<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1474836077899768281</atom:id><lastBuildDate>Wed, 28 Aug 2024 23:23:35 +0000</lastBuildDate><category>Electronic Payment</category><category>Internet</category><category>Malaysia</category><category>E-Tailing</category><category>Internet Security</category><category>E-Auction</category><category>Legal</category><category>Broadband</category><category>E-Government</category><category>Mobile Payment System</category><category>Phishing</category><title>@-commerce</title><description></description><link>http://utarblog.blogspot.com/</link><managingEditor>noreply@blogger.com (yëń^0^)</managingEditor><generator>Blogger</generator><openSearch:totalResults>18</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-2890416583282517422</guid><pubDate>Thu, 03 Jul 2008 07:39:00 +0000</pubDate><atom:updated>2008-07-08T14:50:48.624+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Legal</category><category domain="http://www.blogger.com/atom/ns#">Malaysia</category><title>A Review on Illegal Downloader</title><description>&lt;a href=&quot;http://gameanddvdreview.com/images/illegal_download.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://gameanddvdreview.com/images/illegal_download.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;There is no doubt the UK government are trying their best to eliminate any illegal downloading. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;The same goes to our country too... Our local government are putting a lot of effort to prevent illegal downloading from our society.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;If you download material illegally from the Internet, be prepared to fork out a minimum fine of RM250,000. This is the warning from the Domestic Trade and Consumer Affairs Ministry to Malaysians who continue to illegally download songs, videos and the like.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Although this penalty was legislated more than 10 years ago under the Copyright Act 1987, it has yet to be fully enforced. This was because the Government was still focusing on “physical enforcement”, encompassing continuous efforts to weed out pirated DVDs, VCDs and CDs sold on the streets and their operators. &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.actnow.com.au/files/590/george_lucchese.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://www.actnow.com.au/files/590/george_lucchese.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;However, our government has begin to turn their priority to illegal downloaders nowadays. Malaysians are urged to be responsible consumers and realise the damage they caused to the various industries that painstakingly produced music, videos and movies only to find their work being used for free. &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;On the other hand, products will also be reasonably priced so that our Malaysian consumers would not consider cheaper alternatives, such as pirated or illegally downloaded products.&lt;/div&gt;</description><link>http://utarblog.blogspot.com/2008/07/review-on-illegal-downloader.html</link><author>noreply@blogger.com (Nedved)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-5000384879884699601</guid><pubDate>Wed, 02 Jul 2008 14:17:00 +0000</pubDate><atom:updated>2008-07-08T14:48:44.500+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-Auction</category><title>Things to take note to Prevent E-Auction Fraud when a Consumer Participating in an E-Auction</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimhRSaGcidvQYBY8-h-NMEKfNtHr37ob9bAdTGA91O1rgX5pbM-8sKsR53JoVciWRWvDi1VlGpdZrann-WKPggIqU4hEYSD5weKmpV4c8KBGu2mvGLFvDgr4U74ps7jFsYnHY5XTUEiRw/s1600-h/eAuctionsfinal.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5218426963024406418&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimhRSaGcidvQYBY8-h-NMEKfNtHr37ob9bAdTGA91O1rgX5pbM-8sKsR53JoVciWRWvDi1VlGpdZrann-WKPggIqU4hEYSD5weKmpV4c8KBGu2mvGLFvDgr4U74ps7jFsYnHY5XTUEiRw/s400/eAuctionsfinal.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:130%;&quot; &gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;what is e-auctions?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(153,51,153)&quot;&gt;Electronic auctions (e-auctions)&lt;/span&gt;, auctions conducted online, have been in existence for several years on local area networks (see Section 12.4) and were started on the Internet in 1995. Host sites on the Internet serve as brokers, offering services that enable sellers to post their goods for sale and allow buyers to bid on those items.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:130%;&quot; &gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Types of e-auction fraud&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(51,51,255)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Bid shielding (a buyer’s action)&lt;/span&gt;.&lt;/span&gt; The use of phantom bidders to bid at a very high price when an auction begins is called bid shielding. The phantom bidders pull out at the last minute, and the bidder who bids with a very low price wins. The bogus bidders were the shields, protecting the low bid of the bidder in the stack. By bid shielding, a ring of dishonest bidders can target an item and inflate the bid value to scare off other real bidders.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,51,255)&quot;&gt;Shilling (a seller’s action). &lt;/span&gt;In shilling, sellers arrange to have fake bids placed on their items (either by associates or by using multiple user IDs) to artificially jack up high bids. If they see a legitimate high bid that doesn’t meet their expectations as the end of an auction draws near, they might pop in to manipulate the price.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,51,255)&quot;&gt;Fake photos and misleading descriptions.&lt;/span&gt; In reaching for bidders’ attention,some sellers distort what they can truly sell. Borrowed images, ambiguous descriptions, and falsified facts are some of the tactics that sellers might employ to convey a false impression of the item.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,51,255)&quot;&gt;Selling reproductions (a seller’s action)&lt;/span&gt;. A seller sells something that the seller claims is original, but it turns out to be a reproduction.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,51,255)&quot;&gt;High shipping costs and handling fees (a seller’s action)&lt;/span&gt;. Some sellers just want to get a little more cash out of bidders. Postage and handling rates vary from seller to seller. Some charge extra to cover “handling” costs and other overhead intangibles, whereas others charge to cover the cost of packaging supplies, even though such supplies are often available for free.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,51,255)&quot;&gt;Failure to ship merchandise (a seller’s action).&lt;/span&gt; This is the old collect-and run routine. Money was paid out but the merchandise never arrives.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,51,255)&quot;&gt;Loss and damage claims (a buyer’s action).&lt;/span&gt; Buyers claim they never received an item or received it in damaged condition and then ask for a refund. They might be trying to get a freebie. The seller sometimes cannot prove whether the item ever arrived or whether it was in perfect condition when shipped.&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:130%;&quot; &gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Prevention e-auction fraud&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:130%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,51,204)&quot;&gt;User identity verification&lt;/span&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;. &lt;/span&gt;eBay uses the services of Equifax to verify user&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; identities&lt;/span&gt; for a $5 fee. Verified eBay User, a voluntary program, encourages users to supply eBay with information for online verification. By offering their Social Security number, driver’s license number, and date of birth, users can qualify for the highest level of verification on eBay.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(204,51,204)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Authentication service&lt;/span&gt;. &lt;/span&gt;Product authentication is a way of determining&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; whether an item is genuine and described appropriately.Authentication is very difficult to perform because it relies on the expertise of the authenticators. Because of their training and experience, experts can (for a fee) often detect counterfeits based on subtle details. However, two expert authenticators may have different opinions about the authenticity of the same item.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,51,204)&quot;&gt;Grading services.&lt;/span&gt; Grading is a way of determining the physical condition of&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; an item, such as “poor quality” or “mint condition.” The actual grading system depends on the type of item being graded. Different items have different grading systems—for example, trading cards are graded from A1 to F1, whereas coins are graded from poor to perfect uncirculated.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,51,204)&quot;&gt;Feedback Forum&lt;/span&gt;. The eBay Feedback Forum allows registered buyers and&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;/span&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,51,204)&quot;&gt;Insurance policy.&lt;/span&gt; eBay offers insurance underwritten by Lloyd’s of London.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; Users are covered up to $200, with a $25 deductible. The program is provided at no cost to eBay users.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,51,204)&quot;&gt;Escrow services.&lt;/span&gt; For items valued at more than $200 or when either a buyer or&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; seller feels the need for additional security, eBay recommends escrow services (for a fee). With an easy-to-access link to a third-party escrow service, both partners in a deal are protected. The buyer mails the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At that point, the seller ships the goods to the buyer. After an agreed-upon inspection period, the buyer notifies the service, which then sends a check to the seller. (An example of a provider of online escrow services is tradenable.com.)&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,51,204)&quot;&gt;Nonpayment punishment.&lt;/span&gt; eBay implemented a policy against those who do not&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; honor their winning bids.To help protect sellers, a first-time nonpayment results in a friendly warning.A sterner warning is issued for a second-time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,51,204)&quot;&gt;Appraisal services.&lt;/span&gt; Appraisers use a variety of methods to appraise items,&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months. An appraised value is usually accurate at the time of appraisal but may change over&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(204,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt; time as an item becomes more or less popular in the marketplace.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;span style=&quot;COLOR: rgb(204,51,204)&quot;&gt;Verification.&lt;/span&gt; &lt;/span&gt;One way of confirming the identity and evaluating the condition of an item is through verification.With verification, neutral third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purposes. This provides a way of tracking an item if it changes ownership in the future.&lt;/span&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>http://utarblog.blogspot.com/2008/07/things-to-take-note-to-prevent-e.html</link><author>noreply@blogger.com (clarence leong)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimhRSaGcidvQYBY8-h-NMEKfNtHr37ob9bAdTGA91O1rgX5pbM-8sKsR53JoVciWRWvDi1VlGpdZrann-WKPggIqU4hEYSD5weKmpV4c8KBGu2mvGLFvDgr4U74ps7jFsYnHY5XTUEiRw/s72-c/eAuctionsfinal.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-8576364767011741086</guid><pubDate>Wed, 02 Jul 2008 08:50:00 +0000</pubDate><atom:updated>2008-07-08T15:03:48.519+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Electronic Payment</category><category domain="http://www.blogger.com/atom/ns#">Mobile Payment System</category><title>Mobile Payment Systems in Malaysia: Its Potentials and Consumers&#39; Adoption Strategies</title><description>&lt;a href=&quot;http://jgohil.typepad.com/photos/uncategorized/mopay.JPG&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 204px; CURSOR: hand; HEIGHT: 203px; TEXT-ALIGN: center&quot; height=&quot;203&quot; alt=&quot;&quot; src=&quot;http://jgohil.typepad.com/photos/uncategorized/mopay.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Mobile Money is a PIN-based Mobile Payment Solution designed by Mobile Money International Sdn Bhd to address the limitations and bottlenecks created by cash, cheques and credit cards. It unlocks the power of the mobile phone to make payments, allowing registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service). This gives the freedom to shoppers to buy products online and pay the merchant using his/her mobile phone without being physically present at the store.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;When it comes to online selling, selecting a payment gateway is one of the major obstacles faced by the merchants in Malaysia. There are too few choices available, worse, none of these limited choices are cost effective.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Mobile Money will encourage more consumers to shop online. This will definitely be a great boon to the e-commerce industry in Malaysia. It will surely encourage more merchants to adopt online selling as an extra sales channel which complement perfectly with their offline sales channel to help them sell more of their goods and services.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;a href=&quot;http://www.nbnnews.com/NBN/new/editor_images/Affinity/SoverasMobile082106.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand&quot; height=&quot;290&quot; alt=&quot;&quot; src=&quot;http://www.nbnnews.com/NBN/new/editor_images/Affinity/SoverasMobile082106.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.nbnnews.com/NBN/new/editor_images/Affinity/SoverasMobile082106.jpg&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Potentials and Customers&#39; adoption strategies&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;1) Sell to Anyone, Anywhere at Anytime&lt;/strong&gt; - The merchant can now sell to people across town, across the country and take payment around the clock, which is not possible with current payment systems. Online selling (e-commerce) becomes a practical means for merchants since customers will only need to enter their mobile phone during checkout from merchant e-commerce website. &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;2) &lt;strong&gt;Safe and Secure&lt;/strong&gt; - With Mobile Money, merchants do not have to be concern of cash /cheque/credit card handling problems or fraud. The Mobile Money Payment System conforms to the stringent requirements set by Bank Negara Malaysia and the participating banks.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;3) &lt;strong&gt;Multi Methods to Request for Payment&lt;/strong&gt; - Merchants have multiple mode of operation to request for payments. You can use an IVR, SMS, Mobile Money Website, or even real time Mobile Money Weblink API weblink that can be integrated with your POS (Point of Sales) System or online storefront system. &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;4) &lt;strong&gt;Refund and Reversal Features&lt;/strong&gt; - Merchants are allowed to do reversal (within same business day) and refund (within 10 days from transaction date). &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;5) &lt;strong&gt;No Minimum Monthly Transaction, No Rental Fee, No Merchant Account Required&lt;/strong&gt; - Release yourself from the pressure of hitting the minimum monthly transaction amount to waive the rental fee, which typically runs at RM150 or more per month. Furthermore, you don&#39;t need to have a merchant account to apply for Mobile Money, your existing bank account will suffice. It will easily save you RM50,000 which you need to deposit in your merchant account with banks.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Since there are more than 16 million mobile phone subscribers in Malaysia, it is inevitable that mobile phone will become a payment tool. Mobile Money enables the mobile phone to function like a credit card and it allows users to pay from wherever they may be. &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</description><link>http://utarblog.blogspot.com/2008/07/mobile-payment-systems-in-malaysia-its.html</link><author>noreply@blogger.com (Nedved)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-4961096559232205125</guid><pubDate>Mon, 30 Jun 2008 17:17:00 +0000</pubDate><atom:updated>2008-07-08T14:41:13.227+08:00</atom:updated><title>Corporate Blogging : A New Marketing Communication Tool for Companies</title><description>&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(153,51,153);font-size:130%;&quot; &gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;What Is Corporate Blogging?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A corporate blog is type of blog that is published with the support of an organization to reach their goals, such as marketing and selling their products and services.&lt;br /&gt;&lt;br /&gt;Business create a blog to strengthen relationships with important target groups and the positioning of the publishing organization as industry experts. This mean that an organization create blogs to show their knowledge about the industry they&#39;re in.&lt;br /&gt;&lt;br /&gt;In a business perspective, corporate blogs is used as advertising, much like TV ads, print ads, audio ads, and so on. &lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;The advantage of blogs is that posts and comments are easy to reach and follow due to centralized hosting and generally structures conversation threads. All current browsers (including Firefox, Opera,Safari and Internet Explorer 7) support RSS technology, which enables readers to easily read recent posts without actually visiting the blog which is very useful for low-volume blogs.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;/div&gt;&lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Benefits of Corporate Blogging&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;div&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul  style=&quot;font-family:arial;&quot;&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Build rapport with customers -&lt;/span&gt; give customers a channel to interact and get to know about the brand and organization in a format that are familiar and comfortable with.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Free feedback and suggestions from key constituents - &lt;/span&gt;Corporate blogging gives us insights to what people are saying about products, brand, competitors and marketing. These insights come in the forms of comments on blog or commentary and discussions that take place on other blogs.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Increased website traffic from higher search engine rankings - &lt;/span&gt;Search engines favour websites with fresh content and ranks blog higher in search results.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Position business as a thought leader - &lt;/span&gt;demonstrating expertise and experience in industry through commentary, guides and analysis.