tag:blogger.com,1999:blog-61985430089330526252024-03-05T10:42:39.802-08:00E-CommerceT4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.comBlogger19125tag:blogger.com,1999:blog-6198543008933052625.post-65465686492429807432009-07-09T06:24:00.000-07:002009-07-09T06:58:54.008-07:00Review on a post on Legal - Online Beauty Product Fraud<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMKuHVpaySb8GOhSnrzq5L1igNr9ExvMDWedkQpeSYtRirueP2xtYltslWWTJnF52QHDA3cJpu-RAdyEit6kHUNlrMMhLi-xTUSfJ3YnAu7QiiTtRQ1SlMt1dIsUr7bUDrdaYEBtcE-BA/s1600-h/FC994EC9-9D07-4D4A-B32D-EC0B26597A0F.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 170px; FLOAT: left; HEIGHT: 170px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5356456317575709538" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMKuHVpaySb8GOhSnrzq5L1igNr9ExvMDWedkQpeSYtRirueP2xtYltslWWTJnF52QHDA3cJpu-RAdyEit6kHUNlrMMhLi-xTUSfJ3YnAu7QiiTtRQ1SlMt1dIsUr7bUDrdaYEBtcE-BA/s200/FC994EC9-9D07-4D4A-B32D-EC0B26597A0F.jpg" /></a><br /><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6VigGJXFG-dxF5io7agRtwqVxyrNVxP4Sw6CDCFxkj52XQqH6dCWYjs5uuj7VrxKGce0ojLZ6f7ShZJAdP_fVoBxy_m-br1qCscgthyphenhyphenJPIPptobVdnYRSQmdswDfnPlAmogX0Ys1pZwY/s1600-h/clarins-banner-radiance-gwp.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 68px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5356455951776467570" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6VigGJXFG-dxF5io7agRtwqVxyrNVxP4Sw6CDCFxkj52XQqH6dCWYjs5uuj7VrxKGce0ojLZ6f7ShZJAdP_fVoBxy_m-br1qCscgthyphenhyphenJPIPptobVdnYRSQmdswDfnPlAmogX0Ys1pZwY/s200/clarins-banner-radiance-gwp.jpg" /></a><br /><br /><div><br /><br /><div><br /><br /><div></div><div></div><div></div><div>The post basically is about the fraud or problem of making purchases of beauty product online. Over the years, internet has enabled many great buys through online. Besides, there are price comparison companies that help us drill down to the best prices, shipping and tax advantages, and the convenience of no need to leave home. </div><br /><div>However, sometimes the deal that looks great falls short of what has been advertised. Communicating dissatisfaction can be difficult through online if compare to face-to-face. In addition, it often takes enormous patience and tenacity to achieve satisfaction. </div><div><br /></div><div></div><div>In the post, it stated that The Star has reported 66 people that were cheated almost RM 73,445 when they performed online purchases of skincare products. Nowadays, because of the improvement of technology, people tend to buy the beauty products through internet. As claimed by them, buying the products through online can help them save the time to go out. Moreover, the price is usually cheaper than buying in shop. Besides, there are some people who do not like to be followed by the salesgirl when they make purchases. Hence, they prefer to buy the products online. And they can also choose the product carefully and take as many times as they want.</div><div><br />Convenience appears to be the main reason women buy online. Of those online beauty product shoppers, 74% say “it saves time” and 70% agree that “it’s easier/quicker to shop online than a store.” </div><br /><div>Just because the businessman knows what the consumers are thinking, they can easily attract the consumers by illegal ways, when promoting their products online.</div><br /><div>As reported in The Star, the salesman was lured by the advertisement which displayed the price of the items that cheaper than those off the shelf. Businessman may display a very low price in their advertisement, but they may charge many others additional fees (delivery fees) when the items delivered to the customers. While these additional fees may not know by the consumers before they made their purchases.</div><br /><div>Improvement in the technology is not necessarily a good thing, especially shopping online. Some of the disadvantages of the shopping online are: </div><div><br /> </div><div>- Inabilities to check out the items physically when you are purchasing. Especially for the low price items, the website might send the products which quality might not achieved the standard. </div><div></div><div><br />- Items ordered online are sometimes on backorder but consumer is not always informed until weeks after the purchase is made. </div><div><br /> </div><div></div><div>- Consumer not always knowing if a site is a legitimate and safe site to shop. </div><div></div><div><br />- Have to pay for shipping costs that far exceed the true shipping rate. They may charge lower price for the items, but charge higher in the shipping costs. </div><div></div><div><br />- If there are dissatisfaction, return and exchanges can sometimes be difficult because of lack of face-to-face negotiations. Some websites might even restrict the return or exchange of items. If not, when the items’ quality does not reach the standard, consumer may request for return and make them suffer loss. </div><div><br />- No claim back of money when the product didn’t arrive. Most of the online shopping website is requiring the consumers to make payment using credit card. But, after they received the money, they might never deliver the items to customers, since they already have the money on hand.<br /></div><div></div><div></div><div></div><div> </div><div> </div><div>Therefore, in my opinion, it is better to buy the products (no matter beauty products or others) at shop. Then we can check out the items physically, no matter the quality or its price. If you are still instead to shopping online, please bear in mind, it is important to make sure that the website can be trusted and it is a legal site.</div><br /><div></div><div>Example of website that provide shopping online:</div><br /><div><a href="http://www.adorebeauty.com.au/adorebeauty/index.asp">http://www.adorebeauty.com.au/adorebeauty/index.asp</a></div><div> </div><div><a href="http://ecommerze.blogspot.com/search/label/Legal">http://ecommerze.blogspot.com/search/label/Legal</a></div><div> </div><div><a href="http://my.88db.com/my/Services/Post_Detail.page/Beauty/Face_Skin_Care/?PostID=241848">http://my.88db.com/my/Services/Post_Detail.page/Beauty/Face_Skin_Care/?PostID=241848</a></div></div></div></div>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com5tag:blogger.com,1999:blog-6198543008933052625.post-62696163904909897402009-07-08T06:43:00.001-07:002009-07-08T06:58:57.021-07:00Discussion on E-learning offered in Malaysian unversities:<strong><span style="font-size:130%;">Pros and Cons from student perspective</span></strong><br /><br />E-learning systems are a great alternative to traditional way of learning. Due to the advanced technologies, we can bring everything we need in our daily life to our homes: books, libraries, news, clothes and even food! Today, e-learning has been getting more and more popular. Like anything else, there are many pros to e-learning as well as cons.<br /><span style="color:#ffffff;">.</span><br /><p><img id="BLOGGER_PHOTO_ID_5356084731774379138" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 154px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8oCsrBVhDf5K7oN7UOX67Jz7e7Npd_6d0h97Ch36J_mv4m7tLejhxaCKaPYohFOVo1zYl4Y_7FEYMkYc2J-4E3rYeq55X5Sw7V0aDcLx9j-u4s0So_CkJ16XmwrjkqUVnO_eANxfr8bo/s200/e-learning.jpg" border="0" /><strong>Pros of e-learning</strong><br />The greatest advantage of e-learning is student <span style="color:#33cc00;">no need to travel</span> long distances to attend classes at a particular location as eLearning can be conducted anywhere in the world. The courses are carried out over the internet, through online learning management systems, internet char, real-time lectures, webinars etc. This will save student travel cost and time to and from school.<br /><span style="color:#ffffff;">.</span><br />One of the advantages of e-learning is the <span style="color:#33cc00;">flexibility of time</span>. There is no specified time for classes to be executed, such as a particular lecture on a specific day and time. E-learning classes are recorded and post on the websites. Students can download and watch or listen them during their free time. However, there are deadlines for submitting in assignments and reports. Students have to make sure that they submit their assignments and reports by the deadline, in order to get full credit.<br /><span style="color:#ffffff;">.</span><br />Another advantage would be the students’ <span style="color:#33cc00;">ability to study at their own pace</span>. This helps people who may need a little extra time understanding the subject that is being studied. Student can go back and repeat the subject that is having trouble understanding. Besides, some students are faster at learning than others, so this e-learning allows them to be ahead. Projects with a deadline will be assigned and students can finish their projects at whatever time they find feasible within that particular deadline.<br /><img id="BLOGGER_PHOTO_ID_5356084887322648674" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 200px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFNffPehBOsPhC6fv7i_474HY57u9qOfvVxPi9FNS9KD6clEEKiIztGJmmDeoePGdo9QN0aIcvb6CkmjheTWoE4dfVY6UlWRhiX6flvBNrfRf3I2N2gNTv8KO_wcb_lF7KDFIG3vjuS-8/s200/E-learning2.jpg" border="0" /><strong>Cons of e-learning<br /></strong>First of all, the disadvantage to online learning is that, <span style="color:#33cc00;">not all students have self-motivated and discipline</span> to progress through the program in a timely manner. Student can simply being lazy and fall behind the program for week. This makes learning even harder when trying to get caught up with the progress. Students have to make a set plan and stick to it. This is sometimes very hard for student to follow it.<br /><span style="color:#ffffff;">.</span><br />There is the downside of there being <span style="color:#33cc00;">no face-to-face interaction between</span> the student and the instructors. Lack of face-to-face communication with instructors will contribute lack of understanding between student and instructor. Instructors cannot easily understand student’s demands and interests. Besides, instructor may not always be available if student need help. This can be very frustrating if you are not able to understand the subject being studied.<br /><span style="color:#ffffff;">.</span><br />Another disadvantage of e-learning is problem of <span style="color:#33cc00;">proper accreditation</span>. It is importance for those who are seeking employment upon graduation. However, not all e-learning system of Malaysian universities are accredited. Hence, e-learning students need to make sure that university student enrolled is properly accredited and widely recognized.<br /><span style="color:#ffffff;">.</span><br />In short, there are many pros of e-learning, but there are many cons too, which may require the students to over come it and become a self-organized student. </p><p>Related Links:</p><ol><li><a href="http://ezinearticles.com/?Distance-Learning-Advantages-and-Disadvantages---Not-Everyone-is-Suited-for-E-Learning-Success&id=320610">http://ezinearticles.com/?Distance-Learning-Advantages-and-Disadvantages---Not-Everyone-is-Suited-for-E-Learning-Success&id=320610</a></li><li><a href="http://www.articlesbase.com/e-learning-articles/pros-and-cons-of-elearning-685765.html">http://www.articlesbase.com/e-learning-articles/pros-and-cons-of-elearning-685765.html</a></li></ol><p>Posted by Qiao Ling</p>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com4tag:blogger.com,1999:blog-6198543008933052625.post-33625922247951181192009-07-05T07:17:00.000-07:002009-07-08T07:02:22.172-07:00E-Government in Malaysia: Its implementation so far and citizen's adoption stragies<span style="font-size:130%;">E-Government</span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTBu-GDq6xaFLH0sByWMNOg7YR6-Cq9Sr0pFJk29yVWt5A8REWkyrs45xMJgoY2XYIzv4voHHW6UygZR3NYUL_XqHhEWYWUztgIevb-fqUjxPaaGivyrs_dLifP0qTNOzxj4Cwczu9aaY/s1600-h/egovernment.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 158px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTBu-GDq6xaFLH0sByWMNOg7YR6-Cq9Sr0pFJk29yVWt5A8REWkyrs45xMJgoY2XYIzv4voHHW6UygZR3NYUL_XqHhEWYWUztgIevb-fqUjxPaaGivyrs_dLifP0qTNOzxj4Cwczu9aaY/s200/egovernment.jpg" alt="" id="BLOGGER_PHOTO_ID_5355020175061304418" border="0" /></a><br /><br />E-Government was one of the seven Flagship application introduced by the government with the Establishment of Multimedia Super Corridor (MSC). It was a combination of Information and Communication Technology working together to enhance the communication linkage between the government and the citizens striving a better accessibility and quality of interactions, making information flows and processes within government, the speed and quality of policy development, coordination and enforcement effectively being carried out in the correct time manner.<br /><br />The seven Flagship Application are:<br /><br />1.E-Government<br />2.Multipurpose card<br />3.Smart School<br />4.Telehealth<br />5.R&D Cluster<br />6.E-Business<br />7.Technopreneur Development<br /><br /><br />In acceleration to Vision 2020, the E-Government is being carried out in order to enable team-working with the citizens and Malaysia. The purpose of this project is to ensure information flows and services being delivered to the public in the correct time manner and thus help to improve the responsiveness of government towards citizen's needs and wants.<br /><br />There are seven sub-projects being carried out under this Main objects and there are :<br /><br />1. Project Monitoring System (SPP II)<br />2. Human Resource Management Information System (HRMIS)<br />3. Generic Office Environment (GOE)<br />4. Electronic Procurement (EP)<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin3w3hbE0zxpvYFGY0osIpOKhtbHBd_9zF1BlckKYLXaS73r8hR-1ntWrl-lPuOMy5mG49V1ArVrFQMeB_9p9rardmuEW_cbanozdSye24gZvllRTQGTK4MrGBhHRAcWQustX1qtXdNJk/s1600-h/PMS_circle.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin3w3hbE0zxpvYFGY0osIpOKhtbHBd_9zF1BlckKYLXaS73r8hR-1ntWrl-lPuOMy5mG49V1ArVrFQMeB_9p9rardmuEW_cbanozdSye24gZvllRTQGTK4MrGBhHRAcWQustX1qtXdNJk/s200/PMS_circle.jpg" alt="" id="BLOGGER_PHOTO_ID_5355045080696049346" border="0" /></a><br />5. Electronic Services (E-Services)<br />6. Electronic Labor Exchange (ELX)<br />7. E-Syariah<br /><br /><span style="font-weight: bold;font-size:130%;" >Implementation of E-Government:</span><br /><br />1.Project Monitoring System (SPP II)<br /><br />This is a platform of exchanging ideas, suggesting best alternatives for information management and communication services between the government and citizens to comes out with an efficient and effective system.<br /><br />2. Human Resource Management Information System (HRMIS)<br /><br />Helps to standardize the Human Resource Management of the government employees. This is also a platform for recruitment of new freshmen.