<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1187625316738706200</id><updated>2024-08-28T17:57:33.437+08:00</updated><category term="Self-introduction"/><category term="PayPal"/><category term="eBay"/><category term="3rd party certification"/><category term="Advantages of E-Commerce"/><category term="AirAsia"/><category term="Amazon.com"/><category term="Causes of credit card debts"/><category term="Causes of e-ccommerce success"/><category term="Causes of e-commerce failure"/><category term="Corporate Blogging"/><category term="Credit card debts"/><category term="Customer&#39;s adoption strategies"/><category term="Dell"/><category term="Digicert Sdn Bhd"/><category term="Disadvantages of E-Commerce"/><category term="E-Auction"/><category term="E-Commerce Revenue Model"/><category term="E-currency"/><category term="E-gold"/><category term="E-learning"/><category term="E-money"/><category term="Electronic learning"/><category term="Electronic payment"/><category term="Evolution of E-Commerce"/><category term="Example of E-Commerce failure"/><category term="Example of E-Commerce success"/><category term="Example of phishing"/><category term="Google"/><category term="History of E-Commerce"/><category term="Locat transactional e-commerce site"/><category term="MEPS cash"/><category term="Mobile payment systems"/><category term="Msctrustage.com"/><category term="Online security"/><category term="Phishing"/><category term="Phishing prevention methods"/><category term="Potentials of mobile payment system"/><category term="Pre-paid cash card"/><category term="Prevention of credit card debts"/><category term="Safeguard financial data"/><category term="Safeguard personal data"/><category term="Skype"/><category term="Touch N Go"/><category term="Toys &quot;R&quot; Us"/><title type='text'>Cybertopia&#39;s World</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>24</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-8188312921402142103</id><published>2009-07-17T23:35:00.004+08:00</published><updated>2009-08-02T00:12:17.953+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="E-Auction"/><title type='text'>E-Auction : Types, Benefits, Fraud and Prevention</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMU8s0xZS-DNq1PrzZqo5LTNwu9_DtyLJNHk9NNOPKx0F4StACertoLY1CsRaywyaKiOObB3UthY4aRDoPUC6nf94U8hjqz4YGb_fAd9C8szLTxl6fgZwJ8zhlfTa4y8X5Ggp8UXeQXIP9/s1600-h/house-auction-lg.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5364653100814800178&quot; style=&quot;FLOAT: left; MARGIN: 0pt 10px 10px 0pt; WIDTH: 292px; CURSOR: pointer; HEIGHT: 191px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMU8s0xZS-DNq1PrzZqo5LTNwu9_DtyLJNHk9NNOPKx0F4StACertoLY1CsRaywyaKiOObB3UthY4aRDoPUC6nf94U8hjqz4YGb_fAd9C8szLTxl6fgZwJ8zhlfTa4y8X5Ggp8UXeQXIP9/s400/house-auction-lg.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;An &lt;strong&gt;auction&lt;/strong&gt; is a process of buying and selling goods or services by offering them up for bid, taking bids, and then selling the item to the highest bidder. In economic theory, an auction may refer to any mechanism or set of trading rules for exchange. It is characterized by the competitive and dynamic nature by which the final price is reached. Electronic auctions (E-auctions) are auctions conducted online. There are many types of Auctions like English auction, Dutch auction, Sealed first-price auction, Vickrey auction, forward auction, reverse auction, silent auction, top-up auction and so on.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;Forward auction or regular auctions are electronic auctions, which can be used by sellers to sell their items to many potential buyers. Sellers and buyers can be individuals, organizations etc. Items are commonly placed at a special site for auction (e.g. eBay.com). Buyers can continuously bid for the items they are interested in. Eventually the highest bidder wins the item. Two types of forward auctions are common. The first is a &lt;em&gt;&lt;span style=&quot;COLOR: rgb(51,102,255)&quot;&gt;liquidate auction&lt;/span&gt;&lt;/em&gt;. Here buyers seek to obtain the lowest price for an item they are interested in. The second type is a &lt;em&gt;&lt;span style=&quot;COLOR: rgb(51,102,255)&quot;&gt;marketing efficiency auction&lt;/span&gt;&lt;/em&gt;. Buyers wish to obtain a unique item.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;In a regular auction, purchasers are allowed to place a &lt;em&gt;&lt;span style=&quot;COLOR: rgb(51,102,255)&quot;&gt;bid&lt;/span&gt;&lt;/em&gt; on an item, which is the amount they are willing to pay in order to buy the item. The person who places the highest bid usually ends up with the item. With a reverse auction, however, the opposite is true. More specifically, the buyer advertises a need for an item or service. Then a pool of suppliers or sellers is selected. A Request for Quote (RFQ) is sent out to the suppliers. Suppliers then place bids for the amount they expect to be paid in order to perform such a service or provide such an item. Generally, the supplier who places the lowest bid will win the job or sell the item.