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;COLOR: rgb(153,51,153);font-size:130%;&quot; &gt;&lt;span style=&quot;FONT-WEIGHT: bold;font-family:arial;&quot; &gt;Corporate Example&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a style=&quot;FONT-FAMILY: arial&quot; href=&quot;http://blogs.sun.com/jonathan/&quot;&gt;Jonathan&#39;s Blog&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;div&gt;The blog of Jonathan Schwartz, CEO of Sun Microsystems. Although John is the CEO of a USD$ 15 billion company, his blogs just like a regular guy.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a style=&quot;FONT-FAMILY: arial&quot; href=&quot;http://googleblog.blogspot.com/&quot;&gt;The Official Google Blog&lt;/a&gt; &lt;/div&gt;&lt;div&gt;The Google blog gives you a peek into the internet giant;s products, technology and culture and frequently features managers and enginneers blogging about the projects they work on.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a style=&quot;FONT-FAMILY: arial&quot; href=&quot;http://englishcut.com/&quot;&gt;English Cut&lt;/a&gt;&lt;br /&gt;Thomas Mahon isn&#39;t nearly as big as Sun or Google, but his blog has made him a very successful small business. He tailors Prince Charles&#39; suits!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a style=&quot;FONT-FAMILY: arial&quot; href=&quot;http://blueflavor.com/blog/&quot;&gt;Blue Flavor Blog&lt;/a&gt;&lt;br /&gt;Blue Flavor is another successful small business that effectively employs a thought leadership strategy in their blog.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a style=&quot;FONT-FAMILY: arial&quot; href=&quot;http://sethgodin.typepad.com/&quot;&gt;Seth&#39;s Blog&lt;/a&gt;&lt;br /&gt;Best-selling author Seth Godin&#39;s blog is another example of a blog employing a thought leadership strategy and reinforces Seth&#39;s reputation as a writer, speaker and consultant.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a style=&quot;FONT-FAMILY: arial&quot; href=&quot;http://www.kidchanstudio.com/blog/&quot;&gt;Kid Chan Studio Blog&lt;/a&gt;&lt;br /&gt;A good example of a corporate blog from Malaysian company.&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5218321721463811954&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKm6DWBJsX70S_PVOpgaIvstNKprUZYDtVAzz2k0JDyoCaxxLYUqTRpRcK89LN1zj_JAzveiCKslIoY5M4I_Log9dJ69CiYbGc6yI1dkT7eFIhW4Rs7ezpI3sKx0sFgxZN4Z_ndu_kGIHU/s400/2.bmp&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;a style=&quot;FONT-FAMILY: arial&quot; href=&quot;http://blog.exabytes.com.my/&quot;&gt;Exabytes Blog&lt;/a&gt;&lt;br /&gt;Another Malaysian blog, the Exabtyes Blog does a good job of humanising a &#39;virtual&#39; company and notifying readers of special offers. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5218320813625227922&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnxzBEhlxsbqAUKNelAUcvKA18OqamBdnjZVqzX2nPkkUycwB7edmExDhM6gk-ZuN_2eQPVKVsKcnQygOnrEgoSMzUieUCGBSyuXmBu_7UgxD3yRNkHr65LdTeeyRAVgj7K1I5kZlqjXQY/s400/1exabytes.bmp&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;</description><link>http://utarblog.blogspot.com/2008/07/what-is-corporate-blogging-corporate.html</link><author>noreply@blogger.com (yëń^0^)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKm6DWBJsX70S_PVOpgaIvstNKprUZYDtVAzz2k0JDyoCaxxLYUqTRpRcK89LN1zj_JAzveiCKslIoY5M4I_Log9dJ69CiYbGc6yI1dkT7eFIhW4Rs7ezpI3sKx0sFgxZN4Z_ndu_kGIHU/s72-c/2.bmp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-265191244887682969</guid><pubDate>Sun, 29 Jun 2008 19:10:00 +0000</pubDate><atom:updated>2008-07-08T15:07:19.430+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-Government</category><category domain="http://www.blogger.com/atom/ns#">Malaysia</category><title>E-Government in Malaysia: Its Implementation so far and Citizen’s Adoption Strategies</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirQL5Q8Gronw4wZCPn1l-gN3jhDgMH26vJ646rMwWFpq5kF9YkB6pLAgoq9OR63hU8jjSsDgNeruyN0ukU2b-DISCIK5_A83Eq8wH9WGVlUIu47eZ4tLea3ReABeWINzpKaw396HiHJCfK/s1600-h/fig1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217388327497096370&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 398px; CURSOR: pointer; HEIGHT: 242px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirQL5Q8Gronw4wZCPn1l-gN3jhDgMH26vJ646rMwWFpq5kF9YkB6pLAgoq9OR63hU8jjSsDgNeruyN0ukU2b-DISCIK5_A83Eq8wH9WGVlUIu47eZ4tLea3ReABeWINzpKaw396HiHJCfK/s400/fig1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;COLOR: rgb(204,51,204)&quot;&gt;IMPLEMENTATION OF E-GOVERNMENT IN MALAYSIA&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102)&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;The status of e-government implementation in &lt;?xml:namespace prefix = st1 /&gt;&lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Mala&lt;/st1:place&gt;&lt;/st1:country-region&gt;&lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;ysia&lt;/st1:place&gt;&lt;/st1:country-region&gt; is widely discussed as to the potential of e-government implementation towards the public and businesses. As far from the &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Malaysia&lt;/st1:place&gt;&lt;/st1:country-region&gt; is concerned, the implementation of e-government was initiated by the introduction of the Multimedia Super Corridor (MSC) in 1996.&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102)&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102)&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;The e-government initiative launched the country into the Information Age. It will improve the government operates internally as well as how it delivers services to the people of &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Malaysia&lt;/st1:place&gt;&lt;/st1:country-region&gt;. &lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;It seeks to improve the convenience, accessibility, and quality of interaction with citizens and businesses. Simultaneously, it will improve information flow and processes within the government, improve the speed and quality of the policy development, and improve coordination and&lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt; enforcement. This would enable the government to be more responsive to the needs of its citizens.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102)&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102)&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;In order to realize the e-government adoption in &lt;st1:country-region st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Malaysia&lt;/st1:place&gt;&lt;/st1:country-region&gt;, MAMPU has introduced several documents to streamline the e-government implementation. One of the documents, Blueprint for Implementation contains explanations on concept, vision, objectives and roadmap of e-government implementation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102)&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,102,102)&quot;&gt;E-government is one of the seven flagship applications introduced in MSC. Under the e-government flagship, seven main projects were identified to be the c&lt;/span&gt;ore of the e-governmen&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;t &lt;span style=&quot;COLOR: rgb(102,102,102)&quot;&gt;application.&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNs27gtMgIPBUacYmigboLY_agYUcn8UNn510SH7DR7fIsIFw3xQYFESlL0Hk4n1Crzf4dTBisq962_Rzs7OrhCpMeXCJcb3RjsjwtIVIaF_3N8indrP_-og1-8KHVj9y68gNC1XtyspCC/s1600-h/fig4.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217388741236484466&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 242px; CURSOR: pointer; HEIGHT: 135px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNs27gtMgIPBUacYmigboLY_agYUcn8UNn510SH7DR7fIsIFw3xQYFESlL0Hk4n1Crzf4dTBisq962_Rzs7OrhCpMeXCJcb3RjsjwtIVIaF_3N8indrP_-og1-8KHVj9y68gNC1XtyspCC/s200/fig4.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-INDENT: 12.75pt&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt;1)&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt; Generic Office Environment (GOE)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;-- The aim of GOE is to introduce a fully integrated, distributed and scalable office environment that leverages use of the multimedia information technology.&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,102,102);font-family:Arial;&quot; &gt;This will enable efficient communication, allowing collaboration across all workers, and ensuring right information reaching the right people in the timely manner.&lt;o:p&gt;&lt;/o:p&gt; The GOE projects consists of modules namely Enterprise-wide Information Management System (EIMS), Enterprise-wide Communication Management System, and Enterprise-Wide Collaboration Management System (“Pilot Project”). The EIMS provide a universal interface for the users to mange, find, retrieve and compose the information that they need in their day to day operations.&lt;span style=&quot;font-size:0;&quot;&gt; &lt;/span&gt;Via the Communication and Collaboration Management Systems, users can communicate and collaborate in a group to perform work function. All three modules work together in an integrated fashion to provide the technical transparency for the users.&lt;span style=&quot;font-size:0;&quot;&gt; &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102); TEXT-INDENT: 12.75pt&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,102,102);font-family:Arial;&quot; &gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt;2) Electronic Procurement (eP)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;-- The aim is to re-engineer, automate, and transform current procurement system. The project would cover central contract, tender, and direct purchase.&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,102,102);font-family:Arial;&quot; &gt; Besides that, the use of eP will increase transparency, save time and money while encourage suppliers to go electronic and join the K- Economy.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,102,102)&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,102,102);font-family:Arial;&quot; &gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt;3) Human Resource Management Information System (HRMIS)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;-- The introduction of HRMIS as an e-government project will provide single interface for government employees to perform human resource functions effectively and efficiency. &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,102,102);font-family:Arial;&quot; &gt;Furthermore, it will help to standardize all human resource processes for federal, state, statutory body, and local authority services.&lt;span style=&quot;font-size:0;&quot;&gt; The objective of HRMIS is not just for record keeping but also provide transactional functions such as leave application, loan processing, competency management, recruitment, and selection of employee. &lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-INDENT: 12.75pt&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt;4) Project Monitoring System (PMS)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;-- This projects will create a mechanism to monitor project implementation throughout various government agencies and statutory bodies.&lt;/span&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,102,102)&quot;&gt; PMS also provide a platform to exchange ideas and to demonstrate best practices in information management and communication services. The PMS is designed to provide a mechanism for monitoring the implementation of government projrct (&quot;Pilot Projects&quot;, n.d.). The service also provides a platform for exchanging ideas and demonstrating best practices models in information management and communication services.&lt;/span&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-INDENT: 12.75pt&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-INDENT: 12.75pt&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt;5) Electronic Services Delivery (eServices)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,102,102)&quot;&gt;-- This project is a pilot project that allows citizens of &lt;/span&gt;&lt;st1:country-region style=&quot;COLOR: rgb(102,102,102)&quot; st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Malaysia&lt;/st1:place&gt;&lt;/st1:country-region&gt;&lt;span style=&quot;COLOR: rgb(102,102,102)&quot;&gt; to engage in transaction with government and utilities payment such as telephone and electricity bill, police summons, Road and Transport Department (RTD) services, etc. The eService is accessed via multi channel service delivery such as the Internet and kiosk machines.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt;6) Electronic Labor Exchange (ELX)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;-- This project is to improve the mobilization of human resources and optimize work force utilization through systematic matching of job seekers to job vacancies. As such, this would enable the Ministry of Human Resources (MOHR) to be one- stop centre for labour market information that will be accessible to the public.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-INDENT: 12.75pt&quot;&gt;&lt;span style=&quot;font-family:Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;COLOR: rgb(255,102,0);font-family:Arial;&quot; &gt;&lt;br /&gt;7) E- Syariah&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;-- This project is to improve the quality of service in Syariah courts&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;. This will eventually enhance the Islamic Affairs Department’s effectiveness through better monitoring and co-ordination of its agencies and improving the management of its 102 Syariah courts. The E- Syariah application consists of Syariah Court Case Management System , Office Automatic System, E- Syariah Portal, Syarie Lawyers Registration System and Library Management System.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-INDENT: 12.75pt&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;COLOR: rgb(204,51,204);font-family:Arial;font-size:180%;&quot;  &gt;&lt;strong&gt;CITIZEN&#39;S ADOPTION OF E-GOVERNMENT&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;Citizens expect and demand governmental services with a high degree of quality, qua&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDq4MtZIVaWPX_2ErvnWGu2nFUFowMXMOsyaeYvL2LP0TZNOrVlrgTWaPqGWYwRXObLaDHITVoBcjhRb4rOcmuILyTp4VMDwI6zBatdW_pa-LF-7ZxzAszOwDAyYRDjRLO9CyZyvVpnzSf/s1600-h/images+1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217389813639924994&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 240px; CURSOR: pointer; HEIGHT: 169px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDq4MtZIVaWPX_2ErvnWGu2nFUFowMXMOsyaeYvL2LP0TZNOrVlrgTWaPqGWYwRXObLaDHITVoBcjhRb4rOcmuILyTp4VMDwI6zBatdW_pa-LF-7ZxzAszOwDAyYRDjRLO9CyZyvVpnzSf/s400/images+1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;nti&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;ty,&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt; and availability in a 24-hour, seven-days-a-week, and year-round fashion. Success in delivering electronic services depends upon the capability and self-confidence of citizens in perf&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;ormin&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;g e-transactions, as well as their trust and confidence in the protection of their personal data within an open and accountable government.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;Influence citizens’ adoption of e-Services is very important,&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt; because the success and acceptance of e-Government initiatives are dependent on citizens’ willingness to adopt and utilize these services.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;Perceived ease of use, compatibility, and trustworthiness are significant predictors of citizens’ intention to use e-Services and that perceived reactive advantage, perceived image, perceived compatibility, perceived usefulness, and relative advantage are significant elements of e-Government adoption.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;Most users used E-Government websites in their workplace and the most frequently used topic was taxation.&lt;/span&gt;&lt;span style=&quot;font-family:Arial;color:gray;&quot;&gt;Information quality and system quality are significant factors that influence the adoption of E-Government websites. Accuracy, relevancy, and completeness were more significant than timeliness and precision. Efficiency was the most significant factor.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</description><link>http://utarblog.blogspot.com/2008/06/implementation-of-e-government-in.html</link><author>noreply@blogger.com (janice)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirQL5Q8Gronw4wZCPn1l-gN3jhDgMH26vJ646rMwWFpq5kF9YkB6pLAgoq9OR63hU8jjSsDgNeruyN0ukU2b-DISCIK5_A83Eq8wH9WGVlUIu47eZ4tLea3ReABeWINzpKaw396HiHJCfK/s72-c/fig1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-2081307891155738225</guid><pubDate>Sun, 29 Jun 2008 05:01:00 +0000</pubDate><atom:updated>2008-06-29T14:01:54.391+08:00</atom:updated><title>Electronic currency</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghzJhffm8xVWAqwL9GVICVEsUQd1lMQI0Ednq9FfEMpuAoSv9zBGJO-NOLts_leiQ_UNB_QdNmfkE_YmT6wMzLkWvLtFLs_R_ZsACDeNFtH4nI_K2_tBWxK_v2iMeCBEhN13dHWAzcQOo/s1600-h/bitpass_logo.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghzJhffm8xVWAqwL9GVICVEsUQd1lMQI0Ednq9FfEMpuAoSv9zBGJO-NOLts_leiQ_UNB_QdNmfkE_YmT6wMzLkWvLtFLs_R_ZsACDeNFtH4nI_K2_tBWxK_v2iMeCBEhN13dHWAzcQOo/s400/bitpass_logo.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5217170206401305602&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(204, 0, 0);font-size:130%;&quot; &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;what is bitpass???&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;bitPass&lt;/span&gt;&lt;/span&gt; is a micro payment&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt; service that facilitates online content access transactions by integrating the processes involved in buying and selling content, and making it practical to charge very small amounts of money.&lt;br /&gt;&lt;br /&gt;In the BitPass system, transaction fees are paid by the content provider. For payments under $5., the charge is 15% of the cost. Micro payments are by definition very small sums, so the fee is usually just a few cents. For the content buyer, the BitPass system works similarly to a pre-paid telephone card: you sign up for the service and put money into your account using a credit card or pay pal &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;, which gives you credit towards the purchase of content. When the user agrees to pay the cost of access, their account is charged automatically rather than through a link to an external Web site for payment. &lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Although the micro payment concept has been proposed for several years, it&#39;s been a hard sell. After all, most online content has always been free, and people are naturally opposed to paying for anything they might reasonably expect to get for nothing. However, at least part of the reason that content has been free is likely that no one&#39;s found a viable way to get people to pay for it to this point. &lt;/p&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;color: rgb(204, 0, 0); font-weight: bold;&quot;&gt;Misunderstanding electronic payments&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 99);font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;&lt;b&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;Swinging Wide&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(33, 33, 33);font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;BitPass will fail, as FirstVirtual, Cybercoin, Millicent, Digicash, Internet Dollar, Pay2See, and many others have in the decade since Digital silk road, the paper that helped launch interest in micro payments. These systems didn&#39;t fail because of poor implementation; they failed because the trend towards freely offered content is an epochal change, to which micro payments are a pointless response.