<br /><br />3.Generic Office Environment (GOE)<br /><br />By incorporating a fully integrated, distributed and scalable office environment that maximizes the usage of Information Technology to enable full collaboration between workers, aiming no information delays occur.<br /><br />4. Electronic Procurement (EP)<br /><br />Aiming to save the time and cost of purchasing materials and making the whole transaction is being carried out transparent to the public. It also encourages suppliers to go electronic and join the K-economy.<br /><br />5.Electronic Services (E-Services)<br /><br />A services provided by the government to enable the citizens to make payment thru Internet services, reducing the time and increase the efficiency of the entire progress. One of the successful services introduced is e-filling provided by Malaysia's Inland Revenue Board (IRB).<br /><br />6.Electronic Labor Exchange (ELX)<br /><br />Enabling the utilization of workforce, helping the peoples to search for job opportunity. Using a systematic managing system to match the job vacancies ensuring everyone gets their desired.<br /><br />7. E-Syariah<br /><br />E-Syariah is a government ICT products with helps the Islamic courts involving 111 courts to settle dispute through electronic means.<br /><br /><span style="font-size:130%;"><span style="font-weight: bold;">Citizens Adoption Strategies</span></span><br /><br />There are no doubt that the fast growing of E-Government is getting much more attention form the public. There are fields that government should takes serious focus which might affects its adoption strategies. These fields include the following:<br /><br />1.Ease of use<br /><br />The designed websites should be made user-friendly. Everyone who uses it will find it easy to learn and sooner or later the importance of this services can be popular to the public. This can also enhance the customer's satisfactory and the government gain advantages to launch the project as it becomes well-known among the users.<br /><br />2.Website Designs<br /><br />The designed websites should contain interesting data or info for the public. Making the website become useful and attractive should be the priority of the government implementation as if the customers who used it found out it to be useful and easy to learn will eventually come back to use the services provided too...<br /><br />3.User's characteristic<br /><br />Such characteristics are perceived risk, perceived control, and Internet experience. Experience leads to the continuance usage of the services, the users who are satisfied with the services would likely to return to use the services provided. Perceived risk refers to security and privacy issues of the Internet while perceived control is to ensure that citizens can transact online securely and their personal information will be kept confidential.<br /><br />However there are barriers such as language barriers, lack of public awareness and online behaviour but these are the barriers that can be improved from time being . Lastly, for some extra information, Malaysia ranking in the 5th Waseda University E-Government ranking improve from year 2008 ,from 25th to 22th in year 2009. Viva, Malaysia !<br /><br /><br />Related Links:<br /><br />1.http://www1.american.edu/initeb/ym6974a/egovernment.htm<br /><br />2.http://ecomworld.wordpress.com/2008/07/08/e-government-in-malaysia-2/<br /><br />3.<span style="font-size:100%;"><span style="color: rgb(0, 204, 204);"><a href="http://en.wikipedia.org/wiki/E-government"><span style="color: rgb(51, 51, 255);">http://en.wikipedia.org/wiki/E-government</span></a><span style="color: rgb(51, 51, 255);"><br /></span></span></span><br /><span style="font-size:100%;"><span style="color: rgb(0, 204, 204);"><span style="color: rgb(51, 51, 255);"><span style="color: rgb(0, 0, 0);">4.</span></span></span></span><span style="font-size:100%;"><a href="http://www.elx.gov.my/"><span style=";font-family:";color:green;" >www.elx.gov.my</span></a></span><span style="font-size:100%;"><span style="color: rgb(0, 204, 204);"><span style="color: rgb(51, 51, 255);"><br /></span></span></span><br />5.http://www.giti.waseda.ac.jp/GITS/news/download/e-Government_Ranking2009_en.pdf - page 9<br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkfnyatfmE7y6-b2Um6DPiRqjB1PH1n5GxczEruYO1XYX6KwyOoBPJIJeFHzqYKb11jhIeY2qi9Kv8NjjAX7oUnmBQN8ZWQ2gcTLpo-icqB0Vr_q1FKap_XCKLyDX8l38ftEiKNZalrDk/s1600-h/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 91px; height: 91px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkfnyatfmE7y6-b2Um6DPiRqjB1PH1n5GxczEruYO1XYX6KwyOoBPJIJeFHzqYKb11jhIeY2qi9Kv8NjjAX7oUnmBQN8ZWQ2gcTLpo-icqB0Vr_q1FKap_XCKLyDX8l38ftEiKNZalrDk/s200/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg" alt="" id="BLOGGER_PHOTO_ID_5355046770099428898" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br />Posted by Chee Liat Long<br /><span style="font-style: italic; font-weight: bold;font-size:100%;" ><span style="font-size:130%;"></span></span>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com0tag:blogger.com,1999:blog-6198543008933052625.post-87759175224947289202009-07-04T06:52:00.000-07:002009-07-08T07:02:07.701-07:00The Application of Pre-paid cash card for consumersWhat is <span style="color:#000099;">Pre-paid cash card</span> ?<br /><br /><br />Well, it is a card where we can deposit our money into the card and tend to use it when we need it. The concept lies within this was just as the same as our mobile phone card, when we top-up then only we can use the phone to make calls.... the same theory applied here, we need to deposit money to gain usage of this card too... One of the best selling point of this card is that the users don't need to bound to debts problems, because you can only spend how much you have in the card.<br /><br />There are many types of Pre-paid cash card such as Pre-paid Master card, Pre-paid Visa card and also the Malaysia's Touch'n Go Card and etc.... However, the Malaysia's Touch'n Go Card is the most common card that applied in ours daily life.<br /><br /><br /><p></p><p>Advantages of Pre-paid cash card :</p><p></p><p>1.Availability - No need to worry about your credit history as the card is availble to everyone, identity check performed upon request.</p><p></p><p>2.Control - It helps users to control their spending, users can make use of the budget to control their spending with the Pre-paid cash card as spending more will only make them exhausted faster. xD</p><p></p><p>3.No Debts Risk - Is a Pre-paid cash card, users cannot spend more than the amount inside the card. Thus creating no debts risk.</p><p></p><p>4.The card for travel - The card can be bring outside to any places especially for young travellers.</p><br />What is <span style="color:#000099;">Touch ‘n Go card</span> ?<br /><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNLXQM2UEGwcZXsAu7RLLuvokFK6kFdBGQFcLoevl2mnmwwb_Ftg6UILybkSZsxWE63B4NUd6Go_gT-9xJDcw4gaPcYXXnOvaICeitRu9lw_SiFC24L_toDEEB21LqHS6gjNvzv8HDGZY/s1600-h/images.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 98px; FLOAT: left; HEIGHT: 60px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5354632164337627730" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNLXQM2UEGwcZXsAu7RLLuvokFK6kFdBGQFcLoevl2mnmwwb_Ftg6UILybkSZsxWE63B4NUd6Go_gT-9xJDcw4gaPcYXXnOvaICeitRu9lw_SiFC24L_toDEEB21LqHS6gjNvzv8HDGZY/s200/images.jpg" /></a><br /><br /><br /><br />Touch ‘n Go card is a prepaid smartcard that uses <span style="color:#6600cc;">Mifare contactless technology</span>.Information contain in this card can be read and written via magnetic induction using specified radio frequency and smartcard software.It is an electronic wallet that can be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme park.<br /><br /><br /><br /><blockquote></blockquote><strong><em>How does this card applied in our daily life ?<br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAzZSef36UYP4pE2wc0Em_V9us8DdlcDnOFzc2cdmCcVsdTiyzG-b5FYP6g8MLiF8FHtUjJLSIiWBjPTaK2Od_QrDiy6XpJvLLOQMbycAYkTSb9qRtrOpQZRQ16pMGwC5wRuyrtNL9NxM/s1600-h/img_STAGmach.jpg"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 127px; FLOAT: right; HEIGHT: 144px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5354639985681059234" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAzZSef36UYP4pE2wc0Em_V9us8DdlcDnOFzc2cdmCcVsdTiyzG-b5FYP6g8MLiF8FHtUjJLSIiWBjPTaK2Od_QrDiy6XpJvLLOQMbycAYkTSb9qRtrOpQZRQ16pMGwC5wRuyrtNL9NxM/s200/img_STAGmach.jpg" /></a><br /><br /></em></strong><strong><em></em></strong><strong><em><blockquote></blockquote></em></strong>1.Toll Fee - The Touch ‘n Go card is being used to paid the tolls fee all over the highways in Malaysia with the TnG SmartTAG sign marked on the road. The speed of payment can also be speeded up by combining the Touch ‘n Go card with the SmartTag or known as " Sistem Membayar Automatic Rangkaian Tol ".<br /><br /><br />2.Transportation Fees - Refering to the bus ticket fares, LRT fares, KTM fares and so on.. The card can help us to pay the transportation fares and reduces the time to purchase ticket especially when it comes to the crowded time ... with all the people standing there to make ticket purchasing.. .this sometimes really piss us off....<br /><br /><br />3.Ticketless Parking - This however, only applied in some selected areas such as Century Square Cyberjaya , KLIA , LCCT , Sg. Wang Plaza , 1-Utama Shopping Centre and etc... This is an area that can still be improve more.<br /><br /><br />4.Admission Fees - This only applied in the Bukit Merah Lake Town Resort where customers need not pay money for the admission fees. In fact, they can pay with TnG card instead of money.<br /><br /><br />5.Retail Outlets: The card can also be used in some fast foods restaurants such as A&W, Convenience stores(Caltex Star Mart ) and so on...<br /><br /><br />In Conclusion, the application of Pre-paid cash card for consumers is still not yet perfect at all... The public still rather to hold a credit card than a Pre-paid cash card... maybe the name "Pre-Paid" doesn't sounds so nice...<br /><br /><br /><br />Related Links :<br /><br />1.<a href="http://www.touchngo.com.my/WhatSTAG.html">http://www.touchngo.com.my/WhatSTAG.html</a><br /><br />2.<a href="http://www.touchngo.com.my/WhatTNG.html">http://www.touchngo.com.my/WhatTNG.html</a><br /><br />3.<a href="http://www.startecredit.com/creditpages/prepaid-credit-cards-applications-prerpaid-reloadable-credit-cards.htm">http://www.startecredit.com/creditpages/prepaid-credit-cards-applications-prerpaid-reloadable-credit-cards.htm</a><br /><br />4.<a href="http://www.creditcards.com/credit-cards/vision-premier-prepaid-visa-card-free-with-direct-deposit.php">http://www.creditcards.com/credit-cards/vision-premier-prepaid-visa-card-free-with-direct-deposit.php</a><br /><br />5.<a href="http://www.wisegeek.com/what-are-prepaid-credit-cards.htm">http:<a href="http://www.wisegeek.com/what-are-prepaid-credit-cards.htm">//www.wisegeek.com/what-are-prepaid-credit-cards.htm</a></a><br /><br />6.<a href="http://www.moneysupermarket.com/c/prepaid-cards/guide/">http://www.moneysupermarket.com/c/prepaid-cards/guide/</a><br /><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitpzZkv04ezoSy45LDETiFBUYajqAf5S-_OMTPY-lOs6kHn6wJTXsB8Tv3EbPyqzWs0g3adu8QSHXRR99aIIv1vfzXo6Fdrv7XFCV5tAsGYhE4G150wk8fXtihHZ4Rp8Wf4ZmlTjlpu64/s1600-h/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg"><img style="WIDTH: 91px; HEIGHT: 91px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5354641355738399762" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitpzZkv04ezoSy45LDETiFBUYajqAf5S-_OMTPY-lOs6kHn6wJTXsB8Tv3EbPyqzWs0g3adu8QSHXRR99aIIv1vfzXo6Fdrv7XFCV5tAsGYhE4G150wk8fXtihHZ4Rp8Wf4ZmlTjlpu64/s200/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg" /></a><br /><br /><br />Posted by Chee Liat LongT4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-63692080544708844342009-07-03T09:36:00.000-07:002009-07-03T09:57:29.177-07:00Review on post on e-tailing - Digital music sales increase 50%<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpI9CjXYTAjTnpYJL6GtAc75zhJGzJxxOhVA2tnVR5GCfCz1GafKLwBbQcuPAjVIXaz0_YfI4EDUNR8KFaWtBDWPPnDHnGub9azFVcf_iBSH239Ud3hrh03ZFZFMcRj9WfWyx6QyKTPa0/s1600-h/Filesharing.jpg"><img id="BLOGGER_PHOTO_ID_5354276834110812706" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 160px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpI9CjXYTAjTnpYJL6GtAc75zhJGzJxxOhVA2tnVR5GCfCz1GafKLwBbQcuPAjVIXaz0_YfI4EDUNR8KFaWtBDWPPnDHnGub9azFVcf_iBSH239Ud3hrh03ZFZFMcRj9WfWyx6QyKTPa0/s200/Filesharing.jpg" border="0" /></a>This post basically pointed out that there is an increasing trend in digital music sales, which cause decreasing trend in physical music album sales. Nowadays, with those enhanced technology, consumers easily can assess to internet download any music they like. User can purchase according to their preferences on selected songs instead of whole music album. Purchasing digital music is an e-tailing transaction. It allowed people to shop for music from home when they wanted, at their own convenience.<br /><span style="color:#ffffff;">.</span><br />Consumers have wide music choice at their fingertips as there has many e-tailing sites. With web search capabilities, it is easier to find the types of music a customer is searching for. Thus, as a music lover, users are prefer looking for digital downloads as a means to purchase single tracks, rather than having to purchase an entire album. It is much more cost saving. Especially now is in the middle of economic downturn, consumers kept eye on their wallets. They are more concern on their spending and probably become savvier about what they buy. The post found that users are moving their music budgets towards digital and away from CDs and other physical media.<br /><img id="BLOGGER_PHOTO_ID_5354275960648283650" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 138px; CURSOR: hand; HEIGHT: 200px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0E1lTr4Tj1BAX_QYqiFO1U3e6_K9OM2ZoXFg-u70zJegPgTxfvOhw0tWa4SCgVuIZgs5uscHUcp07xOJetCvDQBximGZPmGE-ltMiQd3RoqNHjWJE2ZYhYHRhJttLYSYLBWknNN2MgU8/s200/image_5107296.jpg" border="0" /> Besides, purchasing digital music is only by a click. It is more convenient than driving to the music store. Digital music downloaded is in wma or mp3 format, which enable consumer stores music in the computer or any other portable music devices. Thus, consumers can play the song anytime and anywhere. On the other hand, the physical music album bought from store can only played with a CD player and it is not convenient. CD purchased will pile up and take up ones space. Unlike physical music, digital music can be store in the computer or in a tiny device.<br /><span style="color:#ffffff;">.