&lt;br /&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5364651761505698402&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; HEIGHT: 247px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj81DFLaOM3ausS3eoNLzeC0cPTtOiPeaTvXhnDMdQf_YZo5vSU46i8UYDPF3XHLde4jOB4-DWNaCgZ-OF0lbXp9csiUS-3qjVBmCHh0DBylrHQ6ofMu1-0e3dQ4FWnjtZQuPTvh79s5kkM/s400/eAuction.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;div&gt;E-Auction replaces the conventional methods of requesting sealed paper tenders, however, it must be emphasized that success depends on at least the same market knowledge and sourcing skills as the paper-based process it replaces.&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5364651757134647602&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; HEIGHT: 301px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmiDIuROsSV2P-AS0r6esrwtn1dqsnLb1DDWnlIuh1tWW16eWzfJOXu1k6qwRDAIUJvMTO6VRDHTSpDVLIbQeez8R35xhyxI-YZvHzbQdnRG8vO29sA0nYpI74DMnv4GMnQl3dJa6MwoJS/s400/auction.jpg&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(0,0,153)&quot;&gt;&lt;strong&gt;Benefits of E-auctions&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Benefits to sellers&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(153,153,255)&quot;&gt;1) Increased revenues&lt;/span&gt;&lt;br /&gt;Sellers can reach the most interested buyers and sell the things at price which equal to buyer valuation by broadening the customer base and shortening the disposal cycle time. they can eliminate the need to predict demand.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(153,153,255)&quot;&gt;2) Better customer relationships&lt;br /&gt;&lt;/span&gt;Buyers and sellers have more time and chances to interact with each other. Seller can gather information about customer interest and delivery more personalized content.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(153,153,255)&quot;&gt;3) Lower transaction and administrative costs&lt;/span&gt;&lt;br /&gt;Compared to manual auctions and liquidation, E-auctions offers lower transaction cost. Cost of selling will be lower too.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Benefits to buyers&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(153,153,255)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;1)&lt;/span&gt; Market Transparency&lt;br /&gt;&lt;/span&gt;An electronic reverse auction with multiple, qualified bidders can be used to flush out the true market price of the auctioned items. Furthermore, this information can be used as the basis for real-time benchmarks for future sourcing projects. Auctions spark healthy competition, which can help all participants understand the true market value and identify areas where they need improvement. A buyer benefits by knowing true – often lower – costs. Suppliers benefit by knowing the market rate so they can review their own business or pricing model.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(153,153,255)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;2)&lt;/span&gt; Opportunities to find unique items and collectibles&lt;/span&gt;. Items that are hard to find are auctioned regularly on the internet.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(153,153,255)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;3)&lt;/span&gt; Anonymity&lt;/span&gt;. Nobody knows who are the buyer, only can see that the price is increasing.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;FONT-WEIGHT: bold; COLOR: rgb(51,102,255)&quot;&gt;&lt;span style=&quot;COLOR: rgb(0,0,153)&quot;&gt;Fraud &amp;amp; Prevention&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;There are many types of &lt;span style=&quot;COLOR: rgb(51,102,255)&quot;&gt;e-auction fraud&lt;/span&gt;. For example:&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Shilling:&lt;/span&gt; It is a place where placing fake bid on auction items. The main purpose is to rise up the bidding price.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Bid shielding&lt;/span&gt;: there is some phantom bidders bid at a very high price at the start of an auction and pull out at the last minute and this will cause a bidder of a much lower price to win.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Fake photos and misleading descriptions&lt;/span&gt;: some seller will distort what they can truly sell. They tried to falsified facts by convey false impression of the item.