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;BitPass&#39; predecessors failed for a variety of reasons and &lt;i&gt;of course&lt;/i&gt; &lt;/span&gt;&lt;span style=&quot;color: rgb(33, 33, 33);font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;&quot;&lt;/span&gt;&lt;span style=&quot;;font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;poor implementation&lt;/span&gt;&lt;span style=&quot;color: rgb(33, 33, 33);font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;&quot;&lt;/span&gt;&lt;span style=&quot;;font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt; was among them. Efforts like the ones Shirky mentions were plagued with problems: Elaborate and intrusive sign-up forms, flaky business models, mandatory plug-ins, blood-sucking hook-ups to bank accounts, vendor start-up fees, greedy profit splits, etc. Some even claimed to offer &lt;/span&gt;&lt;span style=&quot;color: rgb(33, 33, 33);font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;&quot;&lt;/span&gt;&lt;span style=&quot;;font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;micro payments&lt;/span&gt;&lt;span style=&quot;color: rgb(33, 33, 33);font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt;&quot;&lt;/span&gt;&lt;span style=&quot;;font-family:Verdana,Arial,Helvetica,Geneva,Swiss;font-size:100%;&quot;  &gt; while refusing to support transactions below 99¢.&lt;br /&gt;     &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;bitpass died???&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;Bitpass, the Menlo Park start-up that gave people a way to make micro payments online, has died.&lt;br /&gt;&lt;br /&gt;Bitpass &lt;span style=&quot;font-weight: bold; font-style: italic; color: rgb(51, 51, 255);&quot;&gt;sent out an email this afternoon to users saying it was closing Jan 26 2007&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;.&lt;/span&gt; Online payments have become more competitive over recent months, since Google joined the fray with Google Checkout, and began offering its service for free. &lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Perhaps Google’s homepage promotion of Checkout was the last straw — making Bitpass the latest Google road-kill. Just three months ago, Bitpass’ chief executive said he was hoping to ally with google, to have Bitpass’ micro payment feature integrated into Google Checkout. &lt;/p&gt; &lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Bitpass was already showing odd signs two years ago, when the CEO disappeared and nobody ever responded to our request for information about what happened. And numerous other micropayments companies struggle or went belly up, including First Virtual, Cybercoin, Millicent, Digicash and Internet Dollar and Peppercoin is still standing.&lt;/p&gt; &lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;See our recent coverage of BitPass here . BitPass has taken two rounds of funding, the latest in the fall of 2004, when it raised $11.75 million from Worldview Technology Partners, Steamboat Ventures (the venture capital arm of the Walt Disney Co.), RRE Ventures and others. Prior to that, it had raised $1.5 million from Garage Technology Ventures, Cardinal Venture Capital, Amicus Capital and Constantine Partners.&lt;/p&gt;</description><link>http://utarblog.blogspot.com/2008/06/electronic-currency.html</link><author>noreply@blogger.com (clarence leong)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghzJhffm8xVWAqwL9GVICVEsUQd1lMQI0Ednq9FfEMpuAoSv9zBGJO-NOLts_leiQ_UNB_QdNmfkE_YmT6wMzLkWvLtFLs_R_ZsACDeNFtH4nI_K2_tBWxK_v2iMeCBEhN13dHWAzcQOo/s72-c/bitpass_logo.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-1252189284068298730</guid><pubDate>Sat, 28 Jun 2008 23:47:00 +0000</pubDate><atom:updated>2008-07-08T15:00:46.953+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-Tailing</category><category domain="http://www.blogger.com/atom/ns#">Electronic Payment</category><category domain="http://www.blogger.com/atom/ns#">Malaysia</category><title>Credit Card debts: Causes and Prevention</title><description>Credit card debt is a major social problem, leading many individual into bankruptcy. To eliminate credit card debt from your own life, it is best to recognize this problem as both a social and individual problem.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.bmivault.org/multimedia/stillshots/2007/2007-12-27-Debt.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://www.bmivault.org/multimedia/stillshots/2007/2007-12-27-Debt.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Causes of Credit Card debts:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1)Credit card interest rates are high, therefore the profits can be high. Banks and other credit card issuers are after their slice of that big money. If you really think that &#39;they are after your money&#39;, it would be better for you to resist.&lt;br /&gt;&lt;br /&gt;2)It is very easy to get credit cards, multiple credit cards in fact. Issuers of credit cards make it easy for you, if you have had no debt problems in the past. If they seem to take it lightly, it is understandable that their customers do too. But remember, they take the risk factors into account when setting interest rates.&lt;br /&gt;&lt;br /&gt;3)Friends, neighbours and work colleagues will probably all have multiple credit cards, talking about them and flashing them around from time to time. That could influence the attitute of a person towards it.&lt;br /&gt;&lt;br /&gt;4)A monthly spending plan is always essential. Without money management, you will have no idea where your money is going. People may spend hundreds of dollars unnecessarily each month and end up having to charge purchases on which they should have spent that money.&lt;br /&gt;&lt;br /&gt;5)Many people don&#39;t understand how money works and grows, how to save and invest for a rainy day, or even why they should balance their checkbook. Financial mistakes are increasingly expensive and complicated to resolve. People should be responsible towords their money and lifestyle.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf5V3gA8u9hyphenhyphencHXPl_3pFseEaw_IR9klrd-nNSOkzgRpavZwaeSymoH88489PT6_Fc3PG7oCpF6JYEm_NdOLhFeRJdC0NO581LtnHf6tU29QRONd8HTKJ5YtOvJtFusww-3b8nCX_-_eBF/s1600-h/save-money.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217833849578416978&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 233px; CURSOR: hand; HEIGHT: 168px&quot; height=&quot;168&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf5V3gA8u9hyphenhyphencHXPl_3pFseEaw_IR9klrd-nNSOkzgRpavZwaeSymoH88489PT6_Fc3PG7oCpF6JYEm_NdOLhFeRJdC0NO581LtnHf6tU29QRONd8HTKJ5YtOvJtFusww-3b8nCX_-_eBF/s200/save-money.jpg&quot; width=&quot;200&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Preventions of Credit Card debts:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1)Create a budget and stick to it. A clear budget that includes all of your monthly bills, food, entertainment and miscellaneous items will prevent you from spending thoughtlessly and buying on impulse.&lt;br /&gt;&lt;br /&gt;2)Maintain clear financial records and a regular payment schedule. Disorganization can cause you to overlook bills and overestimate how much you have to spend. Dedicate a specific time every month (just after payday is best) when you can sit down with your finances, pay your bills and determine how much you have to spend for the month ahead.&lt;br /&gt;&lt;br /&gt;3)Only use credit when you can pay it off within a few months. Using credit cards with no plan to pay the debt is reckless, irresponsible and can get you into big trouble. The longer it takes you to pay off the debt, the more interest that debt will incur--and the more you&#39;ll end up paying.&lt;br /&gt;&lt;br /&gt;4)Shred or tear up credit card applications that come to you in the mail. Just because you get the application doesn&#39;t mean you need or want the card. Destroying the application will prevent you from using it and protect you from potential identity thieves.&lt;br /&gt;&lt;br /&gt;5)Maintain insurance coverage. Health and home insurance are absolute musts in order to avoid bankruptcy. Unexpected medical bills, flood damage and fire damage can lead to ruin if you aren&#39;t properly covered.</description><link>http://utarblog.blogspot.com/2008/07/credit-card-debts-causes-and-prevention.html</link><author>noreply@blogger.com (Nedved)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf5V3gA8u9hyphenhyphencHXPl_3pFseEaw_IR9klrd-nNSOkzgRpavZwaeSymoH88489PT6_Fc3PG7oCpF6JYEm_NdOLhFeRJdC0NO581LtnHf6tU29QRONd8HTKJ5YtOvJtFusww-3b8nCX_-_eBF/s72-c/save-money.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-844856100511003848</guid><pubDate>Sat, 28 Jun 2008 18:32:00 +0000</pubDate><atom:updated>2008-07-08T14:58:44.532+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-Tailing</category><category domain="http://www.blogger.com/atom/ns#">Electronic Payment</category><title>Credit Card Debts: Causes and Prevention</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijpjl_OJdgBKMcVU5hsAuvP2ogImGef7kTbkW38_DKsk4O-QAbFSgvH-Iel0vNZISRzpTgn3Kqz_jesTpACWggYLNFOYTbAGk4cRybTrmrVXPrntf8gn4KkQJGvLq8dNBE97o4VR011LtJ/s1600-h/images4.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217034263400710658&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 221px; CURSOR: pointer; HEIGHT: 138px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijpjl_OJdgBKMcVU5hsAuvP2ogImGef7kTbkW38_DKsk4O-QAbFSgvH-Iel0vNZISRzpTgn3Kqz_jesTpACWggYLNFOYTbAGk4cRybTrmrVXPrntf8gn4KkQJGvLq8dNBE97o4VR011LtJ/s400/images4.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Credit Card Debts&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;Credit card is defined as any card that may be used repeatedly to purchase product &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;and &lt;/span&gt;services&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt; on &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;c&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;redit which issued by &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;banks&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt; and financial institutions. C&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;redit cards provide us with the added security and e&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;ase when shopping and traveling but we tend to misuse them and may lead to credit&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWEfh1PkXLIGwlkKl_Hi6QKupPAd8v_L55DMbwHulsjxnjBzyStGYhLL2FKZQvvlxM-zhPmtMSg1KV7ephZCpttgvMZJ83KMU9r5aylsRXrbpoZjeWt3SnjCeHmlDCa8U4wgTPiGdmFfGK/s1600-h/images1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217033005215901858&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; CURSOR: pointer&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWEfh1PkXLIGwlkKl_Hi6QKupPAd8v_L55DMbwHulsjxnjBzyStGYhLL2FKZQvvlxM-zhPmtMSg1KV7ephZCpttgvMZJ83KMU9r5aylsRXrbpoZjeWt3SnjCeHmlDCa8U4wgTPiGdmFfGK/s400/images1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt; card debt. When properly used, is an extremely convenient tool.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(102,51,0)&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong style=&quot;FONT-WEIGHT: normal&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;Credit card debts&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-size:0;&quot;&gt; result from when a client of a credit card company purchased an item or services through the card they use. &lt;strong style=&quot;FONT-WEIGHT: normal&quot;&gt;Debts accumulate&lt;/strong&gt; increase with interest and penalties for late payment had made the total amount due become larger.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;Credit card debt is said to be increasing in the industries areas. Sometime the late fees,over limit fees&lt;strong&gt;&lt;/strong&gt;, &lt;strong style=&quot;FONT-WEIGHT: normal&quot;&gt;high annual percentage rates&lt;/strong&gt;, and &lt;strong style=&quot;FONT-WEIGHT: normal&quot;&gt;universal default&lt;/strong&gt; overcome customer who frequentl&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;y do not pay off their debts, and the customer declares bankruptcy.&lt;/span&gt;&lt;/span&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;br /&gt;Causes of&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt; Credit Debts&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(0,0,0); LINE-HEIGHT: normalfont-family:arial;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;1.Poor Credit Management&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;The money spent over the income earn on each month will create the debts. &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;Prices of goods and services going up and not the income, more and more Malaysians are forced to spend beyond their earnings. Thus, they will use credit card to purchase goods and services and unable to pay back the expenses.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;Clearly knowing the expenses spending at which places is very importa&lt;/span&gt;nt.&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: left;font-family:arial;&quot; &gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;2.Lack of Concern&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggytAUWBiUyPVA6T-3KWpQBA53CSdhp3Wmfb36xmnq2eewjv6uJxNxR9jQrQrxlHOdbh_Zz2j_NOUKzLWP02B2AfRuBqyPgAHaxHhP1WDJ5-kVbkHKYHUYrygc3cC5PFA3OmCqQymn5ycK/s1600-h/images3.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217033019389098130&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 212px; CURSOR: pointer; HEIGHT: 166px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggytAUWBiUyPVA6T-3KWpQBA53CSdhp3Wmfb36xmnq2eewjv6uJxNxR9jQrQrxlHOdbh_Zz2j_NOUKzLWP02B2AfRuBqyPgAHaxHhP1WDJ5-kVbkHKYHUYrygc3cC5PFA3OmCqQymn5ycK/s400/images3.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;The real culprit behind the scenario is the desire to spend money.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-size:100%;&quot; &gt; Lack of concern that their unable to meet the credit card &lt;strong style=&quot;FONT-WEIGHT: normal&quot;&gt;payment obligation&lt;/strong&gt;. They are lack of con&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-size:100%;&quot; &gt;cern about payment obligation when they are using the credit card. &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-size:100%;&quot; &gt;Using credit card is that you will never feel like you are spending the real money, so &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-size:100%;&quot; &gt;self discipline&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt; is very important to avoid the debts incurre&lt;/span&gt;d.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;3.Partly Repaying the Credit Card Debts&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;Many credit card users only pay the interest and the minimum amount of principal when the debt is due, thus never fully repaying the entire sum.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt; Debt accumulates and increases via &lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;interest&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt; and a penalty when the consumer does not make the payment&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(153,51,153)&quot;&gt;4.Gambling&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;Many credit card users have the hab&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;it in gambling. When they loss the money, they never stop gambling but is continues doing it, then they will use the most easy way to get the money to let them continue to gamble, so credit card is their first choice to think about it.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(153,51,153)&quot;&gt;5. No Saving&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;When the peoples are no saving, they&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt; can also be sucked into credit card debt by unemployment or emergency happened. So saving is very important to avoid this happening.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Preve&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;nti&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;on of Credit&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirWcjg4W6UpSP_jmDjzqrWWjbseFWx-ywEM-1IfZmS9_BbywNrmeGEkcmJs8Z7ngezl7xaFnXKk5FgCB2vfuQrNEkc8q_1ky9LReoPaK3Jb_zTQcCxbG4KJcLPT08kBDrunT_ZXIjnz-x5/s1600-h/cancel_credit_card.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217033602372379298&quot; style=&quot;FLOAT: left; MARGIN: 0pt 10px 10px 0pt; CURSOR: pointer&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirWcjg4W6UpSP_jmDjzqrWWjbseFWx-ywEM-1IfZmS9_BbywNrmeGEkcmJs8Z7ngezl7xaFnXKk5FgCB2vfuQrNEkc8q_1ky9LReoPaK3Jb_zTQcCxbG4KJcLPT08kBDrunT_ZXIjnz-x5/s400/cancel_credit_card.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(153,51,153)&quot;&gt;1.Budget &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;Create a budget and stick to it. A clear budget that includes all of your monthly bil&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;ls, food, entertainment and miscellaneous items will prevent you from spending thoughtlessly and buying on impulse.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;2.Saving&lt;/span&gt; &lt;/span&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;Save for a rainy day. Direct a portion of your paycheck directly into your savings account so you never even see that money. Aim to save enough money to be able to pay your bills for 6 months in case you lose your job or have an accident.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(153,51,153)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;3.Self discipline&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;Self control to overspending is the best way to avoid the credit card debts. Avoid using the credit card in always especially in shopping, because &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;using credit card is that you will never feel like you are spending the real money.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(153,51,153)&quot;&gt;4.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(153,51,153)&quot;&gt;Clear Financial Records and Regular Payment Schedule&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible; COLOR: rgb(102,51,0)&quot;&gt;Disorganization can cause you to overlook bills and overestimate how much you have to spend. Dedicate a specific time every month (just after payday is best) when you can sit down wi&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible; COLOR: rgb(102,51,0)&quot;&gt;th your finances, pay your bills and determine how much you have to spend for the month ahead. So &lt;/span&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;span style=&quot;COLOR: rgb(102,51,0)&quot;&gt;maintain clear financial records and a regular payment schedule is very important.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;5.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt; Shred or Tear Up Credit Card Applications&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIAZUdcAq1C4hTcwkd7pw5YTUDNe4m_HkVNMshhyphenhyphenagbvks4KDXO2gVgeYTXUBdXXuYLtC_pCSaZlof_dshm2X7H3I4oXmECR3JZkChxRfOJJzIbh3Xk5cbG0T4QNOfr75POSeyYP1Qe47B/s1600-h/images2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5217034468594713154&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; CURSOR: pointer&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIAZUdcAq1C4hTcwkd7pw5YTUDNe4m_HkVNMshhyphenhyphenagbvks4KDXO2gVgeYTXUBdXXuYLtC_pCSaZlof_dshm2X7H3I4oXmECR3JZkChxRfOJJzIbh3Xk5cbG0T4QNOfr75POSeyYP1Qe47B/s400/images2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible; COLOR: rgb(102,51,0)&quot;&gt;Shred or tear up credit card applications that come to you in the mail. Just because you get the application doesn&#39;t mean you need or want the card.