</span><br />In conclusion, the e-tailing of digital music does provide various benefits to the music lovers. However, e-tailers face the issue of illegally downloading music from internet nowadays. Even with the most innovative business models, the revenue are still totally diluted by free music download. Consumers will wonder WHY they would start paying for music if they know they can download it for free. This is an issue where e-tailer must closely supervise and legitimated to avoid any violation of intellectual property. If not, illegal downloading will never stop. I feel bad if I download illegal music. I personally don't mind spending $0.99 for a song if it helps support an artist who took his time to make the song. Illegal downloading is what's destroying the music industry.<br /><br />Related Links:<br /><ul><li><a href="http://ecommerze.blogspot.com/2007/07/digital-music-sales-increase-50.html">http://ecommerze.blogspot.com/2007/07/digital-music-sales-increase-50.html</a></li><br /><li><a href="http://www.bizreport.com/2009/03/the_npd_group_marked_increase_in_digital_music_sales.html">http://www.bizreport.com/2009/03/the_npd_group_marked_increase_in_digital_music_sales.html</a></li></ul><p>Posted by Qiao Ling </p>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-45392155135861781572009-06-30T04:44:00.000-07:002009-07-08T07:02:07.702-07:00Credit Card debts: Causes and Prevention<div><div><div>Credit card is a type of payment card which provides holder with credit to make purchases up to a limit fixed by card issuer (e.g. Visa, master card). It permitting the card holder to purchase items or services while deferring payment, and allow them to make payments to multiple vendors at one time. That is the reason why the <a href="http://en.wikipedia.org/wiki/Credit_card_debt">credit card debt </a>problem exists. A debt occurred would accumulate and increases via interest and penalties when the consumer does not pay for the money he/she has spent.</div><div><br /><br /></div><div>There are several causes of credit card debts:</div><div><br /><br /></div><div><strong>M<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_x58cZHUpGarus2kH1z4FCUQ7YE6UjN8lgFL2aZmbPRoNDAELskfmcsnhc-vckcoy3eRxGCohwcEKBaA3QOK80lWOMoJ6itJpWH68uthFgz0OjF7KTXFqxWPY4XiqUbUKak8Wg_qODME/s1600-h/medical_pic1.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 131px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353089401089011522" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_x58cZHUpGarus2kH1z4FCUQ7YE6UjN8lgFL2aZmbPRoNDAELskfmcsnhc-vckcoy3eRxGCohwcEKBaA3QOK80lWOMoJ6itJpWH68uthFgz0OjF7KTXFqxWPY4XiqUbUKak8Wg_qODME/s200/medical_pic1.jpg" /></a>edical Expenses<br /></strong>- Currently, there are almost all hospitals accept credit cards in Malaysia. This enable people to go for medical treatment even they have no cash on their hand. As an assumption, you have a serious disease now and you need treatment immediately. Unfortunately, you do not have the cash or any savings, but you do have credit cards, what will you do? For sure you will use credit card right? </div><div><br /><br /><strong>Sales/ Offer<br /></strong><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7-JEdPTdt0Sx51hB0fB007RSrRC-JU3jXuec3fJE33D_G2yHFtmgGrMOryhn6lZoBdQ3hpd9dxdn3TDz_kQe2WMNV9sa1Ai2K9KqHZTuTmozK_TSFYR-IQbXoAL4H7OvmYuiuK1VGHiQ/s1600-h/200836232531989_2.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 122px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353089143266904418" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7-JEdPTdt0Sx51hB0fB007RSrRC-JU3jXuec3fJE33D_G2yHFtmgGrMOryhn6lZoBdQ3hpd9dxdn3TDz_kQe2WMNV9sa1Ai2K9KqHZTuTmozK_TSFYR-IQbXoAL4H7OvmYuiuK1VGHiQ/s200/200836232531989_2.jpg" /></a>- When there are mega sales or offer in shopping centre, people tend to use credit card to make payment or purchase items. This is because they want to make a huge purchase but they didn’t have enough money with them. At the end, they might realize that they are unable to repay for the money used.<br /><br /></div><strong></strong><div><br /><br /></div><div><strong></strong></div><div><br /><br /></div><div><strong>Cr<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiugo3HxYMvOycle0PGjLiKZ1etSUU_OCV01JD2HxRzCkzRjx9XDdQC3ABK5BJSTmiaL1N0hTPXE4eDjM_S9_zfqBj7pLkcwxkMmNx_1eKeqr_im1aXtRsLI8ZoIrI3sYBf9afsw8IZ_Ek/s1600-h/gift_smythson_packaging.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 164px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353091518169372290" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiugo3HxYMvOycle0PGjLiKZ1etSUU_OCV01JD2HxRzCkzRjx9XDdQC3ABK5BJSTmiaL1N0hTPXE4eDjM_S9_zfqBj7pLkcwxkMmNx_1eKeqr_im1aXtRsLI8ZoIrI3sYBf9afsw8IZ_Ek/s200/gift_smythson_packaging.jpg" /></a>edit Card “Point-to-Gift” Redemption<br /></strong>- Credit cards provide return to the card holder by allow them to exchange the points accumulated with gifts, voucher, etc. For example, <a href="http://www.aeonmalaysia.com.my/credit_card/juscocard/juscocard_bp.htm">Jusco</a> encourage its member to use “Jusco card” to make payment. Members can accumulate points every time they use the credit card and they can exchange those points with gifts/voucher. Human are easily to get attracted when there is benefits. With the benefits given, they preferred to use credit card instead of using cash. By this way, the accumulating of points also caused the credit card debt accumulated. </div><div><br /><br /><strong>Sub-credit Card</strong></div><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMCcYPlAdbYtw6bewRvfbY9VYtrM2O2UjvQKgoGXWTYBEsF5-sW5rJkXBzXzw_QDHd-mpdBWHzAWLYuQPQk_3KH_bBZVzW9Vjm2FUn5dTqCOWpuqt53gL0uH3bsrC1FV2H1GsLpTzjXfg/s1600-h/credit-cards.jpg"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 200px; FLOAT: left; HEIGHT: 132px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5353088636053573394" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMCcYPlAdbYtw6bewRvfbY9VYtrM2O2UjvQKgoGXWTYBEsF5-sW5rJkXBzXzw_QDHd-mpdBWHzAWLYuQPQk_3KH_bBZVzW9Vjm2FUn5dTqCOWpuqt53gL0uH3bsrC1FV2H1GsLpTzjXfg/s200/credit-cards.jpg" /></a>- Parents nowadays are more likely to sub their credit card to their children. If their children are good in management of money, then should be no problem. But, most of them do not know how to control their expenses. With credit card, they buy whatever they want and don’t even look at the price of the items. Some parents did check for their children’s expenses, but some do not. In such a way, after a long period, they might aware that their credit card debt has reached the limit while it is too late. </div><div><br /><br />Thus, prevention is needed to avoid the credit card debt. Here is some of the prevention:<br /><br /><strong>Savings<br /></strong>- It is better we do savings usually, so that we would not run out of cash when there is emergency. With savings, people can make payment by using cash and they will know the amount of money that they have in hand.<br /><br /><strong>Self-control</strong><br />- Card holder needs self-discipline to keep these cards in their wallet and not over spend on them. One of the best practices or habits that can get into is to have a direct debit set up so that card holder have to pay back the full amount each month. This means that while they have the convenience of using the card in emergencies or while abroad, they have a strong incentive not to let their lending get out of hand.<br /><br />Therefore, before you apply for credit card, ask yourself why you want those credit cards for. Do you just want them so that you have a source of payment in emergencies, to shop occasionally online, or when you travel abroad? Or do you plan on going on a shopping spree and spending the rest of the year struggling to clear the balance? Most people do not intend to ever use up their credit limits and max out their credit cards, but it is surprisingly easy to do, and can be very difficult to undo.<br /><br />Posted by : Shu Hui</div></div></div>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com0tag:blogger.com,1999:blog-6198543008933052625.post-91287846835060084382009-06-30T00:15:00.000-07:002009-07-09T00:36:09.125-07:00Eletronic Currency<div align="justify">Electronic currency (e-currency) is wide spread all over the world in these day and time. Internet users even more often choose this way to pay for municipal services or to buy something in internet shops. In several countries, there is e-currency equal to real paper money. This kind of currency is very easy in use and it does not need any bills, checks, other bank documents in term of paper. E-currency also known as <em>e-money</em>, <em>e-cash</em>, <em>digital money</em>, <em>digital cash</em>, or <em>digital currency</em> which referred to money or scrip that is exchanged only electronically.<br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9KNgbANcEGaF-nbTBr-t6s_rukZ68POi3-o5BuQKmXjkSTNwZoKBS4qwTyWgwwLD2hJHfStnEhzaXfbRvg3rbFb8JWDVt8I5W0uE1ToQ6yi-t0diq9XBk4ifFRSUSm8g1P-iNkUv2wgk/s1600-h/logo.jpg"><img id="BLOGGER_PHOTO_ID_5353029294380328706" style="margin: 0px 10px 10px 0px; float: left; width: 306px; height: 89px;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9KNgbANcEGaF-nbTBr-t6s_rukZ68POi3-o5BuQKmXjkSTNwZoKBS4qwTyWgwwLD2hJHfStnEhzaXfbRvg3rbFb8JWDVt8I5W0uE1ToQ6yi-t0diq9XBk4ifFRSUSm8g1P-iNkUv2wgk/s200/logo.jpg" border="0" /></a> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXeuNNYi3zcAHMbm-02i5RglrW3XVHrpgDlEEftlfErzzrOjdx5v2IjGG46I1vbCrLz84XRVgBq1Ni9zlPcI8nbX575BgYJ4xyxaNXSP8fp-f7Pxm_74jb3pZ5z_uIcPKFp1GoKq2X8do/s1600-h/238028_f120.jpg"><img id="BLOGGER_PHOTO_ID_5353029430505054354" style="margin: 0px 0px 10px 10px; float: right; width: 279px; height: 77px;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXeuNNYi3zcAHMbm-02i5RglrW3XVHrpgDlEEftlfErzzrOjdx5v2IjGG46I1vbCrLz84XRVgBq1Ni9zlPcI8nbX575BgYJ4xyxaNXSP8fp-f7Pxm_74jb3pZ5z_uIcPKFp1GoKq2X8do/s200/238028_f120.jpg" border="0" /></a><br /><br /><br /></div><br /><div align="justify"><br /><br /><br />For the operation of e-currency, only computer networks, internet and digital stored value system are needed. The examples of e-currency are Electronic Fund Transfer (EFT) and direct deposit. EFT refers to the computer based system used to perform financial transaction electronically while direct deposit is a banking term used to refer to certain syatems used to transfer money. </div><div align="justify"> </div><div align="justify">The reasons causes e-currency has been accepted widely are as following:</div><ul><li>Anyone can learn currency trading </li><li>Users can learn to trade in a couple of week</li><li>Users can trade for big profits in less than 30 minutes a day</li><li>Users no need much money and they just need a computer and internet connection</li><li>Users have the opportunity to trade for profits everyday</li><li>Users can leverage to increase their risk reward</li><li>Users have low transaction costs which means they keep more of the profits</li><li>There is a never recession because one currency rises another must fall</li></ul><div align="justify">Users online trading account is a powerful tool to build wealth if they want to trade currencies and of course users need to use it wisely. But just as online trading has created an opportunity, do not think that it is a 'walk in the park'. </div><br /><div align="justify">There are something users have a must to taken into account before open an online trading account. Trading requires not just a simple method, but the understanding of ownself and the discipline to appply a plan. Users should keep in mind if they decide to do e-currency trading, users have to choose abrokerage firm to work with. It will mean evaluating what is the available in order to make the right choice. Although users can leverage up to 200 brokers, but the more brokers the higher risk they are facing. Thus, 10 to 20 brokers are enough for the currency traders. When choosing brokers, there are 3 important factors need to be concern about.</div><ol><li>The security of funds.<br /></li><li>The transaction costs<br /></li><li>The ease of use and reliability of the trading problem.</li></ol><p align="justify">The rise of e-currency trading has increase the volability and this had made the markets herder to trade. Today, we can trade by just click on the mouse and get all the latest information in a split second and this hasdefinitely increased volability. The low transaction costs of e-currency cause small transactions where usual cashless funds not comfortable. </p><p align="justify">In my point, e-currency trading is a challenge and an opportunity if you have the right mindset, want to learn, and accept the challenge, you will win and earn a great second or even life changing income. But before you trade, makesure you have a through understanding of volability and standard deviation of price, as dealing with volability is the biggest challenge you will face in achieving currency trading success. If not, advantages can soon turn to disadvantages. You need to be aware of this and use the services your brokers can offer you wisely and then you can seek a big profit.<br /></p><img id="BLOGGER_PHOTO_ID_5353029784419699234" style="margin: 0px auto 10px; display: block; width: 214px; height: 137px; text-align: center;" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRJg2e-Ashv6uOkEcqFXLs2HIJjFj1Etx5icpplhKvw47TqKiA-w-FxfueKbfPVX3BzVQgya_3XQ0m449KzNbuAPal-mtNvmqVsY80a080E0wa87uCNzP20qE8e0bBJ94E8zu0-hyZ4PU/s200/egold_(swapw_-_making_money_smart).jpg" border="0" />Related links: <ol><li><a href="http://www.learncurrencytradingonline.com/electronic-currency-trading.html">http://www.learncurrencytradingonline.com/electronic-currency-trading.html</a></li><li><a href="http://en.wikipedia.org/wiki/Electronic_money">http://en.wikipedia.org/wiki/Electronic_money</a></li><li><a href="http://en.wikipedia.org/wiki/Electronic_funds_transfer">http://en.wikipedia.org/wiki/Electronic_funds_transfer</a></li></ol><p>-Mun Yee-</p>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-12868096944797632512009-06-27T07:15:00.000-07:002009-06-30T01:17:53.417-07:00The Application of 3rd Party Certification Programme In Malaysia<div style="TEXT-ALIGN: justify">Third Party Certification (TPS) is an assessment carried out to ensure satisfaction and confidence of customers. The increasing phishing and spoofing attacks on the internet has boost the implementation of TPC programme to ensure the information traveled over the internet reaches to the recipient safely. The TPC programme requires the posting of a website privacy statement to inform a visitor about what peronal information a web site may collect from them and how it will be used and disclosed amont other features.<br /></div><br /><div style="TEXT-ALIGN: justify">Security is the primary concern of entering into a new internet economy. The ever-changing paradigm of e-commerce requires a well-mandated security infrastructure.