Lastly, MSN allowed me to chat with friends who are stay in different country. Some of my friends are study abroad and it is </span><span style="font-size:130%;"><strong style="COLOR: rgb(51,51,255)">extremely</strong></span> <span style="COLOR: rgb(51,102,255);font-size:130%;" >expensive to chat through phone call. MSN helps us to solve this problem.</span><span style="font-size:130%;"><br /><br /></span><span style="COLOR: rgb(51,51,255);font-size:130%;" >This is me and my simple daily life. I just hope that i can have more and more free time to do the activities that i like. And pray hard I can safely graduate my degree. That's all......</span>Ho SiaW TinGhttp://www.blogger.com/profile/04450327066867462878noreply@blogger.com2tag:blogger.com,1999:blog-8374589692573383949.post-39478066685881612852009-06-04T10:25:00.011+08:002009-06-12T22:52:13.056+08:00*Introduction of Myself*<span style="color: rgb(51, 0, 153);font-size:130%;" >Hihi everyone, thank for viewing our blog, </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><span>I</span></span><span style="color: rgb(51, 0, 153);font-size:130%;" > am Ang Boon Yong, from Subang and stay there since i was 12 years old, my borned place is at Klang. I am youngest in the family which consists of 5 family members including me. I can speak english, malay, chinese(including cantonese and hokkien). I am born in May 1, which is labour day, special right? haha.. all celebrate for me because is a holiday :P Currently i am 21 years old and study at Universiti Tunku Abdul Rahman. I taking Bachelor of Commerce (HONS) Accounting course in FAM faculty in Sungai Long. I had been arrange to Groups 5 and now is Year 3 Trimester 1.</span><span style="color: rgb(51, 0, 153);font-size:130%;" ><br /><br /></span><span style="color: rgb(51, 0, 153);font-size:130%;" >I got a lot of hobbies, such as listening song, especially jay chou songs because I feel he very talented and those song he compose all very special and also i prefer rap song. When free, I also always go sing karaoke and watch movie with my gang of good friends. Other than those hobbies, I also like to sport, especially play basktaball and badminton and sports make me got more time spend with my friends. While some leisure time, I also prefer chatting with friends and surf net, it have bcome part of my life since i own my own computer.</span><span style="color: rgb(51, 0, 153);font-size:130%;" ><br /><br /></span><span style="color: rgb(51, 0, 153);font-size:130%;" >Since I started have internet connection and surf net, I normally have few website that I surf frequently, such as </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a href="http://www.yahoo.com/">www.yahoo.com</a></span><span style="color: rgb(51, 0, 153);font-size:130%;" > which i always surf this net to look for news and information especially sports news n it provide lives score and allow me always update with latest sports result. Other than tis wesbite, I also always use </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a href="http://www.google.com/">www.google.com</a></span><span style="color: rgb(51, 0, 153);font-size:130%;" > that can help me search information or website that help me in assignment and also search for pictures. Furthermore, I also like to visit </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a href="http://www.espnstar.com/">www.espnstar.com</a></span><span style="color: rgb(51, 0, 153);font-size:130%;" > due to I am a sports lover, so I like to update all sports news, comment and also highlight of those match. Besides that, I also like to surt </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a href="http://www.nba.com/">www.nba.com</a></span><span style="color: rgb(51, 0, 153);font-size:130%;" >, because it allow me to watch highlight of those NBA match which is I prefer the most because i like basketball ball as well, n due to it is so exciting and I love this games very much. Lastly, I also like to surf and join those website that can make more friends and interact wit friends, such as </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a href="http://www.friendster.com/">www.friendster.com</a></span><span style="color: rgb(51, 0, 153);font-size:130%;" >, </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a href="http://www.facebook.com/">www.facebook.com</a></span><span style="color: rgb(51, 0, 153);font-size:130%;" > and furthermore. It make me can keep contact and interact with my friends no matter how far our distance, because some of them are studying at oversea.</span><span style="color: rgb(51, 0, 153);font-size:130%;" ><br /><br /></span><span style="color: rgb(51, 0, 153);font-size:130%;" >Overall, I use internet for few activties, such as searching information, update myself with latest news, watch sports highlight, chatting with my friends, as well as playing online games to relax myself. I also like to watch video clips in the internet and also listen song. This is those activities that i will do normally I surt the net.</span><span style="color: rgb(51, 0, 153);font-size:130%;" ><br /><br /></span><span style="color: rgb(51, 0, 153);font-size:130%;" >This is my brief introduction about myself and a little big about my normal surfing habits. Hope all of you will come to look at our blog again for further post.