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible; COLOR: rgb(102,51,0)&quot;&gt; Destroying the application will prevent you from using it and protect you from potential identity thieves.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;opDefaultContent&quot; id=&quot;opmodule_body&quot; style=&quot;VISIBILITY: visible&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;COLOR: rgb(0,0,0); LINE-HEIGHT: normalfont-family:arial;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;/span&gt;</description><link>http://utarblog.blogspot.com/2008/06/credit-card-debts-credit-card-is.html</link><author>noreply@blogger.com (janice)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijpjl_OJdgBKMcVU5hsAuvP2ogImGef7kTbkW38_DKsk4O-QAbFSgvH-Iel0vNZISRzpTgn3Kqz_jesTpACWggYLNFOYTbAGk4cRybTrmrVXPrntf8gn4KkQJGvLq8dNBE97o4VR011LtJ/s72-c/images4.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-8257508832806049021</guid><pubDate>Sat, 28 Jun 2008 12:59:00 +0000</pubDate><atom:updated>2008-07-08T14:57:40.508+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-Tailing</category><category domain="http://www.blogger.com/atom/ns#">Electronic Payment</category><category domain="http://www.blogger.com/atom/ns#">Malaysia</category><title>The Aplication of Prepaid Cash Card for Consumers</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYK_aDkfjjdVMM9YGgdSd6phcBU_hOlsIUNXmonjhuRQvW4RkV3tPZZBaR-CxXmnh4kav4q1TnHi1cih390d2h1YbSDDYmZzEdPCriternOiAcRoLQArUhCkdswR6mQqJGTQLUBU1Z06Yu/s1600-h/pre-paid-card.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5216956858308236562&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYK_aDkfjjdVMM9YGgdSd6phcBU_hOlsIUNXmonjhuRQvW4RkV3tPZZBaR-CxXmnh4kav4q1TnHi1cih390d2h1YbSDDYmZzEdPCriternOiAcRoLQArUhCkdswR6mQqJGTQLUBU1Z06Yu/s320/pre-paid-card.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(153,51,153)font-size:130%;&quot; &gt;What Is Prepaid Cash Card?&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;Prepaid cash cards is a plastic card which provides an alternative payment method to cash when making purchases. Its functionality is more similar to writing a cheque as the funds are withdrawn directly from either the bank account, or from the remaining balance on the card.&lt;br /&gt;&lt;br /&gt;Prepaid cash card like a portable access point to your checking account. Automated teller machines are everywhere now, and you can use prepaid cash cards at automated teller machines to withdrawal fund from your checking account in cash, deposit funds into your checking account, and you don&#39;t need to have a personal computer handy to check your balance.&lt;br /&gt;&lt;br /&gt;If you tend to overspend or wold like to control your spending then prepaid cash cards could be a good card for you.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(153,51,153)&quot;&gt;Consumer Benefits&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;This payment option quickly and securely moves &quot;Checking Account Like&quot; funds without the hassles or risks involved with paper checks.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Prepaid cash card act virtually the same as cash.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Consumers who make prepaid cash card purchases are free of interest charges associated with credit cards.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Consumers can conveniently and inexpensively transfer funds to friends and relatives anywhere. For example, you can buy two cards, and then send one to your mother in a different country. Every time you want t send her money, you can do card-to-card transfer or load up her card.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Un-banked consumers can pay bills and purchases products and services on-line or through phone calls using the card.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;COLOR: rgb(153,51,153);font-size:130%;&quot; &gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Example of Prepaid Cash Card&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(255,0,0); FONT-STYLE: italicfont-size:100%;&quot; &gt;Touch &#39;n Go&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilBi8SlnOLGKXtW8nF_cGH_OlGwMRwz8IQnCNSh94LB1Xi3CtZnCgO8UPsG8NMO-a1CfdOkAHcOeKhLfdsH8y13u3rM-gFxGuonsVSuPLL4LwLznuRpFxVyLXUZIyWjuzfTEjzFf1P2cFE/s1600-h/img_card.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5216940292726818370&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; CURSOR: pointer&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilBi8SlnOLGKXtW8nF_cGH_OlGwMRwz8IQnCNSh94LB1Xi3CtZnCgO8UPsG8NMO-a1CfdOkAHcOeKhLfdsH8y13u3rM-gFxGuonsVSuPLL4LwLznuRpFxVyLXUZIyWjuzfTEjzFf1P2cFE/s320/img_card.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Touch n&#39; go card is an electronic purse that can be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme park.&lt;br /&gt;&lt;br /&gt;Touch &#39;n go uses contactless smartcard technology. The card look like a credit card. User can continue using the card as long as it is pre-loaded with electronic cash. User can reload the card at toll plazas, train stations, Automates Teller Machines, Cash Deposit Machines, Petrol koisks and at ranging from RM 20 to RM 500.&lt;br /&gt;&lt;br /&gt;Touch &#39;n go enhances the speed of paying for low value but high frequency transactions. Apart from the speed, it is also very convenient because user no longer need to prepare for small change or wait in queue at the cash lane to complete the transaction.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMQrJjKOmKsPk8OkgYqTlnXEoNl18vCWQ3RA9_puqw6iAsFRJ1vkshgpdW6GMRE_u6FfpTZhCn86mAyY-X7FgZk7KhyIRNHJrn1Z-0Mmrb5W2fVmLscMNfaJCiYA1wTsO_Lge8GDpqp37j/s1600-h/n_01doughnut.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5216952353577797090&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 285px; CURSOR: pointer; HEIGHT: 190px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMQrJjKOmKsPk8OkgYqTlnXEoNl18vCWQ3RA9_puqw6iAsFRJ1vkshgpdW6GMRE_u6FfpTZhCn86mAyY-X7FgZk7KhyIRNHJrn1Z-0Mmrb5W2fVmLscMNfaJCiYA1wTsO_Lge8GDpqp37j/s320/n_01doughnut.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Nowadays, you can use Touch &#39;n Go to purchases fast foods from 21 outlets in the Klang Valley. The outlets are from A&amp;amp;W, Burger King, Dunkin&#39; Donut, &amp;amp;-Eleven, Carrefour hypermarkers, Caltex conveniences stores and Cineleisure.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(255,0,0); FONT-STYLE: italicfont-size:100%;&quot; &gt;Maybank Visa Debit Card&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiKqy8IhCSyrm_Bh_g6A0Ob9_S8zUG5XhqvlPrfssQUTe0kfsdKtgnQ1qCCbKVQzH6ABuGJTpCVCmdElFiFTHsxddKdIqvY3y6z0licsC_p-h4_Urutm4QakGs1cM3sdIlcVy3zOgfSq_q/s1600-h/maybank_visa_debit_card.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5216952689051372114&quot; style=&quot;FLOAT: left; MARGIN: 0pt 10px 10px 0pt; CURSOR: pointer&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiKqy8IhCSyrm_Bh_g6A0Ob9_S8zUG5XhqvlPrfssQUTe0kfsdKtgnQ1qCCbKVQzH6ABuGJTpCVCmdElFiFTHsxddKdIqvY3y6z0licsC_p-h4_Urutm4QakGs1cM3sdIlcVy3zOgfSq_q/s320/maybank_visa_debit_card.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt;Maybank&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(102,51,0);font-size:100%;&quot; &gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD3RLMt21G7EIERKxfoDXxVps-wCyuY8Sl993DyskpFXLlUeoE8EKz3Sm_rT25UMfdyJEuqu0a7ImskXwY-3Cyy_oimo8adlR3Ch-2A7MJLeBrUoDoAQiMu77SKDnqjqgHh9wcYPztV8iV/s1600-h/mb2u_logo_r.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5216952611179166322&quot; style=&quot;WIDTH: 108px; CURSOR: pointer; HEIGHT: 16px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD3RLMt21G7EIERKxfoDXxVps-wCyuY8Sl993DyskpFXLlUeoE8EKz3Sm_rT25UMfdyJEuqu0a7ImskXwY-3Cyy_oimo8adlR3Ch-2A7MJLeBrUoDoAQiMu77SKDnqjqgHh9wcYPztV8iV/s320/mb2u_logo_r.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;, in partnership with Visa International today launched the Maybankard Visa Debit Card, Maybank&#39;s first dual purpose Bankcard which offer domestic and international access to the cardholder&#39;s bank account.&lt;br /&gt;&lt;br /&gt;Maybank Visa Debit card is a fast and easy way to pay, and it eliminates the need to carry cheques and reduces the risk of carrying cash. You can also pay bills, transfer money or make purchases wherever VISA is accepted.&lt;br /&gt;&lt;br /&gt;You can set your own purchase limit up to the Bank Purchases Limit which currently stand at RM 5000. Maybankard Visa Debit allow you to keep track of your expenses with online statement where you will see information such as merchant location, transaction amount and date.&lt;br /&gt;&lt;br /&gt;You also can earn TraetsPoint whenever you pay with your Maybankard Visa Debit. Redeem an array of exciting gifts or shopping,dinning or petrol vouchers with your accumulated TreatsPoints.&lt;br /&gt;&lt;br /&gt;No more annual fees, monthly interest rates or late charges to worry about with the Maybankard Visa Debit.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</description><link>http://utarblog.blogspot.com/2008/06/what-is-prepaid-cash-card-prepaid-cash.html</link><author>noreply@blogger.com (yëń^0^)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYK_aDkfjjdVMM9YGgdSd6phcBU_hOlsIUNXmonjhuRQvW4RkV3tPZZBaR-CxXmnh4kav4q1TnHi1cih390d2h1YbSDDYmZzEdPCriternOiAcRoLQArUhCkdswR6mQqJGTQLUBU1Z06Yu/s72-c/pre-paid-card.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-4720503114723047341</guid><pubDate>Sun, 22 Jun 2008 08:56:00 +0000</pubDate><atom:updated>2008-07-08T15:05:26.271+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><category domain="http://www.blogger.com/atom/ns#">Internet Security</category><category domain="http://www.blogger.com/atom/ns#">Legal</category><title>A Review on Internet Security: Impact to Fight Cyber Terrorism</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi88XBXlSSaPmkpg18lIeLPmgZbZFRrQjf7ty6bUW9EDn3OcsEk8FMbcxpBpfadVkVwkfpkaTK_iILCgE_XYRHaypXmZB7DkTzQKDoBQPx7sOr_QuH-udbNHHa3R2UnM6zhBe8OGt9Oxu92/s1600-h/3.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214641306061185954&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi88XBXlSSaPmkpg18lIeLPmgZbZFRrQjf7ty6bUW9EDn3OcsEk8FMbcxpBpfadVkVwkfpkaTK_iILCgE_XYRHaypXmZB7DkTzQKDoBQPx7sOr_QuH-udbNHHa3R2UnM6zhBe8OGt9Oxu92/s200/3.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;First of all, what is cyber terrorism?&lt;br /&gt;&lt;/div&gt;&lt;div&gt;It is basically define as the use of information technology by terrorist groups and individuals to execute attacks against networks, computer systems and telecommunications infrastructures. Some example would be such as hacking into others computer systems, introducing viruses to vulnerable networks, web site defacing, denial-of-service attacks, or terroristic threats made via electronic communication.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu33sEGgJbfQJJ8LYxhGdAhWLhTNkWVNqP8EJlit4QA7rZfRP8cWgFH3rt3P8spSm6H_ckt-5FViedaChsYBM_hZ4fCpv8yO3Am6xoqbZQPYFtmBY3dAi_rFjgl2cyjEeABJtsbDlxEdgj/s1600-h/2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214642579414751506&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu33sEGgJbfQJJ8LYxhGdAhWLhTNkWVNqP8EJlit4QA7rZfRP8cWgFH3rt3P8spSm6H_ckt-5FViedaChsYBM_hZ4fCpv8yO3Am6xoqbZQPYFtmBY3dAi_rFjgl2cyjEeABJtsbDlxEdgj/s200/2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Here are some of the cyber terrorism events which has happened previously... &lt;/div&gt;&lt;br /&gt;&lt;ol&gt;&lt;br /&gt;&lt;li&gt;In May 2007, Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Talinn. The attack was a distributed denial of service attack in which selected sites were bombarded with traffic in order to force them offline; nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline. Despite speculation that the attack had been coordinated by the Russian government, Estonia&#39;s defense minister admitted he had no evidence linking cyber attacks to Russian authorities. &lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;In October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.&lt;/li&gt;&lt;br /&gt;&lt;br /&gt;&lt;li&gt;In 1999 hackers attacked NATO computers. The computers flooded them with email and hit them with a denial of service (DoS). The hackers were protesting against the NATO bombings in Kosovo. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries. No physical harm or injury had been inflicted.&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;The Effect of Cyber-terrorism... &lt;/p&gt;&lt;p&gt;Cyberterrorism can have a serious large-scale influence on significant numbers of people. It can weaken countries&#39; economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack.&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;Cyberterror can also affect internet-based businesses. Like brick and mortar retailers and service providers, most websites that produce income (whether by advertising, monetary exchange for goods or paid services) could stand to lose money in the event of downtime created by cyber criminals.&lt;/p&gt;&lt;p&gt;As internet-businesses have increasing economic importance to countries, what is normally cybercrime becomes more political and therefore &quot;terror&quot; related.&lt;/p&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirbNMpDWwikfg-kyai6pPIUvHrpBR2rJaim8zKMclr2g0_MF5ts7KZC6JmCL3hgxFhZfrEoXBF0_HzqtgqaIDDBQoRFSM2YeJE4O1WbgAaAYMAYPv4jeQhqrbHRLp2q2e37-w4K-a98Bw-/s1600-h/1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214641796895481842&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirbNMpDWwikfg-kyai6pPIUvHrpBR2rJaim8zKMclr2g0_MF5ts7KZC6JmCL3hgxFhZfrEoXBF0_HzqtgqaIDDBQoRFSM2YeJE4O1WbgAaAYMAYPv4jeQhqrbHRLp2q2e37-w4K-a98Bw-/s200/1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Steps to be taken to prevent Cyber-terrorism...&lt;/p&gt;&lt;ol&gt;&lt;li&gt;All accounts should have passwords and the passwords should be unusual, difficult to guess.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Change the network configuration when defects become know. &lt;/li&gt;&lt;br /&gt;&lt;li&gt;Check with venders for upgrades and patches.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Audit systems and check logs to help in detecting and tracing an intruder. &lt;/li&gt;&lt;br /&gt;&lt;li&gt;If you are ever unsure about the safety of a site, or receive suspicious email from an unkown address, don&#39;t access it. It could be trouble. &lt;/li&gt;&lt;/ol&gt;</description><link>http://utarblog.blogspot.com/2008/06/review-on-internet-security-impact-to.html</link><author>noreply@blogger.com (Nedved)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi88XBXlSSaPmkpg18lIeLPmgZbZFRrQjf7ty6bUW9EDn3OcsEk8FMbcxpBpfadVkVwkfpkaTK_iILCgE_XYRHaypXmZB7DkTzQKDoBQPx7sOr_QuH-udbNHHa3R2UnM6zhBe8OGt9Oxu92/s72-c/3.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-612187286371284669</guid><pubDate>Sat, 21 Jun 2008 15:49:00 +0000</pubDate><atom:updated>2008-07-08T15:08:11.766+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet Security</category><title>Threat of Online Security: How Safe is Our Data?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiav8j038JT-plHOmBvxtjDQ2Hlh286ebV8bv2xrgqz5PsmU9cecvsYsJNEFRwIlfRaOZV7KdeJ9qybJP86EzD3OW5zhE5DYJnkRFTl5QuhRhCq1sfwmDq1h7nV3PbMARVfrd1MK9WvLQwn/s1600-h/Mwanted_poster6jpg-1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214405486736340930&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 282px; CURSOR: pointer; HEIGHT: 320px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiav8j038JT-plHOmBvxtjDQ2Hlh286ebV8bv2xrgqz5PsmU9cecvsYsJNEFRwIlfRaOZV7KdeJ9qybJP86EzD3OW5zhE5DYJnkRFTl5QuhRhCq1sfwmDq1h7nV3PbMARVfrd1MK9WvLQwn/s320/Mwanted_poster6jpg-1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;br /&gt;Threat of Online Security&lt;/span&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;COLOR: rgb(255,0,0);font-size:100%;&quot; &gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;&lt;br /&gt;Every unprotected computer is susceptible to have a high level of computer online security risk. The computer online securit&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;y are virus, worm, and/or Trojan horse.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;1) &lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(255,0,0)&quot;&gt;Virus&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZF11fQBt3FdLyQRlhJsc9KBGvWlXGltc7P76TnupMOF1g-XuI7OxuGyXlzRrNcJfJnrfIdxySw3IYDLbRvTVMezJPgb4LKqqTHJhN4rH2T_3ZQEaurW0rWa4fbK5XPFfK-Xt1tYedUHQ/s1600-h/computer-virus.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214399316008964834&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 126px; CURSOR: pointer; HEIGHT: 91px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxZF11fQBt3FdLyQRlhJsc9KBGvWlXGltc7P76TnupMOF1g-XuI7OxuGyXlzRrNcJfJnrfIdxySw3IYDLbRvTVMezJPgb4LKqqTHJhN4rH2T_3ZQEaurW0rWa4fbK5XPFfK-Xt1tYedUHQ/s200/computer-virus.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;--A computer &lt;span style=&quot;FONT-WEIGHT: bold; FONT-STYLE: italic&quot;&gt;virus &lt;/span&gt;is a potentially damaging computer program&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; t&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;hat&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; affects, or infects, a&lt;br /&gt;computer negatively by altering the way the computer works without the&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; user&#39;s knowledge or&lt;br /&gt;permission. Once the virus infects the computer, it can spread throughout and may damage&lt;br /&gt;files and system software, including the operating system.&lt;/span&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdCVE6fgx_xm0ZklNuaHBA5TXWoUvM0RRyAwiCMNAcKFC0TCX7eb6lmCpZ0H9edsVaQOIwOAEcmkQHSLivWc2N94S_vneWeArDN9FeHJJON3PljSRGZ-CIiUK8sO0mK1Kw5Bc7sTIYHoUw/s1600-h/Computer_Worm.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214399317000050194&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 122px; CURSOR: pointer; HEIGHT: 91px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdCVE6fgx_xm0ZklNuaHBA5TXWoUvM0RRyAwiCMNAcKFC0TCX7eb6lmCpZ0H9edsVaQOIwOAEcmkQHSLivWc2N94S_vneWeArDN9FeHJJON3PljSRGZ-CIiUK8sO0mK1Kw5Bc7sTIYHoUw/s200/Computer_Worm.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;2) &lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(255,0,0)&quot;&gt;Worm&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;--A &lt;span style=&quot;FONT-WEIGHT: bold; FONT-STYLE: italic&quot;&gt;worm&lt;/span&gt; is a program that copies itself repeatedly,&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; for example in the memory or on a &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;network, using up resources and possibly shutting down the computer or network.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;3) &lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(255,0,0)&quot;&gt;Trojan horse&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHVHHq3FuyPwg3_uopyC6Nt6ztH-va8cqLcLgHt-3T-TtTU-rkZTpjmMaZqMdyxs66fxXWsDt3UibV9a1gL7UuX4iQMvGjV1lUg4hRRXXM8pQt_sqmF-o3NmOa_t18TZi2B_7H1pixmt45/s1600-h/198980_f520.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214399313166698882&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 128px; CURSOR: pointer; HEIGHT: 90px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHVHHq3FuyPwg3_uopyC6Nt6ztH-va8cqLcLgHt-3T-TtTU-rkZTpjmMaZqMdyxs66fxXWsDt3UibV9a1gL7UuX4iQMvGjV1lUg4hRRXXM8pQt_sqmF-o3NmOa_t18TZi2B_7H1pixmt45/s200/198980_f520.