<br /></div><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZhLgJ3Q1t7wd2Rpl4a6qdH71zBCXSe1mMPL0D8FlQ7sL7JduAzy-11VVhewAVSLVCxs15ZZUUe7xF60Qd3KBVHDZbzY6v7XpkAoza0Ble-GmNTrRWJ1wu31A6G5_O3tHRHDn46yMAi0o/s1600-h/trystgate.jpg"><img id="BLOGGER_PHOTO_ID_5352027607047910578" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 224px; CURSOR: pointer; HEIGHT: 71px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZhLgJ3Q1t7wd2Rpl4a6qdH71zBCXSe1mMPL0D8FlQ7sL7JduAzy-11VVhewAVSLVCxs15ZZUUe7xF60Qd3KBVHDZbzY6v7XpkAoza0Ble-GmNTrRWJ1wu31A6G5_O3tHRHDn46yMAi0o/s200/trystgate.jpg" border="0" /></a> <div style="TEXT-ALIGN: justify"><br />MSC Trustgate.com Sdn Bhd is the most famous application of third party certification programme in Malaysia. It is a licensed Certificate Authority (CA) operating within the Multimedia Super Corridor. MSC Trustgate was incorperated in 1999 to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region. The vision of Trustgate is to enable organizations to conduct their business securely over the Internet, as much as what they have been enjoying in the physical world due to the issue above.<br /></div><br /><div style="TEXT-ALIGN: justify">Trustgate's core business is to provide digital certification services which including digital certificates,cryptograhic products, and software development. There are several products provided by Trustgate, such as SSL Certificate, PKI, Personal ID, MyTRUST, MyKad ID, SSL VPN, and etc.<br /><br /><span style="FONT-WEIGHT: bold">MyKad PKI</span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0emkYmb80BmhnN7B6i0YcJdClQAWuVG69x7bHI6hzu5EONr1nG5dPWF1R0RnDlOzAvHg92fhmoB90uuk5qN9vRnTh0jXzAESpTJUDXMruIYSyW0DSFHU4mZntc9G6bvmWJxvvSuCw6ww/s1600-h/mykad.jpg"><img id="BLOGGER_PHOTO_ID_5352031937971122386" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 130px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0emkYmb80BmhnN7B6i0YcJdClQAWuVG69x7bHI6hzu5EONr1nG5dPWF1R0RnDlOzAvHg92fhmoB90uuk5qN9vRnTh0jXzAESpTJUDXMruIYSyW0DSFHU4mZntc9G6bvmWJxvvSuCw6ww/s200/mykad.jpg" border="0" /></a><br />Malaysia Government has put in place a smart National Identity Card (MyKad) for every citizen. My Kad with PKI capability allows its holder to conduct online transaction with governement agencies private sectors.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMHxvnrXZrjmNhyphenhyphenGJvb7S2dg2VCAmoEtSVq24BfW_Y9JJGFS4aYM8W0B_VvkK8f_1QjveXMp7AIHavgGx9JOPJjrxFVy2ZiCZXCt_5FSG8yZ5K7QF_APt_1CWVWqVWouFyETc7wU93oCo/s1600-h/mykey.jpeg"><img id="BLOGGER_PHOTO_ID_5352032464565425346" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 150px; CURSOR: pointer; HEIGHT: 80px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMHxvnrXZrjmNhyphenhyphenGJvb7S2dg2VCAmoEtSVq24BfW_Y9JJGFS4aYM8W0B_VvkK8f_1QjveXMp7AIHavgGx9JOPJjrxFVy2ZiCZXCt_5FSG8yZ5K7QF_APt_1CWVWqVWouFyETc7wU93oCo/s200/mykey.jpeg" border="0" /></a><br />MyKey is the MyKad PKI solution that works with the physically MyKad which allowing to authenticate users online and to digitally sign documents or transactions and is accepted by the Malaysian Government.<br /><br /><span style="FONT-WEIGHT: bold">MyTRUST </span><br />For Mobile Signature<br />Users can turn a SIM Card into Mobile Digital Identity for secure banking and other financial services with MyTRUST. Users are able to digitally sign any transaction with ease and convenient via their mobile phone.<br /></div><div style="TEXT-ALIGN: justify"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg55rLlb5rP8rHeBqrrtB6kqZWZtkHeI7iuLr6FKs5_8Xnk_yRgZuXwTzLFsGbDPVALpDtQT_Y6kg_-xMU-7puspcszUYlDob8VrsT152sfAk-CZ-kxIiGovdLiVLfJmlnVcY2FB3fMmW0/s1600-h/mytrust2.gif"><img id="BLOGGER_PHOTO_ID_5352023858675687074" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 125px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg55rLlb5rP8rHeBqrrtB6kqZWZtkHeI7iuLr6FKs5_8Xnk_yRgZuXwTzLFsGbDPVALpDtQT_Y6kg_-xMU-7puspcszUYlDob8VrsT152sfAk-CZ-kxIiGovdLiVLfJmlnVcY2FB3fMmW0/s200/mytrust2.gif" border="0" /></a><br />For Government<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPOmhmBhWisogfHa3DqWMclAkHcuTAnHWGi2nVOZZj3TvhUouLBgdRHNghtNlcRrVf1zDTvrUjeTGl5MwvbWKBvVecpf0ccSPtSiCeAZlXNcvAtWIex5paiH_CC12l3AwmoNIVy96TMqI/s1600-h/mytrust3.gif"><img id="BLOGGER_PHOTO_ID_5352024234359894034" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 116px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPOmhmBhWisogfHa3DqWMclAkHcuTAnHWGi2nVOZZj3TvhUouLBgdRHNghtNlcRrVf1zDTvrUjeTGl5MwvbWKBvVecpf0ccSPtSiCeAZlXNcvAtWIex5paiH_CC12l3AwmoNIVy96TMqI/s200/mytrust3.gif" border="0" /></a><br />For Banks & Enterprise<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCD0K-giu_CfMO8p53vazQUpe0GFF6Xr-thT5EeyKiHYkWYDOUYM9VYrRbDdFjHdaUJyGxvILsvF_8PyxxGmiTxComqVWp2jAsZKEW9GqfdU6vpUBy05xXfodfYrcDAeMU68-DWTCuhLY/s1600-h/mytrust5.gif"><img id="BLOGGER_PHOTO_ID_5352024619887220674" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 116px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCD0K-giu_CfMO8p53vazQUpe0GFF6Xr-thT5EeyKiHYkWYDOUYM9VYrRbDdFjHdaUJyGxvILsvF_8PyxxGmiTxComqVWp2jAsZKEW9GqfdU6vpUBy05xXfodfYrcDAeMU68-DWTCuhLY/s200/mytrust5.gif" border="0" /></a> <div style="TEXT-ALIGN: justify"><span style="FONT-WEIGHT: bold">SSL Certificate</span><br />SSL is the short for Secure Sockets Layer. It is a protocol developed by Netscape for transmitting private documents via the Internet.<br /></div><div style="TEXT-ALIGN: justify"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyGbp12Wu8Isq_Oi5k80qpAAm2NXZkPQSx_rqxTPNVmufvZHjIrGLcFQB39cXrjIH4JhtMnnwQYqSWszNyNJenhyw2h19k4DBCC6QTlVJZTrKPq3kv-upcO7D2gEq4PaO4us10UGoo0oM/s1600-h/Verisign_logo.jpg"><img id="BLOGGER_PHOTO_ID_5352027189849481058" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 102px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyGbp12Wu8Isq_Oi5k80qpAAm2NXZkPQSx_rqxTPNVmufvZHjIrGLcFQB39cXrjIH4JhtMnnwQYqSWszNyNJenhyw2h19k4DBCC6QTlVJZTrKPq3kv-upcO7D2gEq4PaO4us10UGoo0oM/s200/Verisign_logo.jpg" border="0" /></a>VeriSign is the leading SSL Certificate Authority that enabling secure e-commerce, communications, and interactions for web sites, intranets, and extranets. It choose the most trusted mark on the internet and enable the strongest SSL encryption available to every site visitor.<br /></div><br /><br /><div style="TEXT-ALIGN: justify"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEideVsqjqLvIpgPgWCRWcvJ4xysFWU8syKFQXFhlIOxkKa3i3qOvkNFdAMm9_9tWE-EbI_CFxxyaEgW7_FnAp8BBweYrjqDZis-e-dPsGQgYBp-kiMO9Ac-gD1hE9Vseg6J8aocMStIShQ/s1600-h/verisign.jpg"><img id="BLOGGER_PHOTO_ID_5352026906053536338" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 190px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEideVsqjqLvIpgPgWCRWcvJ4xysFWU8syKFQXFhlIOxkKa3i3qOvkNFdAMm9_9tWE-EbI_CFxxyaEgW7_FnAp8BBweYrjqDZis-e-dPsGQgYBp-kiMO9Ac-gD1hE9Vseg6J8aocMStIShQ/s200/verisign.jpg" border="0" /></a>When we see the VeriSign logo on the website, we can click on the seal to find out more about the security of the site.<br /></div><br /><span style="FONT-WEIGHT: bold">Public Key Infrastructure (PKI)</span><br />Trustgate provide PKI to assist all the companies in conducting their business over the internet.<br />Organizations are helped by PKI technologies to enhance the security of the data and manage identification credentials from the users and organizations. It helped to secure by based on the exchange of digital certificates between authenticated users and trusted resources.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcFvLEtyhsq3m0iY5qwjI5Co8lDaKBGumJo_UyIQUbITfHqySUUnKjOcDsvhgqgUy5j6Kjuv0vCO6sWDar2djMhuOYEibu6tOHaJpHPSXh34Jc5sv84UGCS8-luGZTH5YmhJW2-BUFrug/s1600-h/mpki_arch.gif"><img id="BLOGGER_PHOTO_ID_5352030145940608130" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: pointer; HEIGHT: 150px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcFvLEtyhsq3m0iY5qwjI5Co8lDaKBGumJo_UyIQUbITfHqySUUnKjOcDsvhgqgUy5j6Kjuv0vCO6sWDar2djMhuOYEibu6tOHaJpHPSXh34Jc5sv84UGCS8-luGZTH5YmhJW2-BUFrug/s200/mpki_arch.gif" border="0" /></a><br />Last but not least, TPC can enhance customer trust because of its efficient management of digital certificates. It also have a complete control over digital certificate issuance, usage, and certificate content. Besides, it is easy to use and manage with web-based user and administrative services. Scalability of TPC also provide customers a better solution if there are any treats happen toward the computer system. </div><div style="TEXT-ALIGN: justify"></div><div style="TEXT-ALIGN: justify"> </div><div style="TEXT-ALIGN: justify">Related links:</div><ol><li><div style="TEXT-ALIGN: justify"><a href="http://www.msctrustgate.com/">http://www.msctrustgate.com/</a></div></li><li style="TEXT-ALIGN: justify"><a href="http://www.verisign.com/">http://www.verisign.com/</a></li><li style="TEXT-ALIGN: justify"><a href="http://www.trademal.com/global/index.php/id/17463/target/about/MSC_Trustgate_com_Sdn_Bhd/index.html">http://www.trademal.com/global/index.php/id/17463/target/about/MSC_Trustgate_com_Sdn_Bhd/index.html</a></li></ol><div style="TEXT-ALIGN: justify">-Mun Yee-</div>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com0tag:blogger.com,1999:blog-6198543008933052625.post-24298501644199181262009-06-26T09:35:00.000-07:002009-06-30T00:14:43.289-07:00Phishing: Examples and its prevention methods<span style="font-size:130%;">What is Phishing ? Identity Theft</span><br /><br />Phishing is the fraudulent Internet activity to acquire important information of a computer users such as usernames, passwords, credit card numbers and so on by sending an e-mail to the users by detailing that they are from the legally established entity in an electronic communication. These mails often ask PC users to go to certain website to update their personal information. From here, those who clicked on the mail......Boom ! YOUR INFO HAS JUST GOT STOLEN !<br /><br />In other words to describe the word "Phishing", it would probably to use the term "<i>brand spoofing</i> or <i>carding</i>" or more common to be "Fishing". Those who sent the mail is like waiting and hoping there are people would click on the link given, in other word, the fish ate the bait.<br /><br />Examples of Phishing :<br /><br />1. <span style="font-weight: bold; color: rgb(0, 0, 153);">Social Engineering</span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-Up-ehX4-dwOBEycCym2QoZYzK729hQFPn1ViCKzn-KT24hF_6Y090tNCgftHvcDJPz9iqtvqA68lfbl7JRYJE3XiwTVQR0oJ8Uan9_Yo0F6v7RgQsl7VybDG2R1hvLo3jb7ivMUBcSE/s1600-h/phishing21.png"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 247px; height: 191px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-Up-ehX4-dwOBEycCym2QoZYzK729hQFPn1ViCKzn-KT24hF_6Y090tNCgftHvcDJPz9iqtvqA68lfbl7JRYJE3XiwTVQR0oJ8Uan9_Yo0F6v7RgQsl7VybDG2R1hvLo3jb7ivMUBcSE/s200/phishing21.png" alt="" id="BLOGGER_PHOTO_ID_5351702805227472418" border="0" /></a><br /><br />Peoples' eyes often attracted by those words or sentences that might affecting their normal daily life. Those sentences might be "Click here to activate your bank Account" or maybe "Detailed information required to update to prevent loss of something". We as normal human being would worry that our information is gone or to keep in track, this kind of methods often comes with an email with link provided for the users to click on.<br /><br /><br />2. <span style="font-weight: bold; color: rgb(0, 0, 153);">Link Manipulation (Spoofing)</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwU3dYms10bR-ewo08rhg5y5zU8WG4IOGj4M-gc9AJlhV2RFBwFucmOhIA1S5-AVN3vUJ_QTH25R3KR-G9dYu674VHzsHhF5v7EpD6M16XBdkqbXL3sibsHoOd1_VgIOUoabSEqVP8VhY/s1600-h/Link+manipulation+,+spoofing.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 136px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwU3dYms10bR-ewo08rhg5y5zU8WG4IOGj4M-gc9AJlhV2RFBwFucmOhIA1S5-AVN3vUJ_QTH25R3KR-G9dYu674VHzsHhF5v7EpD6M16XBdkqbXL3sibsHoOd1_VgIOUoabSEqVP8VhY/s200/Link+manipulation+,+spoofing.jpg" alt="" id="BLOGGER_PHOTO_ID_5351703799820090402" border="0" /></a>In some mails that we often receive, we would notice that inside those mails there are some hyperlink that link to some other websites. Phishers manipulate the link of a normal website or legitimate website to perform their dirty jobs. Examples such as www.google.com @ xxx.com. For normal computer users with not much knowledge would think that the website is actually harmless as the word www.google.com are being used. The link seems to be safe to surf but eventually there are many booby traps inside the website. Once the users click on the hyperlink provided, they are being directed towards some website that they not even know about it. The following example link, <span style="white-space: nowrap;"><tt><a href="http://en.wikipedia.org/wiki/Deception" title="Deception">http://en.wikipedia.org/wiki/Genuine</a></tt></span>, appears to take you to an article entitled "Genuine"; clicking on it will in fact take you to the article entitled "Deception".<br /><br /><br />3.<span style="font-weight: bold; color: rgb(0, 0, 153);">Filter evasion</span><br /><br />In some mails that we received which may contain some images that would draw our attention to click on it to bring us to the phisher's sites. This method is done to prevent detection of the mail being classified as a phisher's tools.<br /><br /><br />4.<span style="font-weight: bold; color: rgb(0, 0, 153);">Website forgery</span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-le38F3udCuWqT8x58T8QeTN6Se0QbyQY2VN1t2x4F4pGeGyxxdwB36c5aX0VRlU7xciF82xQHUIc8bQ-qMDjYeY5v8igGLxnArlEksQdXowHCzSgqLZ2z2EPt8HTqFCl6h-KP7IfH7A/s1600-h/phishing.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 277px; height: 218px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-le38F3udCuWqT8x58T8QeTN6Se0QbyQY2VN1t2x4F4pGeGyxxdwB36c5aX0VRlU7xciF82xQHUIc8bQ-qMDjYeY5v8igGLxnArlEksQdXowHCzSgqLZ2z2EPt8HTqFCl6h-KP7IfH7A/s200/phishing.jpg" alt="" id="BLOGGER_PHOTO_ID_5351708808410185538" border="0" /></a><br />Sometimes we might realise that our homepage has been altered by somebody but we never know when and how this has took place. This is because the phisher use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL.<br /><br />Another type of website forgery is <span style="font-style: italic;">Cross Site Scripting</span>. The users sign in on their own bank account which seems to be safe as everything inside the website is correct even with the CAs. This type of attacks is hardly to detect as the websites are normal but it carries the gens of attacking and hacking the users information.<br /><br />5.<span style="font-weight: bold; color: rgb(0, 0, 153);">Phone Phishing</span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGtAJni8GV45McVpPbe97qgtFi3mAmZ4Le1YuTkcLjs7Y-5WrJN4WxJ5wgrTJKZITf9h8rnGvFkT7GPeseqtvm1lnmXmcGxGraHlZRRzsmvGtECpmBxVyaJ51AGTiQJR90DnJ4ay41w5Q/s1600-h/MobilePhishHypothetical.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 171px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGtAJni8GV45McVpPbe97qgtFi3mAmZ4Le1YuTkcLjs7Y-5WrJN4WxJ5wgrTJKZITf9h8rnGvFkT7GPeseqtvm1lnmXmcGxGraHlZRRzsmvGtECpmBxVyaJ51AGTiQJR90DnJ4ay41w5Q/s200/MobilePhishHypothetical.jpg" alt="" id="BLOGGER_PHOTO_ID_5351711207423159586" border="0" /></a><br />This is known as the Vishing ( Voice phishing ) . This is also a method adopted by the phishers to trick the users provide them their usernames and passwords or even credit card numbers. The users might be required to make a certain phone number which leads to the phishers. When the users dialed to the phishers' phone number provided by a Voice over Internet Protocol service, the information will leak to the phishers.The Phishers sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.