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Selling reproductions&lt;/span&gt;: sellers sell something that claims are original but actually it is a reproduction.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Loss and damage claim&lt;/span&gt;: buyers claim that they did not receive an item or they received it in a damage condition and thus ask for refund. They might be trying to get a freebie.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;COLOR: rgb(102,51,255)&quot;&gt;Other fraud&lt;/span&gt;: sale of stolen goods, use of false identities, providing false contact information, selling the same item to several buyers and so on.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;From the above statements, it is important for everyone to &lt;span style=&quot;COLOR: rgb(51,102,255)&quot;&gt;prevent e-auction fraud&lt;/span&gt;. There are some ways to be taken to prevent fraud:&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1)&lt;strong&gt;Become familiar with the auction website&lt;/strong&gt;. Look into the websites protection policies. Never assume you are protected from auction fraud.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;2)&lt;strong&gt;Before placing a bid, learn as much as you can about the seller&lt;/strong&gt;. If you can’t find anything out about the seller, than avoid doing business with them. Never fall for promises of better deals by moving away from the original auction website.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;3)&lt;strong&gt;Never ever give out your social security number, drivers license number, credit card number, or bank account information&lt;/strong&gt; until you have thoroughly checked out the seller and the escrow service.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;4)&lt;strong&gt;Always save 100% of the transaction information&lt;/strong&gt;. You’ll be glad you did in the event your case makes it to court.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;5)&lt;strong&gt;If after the sale you feel the item/payment should have been delivered already&lt;/strong&gt;, try to work it out with the seller/buyer. If at that point you feel that fraud is involved, immediately contact your state attorney general’s office and the FTC at &lt;a href=&quot;http://www.ftc.gov/&quot; target=&quot;blank&quot;&gt;http://www.ftc.gov/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(51,102,255)&quot;&gt;Related links:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1)&lt;a href=&quot;http://en.wikipedia.org/wiki/Auction&quot;&gt;http://en.wikipedia.org/wiki/Auction&lt;/a&gt;&lt;br /&gt;2)&lt;a href=&quot;http://en.wikipedia.org/wiki/Forward_auction&quot;&gt;http://en.wikipedia.org/wiki/Forward_auction&lt;/a&gt;&lt;br /&gt;3)&lt;a href=&quot;http://www.wisegeek.com/what-is-a-reverse-auction.htm&quot;&gt;http://www.wisegeek.com/what-is-a-reverse-auction.htm&lt;/a&gt;&lt;br /&gt;4)&lt;a href=&quot;http://www.finance.gov.tt/documents/172.pdf&quot;&gt;http://www.finance.gov.tt/documents/172.pdf&lt;/a&gt;&lt;br /&gt;5)&lt;a href=&quot;http://www.esourcingwiki.com/index.php/E-Auctions_in_Sourcing#Benefits_of_online_auctions_.E2.80.93_Suppliers&quot;&gt;http://www.esourcingwiki.com/index.php/E-Auctions_in_Sourcing#Benefits_of_online_auctions_.E2.80.93_Suppliers&lt;/a&gt;&lt;br /&gt;6)&lt;a href=&quot;http://www.crimcheck.com/background-check-news/whats-internet-auction-fraud-and-how-do-i-prevent-it&quot;&gt;http://www.crimcheck.com/background-check-news/whats-internet-auction-fraud-and-how-do-i-prevent-it&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/8188312921402142103/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/e-auction-types-benefits-fraud-and.html#comment-form' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/8188312921402142103'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/8188312921402142103'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/e-auction-types-benefits-fraud-and.html' title='E-Auction : Types, Benefits, Fraud and Prevention'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMU8s0xZS-DNq1PrzZqo5LTNwu9_DtyLJNHk9NNOPKx0F4StACertoLY1CsRaywyaKiOObB3UthY4aRDoPUC6nf94U8hjqz4YGb_fAd9C8szLTxl6fgZwJ8zhlfTa4y8X5Ggp8UXeQXIP9/s72-c/house-auction-lg.jpg" height="72" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-7362824651639937160</id><published>2009-07-17T01:25:00.006+08:00</published><updated>2009-07-17T14:57:01.111+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Electronic payment"/><title type='text'>Electronic Payment</title><content type='html'>&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggjYEdzoEE0v5oCoIUR213l8Ktibru5MWWbaEBTAhzgUcWso_iIAf9cjA-va7AAmCUsA7qf2ZY025TwOR0LxRrw6rGgd5rkLlo78IpiHgKf7xRyVSoelFhLVmfMme4eAJKIuYqC-r07qBB/s1600-h/epayment_image.