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;--A &lt;span style=&quot;FONT-WEIGHT: bold; FONT-STYLE: italic&quot;&gt;Trojan horse&lt;/span&gt; (named after the Greek myth) is a program that hides within or looks like a&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;legitimate program. A certain condition or action usually&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; triggers the Trojan horse. Unlike a&lt;br /&gt;virus or worm, a Trojan horse does not replicate itself to other computers.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(204,51,204)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Safeguards against Computer Viruses, Worm and&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(204,51,204)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt; Trojan Horses&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;COLOR: rgb(204,51,204)&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Metho&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;ds that&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; guarantee a computer or network is safe from computer viruses, worm, an&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;d Trojan horses simply do not exist. User can take several precaution&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;s, however, to protect their home and wo&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;rk computer from these malicious infections.&lt;br /&gt;&lt;br /&gt;1) Never start a computer with with removable media in the drives, unless the media in uninfected.&lt;br /&gt;&lt;br /&gt;2) Never open an e-mail attachment unless you are expecting it and it is from a trusted source. Turn off&lt;br /&gt;message preview.&lt;br /&gt;&lt;br /&gt;3) Set the macro security in programs so you can enable or disable macros. Enable m&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;acros only if the&lt;br /&gt;document is from trusted source and you are expecting it.&lt;br /&gt;&lt;br /&gt;4) Install an antivirus program on all of your computers. Obtain updates to the virus signature files on a&lt;br /&gt;regular basis.&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;5) Check all downloaded programs for viruses, worms, or Trojan horses. These malicious- logic programs&lt;br /&gt;often are placed in seemingly innocent programs, so they will affect a large number of users.&lt;br /&gt;&lt;br /&gt;6) If the antivirus program flags an e-mail attachment as infected, deleted the attachment immediately.&lt;br /&gt;&lt;br /&gt;7) Before using any removable media, use the antivirus scan program to check the media for infection.&lt;br /&gt;incorporate this procedure even for shrink- wrapped software from major developer&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;s. Some commercial&lt;br /&gt;software has been infected and distributed to unsuspecting users this way.&lt;br /&gt;&lt;br /&gt;8) Install a personal fire program.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg42cSHtPXFW3Ooqe2YwU2iKx_bJUVeQ_viAyOgHqLstA5lHCdpZqpc_w3tl_cOnBRYDfy9iBsxpFyNwK6-fvYfPEvp-hugfJEcGcPruQwJZn7CY0CNja5kFgPBJPxgrwMDDfcfDanl9_Pj/s1600-h/encryption.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214406101966175138&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; CURSOR: pointer&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg42cSHtPXFW3Ooqe2YwU2iKx_bJUVeQ_viAyOgHqLstA5lHCdpZqpc_w3tl_cOnBRYDfy9iBsxpFyNwK6-fvYfPEvp-hugfJEcGcPruQwJZn7CY0CNja5kFgPBJPxgrwMDDfcfDanl9_Pj/s320/encryption.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Safeguard against Data and Information Theft&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Many companies and individuals use a variety of encryption techniques to keep data secure and private.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(255,0,0)&quot;&gt;Encryption&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Encryption&lt;/span&gt; is a process of converting readable data into&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; unreadable characters to prevent unauthorized access. You treat encrypted data just like any other data. That is, you can store it or send it in an e-mail message. To read the data, the recipient must &lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;decrypt&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;, or decipher, it into readable form.&lt;br /&gt;&lt;br /&gt;In the encryption process, the unencrypted, readable data is called &lt;span style=&quot;FONT-STYLE: italic&quot;&gt;plaintext&lt;/span&gt;. The encrypted (scrambled) data is called &lt;span style=&quot;FONT-STYLE: italic&quot;&gt;ciphertext&lt;/span&gt;. To encrypt the data, the originator of the data coverts the plaintext into ciphertext using an encryption key. In its simplest form, an &lt;span style=&quot;FONT-STYLE: italic&quot;&gt;encryption key&lt;/span&gt; is programmed formula that the recipient of the data uses to decrypt ciphertext.&lt;br /&gt;&lt;br /&gt;When user send an e-mail message over the Internet, they never know might intercept it, who might read it, or to whom it might be forwarded. if a message contain personal or confidential information, users can protect the message by encrypting it or signing it digitally. One of the more popular e-mail encryption programs is called &lt;span style=&quot;FONT-STYLE: italic&quot;&gt;Pretty Good Privacy (PGP)&lt;/span&gt;. PGP is freeware for personal, noncommercial users. Home users can download PGP from web at no cost.&lt;br /&gt;&lt;br /&gt;A &lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;digital signature&lt;/span&gt; is an encrypted code that a person, website, or company attaches to an electronic message to verify the identity of the message sender. The code usually consists of the user&#39;s name and a hash of all part of the message. A &lt;span style=&quot;FONT-STYLE: italic&quot;&gt;hash&lt;/span&gt; is a mathematical formula that generates a code from the contents of the message. Thus, the hash differs for each message. Receivers of the message and compares it with oner in the digital signature to ensure they match.&lt;br /&gt;&lt;br /&gt;Digital signature often are used to ensure that an impostor in not participating in an internet transaction. that is, digital signature help to prevent e-mail forgery. A digital signature also can verify that the content of a message has not change.&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPMiSj7esxzd6vjzwrigB7pf7FspOHTSKevckAXtjI4e2ymHg3VujthMVNOaniRAiJxpCA4wpDQF2hkc7ENucWqIgpMI1FzLQlHel0lms4MSJzqZzhaJOxueuzX_byVvtnTPi5KlfPhqVp/s1600-h/encryption_decryption.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5214395288396620514&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPMiSj7esxzd6vjzwrigB7pf7FspOHTSKevckAXtjI4e2ymHg3VujthMVNOaniRAiJxpCA4wpDQF2hkc7ENucWqIgpMI1FzLQlHel0lms4MSJzqZzhaJOxueuzX_byVvtnTPi5KlfPhqVp/s400/encryption_decryption.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://utarblog.blogspot.com/2008/06/threat-of-online-security-every.html</link><author>noreply@blogger.com (janice)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiav8j038JT-plHOmBvxtjDQ2Hlh286ebV8bv2xrgqz5PsmU9cecvsYsJNEFRwIlfRaOZV7KdeJ9qybJP86EzD3OW5zhE5DYJnkRFTl5QuhRhCq1sfwmDq1h7nV3PbMARVfrd1MK9WvLQwn/s72-c/Mwanted_poster6jpg-1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-819380260931399624</guid><pubDate>Thu, 19 Jun 2008 14:20:00 +0000</pubDate><atom:updated>2008-07-07T10:49:39.063+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet Security</category><title>How to safeguard our personal and financial data?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWVh5L1OKghd5z7jj3lYeHv1z9Z44pOau7BpWRH9Y66UbuoFuMF0v9tq7zDMvjvB7Q5Y1vtb2UWaR9SUK8DTQvhfpY5MjmWSWO8lE_LQVeDnIqwNu9_4Kkf0TpHQGp3j8zALiAj1EAQ48/s1600-h/afaria_security.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5215004393269965410&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWVh5L1OKghd5z7jj3lYeHv1z9Z44pOau7BpWRH9Y66UbuoFuMF0v9tq7zDMvjvB7Q5Y1vtb2UWaR9SUK8DTQvhfpY5MjmWSWO8lE_LQVeDnIqwNu9_4Kkf0TpHQGp3j8zALiAj1EAQ48/s320/afaria_security.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Today, people rely on computers to create, store and manage critical information. Thus, it is important that the computers and the data they store are accessible and available when needed. It also is crucial that users take measures to protect their computers and data from loss, damage, and misuse.&lt;br /&gt;For example,&lt;br /&gt;&lt;ul&gt;&lt;li&gt;businesses must ensure that information such as credit records, employee and customer data, and purchase information is secure and confidential.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;home users must ensure that their credit card number is secure when they use it to purchase goods and services from Web-based businesses.&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,51,255)&quot;&gt;There are some ways and suggestions to safeguard our personal and financial data....&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,0,0)&quot;&gt;Safeguards on personal data&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Request electronic versions of bills, statements, and checks instead of paper.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Sign up for direct deposit of payroll to prevent paper checks from ending up in the wrong hands.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Shred all personal and financial information such as bills, bank statements, ATM receipts, and credit card offers before you discard them.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Keep your personal documentation (e.g. birth certificate, Social Security card, etc.) and your bank and credit card records in a secure place.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Limit the personal information that you carry in your wallet or purse.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Do not give your Social Security number, credit card number, or any bank account details over the phone unless you have initiated the call and know that the business that you are dealing with is reputable.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Do not disclose bank account numbers, credit card account numbers, and other personal financial data on any Web site or online service location, unless you receive a secured authentication key from your provider.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Do not allow mail to go uncollected. Retrieve it promptly.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Memorize your numbers and/or passwords. Do not write your Social Security number or passwords on paper and store them in your wallet or purse.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Avoid leaving envelopes containing your credit card payments or checks in your home mailbox for postal carrier pickup.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Prior to discarding a computer, make sure all personal information is deleted from its hard drive.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Take receipts at ATMs, bank counters, or unattended gasoline pumps with you.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Use passwords on your credit cards, bank accounts, and phone cards.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Review your credit reports annually.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Be aware of your surroundings when entering your Personal Identification Number (PIN) at an ATM.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Frequently monitor your account activity, such as balances and withdrawals.&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(204,0,0)&quot;&gt;Safeguards on personal and financial data&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(255,102,0)&quot;&gt;Firewalls&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;companies can use firewalls to protect network resources from outsiders and to restrict employees&#39; access to sensitive data such as payroll or personnel records.&lt;/li&gt;&lt;li&gt;businesses can implement a firewall solution themselves or outsource their needs to a company specializing in providing firewall protection.&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(255,102,0)&quot;&gt;Access controls&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;many companies use access controls to minimize the chance that a perpetrator intentionally may access or an employee accidentally may access confidential information on a computer.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(255,102,0)&quot;&gt;Encryption&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;to prevent information theft and to protect information on the internet and networks, companies and individuals use a variety of encryption techniques to keep data secure and private.&lt;/li&gt;&lt;/ul&gt;</description><link>http://utarblog.blogspot.com/2008/06/how-to-safeguard-our-personal-and_19.html</link><author>noreply@blogger.com (clarence leong)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWVh5L1OKghd5z7jj3lYeHv1z9Z44pOau7BpWRH9Y66UbuoFuMF0v9tq7zDMvjvB7Q5Y1vtb2UWaR9SUK8DTQvhfpY5MjmWSWO8lE_LQVeDnIqwNu9_4Kkf0TpHQGp3j8zALiAj1EAQ48/s72-c/afaria_security.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-8030788074636536529</guid><pubDate>Tue, 17 Jun 2008 13:24:00 +0000</pubDate><atom:updated>2008-07-08T15:02:39.310+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Phishing</category><title>Phishing: Examples and its Prevention Methods</title><description>&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://readyroom.files.wordpress.com/2008/02/phishing.jpg&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;img style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 106px; CURSOR: pointer; HEIGHT: 112px&quot; alt=&quot;&quot; src=&quot;http://readyroom.files.wordpress.com/2008/02/phishing.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;COLOR: rgb(255,0,0);font-family:arial;font-size:130%;&quot;  &gt;What is Phishing?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;span style=&quot;TEXT-DECORATION: none;font-family:arial;&quot; &gt;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Phishing&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. &lt;b&gt;PayPal, eBay and online banks&lt;/b&gt; are common targets.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;Phishing is typically carried out by &lt;b&gt;e-mail&lt;/b&gt; or &lt;b&gt;instant massaging&lt;/b&gt;, and often directs users to enter details at a website, although phone contact has also been used.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;COLOR: rgb(255,0,0);font-family:arial;font-size:130%;&quot;  &gt;Examples and Prevention Method of Phishing&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;span style=&quot;TEXT-DECORATION: none;font-family:arial;&quot; &gt;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;COLOR: rgb(153,51,153);font-family:arial;&quot; &gt;Phishing emails&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;Phising emails usually appear to come from a &lt;b&gt;well-know organization &lt;/b&gt;and &lt;b&gt;ask for your personal information&lt;/b&gt;, such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div  style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;How to Prevent?&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Important:&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; To be completely safe from phishers, do not click links in emails. If in doubt, close your browser, reopen it, and type the web address for the site you want to visit directly into the Address bar.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://us.i1.yimg.com/us.yimg.com/i/us/str/gr/spoof-email.gif&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;http://us.i1.yimg.com/us.yimg.com/i/us/str/gr/spoof-email.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;ol style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Unofficial “From” address: &lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Look out for a sender’s e-mail address that is similar to, but not the same as a company’s official email address.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Urgent action requires:&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; Be wary of emails containing phrase like “your account will be closed”, “your account has been compromised”, or “urgent action required”. The fraudster is taking advantage of your concern to trick you into providing confidential information&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Generic greeting:&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; Fraudster may have your email address, but they seldom have your name. Be skeptical of an email sent with a generic greeting suc as “Dear Customer” or “Dear Member”.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Links to a fake web site: &lt;/span&gt;&lt;/b&gt;To trick you into disclosing your user name and password, fraudsters often include a link to a fake website that look like the sign-in page of a legitimate website.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGW7mQ5lA5GQnlT8-ZC4rbb_K6apGfk1hJ81yG7SlMr3BOvcywRRT2RS73i0_Zr0U1H8SklhiCguRPAzfA4ofGbElkb_aOoJCwNnCRhhyphenhyphenYZFtX3PZJoClhCA5XlgzuuWzOuXNk8huTpjnX/s1600-h/ZA011411871033.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5212889758185241634&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGW7mQ5lA5GQnlT8-ZC4rbb_K6apGfk1hJ81yG7SlMr3BOvcywRRT2RS73i0_Zr0U1H8SklhiCguRPAzfA4ofGbElkb_aOoJCwNnCRhhyphenhyphenYZFtX3PZJoClhCA5XlgzuuWzOuXNk8huTpjnX/s320/ZA011411871033.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Legitimate link mixed with fake links:&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; Fraudsters sometimes include authentic links in their spoof pages in order to make the spoof site appear more realistic. There are some indicators that an email might not be trustwor&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;thy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;ul style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Spelling errors, poor grammar, or inferior graphics.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Request for personal information&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;Attachments&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;FONT-WEIGHT: bold&quot;&gt;Sample bogus e-mail from Citibank:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.bankrate.com/images/nws/PhishingEmail-small.gif&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;http://www.bankrate.com/images/nws/PhishingEmail-small.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;span style=&quot;FONT-STYLE: italic&quot;&gt;Example Phishing on eBay:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.siliconvalleywatcher.com/mt/archives/phishing.gif&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;http://www.siliconvalleywatcher.com/mt/archives/phishing.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;COLOR: rgb(153,51,153);font-family:arial;&quot; &gt;Phishing Web Site&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;A phishing web site (spoofed) tries to steal your account password or other confidential information by tricking you into believing you’re on a legitimate web site.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;Important: If you’re at all unsure about a web site, &lt;b&gt;do not sign in&lt;/b&gt;. The safest thing to do is to close and then reopen your browser, and then type the URL into your browser’s Address bar.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;How to Prevent?&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.phishtank.com/images/example_website.gif&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 449px; CURSOR: pointer; HEIGHT: 263px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;http://www.phishtank.com/images/example_website.