<br /><br /><br />6.<span style="font-weight: bold; color: rgb(0, 0, 153);">Spear Phishing</span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijI7uOiJ2AvgQWxHyFzzfqhfyUGlR1ddt68L_gk0kKb-knZeBie6cx-UrR8_I_hHabGP7yN5Piajt3NBXdkYGVg2zDp-N0uj8dnsacUQTJkhfroMDeaC9CpHBzeSRDaFLa1E1vNSbILgQ/s1600-h/how-viagra-spam-works-large.png"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 142px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijI7uOiJ2AvgQWxHyFzzfqhfyUGlR1ddt68L_gk0kKb-knZeBie6cx-UrR8_I_hHabGP7yN5Piajt3NBXdkYGVg2zDp-N0uj8dnsacUQTJkhfroMDeaC9CpHBzeSRDaFLa1E1vNSbILgQ/s200/how-viagra-spam-works-large.png" alt="" id="BLOGGER_PHOTO_ID_5351714374952728594" border="0" /></a><br /><br />With all the malicious code written by the pshishers, they uses this new methods to steal information from a persons. This phishing scam can be focus on one group of people or divisions. The phish appears to be legitimately addressed by someone in the organization which often to be the person in the IT or HR departments. Some Spear Phishing also asked users to click on the link or pictures that will eventually deploys spyware to the computers.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiglUj7p2IKdDQSaTa2Q-wXzENI3899hzP5QXrkhSMt2zqbaaKcbi4XMw7HGJAj7T_H0RdF33JH7abUHrhComRyJX1LldXWLJJGiSNbuyYiNMjB_6yZeUzIjcU4sMSYLuyxT_4R_5E5Wyo/s1600-h/no-NIS_Settings_clean_lg.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 278px; height: 198px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiglUj7p2IKdDQSaTa2Q-wXzENI3899hzP5QXrkhSMt2zqbaaKcbi4XMw7HGJAj7T_H0RdF33JH7abUHrhComRyJX1LldXWLJJGiSNbuyYiNMjB_6yZeUzIjcU4sMSYLuyxT_4R_5E5Wyo/s200/no-NIS_Settings_clean_lg.jpg" alt="" id="BLOGGER_PHOTO_ID_5351718042218700978" border="0" /></a><br /><span style="font-size:180%;">Prevention</span>s<br /><br />1. As the paths of development in the ITs is growing fast and faster, nowadays some anti-virus software does provide the features of filtering the phisher to prevent us to fall into the phisher's trap. So, get yourself a reliable anti-virus software.<br /><br />2.Phish Tank --- software that can identify the URLs whether it is safe to surf on or not .<br /><br />3.Keep computer up-to-date. As microsoft provides malicious software removal tools which can prevent form the Spear Phishing. Always turn on the Phishing filter in the Internet Explorer to protect the security of the websites.<br /><br />4.Install Site Advisor. There are some antivirus which provide the site advisor to the users in order to protect them from the threats. Such antivirus are AVG internet security and MACfree Antivirus. But .... Sometimes.. i really doubt what they can actually do....<br /><br />5.Perform triple check on the website that you received, make sure those websites are trusted websites and is in your areas of concern.<br /><br />6. Do not use same passwords and usernames for every accounts and do not do business with the website which is unknown.<br /><br /><br />In conclusion, Phishing is becoming a serious threats to the networking connected fields such as baking industry and e- commerce. There are also sign of increasing of this wrong-doing. Be a wise users and protect our own belongings.....<br /><br /><br />Related Links:<br /><br />http://en.wikipedia.org/wiki/Phishing<br /><br />http://www.webopedia.com/DidYouKnow/Internet/2005/phishing.asp<br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9qTB5d2vs611eMbzOMdDLTDDFvphVBW6fSiud0ZCHPS-phyphenhyphengvbN8zLUqUsAUPyyBC21eQEW3WrM00pkj0UL9CpNbp9Dp2bSd3ItvGwbQ-Ol4zwGn4twIXChhrkGXNtP846vALYuDWQiI/s1600-h/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg"><img style="cursor: pointer; width: 91px; height: 91px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9qTB5d2vs611eMbzOMdDLTDDFvphVBW6fSiud0ZCHPS-phyphenhyphengvbN8zLUqUsAUPyyBC21eQEW3WrM00pkj0UL9CpNbp9Dp2bSd3ItvGwbQ-Ol4zwGn4twIXChhrkGXNtP846vALYuDWQiI/s200/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg" alt="" id="BLOGGER_PHOTO_ID_5351721657626389250" border="0" /></a><br />Posted by Chee Liat LongT4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-84271842772132831782009-06-26T04:41:00.000-07:002009-06-30T00:14:43.289-07:00The threat of online security: How safe is our data?<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkWlc86RuHacN109KIyw20mWdvbywe5oCBAY1am7SilsiOrQLpkzcJ1uEXCr4XZsTrREoNeYJ4WFg4M56hqU4OUM-4JlcZCJIE9lWw0ah95go5W9p8Dd6Ut9HZlIfke59QYjXWgkmFTF0/s1600-h/sick-computer.gif"><img style="MARGIN: 0px 0px 10px 10px; WIDTH: 200px; FLOAT: right; HEIGHT: 200px; CURSOR: hand" id="BLOGGER_PHOTO_ID_5351600531418134834" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkWlc86RuHacN109KIyw20mWdvbywe5oCBAY1am7SilsiOrQLpkzcJ1uEXCr4XZsTrREoNeYJ4WFg4M56hqU4OUM-4JlcZCJIE9lWw0ah95go5W9p8Dd6Ut9HZlIfke59QYjXWgkmFTF0/s200/sick-computer.gif" /></a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcLpn_GXFnJYhmSao4uUV9BdBN8BYKAqHk8a7p5lfsFhK3UZo9gCRbn6Antua1XwtltQKFQru6c0_ZhNfe7uMdDkDwoW8N8ne6C4Xt0vhmdh2jKrnJu5i3ndrkr0ISlbeQiSqChsfAfEM/s1600-h/sick-computer.gif"></a><div><br />Online security threats are one of the biggest challenges for most of the organizations today. Organizations continue to experience cyber attacks from inside and outside of the organization. In addition, the types of cyber attacks that organizations experience were varied. These made organizations started to worry that the user's break into the server purposely is to alter the pages and content at the site. Besides, they would also worried about the disruption of server by user, because by doing that would possibly made it unavailable to other.<br /><br />Cyber attacks fall under several general categories:<br /><strong>(i) accidental actions<br /></strong>- A large number of computer security risks are contributed by accidental actions. Most of the users nowadays are lack of knowledge about online security concepts, these includes poor password choices, accidental disclosure, erroneous or even using a outdated software. For example, many people are using <a href="http://www.facebook.com/">facebook</a>,<a href="http://www.friendster.com/"> friendster</a>, <a href="http://www.ebay.com/">ebay</a> and others. All of these are actually need user to enter their user name and password to log in. The problem is people are tend to use their IC number, birthday, or even an "easy memorize number" like "1234"as their password. This make it easy for people to figure out their password and break into their account. However, this form of cyber vulnerability is avoidable if education and prudence are being considered.<br /><br /><strong>(ii) malicious attacks</strong><br />- Attacks that specifically aim to do harm. It is at root of so-called "crackings" and "hackings"-notable examples of which include computer viruses, denial-of-service (Dos) attacks, and distributed denial-of-service (DDos) attacks.<br /><br /><span style="color:#000099;">* computer viruses<br /></span>- a piece of software code that inserts itself into a host, including the opearating system, to propagate; it requires its host program be run to activate it. A virus will simply infect and spread over the operating system and consequently cause the server system broke down. As an example, the May 2000 "I LOVE YOU" virus. A small piece of code attached to electronic mail (E-mail),and double-clicking on the executable caused it to send an e-mail to everyone in an address book, subsequently damaging victim's machines. The virus caused over $100million in US damages and over $1million in worldwide losses.<br /><br /><span style="color:#000099;">* denial-of-service (Dos) attacks</span><br />- an attack on a web site in which attacker used specialized software to send a flood of data packets to the target computer with the aim of overloading its resources. It may cause a network to shut down, making it impossible for users to access the site.<br /><br /><span style="color:#000099;">* distributed denial-of-service (DDos) attacks</span><br />- a denial-of-service attack in which attacker gains illegal administrative access to computers on the Internet and uses them to send a flood of data packets to the target computer. Such attacks were witnessed in a number of large corporate computer shutdown in 2000.<br /><br /><strong>(iii) online fraud<br /></strong>- A broad term covering Internet transactions that involve falsified information. There are 2 major form of online fraud: identity theft and data theft.<br /><br /><span style="color:#000099;">* identity theft<br /></span>- the theft of personal identity on the internet is the newest form of fraud. A person may open a credit card account by using a false identity such as the victim's name, address, or bank account. Besides, since it's impossible to identify the identity of buyer through online, a person can also do online transaction using victim's identity if they can get the victim's personal information.<br /></div><div>- Talking about identity theft, I have an experience before. My sister's boyfriend (A) ever used my account to chat in messenger with my friend and my friend didn't aware about it even until they finished the conversation. Sounds so funny! At the moment, I realize that there is "online security threat" in messenger too. "A" using my identity while my friend can't even recognise who is she dealing with. These shown that there is lack of proper security to detect people's identity and thus enable a person to do whatever he/she want using other people's identity. </div><div><br /><span style="color:#000099;">* data theft<br /></span>- the theft of information , unauthorized data, or manipulation of private data. Data theft is a problem primarily perpetrated by office workers with access to technology. Since employees often spend a considerable amount of time developing confidential and copyrighted information for the company they work for, they often feel they have some right to the information and are inclined to copy/delete it when they leave the company. Besides, they might also misuse it while they are still in employment.<br /></div><div>- In April 2001,2 employees of Cisco System were obtained unauthorized access to Cisco stock and they broke into the computer system that handled stock distribution. They were able to transfer stock shares nearly $6.3million to their private portfolios. </div><div><br />As the conclusion, the financial losses from a cyber attack can be substantial. Except the financial losses, it also bring other effect to users. These shown that the online security still need to be improved. Security requirements such as authentication, authorization, and confidentiality also need to be considered. </div><div><br /></div><div>Posted by: Shu Hui</div>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com0tag:blogger.com,1999:blog-6198543008933052625.post-60696861319658361682009-06-25T09:55:00.000-07:002009-06-26T01:25:36.818-07:00How to safeguard our personal and financial data<span style="font-family:arial;">As Internet criminals grow smarter and sneakier, Internet is no longer a safe place. It is increasingly difficult to keep your financial and personal information safe because hackers have the ability to get that information. Have you done proper safeguards for data? If you don't take basic steps to protect your data, you may find yourself a victim of fraud or identity theft.<br /><br /></span><span style="font-family:arial;"></span><span style="font-family:arial;">Here are a few tips on how to safeguard your personal information: </span><br /><br /><p><span style="font-family:arial;"><strong>~ Password protection</strong> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZwuQaBouAVZM0lXCTko5Z9oankOwiVJ_XA8lIfyome0N-AwuqMXUWpFHVMQkRyu-1kN8dtfjSIl3QukSGshY1xhCJ9ywaV69lcnyEeWLj2TynY4IrvnXJx9J3bys5yCFBQd17xeNLoqE/s1600-h/password_star.jpg"><img id="BLOGGER_PHOTO_ID_5351315393495452562" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 142px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZwuQaBouAVZM0lXCTko5Z9oankOwiVJ_XA8lIfyome0N-AwuqMXUWpFHVMQkRyu-1kN8dtfjSIl3QukSGshY1xhCJ9ywaV69lcnyEeWLj2TynY4IrvnXJx9J3bys5yCFBQd17xeNLoqE/s200/password_star.jpg" border="0" /></a><br />While you choose passwords (you'll remember), please make sure that passwords is not be something that are easy for someone else to guess, such as the name of your child's name or your date of birth. A combination of uppercase and lowercase letters, numbers, and symbols will offer more security. Also, never write this information down and never carry it in your wallet .</span></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:arial;"></span></p><p></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:arial;"><strong>~ Do not reveal any personal information or particularly passwords</strong> to anyone.<br />Don't give your personal and financial information to someone or organizations that you don't know or never dealt with before. Even though giving something, such as date of birth and mother's maiden name, can be used to steal personal identity. Therefore, it's important to know that personal information can be just as dangerous as financial information. </span></p><p><span style="font-family:Arial;color:#cccccc;">.</span></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:arial;"><strong>~ Be careful of the merchants which you deal with</strong><br />If you place orders or shop online, try to make sure it is a legitimate site. Transaction made only with good reputation organization, such as Amazon.com. If in the real world, you're shopping, you're more likely to trust an established store that you know and using normal payment means. Besides, it's essential that you use a password-protected and encrypted wallet, to safeguard your credit card information. </span></p><p><span style="color:#ffffff;">.</span></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:Arial;"></span></p><p><span style="font-family:arial;"><strong>~ Keep your eye out for scams</strong> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDUijeh3R-nbu25nut0n9cA4XCpM7WNJB1uYAbAFRYfjSh6fBFBtpI407cC0ZgIYPJVgcU0XgrcUQ7TJr5AQ-AyLeDkcGE-3FdGivuC8mhDQb-9E12I38khLYSi4ly4Cr6ZE-YXCPZzbg/s1600-h/cover.gif"><img id="BLOGGER_PHOTO_ID_5351314737222123346" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 176px; CURSOR: hand; HEIGHT: 164px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDUijeh3R-nbu25nut0n9cA4XCpM7WNJB1uYAbAFRYfjSh6fBFBtpI407cC0ZgIYPJVgcU0XgrcUQ7TJr5AQ-AyLeDkcGE-3FdGivuC8mhDQb-9E12I38khLYSi4ly4Cr6ZE-YXCPZzbg/s200/cover.gif" border="0" /></a><br />Many people have become familiar with common scams. Don’t hesitate, <span style="color:#ff0000;">DELETE</span> them. But now there are even more-convincing scam e-mails. You are probably confident you're not getting RM1million from anonymous sources, but if you get an e-mail, where the bank needs you to update your personal information for the security purpose, it looks realistic, Right? People will probably hand over their information and compromise all their financial accounts. If you receive an e-mail from any institution asking for your personal or financial information, even if it appears to come from a place you trust such as eBay, Paypal or Maybank, <span style="color:#ff0000;">DO NOT respond</span>. Instead, pick up the phone and call in order to verify. Nowadays, many fake e-mails have been circulating around us. Many people have been a victim of the fake e-mail. <span style="color:#ff0000;">PLEASE be cautions!