</span><span style="color: rgb(51, 0, 153);font-size:130%;" ><br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9CC92rW-Jcxfir7TWEr1iAbp_pWIakedK8mZX9weSPWa7_oHeqwIB9GcfFsMHqEiddiB1NuDxOyIa_-dwOVsUw-73toMzhkBs1wi_AoW8NtcepHpSfPcqRt_ZJ1UvSzfdaKe9qDuGWjzz/s1600-h/facebook-logo.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 150px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9CC92rW-Jcxfir7TWEr1iAbp_pWIakedK8mZX9weSPWa7_oHeqwIB9GcfFsMHqEiddiB1NuDxOyIa_-dwOVsUw-73toMzhkBs1wi_AoW8NtcepHpSfPcqRt_ZJ1UvSzfdaKe9qDuGWjzz/s200/facebook-logo.png" alt="" id="BLOGGER_PHOTO_ID_5345581609466332642" border="0" /></a><br /></span><span style="text-decoration: underline; color: rgb(51, 0, 153);font-size:130%;" ><br /><br /><br /></span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixUpUam3epAaFNKLk-qOx3TWdt91k1fXcweb-xjoDIy4J1jvsPkuxMeoZZdoIaGf0en53f4IcGC22PX6r9YxRFXpTaIcar1vDnOnAsBYKW6VK_aK2lmrlbvCvSI_Hd4PRo1Fql2-6jKtm-/s1600-h/images.jpg"><img style="cursor: pointer; width: 125px; height: 83px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixUpUam3epAaFNKLk-qOx3TWdt91k1fXcweb-xjoDIy4J1jvsPkuxMeoZZdoIaGf0en53f4IcGC22PX6r9YxRFXpTaIcar1vDnOnAsBYKW6VK_aK2lmrlbvCvSI_Hd4PRo1Fql2-6jKtm-/s200/images.jpg" alt="" id="BLOGGER_PHOTO_ID_5345581863399233410" border="0" /></a></span><span style="color: rgb(51, 0, 153);font-size:130%;" > </span><span style="color: rgb(51, 0, 153);font-size:130%;" ><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP7LNkvNYH94XuUSEVdaAz-2sinvCvyWviSm0h33EexT3JUvOj9jSTVIT4b8x_XAqn1ULxoh5eOBr5uhtv4AcDT_127qg6cg1ZvUKrGOEAockS9w5amgHmw0AFuIopaWmlRS5JhLq3Amat/s1600-h/38nba_g_wade_kobe_395x300.jpg"><img style="cursor: pointer; width: 200px; height: 152px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP7LNkvNYH94XuUSEVdaAz-2sinvCvyWviSm0h33EexT3JUvOj9jSTVIT4b8x_XAqn1ULxoh5eOBr5uhtv4AcDT_127qg6cg1ZvUKrGOEAockS9w5amgHmw0AFuIopaWmlRS5JhLq3Amat/s200/38nba_g_wade_kobe_395x300.jpg" alt="" id="BLOGGER_PHOTO_ID_5345582297991313666" border="0" /></a></span><span style="text-decoration: underline; color: rgb(51, 0, 153);font-size:130%;" ><br /></span>ANG BOON YONGhttp://www.blogger.com/profile/07267099735335331864noreply@blogger.com3tag:blogger.com,1999:blog-8374589692573383949.post-84610375681323670242009-06-04T10:21:00.002+08:002009-06-12T22:49:07.111+08:00About me<span style="color: rgb(0, 0, 153);font-size:130%;" >First of all, I would like to great to all that had made their effort to surf to this blog. Hi, I am Tan Cheng Ling, 20 years old. I am now currently studying in <strong>UTAR Sg Long</strong>, and taking the course of <strong>Bachelor of Commerce (Hons) Accounting</strong>. I had been arranged to BAC Group 5, together with my classmates, we are now in Year 3 Trimester 1.<br /><br />It would be my pleasure to share to you all about my everything. First of all, I am from <strong>Banting</strong>, Selangor. The residents in Banting all speak Hokkien, however, when you speak Chinese, we too can catch what you trying say. For the leisure time that I got, I will usually spend it by chatting through <a href="http://www.msn.com/">MSN Messager</a>. When I need to relax myself, I will open my folder and either listen to songs, or watching movies.<br /><br />After having the internet connection, I had became a surfer in internet. I will use internet to check my email in <a href="http://www.hotmail.com/">www.hotmail.com</a>. This is important thing that I must do everyday, so that I can get the message from my friends that some might be helpful in life. Whenever I am free, I will surf the <a href="http://www.friendster.com/">Friendster </a>and <a href="http://www.facebook.com/">Facebook</a>, as both of them are the friendship connection of mine. With it, I had too know a lot of new friends there. When I was bored, I will try to relax myself by looking for any funny short clips in <a href="http://www.youtube.com/">Youtube</a>. It is a website that allow everyone to share their clips that taken with their own recorder, or any funny clips that they had found. Sometimes, when I face some problem, I will look up for <a href="http://chinese.cari.com.my/">chinese.cari.com.my</a>. It is a forum that allow users to post their title to discuss with other. At there, you can get a lot of feedbacks from other users. Sometimes, you too can discover some funny topic that you never see before. Internet connection can also ease my burden to do my assignment and research. I can easily get the information through <a href="http://www.google.com/">Google</a>, <a href="http://www.yahoo.com/">Yahoo</a>, <a href="http://www.wikipedia.org/">Wikipedia</a>, and those official website to get those essential and necessary information for my work.<br /><br />These are the things that I will do with the internet connection. If you still think that it's not enough details of mine, you are welcome to leave your comment here. Thanks again for your patient in reading all of these! :-)</span>Tan Cheng Linghttp://www.blogger.com/profile/05676503683750291218noreply@blogger.com0