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-LEFT: 21pt; TEXT-INDENT: -21pt&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;1.&lt;span style=&quot;FONT-WEIGHT: normal; LINE-HEIGHT: normal; FONT-STYLE: normal; FONT-VARIANT: normal; font-size-adjust: none; font-stretch: normal&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Incor&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;rect company name:&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; Look out for tricks such as substituting the number “1” for the letter “I” in a web address (for example, www.paypa1.com instend of &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;www.paypaI.com&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt; ).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-LEFT: 21pt; TEXT-INDENT: -21pt&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;2.&lt;span style=&quot;FONT-WEIGHT: normal; LINE-HEIGHT: normal; FONT-STYLE: normal; FONT-VARIANT: normal; font-size-adjust: none; font-stretch: normal&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;http:// at the start of the address on Yahoo! sign-in pages:&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; A legitimate Yahoo! sign-in page address starts with “https://”. Look for the letter “s” following “http”.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;MARGIN-LEFT: 21pt; TEXT-INDENT: -21pt&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt;3.&lt;span style=&quot;FONT-WEIGHT: normal; LINE-HEIGHT: normal; FONT-STYLE: normal; FONT-VARIANT: normal; font-size-adjust: none; font-stretch: normal&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Missing slash:&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt; Make sure a forward slash (“/”) appears after “yahoo.com” in the Address bar.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://us.i1.yimg.com/us.yimg.com/i/us/sec/yahoo_dotcom_slash_url_bar_3.gif&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;http://us.i1.yimg.com/us.yimg.com/i/us/sec/yahoo_dotcom_slash_url_bar_3.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;A slash (“/”) after “yahoo.com” can help identify a Yahoo! site.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://us.i1.yimg.com/us.yimg.com/i/us/sec/yahoo_https_url_bar_2.gif&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;http://us.i1.yimg.com/us.yimg.com/i/us/sec/yahoo_https_url_bar_2.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;For example, &quot;http://www.yahoo.com:login&amp;amp;mode=secure&quot; is a fake web site address.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Both &lt;/span&gt;&lt;a href=&quot;http://www.internet%20explorer.com/&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Internet Explo&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;a href=&quot;http://www.internet%20explorer.com/&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;&lt;b&gt;rer &lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.internet%20explorer.com/&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;img style=&quot;WIDTH: 26px; CURSOR: pointer; HEIGHT: 26px&quot; alt=&quot;&quot; src=&quot;http://imthi.com/wp-content/uploads/2008/01/internet_explorer_logo.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt; and &lt;/span&gt;&lt;a href=&quot;http://www.mozilla%20firefox.com/&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Mozilla Firefox &lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.mailchimp.com/blog/wp-content/uploads/2008/03/firefox_logo1.jpg&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;img style=&quot;WIDTH: 24px; CURSOR: pointer; HEIGHT: 23px&quot; alt=&quot;&quot; src=&quot;http://www.mailchimp.com/blog/wp-content/uploads/2008/03/firefox_logo1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt; web browsers have free add-ons (or “plug-ins”) that can help you detect phishing sites.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;COLOR: rgb(255,0,0);font-family:arial;&quot; &gt;How to Spot Phishing Scams:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;ol style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Never reply to e-mail massages that request your personal information.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-family:arial;&quot;&gt;Don’t click links in suspicious e-mail, do not copy and paste links from messages into your browser.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Use strong passwords and change them often.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Don’t send personal information in regular e-mail messages.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Do business only with companies you know and trust.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Make sure the web site uses encryption &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilROJLw72eoIgGsYlVVM2sjtJbjl-0x95J-pmfPhkcw0GvmqMNFqogK6M6X7i6iVWRjvdV1aT9f_6OxEVFKYb9JbZ7ArcLgPc6cEEGbVqdXafKQdC72Lbxjsey8lmwyQBZElYdPM_V0LuC/s1600-h/ZA011491851033.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5212893237552862914&quot; style=&quot;CURSOR: pointer&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilROJLw72eoIgGsYlVVM2sjtJbjl-0x95J-pmfPhkcw0GvmqMNFqogK6M6X7i6iVWRjvdV1aT9f_6OxEVFKYb9JbZ7ArcLgPc6cEEGbVqdXafKQdC72Lbxjsey8lmwyQBZElYdPM_V0LuC/s200/ZA011491851033.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Help protect your PC. Use firewall, keep your computer updated, and use antivirus software.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Monitor your transactions. R&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;eview you order confirmations and credit card and bank statements.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Use credit cards for transactions on the internet&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;TEXT-ALIGN: justify;font-family:arial;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://utarblog.blogspot.com/2008/06/blog-post_17.html</link><author>noreply@blogger.com (yëń^0^)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGW7mQ5lA5GQnlT8-ZC4rbb_K6apGfk1hJ81yG7SlMr3BOvcywRRT2RS73i0_Zr0U1H8SklhiCguRPAzfA4ofGbElkb_aOoJCwNnCRhhyphenhyphenYZFtX3PZJoClhCA5XlgzuuWzOuXNk8huTpjnX/s72-c/ZA011411871033.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-4365482527775855372</guid><pubDate>Sun, 15 Jun 2008 15:50:00 +0000</pubDate><atom:updated>2008-06-16T20:10:32.071+08:00</atom:updated><title>The failure of Pets.com</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvAviFGYknu26OC2ztyVsjVDGdVPFiZJqSzlGA3Why3OhaRGo6hto9KG2s4ET76KJTzwtNcjVX0fkNhJFold7G1YQv3iwbiG_9JqnS2LRykyK9MaFlLxuMDA3AlQjzCef3-nytQELgcDU/s1600-h/Pets2_120.gif&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvAviFGYknu26OC2ztyVsjVDGdVPFiZJqSzlGA3Why3OhaRGo6hto9KG2s4ET76KJTzwtNcjVX0fkNhJFold7G1YQv3iwbiG_9JqnS2LRykyK9MaFlLxuMDA3AlQjzCef3-nytQELgcDU/s320/Pets2_120.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5212136557395894610&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;                                                          &lt;span style=&quot;font-size:180%;&quot;&gt;  Pets.com&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);font-size:100%;&quot; &gt;Pets.com was a short-lived online business (business to customer  companies) that sold pet accessories and supplies direct to consumers over the World Wide Web. It launched in August of 1998 and went from an IPO on a major stock exchange to liquidation in 9 months.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;After its start by Greg McLemore, the site and domain was purchased in early 1999 by leading venture capital&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; firm Hummer Winblad and executive Julie Wainwright. Amazon.com &lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; was involved in pets.com&#39;s first round&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; of venture funding&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;. Pets.com would eventually buy out one online competitor Petstore.com.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;Pets.com brought rival Petstore.com in June and announced plans in September to move some of its staff to the Midwest to cut costs. Despite these moves, the company&#39;s stock price has been mired below the $1.50 level for months.  &lt;/span&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;Trading in Pets.com stock was temporarily halted Tuesday. When trading resumed, the price promptly plunged to 22 cents from 66 cents, a one-day decline of 67 percent. Volume topped 4 million shares. &lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;After trading as high as $14 this year, the rock-bottom stock price values the entire company at about $6.4 million. The month before it went public, the company spent almost half that amount on 30 seconds of advertising during the Super Bowl. &lt;/p&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;Marked initially for its fierce, well-financed competiton&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;, the online pet supply market has since been beset with consolidation and collapse. In addition to Pets.com&#39;s purchase of Petstore.com, Petopia, backed&lt;/span&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; by offline pet supply giant Petco, laid off 60 percent of its staff last month.  &lt;/span&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;Despite all the initial hype and funding--the four largest players each raised more than $50 million in private financing--pet supplies are not a natural e-tail market. Pet owners are less likely than others to shop online.&lt;br /&gt;&lt;/p&gt; &lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;Additionally, the e-tail pet stores have not offered a compelling reason to shop online. Although delivering pet food and supplies directly to consumers is a convenience, that benefit is outweighed by the fact that the consumer has to wait days to receive their orders. Considering that pet food is available at just about any neighborhood grocery, few people have a reason to shop online.&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;After bursting to life to deliver on the promise of e-commerce, &lt;/span&gt;&lt;strong style=&quot;color: rgb(0, 0, 0);&quot;&gt;Pets.com&lt;/strong&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt; ( Nasdaq:IPET ) closed its business the same year that it went public. To quote Tichborne again.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;The failure of Pets.com and other Internet-based companies affects us all in obvious if small ways, and also in ways that we&#39;ll never know. These failures not only leave us with fewer choices as consumers, but they make it difficult for today&#39;s new online-based enterprises to raise capital. Some of today&#39;s upstarts have excellent ideas that will never see the light of day because they can&#39;t get funding.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 51, 255);font-size:130%;&quot; &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Why did Pets.com die? &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;Ironically, the eager venture capital investors who swiftly funded Pets.com might have made the company&#39;s failure almost inevitable. Pets.com raised millions with nary a sustainable advantage to its name (it was not a Rule Breaker), and the venture capitalists knew that most of the money would be blown on marketing. Then, Pets.com was able to go public without a penny of value creation, let alone meaningful experience, under its belt. Next, Pets.com was allowed to fail quickly without anyone giving it a long-term chance. &lt;/span&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;When the company went public on Valentine&#39;s Day this year, management knew that very soon it would need more money given its marketing spending plan. Pets.com counted on additional funds, most likely from a secondary stock offering (they were a dime a dozen back then), and the additional funds would largely be spent on still more marketing. They arguably had to be. Even a partnership with&lt;span style=&quot;font-size:100%;&quot;&gt; &lt;strong&gt;Amazon.com&lt;/strong&gt;&lt;/span&gt; ( Nasdaq:AMZN) was not bringing the millions of customers that Pets.com needed quickly enough.&lt;/p&gt; &lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;color: rgb(0, 0, 0);&quot;&gt;Relying on additional public capital to fund the long process of becoming a sustainable business with a meaningful customer base was a big gamble at Pets.com. It lost the gamble. In a different stock market (for example, if Pets.com had gone public in 1997), this bet might have actually panned out, but it didn&#39;t.&lt;/p&gt;</description><link>http://utarblog.blogspot.com/2008/06/failure-of-petscom.html</link><author>noreply@blogger.com (clarence leong)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvAviFGYknu26OC2ztyVsjVDGdVPFiZJqSzlGA3Why3OhaRGo6hto9KG2s4ET76KJTzwtNcjVX0fkNhJFold7G1YQv3iwbiG_9JqnS2LRykyK9MaFlLxuMDA3AlQjzCef3-nytQELgcDU/s72-c/Pets2_120.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-8705728102948861839</guid><pubDate>Fri, 13 Jun 2008 13:11:00 +0000</pubDate><atom:updated>2008-07-08T15:06:44.131+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">E-Auction</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Revenue model for Google, Amazon.com and eBay</title><description>Google, Amazon.com and eBay are some of the most successful companies around the world, well-known for their online generation of revenues.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4tY69e8PMj03dWo5gS_BuC7UexXimInQ2lD8MUigNjdkTU0ICezn63ScqY7ExmUDViUF8IAD4SHLFugMeHHWdNl1JYkRfD9NTUGytDuLiLv8yVzLleSseH5P0v-WrpHZ_r0nSsH-nAQVg/s1600-h/Google%2520Logo.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211355323225801826&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 133px; HEIGHT: 89px&quot; height=&quot;73&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4tY69e8PMj03dWo5gS_BuC7UexXimInQ2lD8MUigNjdkTU0ICezn63ScqY7ExmUDViUF8IAD4SHLFugMeHHWdNl1JYkRfD9NTUGytDuLiLv8yVzLleSseH5P0v-WrpHZ_r0nSsH-nAQVg/s200/Google%2520Logo.jpg&quot; width=&quot;200&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZCNfMx0knJnjw-Rixrv7UA8ZUCG7-yYLBRThqahA2A-y0ONpJrbCwQvJn4WoDGCm4_gmIbiQfsBFZVMU0FMNYfA8bdmI3j2hu4kim70dh9ciT8c1_tDEy_6wZ7u3BjTjru5kINqtvlGOx/s1600-h/ebay_logo_big.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211356603126056082&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 128px; HEIGHT: 82px&quot; height=&quot;93&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZCNfMx0knJnjw-Rixrv7UA8ZUCG7-yYLBRThqahA2A-y0ONpJrbCwQvJn4WoDGCm4_gmIbiQfsBFZVMU0FMNYfA8bdmI3j2hu4kim70dh9ciT8c1_tDEy_6wZ7u3BjTjru5kINqtvlGOx/s200/ebay_logo_big.jpg&quot; width=&quot;181&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211355559449003122&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 155px; HEIGHT: 85px; TEXT-ALIGN: center&quot; height=&quot;88&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9VtXa0Dt8P5_6H2pAaUyf3slfcyBwt4OYxA4krOznW24v3W1vcRPas5Am_xkFzCv7w0o1jlaSLhlPBhwe-HwG9mSF0m337y7I8Io7qwWw_366L3ZdJrL9ds5YoGb-hq5puI4L-Gpt3dOD/s200/amazon-logo.jpg&quot; width=&quot;178&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now let us briefly view through their revenue model one by one…&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Google’s Revenue Model&lt;br /&gt;&lt;/strong&gt;A major percentage of Google’s revenue income is generated though advertising. In the year of 2007, Google’s revenue income reached as high as 16 billion dollars. Among this figure, 99% of it comes from their advertising services. The remaining 1% is derived from licensing. Some of Google’s advertising revenue model includes Google AdWords, Google Ad Sense and Froogle.&lt;br /&gt;&lt;br /&gt;To enquire more information about Google’s Revenue Model…&lt;br /&gt;Go to &lt;a href=&quot;http://www.organicspam.com/google_revenue_model.asp&quot;&gt;http://www.organicspam.com/google_revenue_model.asp&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Amazon.com’s Revenue Model&lt;br /&gt;&lt;/strong&gt;Amazon.com is one of the first major companies to sell goods through the internet. They have made total revenue of 14 billion dollars in the year of 2007. Their revenue mainly arrived from selling books, videos, electronics, and kitchen equipment on domestics and international websites, such as Amazon Marketplace.&lt;br /&gt;&lt;br /&gt;To enquired more information about Amazon Marketplace…&lt;br /&gt;Go to &lt;a href=&quot;http://www.amazon.com/gp/help/customer/display.html/?nodeId=537734&quot;&gt;http://www.amazon.com/gp/help/customer/display.html/?nodeId=537734&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;eBay’s Revenue Model&lt;/strong&gt;&lt;br /&gt;Ebay is an &lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;online auction&lt;/span&gt; and shopping &lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;website&lt;/span&gt; in which people and businesses buy and sell goods and services worldwide. They generated about 7 million dollars in the year 2007. Among that, 96% of its revenues are generated from transactions. Whereas, it’s remaining 4% comes from advertising and other income.&lt;br /&gt;&lt;br /&gt;To enquired information on how eBay’s work…&lt;br /&gt;Go to &lt;a href=&quot;http://pages.ebay.com/help/newtoebay/questions/about-ebay.html&quot;&gt;http://pages.ebay.com/help/newtoebay/questions/about-ebay.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;Based on the above information, we can differentiate the 3 companies according to the way they generate revenues. &lt;/p&gt;&lt;ul&gt;&lt;li&gt;For Google, their revenues are mainly based on advertisements. Therefore, they are adopting the advertising revenue model.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Regarding Amazon.com, their revenues are based on online retailing. So, they are using the sales revenue model instead.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Finally, eBay gained their revenues mainly from the services they provide. This means they adopt the transaction fees revenue model.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;To enquire more information about online revenue models…&lt;/p&gt;&lt;p&gt;Go to &lt;a href=&quot;http://www.davechaffey.com/Internet-Marketing/C2-Internet-micro-environment/Online-revenue-models&quot;&gt;http://www.davechaffey.com/Internet-Marketing/C2-Internet-micro-environment/Online-revenue-models&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://utarblog.blogspot.com/2008/06/revenue-model-for-google-amazoncom-and.html</link><author>noreply@blogger.com (Nedved)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4tY69e8PMj03dWo5gS_BuC7UexXimInQ2lD8MUigNjdkTU0ICezn63ScqY7ExmUDViUF8IAD4SHLFugMeHHWdNl1JYkRfD9NTUGytDuLiLv8yVzLleSseH5P0v-WrpHZ_r0nSsH-nAQVg/s72-c/Google%2520Logo.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-998232182575089003</guid><pubDate>Fri, 13 Jun 2008 12:35:00 +0000</pubDate><atom:updated>2008-07-08T14:20:44.727+08:00</atom:updated><title>E-Commerce Success and Its Causes</title><description>&lt;span style=&quot;font-family:arial;font-size:130%;&quot;&gt;&lt;strong&gt;The Success of Dell&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdFKcye8kGruZHe0-OdA_HKz8a9yVl2XTHBN4-wXBXJR8MSNrRzoj47HJUWRYsK7g20AbXxgOCYLPm8PsHT6ZgV0iFEw-EEckyF37IdhEsMbHhX7TaAxU51AmiJzF2i7N5Bpdh-x19s5GE/s1600-h/dell.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211371716905755298&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdFKcye8kGruZHe0-OdA_HKz8a9yVl2XTHBN4-wXBXJR8MSNrRzoj47HJUWRYsK7g20AbXxgOCYLPm8PsHT6ZgV0iFEw-EEckyF37IdhEsMbHhX7TaAxU51AmiJzF2i7N5Bpdh-x19s5GE/s320/dell.