</span> Don’t be one of them. </span></p><p><span style="font-family:arial;"><br /></p></span><p><span style="font-family:arial;"></p></span><span style="font-family:arial;"></span><p><span style="font-family:arial;">Sound terrible, right? You don't need to be scared, but you need to be cautious and aware that there are people on the Internet that will take advantage if you allow them. If something doesn't seem right, trust your gut and avoid it.</span></p><img id="BLOGGER_PHOTO_ID_5351316413850081890" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 105px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2dCea4iw54LTs-jO9SnLwAgO_iY6l2Z73vAxPo8noRRzu-Rh6KlKWQXuvU_YsKGO0pFAiDFGc24pf2p8JHMfeper31hY83-RLn2Lam4MeEnzhVg5fF_9AtMqA0EkGp1NJiepzvx7brdc/s200/StarTrekscreensaver_RedAlert.jpg" border="0" /> <span style="font-family:Arial;">Related Links:</span><br /><ol><li><a href="http://buckeyesecure.osu.edu/SafeComputing/Passwords">http://buckeyesecure.osu.edu/SafeComputing/Passwords</a></li><li><a href="http://azlan.anilezfa.com/maybank-fake-email">http://azlan.anilezfa.com/maybank-fake-email</a></li></ol><span style="font-family:Arial;"></span><br /><span style="font-family:Arial;">Posted by Qiao Ling</span>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-89772644401911064412009-06-18T08:07:00.000-07:002009-06-24T07:18:15.993-07:00History&Evolution of E-commerce<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjbIJ0WREQ6FQxs1_ds9bLA0FPo0uuTL5OlI5zeUsVsHz0TN5z0DtPOBOMeYvOqtGAHOyKCYs1gDkSXHKobFsC6ybEd_DD4OWwgzN1tUzFUezJFCopJFxVL7Aw4R8JAhsoYZ6a8lTFXWM/s1600-h/images2.jpg"></a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSq6kmGTjdXV2A6OwMFlHr7mQY1rO2zszrUlTZ5iCezdG7emuGkbiKoXit4YMsH8oFC5dKMo-hFuE9B1v-hRyI_Gvr1-P0pkkwVyxAG0zZ9kJD-C-KEVG0-RRYiCfFM_WiO2t7VMG4tcY/s1600-h/ecommerce.jpg"><img id="BLOGGER_PHOTO_ID_5348709893536049826" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 154px; CURSOR: hand; HEIGHT: 105px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSq6kmGTjdXV2A6OwMFlHr7mQY1rO2zszrUlTZ5iCezdG7emuGkbiKoXit4YMsH8oFC5dKMo-hFuE9B1v-hRyI_Gvr1-P0pkkwVyxAG0zZ9kJD-C-KEVG0-RRYiCfFM_WiO2t7VMG4tcY/s200/ecommerce.jpg" border="0" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXrt3d06olrGuALkdkm6OoaW4tW4r8IuAkQveBAZ-Hi6muf43NwBAaYMmUZV5aTQa6E8TbAKvsThCXkeC5e5dcFY7NpnBZvb6gIeQVoj1sOlzP_Aoa2b6HcbswYVIZpr_Uio_WcJQb-ew/s1600-h/image.gif"><img id="BLOGGER_PHOTO_ID_5348709899036878690" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 155px; CURSOR: hand; HEIGHT: 105px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXrt3d06olrGuALkdkm6OoaW4tW4r8IuAkQveBAZ-Hi6muf43NwBAaYMmUZV5aTQa6E8TbAKvsThCXkeC5e5dcFY7NpnBZvb6gIeQVoj1sOlzP_Aoa2b6HcbswYVIZpr_Uio_WcJQb-ew/s200/image.gif" border="0" /></a><br /><br /><div><div><br /><br /><br /><br /><div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh4clXWyJsOfY-mXJPV6bPx9jeKitVxe46HqSdfl1WS3fz73ChoM9lStDfAOGkS-IU7eIdEtgipqTNX8i0fgKx5aROIDSv3bCL0KIoHKh7JRbHdLvYLTa0xT6AqmiuCtSMbPgrXjjMCqg/s1600-h/ecommerce.jpg"></a><br /><div><br /><div>E- Commerce (EC) – the process of electronically buying and selling goods, services and information. EC enables users to communicating, collaborating and discovering information by linked computer systems of the vendor, host and buyer. At the same time, it allows them to do online transaction.</div><div><br />The emergence of EC started in the early 1970s with Electronic Funds Transfer (EFT), which allows organizations to transfer funds with one another electronically. </div><br /><div>In the late 1970s, Electronic Data Interchange (EDI) was introduced to improve the limitation of EFT, by extend business transactions from financial institutions to other types of business. Different to EFT( only allow for the transfer of funds), EDI also provides transactions and information exchanges. However, EDI was not widely accepted because the system limited to special networks such as large corporations, and it is costly, complex to administer for small business. </div><br /><div>Later, the new type of applications which is Electronic Mail (e-mail) was widely adopted in business world in the late 1980s. When it was first introduced, this system was considered a major breakthrough.</div><br /><div>Afterward, a strong foundation of prosperous EC continues to be built. During 1990s, the internet was opened for commercial use. At the period as well, users started to participate in World Wide Web (WWW), and the phenomenon of rapid personal computer (PCs) usage growth. Integrated with the commercialization of the internet, web invention and PC networks, these 3 factors have made EC possible and successful. </div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div>There is an important phase in the history of EC that I would like to share with you guys. For your information, there was development of Mosaic web-browser in 1992. This web-browser was soon given the form of a browser which could be downloaded and was named as Netscape. The arrival of Netscape provides users a simple browser to surf the internet. It further broadened the scope and possibility of electronic commercial transaction. </div><br /><div>In 1994, Amazon.com (<a href="http://www.amazon.com/">http://www.amazon.com/</a>) and eBay.com (<a href="http://www.ebay.com.my/">http://www.ebay.com.my/</a>) are examples of internet companies which allows electronic transactions (sell products over the internet). Thanks to their founders! Because of them, we now have the opportunity to enjoy the buying and selling advantages of the internet! In addition, Dell.com (<a href="http://www.dell.com.my/">http://www.dell.com.my/</a>) has also contributed much to the process of EC development. It was launched in 1994 and selling goods over the WWW with no retail outlets, no middlemen, and it enables customers to choose the product based on their budget and requirements. With approximately half of the company‘s profit comes from the web sites, the successful of Dell.com has been proven. In that particular year, the internet started to become popular among the general public. However, it took four years to develop the security protocols and DSL, which allowed rapid access and connection to the internet (1998). </div><br /><div>What we have discussed above is one of the types of EC – business to consumer (B2C). It was the first and also the most common type which involves e-business providing goods and/or services to end consumers.</div><br /><div>In 1999, the emphasis of EC shifted from B2C to business to business (B2B), which is the electronic transaction between multiple businesses, and does not involve common products or consumers.</div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div>In 2000, the meaning of the world EC was changed. People began to define the term EC as the process of purchasing of available goods and services over the internet using secure connections and electronic payment services. In the same year as well, the dot com collapse and led to unfortunate results, many EC companies disappeared. But, the “brick and mortar” retailers recognized the advantages of EC and started to add such capabilities to their web sites. At the end of 2001, the largest form of EC, B2B model made $700 billion in transactions.</div><br /><div></div><div>Web 2.0 </div><div><object height="344" width="425"><param name="movie" value="http://www.youtube.com/v/0LzQIUANnHc&hl=en&fs=1&"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><br /><br /><br /><br /><br /><br /><br /><br /><embed src="http://www.youtube.com/v/0LzQIUANnHc&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object><br /></div><div>Web 2.0 is a second generation of web development and web design. It is characterized as facilitating communication, information sharing, and collaboration on the WWW. It has led to the development and evolution of web-based communities, hosted services, and web applications. Examples include social-networking sites, video-sharing sites, wikis, and blogs. Web 2.0 websites also considered as the Read/Write web, which allow users to do more than just retrieve information. Users can own the data on a Web 2.0 site and exercise control over that data. For example, they are provided with tools to add a comment or to edit the content. </div><br /><div>Today, EC is so much better than any other way of shopping that it has already attracted many EC-lovers. People seem to shop literally everywhere – at their workplaces during lunch time, in rush hour, or when there is nothing else to do; they will just switch on their laptops and start surfing. EC today enable us to have a better understanding of product’s shape, size and texture through online. So, why go somewhere out when all you have to do is make an order, choose the shipping method, put up your feet and wait until the order is delivered right up to your door-step?<br /><object height="344" width="425"><param name="movie" value="http://www.youtube.com/v/LW4X3b_j0eE&hl=en&fs=1&"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><br /><br /><br /><br /><br /><br /><br /><br /><embed src="http://www.youtube.com/v/LW4X3b_j0eE&hl=en&fs=1&" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div></div><div>Posted by <a href="http://intro-to-e-commerce.blogspot.com/2009/06/hi-everyone.html">shu hui</a></div></div></div></div></div>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com2tag:blogger.com,1999:blog-6198543008933052625.post-63208838417671381922009-06-18T07:57:00.000-07:002009-06-24T07:17:57.948-07:00Revenue model for Google, Amazon.com and eBay<span style="font-family:arial;">There are billions of websites on the internet. But among these, how many websites actually make money. There is a revenue model that describes how the organization will generate revenue. The major revenue models are sales, transaction fee, advertising, subscription, affiliate and others revenue model. </span><a href="http://www.google.com/"><img id="BLOGGER_PHOTO_ID_5348695534108111426" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 300px; CURSOR: hand; HEIGHT: 106px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLlOxDojvbYT4mNA-qFahmEg07FExHidvMpzLGtSMkzSfV5yTRNiGlGjj0fddYR9zLQy_VW0Es2P9-0NKW1k7_o2CR9tHTiFnCJALpTElvni_gRQAIZW1lCU4D57x7xDn25w2Jsk4cyig/s400/google-logo.jpg" border="0" /></a> <div><span style="font-family:arial;"><a href="http://www.google.com/">Google </a>is widely recognized as the world's largest search engine. It is an easy-to-use free service that provides ways to access all this information. Google generates most of the revenue from Google AdWords, Pay per Click Advertising, Google AdSense, Froogle, GoogleAnswers and their latest advertising program which is Cost per Click model. Now, we just focus on the most two common function of Google: </span><br /><ul><li><span style="font-family:arial;"><a href="https://www.google.com/accounts/ServiceLogin?service=adwords&cd=null&hl=en-US&ltmpl=adwords&passive=true&ifr=false&alwf=true&continue=https%3A%2F%2Fadwords.google.com%2Fselect%2Fgaiaauth%3Fapt%3DNone%26ugl%3Dtrue&sourceid=AWO&subid=my-en-et-adsc">Google AdWords </a>is pay per click advertising program. It designed to allow the advertisers to place targeted text-based and display ads on Google web sites and Google Network members’ web sites to people, who are looking for information related to what the advertiser has to offer. Google’s text ads are short, consisting of one title line and two content text lines. When a user searches Google's search engine, ads for relevant words are shown as "sponsored link" on the right side of the screen, and sometimes above the main search results. AdWords advertisers pay Google either based on cost-per-click basis, or cost-per-impression basis.</span></li></ul><img id="BLOGGER_PHOTO_ID_5348694811933001298" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 300px; CURSOR: hand; HEIGHT: 275px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Fqz55cZYnG-CtAj_KT877FEGETcmHKXLnGVEViiYdwzLiv5E6-5tJxLD1bu2CuSQ3lKaZLUbCPqNdBfSVWBxeX07ANwqKRF4JCdxkr4TVGEYP-iPSvJIpgfRQpRPSpnFM26spQrNseg/s400/google_adwords_page_layout.gif" border="0" /></div><ul><li><span style="font-family:arial;"><a href="https://www.google.com/adsense/login/en_AU/?hl=en_AU&sourceid=aso&subid=ww-en_AU-et-ads-r3_b_learnlink_new&medium=link">Google AdSense</a> is an online program, where Google distribute advertisers’ AdWords ads for display on the web sites of Google Network members. These ads can generate revenue on either a cost-per-click or cost-per-thousand-impressions basis. AdSense has become a popular method of placing advertising on a website because the ads are less intrusive than most banners, and the content of the ads is often relevant to the website. </li></ul></span><img id="BLOGGER_PHOTO_ID_5348694992179232626" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 343px; CURSOR: hand; HEIGHT: 202px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3yj2bN785H2gEstdEvLWmld_5vf83keV-R9XdBqZ5jUQNRB2vOxywBX032fkJzKrQzHuTnapPtEcht43lbS-vS79BrJShPZ6LeKs0U7BmbRBUUC-qi_d9Doo2ZIPMlfO8T9V1EGYGUzw/s400/google-adsense-example-731321.jpg" border="0" /><span style="font-family:arial;"></span><br /><span style="font-family:arial;"></span><br /><span style="font-family:arial;"><a href="http://www.amazon.com/">Amazon.com </a>is one of successful website that used e-commerce model, where the website sells products or services online. Amazon.com started as an on-line bookstore, and soon diversified into many product lines. Amazon generates revenue primarily by selling books, music, videos, electronics, apparel, and kitchen equipment on domestic. Amazon.com successfully earned distributed transaction fees which are fixed at price through creating virtual marketplace. Moreover, Amazon.com also generates revenue by Affiliate revenue model.Amazon.com is pioneer in affiliate partnership marketing, where uses affiliations with other websites to generate revenue. An Amazon partner website itself may not sell any product or service, but helps in promoting the product. In turn, website owner earns referral fees (commission) on the products purchased by customers. The fee structure is currently the same as for the other affiliate links and ranges from 4% to 10% of the product price. </span><br /><a href="http://www.amazon.com/"><img id="BLOGGER_PHOTO_ID_5348696721896962290" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 242px; CURSOR: hand; HEIGHT: 61px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_-T9IV6FS2S-t0pcIU1Ig0xp_lsOhefW9XD7-xvetmdk2uulrhkuUVD5VkbOKjYJTbzwK_HOdTxZt8oit8iCqoj4Gfuc46XqEpIHliRl84kusd0-befYjMq3Ccf8EAvyfQ99zuK6eKUI/s400/amazon_logo.gif" border="0" /></a><br /><span style="font-family:arial;"><a href="http://www.ebay.com/">Ebay</a> is the world's largest auction online marketplace - where practically anyone can sell and bit for practically anything at any time. Millions of collectibles, appliances, computers, furniture, equipment, vehicles, and other miscellaneous items are listed, bought, and sold daily. Ebay does not actually sell goods that it owns itself. It merely facilitates the process of listing and displaying goods, bidding on items, and paying for them. It acts as a marketplace for individuals and businesses that use the site to auction off goods and services. Ebay generates revenue from a number of fees, such as insertion fees, promotional fees, and final value fees. Insertion fees are charged for any item that is listed on Ebay, the fees is nonrefundable, promotional fees are charged for extra listed options that attract attention for an item, while for final value fees are a commission at the end of the auction that is charged to seller. It also earns transaction fee from paypal (Acquired by eBay Inc. in October 2002), an online paying service system for users to buy items online more conveniently as well as advertising fees.<br /><a href="http://www.ebay.com/"><img id="BLOGGER_PHOTO_ID_5348696781823370402" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 172px; CURSOR: hand; HEIGHT: 82px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-ikKCKpTsrLEFrvwmA7g1glko4A7rv4iJ7zPYYxr9UPgv7HKmG5qwD5Z2uF-XJMX1Oc8eoIT4gC0pPdYmd8OhsyhKO2kyXS4bOMqw0oRaQ1sJapEZmXnsAtWX1CRE-zAHjRazuZpb1E0/s400/ebay-logo.jpg" border="0" /></a><br />Google, Amazon, and eBay, are few of the most successful e-commerce model that implement different type of revenue model. As we can see that Google earn advertising fee from their advertiser. Whereas Amazon.com’s revenue come from sales throughout their website and collect affiliate fees for referring customers. As for Ebay charged transaction fee on those products listed on their website as well as commissions on any completed auction transaction. </span><br /><span style="font-family:arial;"></span><br /><span style="font-family:arial;">By Qiao Ling</span>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com3tag:blogger.com,1999:blog-6198543008933052625.post-82452383225739732302009-06-18T00:27:00.000-07:002009-06-24T07:17:38.850-07:00An example of an E-commerce success and its causes<img id="BLOGGER_PHOTO_ID_5348581273715824370" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 175px; CURSOR: hand; HEIGHT: 177px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMBfysYdkUHgojeeuTeQH2rg8XgbkrrOaYtj7HrsUINASl9pTb3mP0r0zGEkY-mapRwlhMCrrwbrGlcLZ6pdiCgfJ-TDpRoowFtpRGTudSZ2QOQIxcLsBIQO3TY4VD4L_D0upez7fBO7E/s400/175px-Dell_logo_svg.png" border="0" /> <span style="color:#000066;">Michael S. Dell</span> founded <span style="color:#6600cc;">PC's Limited</span> with capital of $1000 on November 4, 1984. The company was formed when <span style="color:#000066;">Michael S. Dell</span> was still studying at University of Texas, Austin. <span style="color:#6600cc;">PC's Limited</span> beliefs that they could understand the customer's needs by selling products directly to them.<br /><br />In year 1985, the company sold its the "Turbo PC" for US$795 — which contained an Intel 8088-compatible processor running at a speed of 8 MHz.<br /><br />The company later change its name from " <span style="color:#6600cc;">PC's Limited</span> " to " <span style="color:#ff0000;">Dell </span>Computer Corporation " . Trace back to when the company started its business thru Internet, it all back to year 1996 which the company decided to engage in Internet business in selling its products to meet different customer's preferences.<br /><br />The reasons which contributed to the successful of <span style="color:#ff0000;">Dell </span>in the areas of E-Commerce in selling its products are <span style="color:#ff0000;">Dell</span> sells their products directly to customers which you cannot find it in any other stores. They also provides services and maintenance of the product to the customers who encounter problems on the product purchased. This has helped to save precious time of the buyer to have their problems fixed. The more important is the buyer can save MONEY !<br /><br />Another reasons is the <span style="color:#ff0000;">Dell</span>'s Culture. Dell has created a highly disciplined culture that focuses on optimizing the operational model , responding to what customer wants and needs. Besides, they also provide door to door services to the buyer of their products. <span style="color:#ff0000;">Dell</span> respond quick to the commitment of the public and others. Example: if the information of the web outdated even just for minutes, they will fix it within a range rather than waiting for a overall rearrangement.<br /><br /><span style="color:#ff0000;">Dell</span> also one of the low cost providers. <span style="color:#ff0000;">Dell</span> know that by being a low cost provider of their product can unlock the hidden business/market opportunities. That's why their product does comes with the balance between quality and money. Unlike Sony Vaio, the high cost of the product does not constitute to a better comparison in cost with Dell.<br /><br />Despite Product development is focused by the company, the company can allocate resources to the project undergoing. <span style="color:#ff0000;">Dell</span> know what kind of R&D they wanted to differentiate their products, this has made the " <span style="color:#ff0000;">Dell</span> " can allocate their fund offensively and not defensively.<br /><br />The customization tools of <span style="color:#ff0000;">Dell</span>'s Website has made easier for customer to purchase the laptop or PC and any other products in just few clicks. WoW... it's never been easier for the customer !<br /><br />The above are the reasons contributed to the success of <span style="color:#ff0000;">DELL</span>.<br /><br />Related Links:<br /><br />1.<a href="http://www.oppapers.com/essays/Dell-Key-Success-Factors/150188">http://www.oppapers.com/essays/Dell-Key-Success-Factors/150188</a><br /><br />2.<a href="http://en.wikipedia.org/wiki/Dell">http://en.wikipedia.org/wiki/Dell</a><br /><br /><br /><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikOUCMk7bckCuVruDy3dLzg-8dp7tytJEdTjfVou-L9GlTO60q7o8oOsmPBJUq1o3MR8i6KMyy0-68SZ_AuXP5DjTs2CbI2jJ49LtvLcOS2Kx35VQt7OU-fG9b9w3jA-jVuzYotjp95rk/s1600-h/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg"><img id="BLOGGER_PHOTO_ID_5348599357204958674" style="WIDTH: 91px; CURSOR: hand; HEIGHT: 91px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikOUCMk7bckCuVruDy3dLzg-8dp7tytJEdTjfVou-L9GlTO60q7o8oOsmPBJUq1o3MR8i6KMyy0-68SZ_AuXP5DjTs2CbI2jJ49LtvLcOS2Kx35VQt7OU-fG9b9w3jA-jVuzYotjp95rk/s400/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg" border="0" /></a><br /><br /><br />Posted by Chee Liat LongT4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-38074847681050041582009-06-17T09:08:00.000-07:002009-06-29T23:04:14.058-07:00An example of an E-commerce failure and its causes<p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7qzLyRfbSgSwCyZM6liq3K9mySd_JrUygqJQ2InOUJH_C1LD1y_cefN3gRXzSx8LSsBnLev8NlKNAgppHpVHRyfTT71xxy3H4r3189O3sMJfvh2MSn1-8MBO2QKuTGQXRXeYZMsTDkHg/s1600-h/logo_go.gif"><img id="BLOGGER_PHOTO_ID_5348336445653952642" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 253px; CURSOR: pointer; HEIGHT: 180px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7qzLyRfbSgSwCyZM6liq3K9mySd_JrUygqJQ2InOUJH_C1LD1y_cefN3gRXzSx8LSsBnLev8NlKNAgppHpVHRyfTT71xxy3H4r3189O3sMJfvh2MSn1-8MBO2QKuTGQXRXeYZMsTDkHg/s400/logo_go.gif" border="0" /></a><br /><div style="TEXT-ALIGN: justify">One of the failure examples in e-commerce is Go.com.<br /><br />Go.com is also known as The Go Network. It was a web portal first launched by Jeff Gold in 1995. It was an entertainment portal featuring one of the Internet's first web-based chat room networks. Go.com was acquired from Gold by the Walt Disney Company. It is a combination of Disney's online properties and Infoseek since 1998 and now operated by Walt Disney Internet Group. The site originally started off as a search engine, using a distinctive green spotlight logo. However, a complaint of similar logos filed by Goto.com has forced Go.com pay $21.5 million for the damages of Goto.com and it is changed its logo as well.<br /><br />Go.com has expanded by Disney and used as a hub for the other Disney related sites, cush as ABC.com and Disney.com in 1998. In addition, Go.com also hosted its personal web pages. In early 2000, Disney announced that the general portal would now focus more on entertainment since its visits has dropped. Almost all Disney and ABC sites has migrated into Go.com domain, and the sites was mentioned at the end of the programs of Disney and ABC networks.<br /><br />However, Disney announced in January 2001 that Go.com and its search engine would be closing since Disney was unable to make Go.com popular enough to validate the millions spent on the promotion. Disney took a write-off of $790 million or 37 cents per share for the shut down of Go.com. The shutter of Go.com laying off approximately 400 employees and retiring the Go.com tracking stock. Go.com was still exists, but it carries only feeds from other Disney Web properties.<br /><br />The reasons that led to the failure of Go.com are:<br /><br /></div><div style="TEXT-ALIGN: justify"><ul><li>The contents and services provided were inferior. </li><li>Fail to attract enough consumers.</li><li>Online advertising slumped and fail to attract enough advertising revenue.</li><li>Compete head-on with the major web portal sites that serves as entryways to the internet operated by Yahoo Inc., America Online Inc., and Microsoft Corp.</li><li>Disney underestimated how much ground the company need to cover to catch Yahoo.</li><li>It is just a portal that wasn't able to get traction in a leadership position. </li><li>It made little sense to spend millions to promote a new umbrella brand.</li></ul></div><br />In a short word, Go.com needs to continue invest in its contents and commerce sites grow them. On the other hand, consumers' needs and demand need to be identified to attract more consumer and online advertisement. Disney needs to shift and implement operation strategy for Go.com in order to compete with those strong competitors like Yahoo and achieve long lasting success.<br /><br />Related links: <p></p><ol><li><a href="http://en.wikipedia.org/wiki/Go.com">http://en.wikipedia.org/wiki/Go.com</a></li><li><a href="http://articles.latimes.com/2001/jan/30/business/fi-18700">http://articles.latimes.com/2001/jan/30/business/fi-18700</a></li><li><a href="http://www.thefreelibrary.com/DISNEY">http://www.thefreelibrary.com/DISNEY</a></li></ol><br />-Mun Yee-T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-72550715638239548862009-06-11T07:42:00.000-07:002009-07-31T06:44:44.974-07:00~YQL~ \(*0*)/<div style="TEXT-ALIGN: justify"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibNBhUSYie1fMjI4xWg7exWrp6vl6Oan7YCKMdUV5WWIm4VxLe6SImr6cyFrInBnC6DlQaqFotqjun-mYQhqgYPY3T81XomCx2DJKo0Fm6F_Ka0QR9H99wBhXxnTb2q71IDD28cVXGQdo/s1600-h/shy.bmp"><img id="BLOGGER_PHOTO_ID_5346104244478750098" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 174px; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibNBhUSYie1fMjI4xWg7exWrp6vl6Oan7YCKMdUV5WWIm4VxLe6SImr6cyFrInBnC6DlQaqFotqjun-mYQhqgYPY3T81XomCx2DJKo0Fm6F_Ka0QR9H99wBhXxnTb2q71IDD28cVXGQdo/s200/shy.bmp" border="0" /></a><br /></div><div style="TEXT-ALIGN: justify">Hey yo!!!</div><br /><div style="TEXT-ALIGN: justify">Welcome to Intro to E-Commerce blog!!!</div><br /><div style="TEXT-ALIGN: justify">I am Yap Qiao Ling, a year three trisemester one Utar student for BAC. As this blog was required for our UBAI 3013 E-Commerce assignment, we as T4 Group3, will post the interesting articles and latest development on e-commerce for the next few week(stay tune). </div><br /><div style="TEXT-ALIGN: justify">Let begin with a little bit of my introduction. ^^</div><br /><div style="TEXT-ALIGN: justify">I come from Cheras. Currently study at Utar Sg Long campus. Everyday, i travel to university. Even though it is very tiring and wasting time for waiting bus, I am still insist to travel daily. My hobby is sleeping. I like to sleep so much whenever there is time for me to sleep, especially during weekend. My longest sleeping hours record is 16hrs, where I went back from camping for 4 days 3 night (i didn''t sleep for 3night) during my secondary school.</div><br /><div style="TEXT-ALIGN: justify">Otherwise, I will spend most my time on surfing net. The top 5 websites I visited are:</div><ul style="TEXT-ALIGN: justify"><br /><li><a href="http://www.youtube.com/">http://www.youtube.com/</a> - I able to watch latest Taiwanese and Korean drama series online and even variety entertainment shows. I found it's loading video clip is the fastest(compare to others, such as tudou). </li><br /><li><a href="http://www.google.com/">http://www.google.com/</a> - In my opinion, Google search engine is the best. I usually googling information for the assignment. As you all know, being a student need to do a lot of research for the purpose of assignment. </li><br /><li><a href="http://www.gougou.com/">http://www.gougou.com/</a> - I able to search for the latest movie, music video and music that i like in order to download by using xunlei.</li><br /><li><a href="http://www.520music.com/">http://www.520music.com/</a> - It is complete music database ( in my opinion), where i can listen to music that i like. Whatever kind of music i able to find in here.</li><br /><li><a href="http://www.msn.com/">http://www.msn.com/</a> - I always check email. These even become my daily routine. I able to get useful knowledge and even many funny things through email. Through Windows Live Messenger, i use to chatting with my friends and family relatives (where they stay very far away, difficult to gather) in order to keep in touch with them. </li></ul><p style="TEXT-ALIGN: justify">That all. Thank you for viewing our blog. Hope you will enjoy it. Please stay tune with us for our next posting. See you ~> (0<)</p>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com0tag:blogger.com,1999:blog-6198543008933052625.post-88509190653194988972009-06-11T02:44:00.000-07:002009-06-29T23:03:46.149-07:00Hihi...