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(51,0,0)&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSF4mWvoKtvnL5imcPzesL8161uNmPZTeqPaut6unede9n-mkd8sKPYbR6Ky9K_qtN1kGwDVhsgOGWfUA_5Ckul0SRDXIImkJD57pGatz-55NTa-644dYLYrvq7mPN9xyGSKsWHOvx1Y80/s1600-h/dell1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211372461039552578&quot; style=&quot;FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 96px; CURSOR: pointer; HEIGHT: 124px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSF4mWvoKtvnL5imcPzesL8161uNmPZTeqPaut6unede9n-mkd8sKPYbR6Ky9K_qtN1kGwDVhsgOGWfUA_5Ckul0SRDXIImkJD57pGatz-55NTa-644dYLYrvq7mPN9xyGSKsWHOvx1Y80/s320/dell1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;Dell Computer Corporation is a success to the E-commerce world. Dell was founded 16 years ago by a medical &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family:arial;font-size:100%;&quot;&gt;&lt;span style=&quot;font-family:arial;font-size:85%;&quot;&gt;student name Michael Dell. Today, &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Dell is one of the world’s top providers of computer products and services such as servers, storage, workstations, notebook and notebooks computers. The company has an average revenu&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;es of $38.2 billion dollars worldwide and it employs over 41,000 staff worldwide.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;In 1994, Dell started using the Internet as an information source and by 1996 they already started their business through the Internet. The reason for them to start using Internet to conduct business was that Dell saw the opportunities. By using the Internet, it is easier to communicate with all the involved parties, includes less costs for transactions and provide an improved customer relationship.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;E-commerce offers many benefits to businesses and consumers in their purchasing activities. It changes the purchasing process from being a physical transaction to being a virtual transaction where no paper is involved.&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;This saves time and money for everyone and opens up a virtual global marketplace – for example, you could be staying in Malaysia but you can still buy online from a shop in New York. It is also more convenient as you can access the Internet 7 days a week, 24 hours a day, at your own convenience. However, it requires a whole new business methods and infrastructures to meet &lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;the demands of the buyer and the needs of the seller.&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;std&quot; style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class=&quot;std&quot; style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;&lt;em&gt;&lt;/em&gt;&lt;em&gt;&lt;/em&gt;&lt;/span&gt;&lt;span class=&quot;std&quot; style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;em&gt;Disintermediation &lt;/em&gt;and&lt;em&gt; real-time&lt;/em&gt; &lt;em&gt;production&lt;/em&gt;&lt;/span&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9JiVlEXcCkuClRHetESx1YSCiYikpxXq22AxR3kDwRSoysqVsebSeHyP0quQ7E8nfUMYFdFdpeVrHIlKJ7uvm-WdhKkdTxQ20gKeKqoEKuP4rATMfc7GuXW6MxFyVJfxW20U6QTdbPNUb/s1600-h/dell-xps-m1330.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211392779635590306&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 183px; HEIGHT: 133px&quot; height=&quot;199&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9JiVlEXcCkuClRHetESx1YSCiYikpxXq22AxR3kDwRSoysqVsebSeHyP0quQ7E8nfUMYFdFdpeVrHIlKJ7uvm-WdhKkdTxQ20gKeKqoEKuP4rATMfc7GuXW6MxFyVJfxW20U6QTdbPNUb/s200/dell-xps-m1330.jpg&quot; width=&quot;200&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;D&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;ue to its efficient supply chain management, Dell is capable of shiping a PC within 24 hours of receiving an order. This introduction of the internet and e-commerce has helped Dell improve this&lt;/span&gt; &lt;span style=&quot;font-size:85%;&quot;&gt;efficiency and profitability. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;At Dell, the traditional supply chain has two fundamental differences: &lt;em&gt;disintermediation &lt;/em&gt;and&lt;em&gt; real-time&lt;/em&gt; &lt;em&gt;production&lt;/em&gt;. Dell sells directly to its customer, cutting out the middle man, the distributor and retailer. When a layer that exists between two other layers is removed like this, it is known as disintermediation.&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;&lt;span style=&quot;font-family:arial;&quot;&gt;Dell manufactures the products and then sells them directly to the customer, Dell creates disintermediation – the outside retailer is cut out of the process. This reduces time and costs in the process and also ensures Dell is better positioned to understand its customers’ needs directly.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;Dell’s supply chain costs are reduced on the storage side too by its efficient relationship between orders and production. Each individual PC that is ordered is only manufactured AFTER the order is received and only using the freshest raw materials, which are delivered to the factory several times a day. This is known as just-in-time production or real-time production. There is no warehouse for either raw components or finished goods. Each computer has been paid for and has been built for a specific customer before it is shipped.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVTQGur-ewocfiwQk4uqF0qvERiEEoXCntZyn8OUivLIwX2LXEZ4ClCL3nT0KJmpxZ5A89K9o1JOjqKOFy3JWMXtshcWYSDCWpZ7xIKMA3f-wRPitR8SIzsDm0F0j2wZayb4wfjE6wUNUW/s1600-h/untitled.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211393917801923762&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 177px; HEIGHT: 196px&quot; height=&quot;209&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVTQGur-ewocfiwQk4uqF0qvERiEEoXCntZyn8OUivLIwX2LXEZ4ClCL3nT0KJmpxZ5A89K9o1JOjqKOFy3JWMXtshcWYSDCWpZ7xIKMA3f-wRPitR8SIzsDm0F0j2wZayb4wfjE6wUNUW/s200/untitled.bmp&quot; width=&quot;200&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;R&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;eal time production ensures no costs are incurred from rising inventory stocks. Output is always driven by actual customer demand. Each individual product is created with the latest technology and each product is custom-made to exactly what the customer wants.&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt; Dell’s direct selling started off using the customer channels of mail order and ordering using toll-free phone numbers and this has grown to embrace online sales channels too.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;textheadline&quot; style=&quot;FONT-WEIGHT: bold;font-size:130%;&quot; &gt;Focus Improve Customer Service&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;customers can create and view their service records online. This includes product support, shipment and delivery dates. Each purchase comes with a service tag code, which can track the model bought and its service requirements. This allows Dell customer service representatives to quickly and efficiently handle requests.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;This level of 24 hour customer service and fast response time helps Dell build strong customer relations, which of course is crucial for the company in its understanding of consumer needs. It is also a very cost-effective way of providing sales and support – cost savings which can be passed on in the form of better prices to customers.&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDZNnZea3_TikA0QZdw3FRTz4FIJScd4-tQkbDZ5EHFZCk5UfAPDv0xSBGCoQzMvN6DkrgUG2D2vkSFg5s__vCYpdcptCifHfrYGWbJ4zWPB_acOL_b5sIqnuxoTE7CFtq6CT4IttOlk_x/s1600-h/dell2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5211375097015161170&quot; style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 212px; CURSOR: pointer; HEIGHT: 160px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDZNnZea3_TikA0QZdw3FRTz4FIJScd4-tQkbDZ5EHFZCk5UfAPDv0xSBGCoQzMvN6DkrgUG2D2vkSFg5s__vCYpdcptCifHfrYGWbJ4zWPB_acOL_b5sIqnuxoTE7CFtq6CT4IttOlk_x/s400/dell2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;Dell is focussed on enhancing its image and relationships, not only with customers, but&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt; also with&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt; employees and the wider community. To do this, the website is also used as a communication tool for news, press releases and general information to help customers, employees, the media and prospective employees find out more about the company.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;std&quot;   style=&quot;font-family:Verdana,Arial,Helvetica,sans-serif;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://utarblog.blogspot.com/2008/06/example-of-e-commerce-success-dell.html</link><author>noreply@blogger.com (janice)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdFKcye8kGruZHe0-OdA_HKz8a9yVl2XTHBN4-wXBXJR8MSNrRzoj47HJUWRYsK7g20AbXxgOCYLPm8PsHT6ZgV0iFEw-EEckyF37IdhEsMbHhX7TaAxU51AmiJzF2i7N5Bpdh-x19s5GE/s72-c/dell.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-4563946439142810453</guid><pubDate>Wed, 11 Jun 2008 11:00:00 +0000</pubDate><atom:updated>2008-07-07T10:51:11.723+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Broadband</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>History and Evolution of E-commerce</title><description>&lt;p class=&quot;MsoNormal&quot; style=&quot;FONT-WEIGHT: bold; MARGIN-LEFT: 14.4pt; TEXT-INDENT: -14.4pt&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://newmedia.medill.northwestern.edu/courses/nmpspring01/brown/Revstream/NY.JPG&quot;&gt;&lt;img style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: pointer; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;http://newmedia.medill.northwestern.edu/courses/nmpspring01/brown/Revstream/NY.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;FONT-WEIGHT: bold; MARGIN-LEFT: 14.4pt; TEXT-INDENT: -14.4pt; FONT-FAMILY: times new roman; TEXT-ALIGN: justify&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;FONT-WEIGHT: bold; MARGIN-LEFT: 14.4pt; TEXT-INDENT: -14.4pt; FONT-FAMILY: times new roman; TEXT-ALIGN: justify&quot;&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;E-commerce began before personal computers were prevalent and has grown into a &lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;multi-billion&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt; dollar industry&lt;/span&gt;, but where did it come from? By looking at the evolution of e-commerce, it will be easier to judge its trends for the future.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;div style=&quot;FONT-WEIGHT: bold; TEXT-ALIGN: justify&quot;&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;FONT-WEIGHT: bold; MARGIN-LEFT: 14.4pt; TEXT-INDENT: -14.4pt; FONT-FAMILY: times new roman; TEXT-ALIGN: justify&quot;&gt;&lt;/p&gt;&lt;div style=&quot;FONT-WEIGHT: bold; TEXT-ALIGN: justify&quot;&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;FONT-WEIGHT: bold; MARGIN-LEFT: 14.4pt; TEXT-INDENT: -14.4pt; FONT-FAMILY: times new roman; TEXT-ALIGN: justify&quot;&gt;&lt;/p&gt;&lt;div style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;table class=&quot;MsoTableGrid&quot; style=&quot;BORDER-RIGHT: medium none; BORDER-TOP: medium none; MARGIN-LEFT: 0px; BORDER-LEFT: medium none; MARGIN-RIGHT: 0px; BORDER-BOTTOM: medium none; BORDER-COLLAPSE: collapse; TEXT-ALIGN: left&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot; border=&quot;1&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;BORDER-RIGHT: windowtext 1pt solid; PADDING-RIGHT: 5.4pt; BORDER-TOP: windowtext 1pt solid; PADDING-LEFT: 5.4pt; FONT-WEIGHT: bold; PADDING-BOTTOM: 0cm; BORDER-LEFT: windowtext 1pt solid; WIDTH: 59.4pt; PADDING-TOP: 0cm; BORDER-BOTTOM: windowtext 1pt solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Year&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; FONT-WEIGHT: bold; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: solid; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Event&lt;?xml:namespace prefix = o /&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 59.4pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: solid; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;1984&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;EDI, or electronic data interchange, was standardized through ASC&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt; X12. This guaranteed that companies would be able to complete transactions with one another reliably.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 59.4pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: solid; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;1992&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;Compuserve offers online retail products to its customers. This gives people the first chance to buy things off their computer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 59.4pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: solid; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;1994&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;?xml:namespace prefix = v /&gt;&lt;v:stroke joinstyle=&quot;miter&quot;&gt;&lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;&lt;v:f eqn=&quot;sum @0 1 0&quot;&gt;&lt;v:f eqn=&quot;sum 0 0 @1&quot;&gt;&lt;v:f eqn=&quot;prod @2 1 2&quot;&gt;&lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;&lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;&lt;v:f eqn=&quot;sum @0 0 1&quot;&gt;&lt;v:f eqn=&quot;prod @6 1 2&quot;&gt;&lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;&lt;v:f eqn=&quot;sum @8 21600 0&quot;&gt;&lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;&lt;v:f eqn=&quot;sum @10 21600 0&quot;&gt;&lt;v:path connecttype=&quot;rect&quot; gradientshapeok=&quot;t&quot; extrusionok=&quot;f&quot;&gt;&lt;o:lock aspectratio=&quot;t&quot; ext=&quot;edit&quot;&gt;&lt;v:imagedata title=&quot;&quot; src=&quot;file:///C:\DOCUME~1\Yen\LOCALS~1\Temp\msohtml1\01\clip_image001.png&quot;&gt;&lt;?xml:namespace prefix = w /&gt;&lt;w:wrap type=&quot;square&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://www.netscape.com/&quot;&gt;Netscape&lt;/a&gt; arrived. Providing users a simple browser to surf the&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt; Inter&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;net and a safe online transaction technology called Secure Sockets Layer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 59.4pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: solid; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;1995&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;Two of the biggest names in e-commerce are launched: &lt;a href=&quot;http://www.amazon.com/&quot;&gt;Amazon.com &lt;/a&gt;and &lt;a href=&quot;http://www.ebay.com/&quot;&gt;eBay.com&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 59.4pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: solid; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;1998&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;v:imagedata title=&quot;&quot; src=&quot;file:///C:\DOCUME~1\Yen\LOCALS~1\Temp\msohtml1\01\clip_image003.png&quot;&gt;&lt;w:wrap type=&quot;square&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://newmedia.medill.northwestern.edu/courses/nmpspring01/brown/Revstream/broadband.JPG&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 153px; CURSOR: pointer; HEIGHT: 68px&quot; alt=&quot;&quot; src=&quot;http://newmedia.medill.northwestern.edu/courses/nmpspring01/brown/Revstream/broadband.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;DSL, or Digital Subscriber Line, provides fast, always-on Internet service to subscribers across &lt;?xml:namespace prefix = st1 /&gt;&lt;st1:place st=&quot;on&quot;&gt;&lt;st1:state st=&quot;on&quot;&gt;California&lt;/st1:state&gt;&lt;/st1:place&gt;. This prompts pe&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;ople to spend more time, and money, online.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 59.4pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: solid; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;1999&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;Retail spending over the Internet reaches $20 billion, according to &lt;a href=&quot;http://www.business.com/&quot;&gt;Business.com&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 59.4pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: solid; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;79&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;TEXT-ALIGN: center&quot; align=&quot;center&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;2000&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;td style=&quot;PADDING-RIGHT: 5.4pt; PADDING-LEFT: 5.4pt; PADDING-BOTTOM: 0cm; WIDTH: 366.7pt; BORDER-TOP-STYLE: none; PADDING-TOP: 0cm; BORDER-RIGHT-STYLE: solid; BORDER-LEFT-STYLE: none; BORDER-BOTTOM-STYLE: solid&quot; valign=&quot;top&quot; width=&quot;489&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;The U.S government extended the moratorium on Internet taxes until at least 2005.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;FONT-WEIGHT: bold; TEXT-ALIGN: justify&quot;&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;The word &lt;b&gt;&lt;a href=&quot;http://www.aspdotnetstorefront.com/t-s-ecommerce.aspx&quot;&gt;&lt;span style=&quot;FONT-WEIGHT: normal&quot;&gt;eCommerce&lt;/span&gt;&lt;/a&gt;&lt;/b&gt; or electronic commerce was founded late in the &lt;b&gt;1970’s&lt;/b&gt;. The term was introduced for transactions done via computer to computer, transactions like &lt;b&gt;important company data transfers, fund codes transfers, bank document transfers, purchase orders, bills or invoices&lt;/b&gt;; in other words all the data transfer related to commerce done electronically. E-Commerce is not just a term but a &lt;b&gt;revolution for the online industry&lt;/b&gt;. All the tasks, letters, messages and data transferred within a flick of a second at any place no matter how far or how near. This all was impossible even for a thought or a dream, for things to be like that just a few years ago.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h2 style=&quot;TEXT-ALIGN: justify;font-family:times new roman;&quot; &gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:12;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;In the Beginning, There Was Amazon&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://tbn0.google.com/images?q=tbn:ConR54MZhyjeXM:http://www.product-reviews.net/wp-content/userimages/2007/11/amazon-logo.gif&quot;&gt;&lt;img style=&quot;FLOAT: right; MARGIN: 0pt 0pt 10px 10px; WIDTH: 149px; CURSOR: pointer; HEIGHT: 55px&quot; alt=&quot;&quot; src=&quot;http://tbn0.google.com/images?q=tbn:ConR54MZhyjeXM:http://www.product-reviews.net/wp-content/userimages/2007/11/amazon-logo.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;However, that&#39;s the future. In the beginning, the Internet was characterized by &lt;b&gt;slow dial-up connections and online billboards&lt;/b&gt;. &lt;b&gt;Netscape&lt;/b&gt; came on the scene in 1994 with its point-and-click Web browser that opened the door to the billion-dollar revenues e-tailers enjoy today. Two of the first online purveyors were, of course, &lt;a href=&quot;http://www.ebay.com/&quot;&gt;eBay&lt;/a&gt;&lt;a href=&quot;http://www.amazon.com/&quot;&gt;Amazon.com&lt;/a&gt;. and &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;Looking at Amazon&#39;s evolution offers a pretty clear picture of the evolution of e-commerce, according to &lt;a href=&quot;http://www.netratings.com/&quot;&gt;Nielsen//Netratings&lt;/a&gt; senior retail analyst Heather Daugherty.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&quot;Amazon has been around since almost day one,&quot; Daugherty said. &quot;They were the first ones to offer one-click ordering that people now expect to find. Although Amazon certainly had a lot of skepticism from the street as to when it was going to become profitable, the company kept at it.