^_^<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKAMHa7dmEusug8wbpV0RXEP9s-6LJCAApRvJ3uFRi-dTGBzUBQD5FeDqounrsyu-WVgnykj27A5Nu2tnBPPurBBdrJSqlGWwYAg2vokX45ySFMgNeJTAg8eaSFsfaZ6bbbdIm6-bZHws/s1600-h/DSC00130.jpg"><img id="BLOGGER_PHOTO_ID_5352213323878311474" style="FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 150px; CURSOR: pointer; HEIGHT: 200px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKAMHa7dmEusug8wbpV0RXEP9s-6LJCAApRvJ3uFRi-dTGBzUBQD5FeDqounrsyu-WVgnykj27A5Nu2tnBPPurBBdrJSqlGWwYAg2vokX45ySFMgNeJTAg8eaSFsfaZ6bbbdIm6-bZHws/s200/DSC00130.jpg" border="0" /></a>Welcome to our e-commerce blog. <div><br /><div style="TEXT-ALIGN: justify">I am Chan Mun Yee, a Year 3 Trimester 1 Accounting student in UTAR Sg long. I live in Subang but come from the Hill City, Ipoh. Currently stay in Sg long due to the distance from my home to school is very far and I do not own a personal car :-( , but I go back home every weekend. So Friday is the day I like the most. Hehe...<br /></div><br /><div style="TEXT-ALIGN: justify">I like to sleep. There is nothing better than lay on my bed in the world. Of course it's just my view. Before study in UTAR, I can sleep more than ten hours a day. After study in UTAR, I always have not enough sleep. As you know, a student SHOULD be very busy for attend classes, midterm tests, assignments, final exams as well as society activities.<br /></div><div style="TEXT-ALIGN: justify">After I have became the committee member of the society, my sleep became worse. Always busy in organizing activities and sometimes fail to get corporation form others makes me accumulated 'a lot of gas in stomach' (please translate in Mandarin). Of course there is a lot of fun when organizing those activities and I have learned many things that are not available on the books. Thus, I am still happy to became one of the committee members. Well, me resignation day is around the corner.<br /></div><br /><div style="TEXT-ALIGN: justify">I like to eat as well. I can eat all the time when I have nothing to do. What I like to eat? Erm...I eat anything that I consider as food. Those are not considering as food sure I won't eat (I'm not a dustbin). So my hobbies are sleep and eat, that is what an animal will do. Guess it! Hahaha...<br /></div><br /><div style="TEXT-ALIGN: justify">Searching the internet is what I will do everyday. Thus, before enter into any website, I will first go to <a href="http://www.google.com/">http://www.google.com/</a>. It is one of the 'more results' website and there is nothing can't get from it. Have you try to search for yourself in google? I have tried it before, it showed many different 'Mun Yee' to me. Haha...<br /></div><br /><div style="TEXT-ALIGN: justify">The website that I visit the most is <a href="http://www.msn.com/">http://www.msn.com/</a> to check my email. Through msn, I can get latest knowledge or gossip around us. Haha...please, I am not a busy body, just concern about what is happening around the world.<br /></div><br /><div style="TEXT-ALIGN: justify">I believe that almost everyone will have an account on <a href="http://www.faceboook.com/">http://www.faceboook.com/</a>. It is a medium that let you to know someone from all around the world. It also allows me to keep in touch with my primary and secodary school friends.<br /></div><br /><div style="TEXT-ALIGN: justify">An Utarian sure have to go <a href="http://www.utar.edu.my/">http://www.utar.edu.my/</a> and <a href="http://www.wble.utar.edu.my/">wble.utar.edu.my</a> frequently to get the latest news about UTAR and also download all the notes. Intranet also allows us to check our status in UTAR includes the details information, announcements, exam results, and etc.<br /></div><br /><div style="TEXT-ALIGN: justify">On the other hand, I also learned Korean language from the internet. There are many websites that provide guidelines and inforation about learning Korean language and some of them are free of charge. One of them is <a href="http://www.study.hanguo.net.cn/">http://www.study.hanguo.net.cn/</a>. What I have learned is very basic and please don't ask me to show it. (Aiyo...I'm humble and feel shy)Hehe...<br /><br />The last preferable website is <a href="http://www.gougou.com/">http://www.gougou.com/</a>. Hehe...this is a China website that have more than thousand songs, movies, and dramas from every countries. Please forgive me of doing those illegal things. Hehe...<br /><br />That's all for my self-introduction. Thank you for looking at my first post in the blog of T4G3 E-commerce subject. We'll upload some articles and opinions about e-commerce every week. So please pay attention to our blog and we will much appreciate it. See you soon.^_^ </div><div style="TEXT-ALIGN: justify"> </div><div style="TEXT-ALIGN: justify">-Mun Yee-</div></div>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com1tag:blogger.com,1999:blog-6198543008933052625.post-19384650649081315212009-06-11T00:34:00.000-07:002009-06-24T07:16:31.048-07:00Myself ~~~<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHtM1mWfWmhE7JGRrdLbukE_hTokZlxqOztxEkJiRp4DU5iH_sauAAlmtTq1dblqHRRG_rIfBJVE5iaCu99hCqKTXjtbjODj26HBN56RVAnS06hkmaxZXs_n84jSz3d2e2MA9cM1FSZ8Q/s1600-h/Sunset.jpg"><img id="BLOGGER_PHOTO_ID_5345978373367634338" style="FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 200px; CURSOR: pointer; HEIGHT: 150px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHtM1mWfWmhE7JGRrdLbukE_hTokZlxqOztxEkJiRp4DU5iH_sauAAlmtTq1dblqHRRG_rIfBJVE5iaCu99hCqKTXjtbjODj26HBN56RVAnS06hkmaxZXs_n84jSz3d2e2MA9cM1FSZ8Q/s200/Sunset.jpg" border="0" /></a><br /><br /><div style="TEXT-ALIGN: justify">Hi, everyone. I am Shu Hui, and I am a year three trisemester one student for BAC course. Don't know how to describe my feelings now. Well, I don't know how you guys feel while writing in the blog. But, for me, i feel it is quite weird to introduce myself here. Anywhere, since it's required by our tutor, or lecturer, i do not know, so it is a must for me to do it.<br /><br />Ok. Let's start with my hobbies. Actually, my hobbies more likely are related to sport. Oh ya, before that, just want to share with you guys. I am a committee member of UTAR Yoga Society, and if you were participated in the society event, probably you ever seen me before. I guess. I like yoga, maybe is because it provide a healthier lifestyle to me, with asana. Besides, it also helps me to calm down most of the time. As you all know, there is a lot of pressure and stress on us, as a student, since there are so many assignment, mid-term to deal with. Believe me! It reaaly help! Especially for those year three student, I know we are having many problem, difficulties in doing our thesis. Maybe you guys can have a try on it!<br /><br />Finish with promoting Yoga Society. What else I can share some more? Let me think... Besides yoga, I like jungle trek too. It's challenging and I like to "stay" in jungle, with all trees in green. Additionally, if there is scenery to be enjoyed at top of the mountain, I would be more motivated to "participate". Morover, I like swim, since I learned it from my ex-housemates for the past two years. Unfortunately, I have moved into Cypress now. And, I heard from those residents staying there, they claimed that the swimming pool provided is very dirty and it is better not to use. Thus, I think maybe I can't go to swim for the whole year at Cypress. So disappointed.<br /><br />I like online, because there are many things that can be done through online. The websites that I visited the most, I think is Gougou, Google, MSN, PPStream, and Facebook. All of these websites are visited to search information, chat with friends, watch movies and even download it. Furthermore, some of the websites even provide games! It's an "amazing" thing for me! I like it! Usually, I would play games through online when I feel bored. In addition, I will also download some new songs from the websites, to keep myself updated. But this is probably done only when I have nothing to do. ^^<br /><br />Keep on typing for long time, now only I realized that I have wrote more than 200 words! Already achieved the requirement! Unbelievable! Haha!I better stop here. And, thanks for you guys for viewing my post!</div>T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com0tag:blogger.com,1999:blog-6198543008933052625.post-25021000113080562852009-06-10T10:35:00.000-07:002009-06-24T07:16:10.985-07:00Pro's File<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCXxcvAJoKQTD5QRxbt9mYRnt8DktmF3AWq6kKQqUY9wXLXys-oAdc5_6GX01D_b2puQg2_Oc0QfWfOZvziRUSVzDOb5wxQtqGA_eAfmcsO-QckK5Eg6XQ1rDRBG6qCHj8cP6fIcGPOk/s1600-h/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg"><img id="BLOGGER_PHOTO_ID_5345773285938310114" style="WIDTH: 91px; HEIGHT: 91px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiCXxcvAJoKQTD5QRxbt9mYRnt8DktmF3AWq6kKQqUY9wXLXys-oAdc5_6GX01D_b2puQg2_Oc0QfWfOZvziRUSVzDOb5wxQtqGA_eAfmcsO-QckK5Eg6XQ1rDRBG6qCHj8cP6fIcGPOk/s320/MLCABC0P0MCA45GMYWCA4XRDCOCAN6M2JYCA3KY7YZCASO27NKCA7G1GK5CAZO8QQECADQQ4TBCA6TXZ4WCAWMDJUECAYTHSQNCAZ93ANRCAZ5US58CATBL4EJCA1XJSNKCAVGQX79CAKU53OWCAH6Y5OK.jpg" border="0" /></a><br /><br /><br /><br /><blockquote></blockquote>Hey Guys ! My name is <span style="COLOR: rgb(51,51,255)">Chee Liat Long</span>. For those who knew me would call me Chris but you all can address me with that if you like. I'm 21 by the end of this year.<br /><br />Getting started with my primary education in SJK(c) Jemntah, Johor. Maybe my mother think it is useless for me to keep stay in the rural area which is now more developed, she decided to send me to get my secondary education in Tsun Jin High School which located in Jalan Loke Yew, Kuala Lumpur.<br /><br />After i finish my secondary, i worked for few months before i got offer to pursue my Tertiary education in University Tunku Abdul Rahman which is the currently position of my life as a U student. As time passed, it comes to my last year in my U-Life.... What a pity, I don't want to step out so fast ... >.<" <blockquote></blockquote>The forum i visited the most during my time are as follow :<br /><br /><blockquote></blockquote>1. <a href="http://chinese.cari.com.my/">http://chinese.cari.com.my/</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn8-Si32oS29hlQaSnXMzMf8ilyME38CJ8dHxqWayODdaVYy7cUYtmCd8udVA05xP0g-SyuKRRGlNM1UUWFtIk-OAluV3tX66Qnioo3phx9VdR0f2AeMEV3A2RqI_G5o5LbnW4VIRymyA/s1600-h/banner_logo.gif"><img id="BLOGGER_PHOTO_ID_5345758448918334674" style="WIDTH: 320px; HEIGHT: 55px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn8-Si32oS29hlQaSnXMzMf8ilyME38CJ8dHxqWayODdaVYy7cUYtmCd8udVA05xP0g-SyuKRRGlNM1UUWFtIk-OAluV3tX66Qnioo3phx9VdR0f2AeMEV3A2RqI_G5o5LbnW4VIRymyA/s320/banner_logo.gif" border="0" /></a><br /><br /><blockquote></blockquote>This Websites provides me lots of info regarding to many fields that i was interested such as IT and so on .. besides, this website also the largest Chinese forum in Malaysia.<br /><br /><br /><blockquote></blockquote>2.<a href="http://www.google.com.my/">http://www.google.com.my/</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyCJmsIGeksEPaiOVLLHSNqlRGtBV7Nm7hZ6hCS2yXn-sXteP_vkjKACTXU4voUhZbuobM0G-b9W_JvX0z00q0bCxSRKPkia-ox05iYkSdIBnYgk6T1O4658gaqF_FcVGRHdpl3eMMxoc/s1600-h/N8CA8X43XDCALWAMD2CAHAG6XLCA2XKPZDCAO5JGPDCATLGHQ7CAOOIZRBCABGO8XSCASVPBSHCALVU8AZCAP5XMT2CA032LDECA9W6EY0CA4BWZTGCABVSL1VCAG7TNF2CA21AK75CA818IRUCAK2E0SU.jpg"><img id="BLOGGER_PHOTO_ID_5345759234977255714" style="WIDTH: 126px; HEIGHT: 89px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyCJmsIGeksEPaiOVLLHSNqlRGtBV7Nm7hZ6hCS2yXn-sXteP_vkjKACTXU4voUhZbuobM0G-b9W_JvX0z00q0bCxSRKPkia-ox05iYkSdIBnYgk6T1O4658gaqF_FcVGRHdpl3eMMxoc/s320/N8CA8X43XDCALWAMD2CAHAG6XLCA2XKPZDCAO5JGPDCATLGHQ7CAOOIZRBCABGO8XSCASVPBSHCALVU8AZCAP5XMT2CA032LDECA9W6EY0CA4BWZTGCABVSL1VCAG7TNF2CA21AK75CA818IRUCAK2E0SU.jpg" border="0" /></a><br /><br /><blockquote></blockquote>The most powerful search engine that provides anything that we wanted to have in just a click. In fact i save it as my default homepage as i uses it all the time XD !<br /><br /><blockquote></blockquote>3.<a href="http://youthsays.com/">http://youthsays.com/</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicodXC2ysxeDBkNAXrcx3cI6tRptYMV2lApoDUAjejoPq5zAt8_ul_Ed58FqKOXals9xGZo6ZWKkVA7AM0vyITqgrDajsnDvgorznaD15qWCiPZTVNw4cVCYOsVjQAU0mnfYrFa-qUEWs/s1600-h/youthsaysheader.jpg"><img id="BLOGGER_PHOTO_ID_5345761548417816690" style="WIDTH: 320px; HEIGHT: 76px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicodXC2ysxeDBkNAXrcx3cI6tRptYMV2lApoDUAjejoPq5zAt8_ul_Ed58FqKOXals9xGZo6ZWKkVA7AM0vyITqgrDajsnDvgorznaD15qWCiPZTVNw4cVCYOsVjQAU0mnfYrFa-qUEWs/s320/youthsaysheader.jpg" border="0" /></a><br /><br /><blockquote></blockquote>This website let me earn some extra money while i am free.... although not much ... but is a good way to earn some during surfing net... but is restricted to YOUTH only !<br /><br /><blockquote></blockquote>4.<a href="http://gougou.com/">http://gougou.com/</a><br /><br /><br /><blockquote></blockquote><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4rth75AcPVcHSVbkcOMd7Lj296lvjGKiGuCeCIbNpLGEjO20Pdeau80wh1UOe26Mp34tDekTVPalONLQn2DrxebUJhbEiC12Uaf-BAlbC8vRRGgfVJCAiq-qoEexdZCTaBPJjEa4alcw/s1600-h/logo_big_qb.gif"><img id="BLOGGER_PHOTO_ID_5345761552402948530" style="WIDTH: 237px; HEIGHT: 64px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4rth75AcPVcHSVbkcOMd7Lj296lvjGKiGuCeCIbNpLGEjO20Pdeau80wh1UOe26Mp34tDekTVPalONLQn2DrxebUJhbEiC12Uaf-BAlbC8vRRGgfVJCAiq-qoEexdZCTaBPJjEa4alcw/s320/logo_big_qb.gif" border="0" /></a><br /><br /><blockquote></blockquote>I used this website to find movie to download movies and musics..<br /><br /><blockquote></blockquote>5. <a href="http://forum.fdzone.org/">http://forum.fdzone.org/</a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjooCgvIOlhlgkafcrxsNJYY0zkHIqu8VUIk-2XrDIrvIHfUs7RF1CXNyxe7-jdmvUaO5idlpZsJQrS1-_E3_hc1vy8ggSJFksX4LoYTGhkmbJtTduyMNFEgEmVV8vKJbKTmAvtZqJRchw/s1600-h/logo.gif"><img id="BLOGGER_PHOTO_ID_5345761549849313346" style="WIDTH: 320px; HEIGHT: 44px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjooCgvIOlhlgkafcrxsNJYY0zkHIqu8VUIk-2XrDIrvIHfUs7RF1CXNyxe7-jdmvUaO5idlpZsJQrS1-_E3_hc1vy8ggSJFksX4LoYTGhkmbJtTduyMNFEgEmVV8vKJbKTmAvtZqJRchw/s320/logo.gif" border="0" /></a><br /><br /><blockquote></blockquote>This HK websites requires a member account to log in to ... however ... my friend don't know how cracked it ... and i got access to this website.. this is really a good website which provides me a lot of information.. i got it introduced to my friends also. good thing are meant to be shared.. Don't you agree ?<br /><br /><blockquote></blockquote>Besides .. i also like to play computer games during my free time instead of studying ... can't be denied that i am indeed a lazy student ... that's why i always got scolded by my uncle for my this attitude for not being serious in my studies.. It all end up with not getting any compliments from him during my stays at his house ... how pathetic am i, huh ? kinda sad ... @.@<br /><br /><blockquote></blockquote>My English is not that good and still in improvement .. pls do forgive me for any typo or grammer errors.. kekez..T4 Group 3http://www.blogger.com/profile/03446595083467194531noreply@blogger.com2