&quot;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Innovative Technology&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;Rich Riley, vice president and general manager of Yahoo Small Business, told the E-Commerce Times that the essence of the Internet is the establishment of a level playing field for communicating and collaborating. Riley believes the power of the Internet has enabled innovators and entrepreneurs to reach their audiences efficiently and effectively over the past decade.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&quot;Specifically, an important milestone in the evolution of e-commerce is the development of affordable, easy-to-use e-commerce solutions that have enabled hundreds of thousands of entrepreneurs to transform their unique ideas into online successful businesses,&quot; Riley said.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;One of the most important milestones was order fulfillment technologies, including shipping, according to UPS Vice President for Customer Technology Jordan Colletta. Colletta told the E-Commerce Times that online buying is mainstream today as compared to a decade ago.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&quot;There is increased confidence in online order fulfillment, the security of personal data, and easier online return options,&quot; Colletta said. &quot;Another critical turning point is the evolution of the online payment process. By making the payment process easier, the shipping process has become easier and more visible. Once a shipment is en route, it&#39;s trackable at all points along its journey.&quot;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;Looking Ahead&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;What will the next 10 years bring? UPS&#39; Colletta said we&#39;ve only just begun: &quot;During the next 10 years we anticipate seeing more ease of use, even better technology, dramatically improved visibility as well as a wider array of solutions for both online buyers and merchants.&quot;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;Nielsen//Netratings&#39; Daugherty expects to see significant changes as wireless e-commerce grows. &quot;In 10 years, consumers ordering products online through their cell phones and PDAs will probably become commonplace,&quot; she said. &quot;In-store pick up will allow consumers to place the order on their wireless device and get the product easily.&quot;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;Gartner&#39;s Sarner said that as consumers tap into broadband, on-demand services would gain greater momentum. &quot;If you don&#39;t want to drive to the store to pick up your favorite artist&#39;s new album, and you don&#39;t want it mailed three days later, then you can order the content online instantly,&quot; he said. &quot;Broadband and instant access is going to change the way we think about e-commerce.&quot;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;   style=&quot;font-family:宋体;font-size:12;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;FONT-WEIGHT: bold&quot;&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;  style=&quot;font-size:100%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;/w:wrap&gt;&lt;/v:imagedata&gt;&lt;/w:wrap&gt;&lt;/v:imagedata&gt;&lt;/o:lock&gt;&lt;/v:path&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:stroke&gt;</description><link>http://utarblog.blogspot.com/2008/06/e-commerce.html</link><author>noreply@blogger.com (yëń^0^)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1474836077899768281.post-1025527347767064345</guid><pubDate>Tue, 10 Jun 2008 11:47:00 +0000</pubDate><atom:updated>2008-07-22T20:54:56.899+08:00</atom:updated><title>Welcome To Our @-COMMERCE</title><description>&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;a href=&quot;http://s133.photobucket.com/albums/q56/shelwin_teo/?action=view&amp;amp;current=lovestick-1.gif&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; src=&quot;http://i133.photobucket.com/albums/q56/shelwin_teo/lovestick-1.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot; lang=&quot;EN-US&quot;&gt;Self Introduction of Kian Weng...&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot; lang=&quot;EN-US&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCky7gJMuj6LEQFwxwg1dIorPYO2gXV9Y36TYqDxZjc0fURjn5WKXXlVSwCKmhJx2rGzz01RvwMF-Qyqa82aUK-uVLJzakHjebmlk8JEKiWqfFosoDGDs-Vn_YQa-ENMcBBM7TEsyTfPUL/s1600-h/DSC00290.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5210567791942892434&quot; style=&quot;margin: 0pt 10px 10px 0pt; float: left; width: 188px; cursor: pointer; height: 323px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCky7gJMuj6LEQFwxwg1dIorPYO2gXV9Y36TYqDxZjc0fURjn5WKXXlVSwCKmhJx2rGzz01RvwMF-Qyqa82aUK-uVLJzakHjebmlk8JEKiWqfFosoDGDs-Vn_YQa-ENMcBBM7TEsyTfPUL/s400/DSC00290.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;Hello, everyone. Thank for visiting and supporting our blog &lt;a href=&quot;mailto:&quot;&gt;&#39;&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;mailto:&quot;&gt;@-commerce&#39;&lt;/a&gt;. My name is Kian Weng and I&#39;m currently 21 years old. I come from a place which is well famous for &#39;leng chai&#39; and &#39;leng lui&#39;- of course it is none other than &lt;st1:city st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;Ipoh&lt;/st1:place&gt;&lt;/st1:city&gt;.&lt;br /&gt;My favorate sport is soccer. I supported Liverpool FC since childhood. Apart from that, I also like swimming and table tennis.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;In addition to that, I also like to surf the internet. Here is th&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;e top 5 web sites I visited most frequently:&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.google.com/&quot;&gt;http://www.google.com/&lt;/a&gt;- This is my favarote search engin&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;e. I used it frequently to search for information I&#39;m interested to know. I prefer Google rather than Yahoo be&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;cause it has a much faster displaying speed.&lt;a href=&quot;http://www.thestar.com.my/&quot;&gt; &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.thestar.com.my/&quot;&gt;http://www.thestar.com.my/&lt;/a&gt; - Here is where I get the latest news happening all around the world. This site means a lot to me as I&#39;m a person who seldom read newspaper.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.wikipedia.org/&quot;&gt;http://www.wikipedia.org/&lt;/a&gt; - This site help me to search information related to my studies and personal interest. Apart from that, it also serve as a elcetronic dictionary to me.&lt;a href=&quot;http://www.youtube.com/&quot;&gt; &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.youtube.com/&quot;&gt;http://www.youtube.com/&lt;/a&gt; - Feeling bored? This is basicall&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;y the place to browse for the video you like. It include shortclips, music videos and other entertainment stuffs.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.livescore.com/&quot;&gt;http://www.livescore.com/&lt;/a&gt; - This site provide me with the latest result regarding any football matches all around the globe.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://s133.photobucket.com/albums/q56/shelwin_teo/?action=view&amp;amp;current=bhmz50bv1.gif&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;width: 428px; height: 22px;&quot; alt=&quot;Photobucket&quot; src=&quot;http://i133.photobucket.com/albums/q56/shelwin_teo/bhmz50bv1.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;a href=&quot;http://s133.photobucket.com/albums/q56/shelwin_teo/?action=view&amp;amp;current=lovestick-1.gif&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; src=&quot;http://i133.photobucket.com/albums/q56/shelwin_teo/lovestick-1.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot; lang=&quot;EN-US&quot;&gt;Self Introduction of Xiao Yan...&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot; lang=&quot;EN-US&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;span style=&quot;;font-family:宋体;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMs3Y6SJaXOUBBWCqCpCc2dDbZPp53X_B7pg9YnHjLU8Ja5nOUVSVSHMGgTbwZ7qo_IhFMWFEL4jjaLtS5HHcE3mcvGcVLwLIRRXLZDe94WwXLfvNTCI6zZuER1uwa4NG-33bxFT4g8MOs/s1600-h/DSC01380.JPG&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 186px; height: 247px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMs3Y6SJaXOUBBWCqCpCc2dDbZPp53X_B7pg9YnHjLU8Ja5nOUVSVSHMGgTbwZ7qo_IhFMWFEL4jjaLtS5HHcE3mcvGcVLwLIRRXLZDe94WwXLfvNTCI6zZuER1uwa4NG-33bxFT4g8MOs/s320/DSC01380.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5225819951330903810&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;Hi, I am xiao yan, currently a Year 3 Semester 1 accounting student in University Tunku Abdul Rahman. My hobby is playing basketball, watch movie and sleeping. Besides that, I also like surfing website via the internet. I frequently use the interne&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;t to se&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;nd and read e-mails, watch drama and movies, download songs, chatting through MSN, and play online games.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;The top 5 websites I visited the most are:&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.tvbnow.com/&quot;&gt;http://www.tvbnow.com/&lt;/a&gt; – this website enable me to access to a wide range of forum that talk about fashion and current issues. There are also some movies and dramas that I can down&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;load via bitComet program. Apart from that, I can download Chinese, Mandarin, English and Japanese song that I like from this site.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.google.com/&quot;&gt;http://www.google.com/&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.google.com/&quot;&gt;gle.com/&lt;/a&gt; – a search engine which help me to search information when I need to do and submit my assignments. I also download wallpapers, animat&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;ion pictures, and icons from this website. &lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.ownskin.com/&quot;&gt;http://www.ownskin.com/&lt;/a&gt; – I can download mobile themes in this&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt; website and by using Bluetooth transfer it into my mobile phone. So, I can change my mobile theme everyday…hehe… &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.pbebank.com.my/&quot;&gt;http://www.pbebank.com.my/&lt;/a&gt; – I access this website to check my account balance and make payment like water bill, electric bill and student bill. It also enables me to check my transaction history for the current month or previous month.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.baidu.com/&quot;&gt;http://www.baidu.com/&lt;/a&gt; – I can read the latest international’s news anytime and download MP3 or picture from this site. It’s similar to google or yahoo website whereby we can enter specific key words in the search bar to search for inform&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;ation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://s133.photobucket.com/albums/q56/shelwin_teo/?action=view&amp;amp;current=bhmz50bv1.gif&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;width: 428px; height: 22px;&quot; alt=&quot;Photobucket&quot; src=&quot;http://i133.photobucket.com/albums/q56/shelwin_teo/bhmz50bv1.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;a href=&quot;http://s133.photobucket.com/albums/q56/shelwin_teo/?action=view&amp;amp;current=lovestick-1.gif&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; src=&quot;http://i133.photobucket.com/albums/q56/shelwin_teo/lovestick-1.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 102, 102);font-size:130%;&quot; lang=&quot;EN-US&quot; &gt;Self Introduction of See Wan...&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2zGUJR0oDnGfaFY8iPpagZaSkF31M6Wm8Wi0r387Pe0VWbyg1wuSbApoW51hK3bkPQnDdiKRw1OamnBqDe9Na6JDPnb3lZBipE9oT7_caUSYqB6gFjwl38OgveMKJ2w3uCABDbooZeSe-/s1600-h/DSC00057.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 222px; height: 304px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2zGUJR0oDnGfaFY8iPpagZaSkF31M6Wm8Wi0r387Pe0VWbyg1wuSbApoW51hK3bkPQnDdiKRw1OamnBqDe9Na6JDPnb3lZBipE9oT7_caUSYqB6gFjwl38OgveMKJ2w3uCABDbooZeSe-/s400/DSC00057.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5213960799704198482&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;span style=&quot;;font-family:宋体;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;Hello, my name is &lt;b&gt;SeeWan&lt;/b&gt;, i&#39;m 22 years old, year 3 sems 1 accounting student, stud&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;yi&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;ng in University Tunku Abdul Rahman. I&#39;m a normal student..... living a boring life which include eat, sleep and study everyday!!! This is the first time i&#39;m posting a blog......because i&#39;m a computer dummy!!! I usually use the internat for purposes such as msn, searching information and etc......&lt;br /&gt;&lt;br /&gt;Here is the top 5 we&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;b sites I visited most frequently: &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.friendster.com/&quot;&gt;http://www.friendster.com/&lt;/a&gt;- this website is my favourite website. It enable me to meet new friends. Besides that, i can also keep contact with some of my old friends, especially my primary school friends!!!&lt;/span&gt; &lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.google.com/&quot;&gt;http://www.google.com/&lt;/a&gt;- this is the search engine i frequently use to find information which are useful to my studies........especially for this year thesis!!!! &lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.sogou.com/&quot;&gt;http://www.sogou.com/&lt;/a&gt;- i can access this website to find the new songs and ringtones. Apart from that, i may also obtained entertainment information from this site.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://www.tudou.com/&quot;&gt;http://www.tudou.com/&lt;/a&gt;- i can watch online drama and movies through this website.&lt;/p&gt;&lt;/span&gt;&lt;a style=&quot;font-family: arial;&quot; href=&quot;http://www.my.com.my/&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;www.my.com.my&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(153, 51, 153);font-family:arial;&quot; &gt; -&lt;/span&gt;&lt;span style=&quot;color: rgb(153, 51, 153);font-family:arial;&quot; &gt; i can leave messages to my parents or friends and listen FM online without using a radio.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://s133.photobucket.com/albums/q56/shelwin_teo/?action=view&amp;amp;current=bhmz50bv1.gif&quot; target=&quot;_blank&quot;&gt;&lt;img style=&quot;width: 428px; height: 22px;&quot; alt=&quot;Photobucket&quot; src=&quot;http://i133.photobucket.com/albums/q56/shelwin_teo/bhmz50bv1.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;a href=&quot;http://s133.photobucket.com/albums/q56/shelwin_teo/?action=view&amp;amp;current=lovestick-1.gif&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Photobucket&quot; src=&quot;http://i133.photobucket.com/albums/q56/shelwin_teo/lovestick-1.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(255, 0, 0);&quot; lang=&quot;EN-US&quot;&gt;Self Introduction of Mei Kei...&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8K9OGED7QO14tnJrqdJWpasfPIjFwAd9reYJ43WJ-9mfCVEIBvm5rtMT_ww5PTBCMfwaoSPI-4Ho2UHqj5GVoVKPL-EJ_FMF1yhGOLYCStlK8jgCDVIuV72Q1Q6yqUCVYDXq7-O2Sym2T/s1600-h/1_585150111l.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5210570745661819778&quot; style=&quot;margin: 0pt 10px 10px 0pt; float: left; width: 287px; cursor: pointer; height: 287px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8K9OGED7QO14tnJrqdJWpasfPIjFwAd9reYJ43WJ-9mfCVEIBvm5rtMT_ww5PTBCMfwaoSPI-4Ho2UHqj5GVoVKPL-EJ_FMF1yhGOLYCStlK8jgCDVIuV72Q1Q6yqUCVYDXq7-O2Sym2T/s400/1_585150111l.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;hi everyone... nice to meet you!!!^_^&lt;br /&gt;i&#39;m Mei Kei, 21 years old. University Tunku Abdul Rahman is the place where I&#39;m studying for my accounting degree. However, accountant is not my dreams. why???? To me, graphic design is more interesting. haha... Can you imagine look at an advertisement i design is appearing on the tv. hohoo... BUT, what to do??? MONEY is more important in reality. Choosing accounting is a better and safer choice...&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;My hobbies:&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;b&gt;&lt;span  lang=&quot;EN-US&quot; style=&quot;font-family:Arial;&quot;&gt;dancing :&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt; when i was 11 years old, i was sent to learn traditional Chinese dance. From that time onwards,&lt;b&gt; i love to dance&lt;/b&gt;.. i had learn dancing for 6 years and i was a gymnast in my secondary school. Now i hope that i can spend my time to learn yoga.&lt;br /&gt;&lt;b&gt;shopping :&lt;/b&gt; i like to shop with my friends when i&#39;m free. Especially during mega sales. haha......&lt;br /&gt;&lt;b&gt;listening music : &lt;/b&gt;listening music can reduce stress. Classical musics and love songs are my favourites ....&lt;br /&gt;&lt;b&gt;vacation :&lt;/b&gt; i like to go for a trip with my friends and family during holidays.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;Top 5 favourite website : &lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.facebook.com/&quot;&gt;http://www.facebook.com/&lt;/a&gt; : this website enable me to make new friends, look at my friends updated information and photos as well as keeping in touch with my friends.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.google.com/&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.google.com/&quot;&gt;http://www.google.com/&lt;/a&gt;: this is a powerful search engine where i used for finding information, websites and sources for my assignments.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.games2girls.com/&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.games2girls.com/&quot;&gt;http://www.games2girls.com/&lt;/a&gt; : i can play different type of flash games through this website whenever i&#39;m boring.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.viwawa.com/&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.viwawa.com/&quot;&gt;http://www.viwawa.com/&lt;/a&gt; : i like to play &quot;mahjong&quot;, &quot;sushido&quot; and &quot;match it&quot; games from this website.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.hotmail.com/&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;a href=&quot;http://www.hotmail.com/&quot;&gt;http://www.hotmail.com/&lt;/a&gt;: i can check my mail and send mail to other friends with this website.&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;&quot;  lang=&quot;EN-US&quot; &gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;color: rgb(153, 51, 153); text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgb(51, 51, 255);font-size:100%;&quot; &gt;&lt;span style=&quot;font-family:courier new;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://utarblog.blogspot.com/2008/06/welcome-to-our-commerce.html</link><author>noreply@blogger.com (yëń^0^)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCky7gJMuj6LEQFwxwg1dIorPYO2gXV9Y36TYqDxZjc0fURjn5WKXXlVSwCKmhJx2rGzz01RvwMF-Qyqa82aUK-uVLJzakHjebmlk8JEKiWqfFosoDGDs-Vn_YQa-ENMcBBM7TEsyTfPUL/s72-c/DSC00290.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>