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359318294472356546&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 165px; CURSOR: hand; HEIGHT: 184px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggjYEdzoEE0v5oCoIUR213l8Ktibru5MWWbaEBTAhzgUcWso_iIAf9cjA-va7AAmCUsA7qf2ZY025TwOR0LxRrw6rGgd5rkLlo78IpiHgKf7xRyVSoelFhLVmfMme4eAJKIuYqC-r07qBB/s320/epayment_image.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Electronic payment&lt;/strong&gt; (e-payment) is any digital financial payment transaction involving currency transfer between two or more parties. It is an electronic payment device that is used in modern times. This has payment by via net possible to businesses, banks and citizens. However, it is important that when you are talking about e-payment you should know that they are connected e-Business and moreover, the online payment has become one of the solutions to businesses.&lt;br /&gt;&lt;br /&gt;When it comes to payment options, nothing is more convenient than e-payment. You do not have to write a check, swipe a credit card or handle any paper money; all you have to do is enter some information into your Web browser and click your mouse. It is no wonder that more and more people are turning to e-payment as an alternative to sending checks through the mail.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Methods and types of electronic payment&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;An e-payment is any kind of non-cash payment that does not involve a paper check. Methods of e-payment include credit cards, debit cards and the Automated Clearing House (ACH) network. The ACH system comprises direct deposit, direct debit and electronic checks (e-checks).&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000066;&quot;&gt;For all these methods of e-payment, there are three main types of transactions:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. A &lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;one-time customer-to-vendor payment&lt;/span&gt;&lt;/strong&gt; is commonly used when you shop online at an e-commerce site, such as Amazon. You click on the shopping cart icon, type in your credit card information and click on the checkout button. The site processes your credit card information and sends you an e-mail notifying you that your payment was received. On some Web sites, you can use an e-check instead of a credit card. To pay by e-check, you type in your account number and your bank&#39;s routing number. The vendor authorizes payment through the customer&#39;s bank, which then either initiates an electronic funds transfer (EFT) or prints a check and mails it to the vendor.&lt;br /&gt;&lt;br /&gt;2. You make a &lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;recurring customer-to-vendor payment&lt;/span&gt;&lt;/strong&gt; when you pay a bill through a regularly scheduled direct debit from your checking account or an automatic charge to your credit card. This type of payment plan is commonly offered by car insurance companies, phone companies, and loan management companies. Some long-term contracts (like those at gyms or fitness centers) require this type of automated payment schedule.&lt;br /&gt;&lt;br /&gt;3. To use &lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;automatic bank-to-vendor payment&lt;/span&gt;&lt;/strong&gt;, your bank must offer a service called &lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;online bill pay&lt;/span&gt;&lt;/strong&gt;. You log on to your bank&#39;s Web site, enter the vendor&#39;s information and authorize your bank to electronically transfer money from your account to pay your bill. In most cases, you can choose whether to do this manually for each billing cycle or have your bills automatically paid on the same day each month.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Benefits of Electronic Payment&lt;/span&gt;&lt;/strong&gt; &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8ilzzyOWhsTuZRCwnCghV1BsE0u5yE41gKtuDX84JPHK5xAsWkYQk7fN3L9ligiTk6gfQ4uVQE3VL3lCAfwx7pEGHMr2H6XcnQDLXMCEK9AgheNbwend3LgYZwTJWq8qm7CWfqPO7Z0kc/s1600-h/convenient.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359318658280104546&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 138px; CURSOR: hand; HEIGHT: 153px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8ilzzyOWhsTuZRCwnCghV1BsE0u5yE41gKtuDX84JPHK5xAsWkYQk7fN3L9ligiTk6gfQ4uVQE3VL3lCAfwx7pEGHMr2H6XcnQDLXMCEK9AgheNbwend3LgYZwTJWq8qm7CWfqPO7Z0kc/s320/convenient.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;1. E-payment is very convenient for the consumer.&lt;br /&gt;&lt;/span&gt;In most cases, you only need to enter your account information, such as your credit card number and shipping address once the information is then stored in a database on the retailer&#39;s Web server. When you come back to the Web site, you just log in with your username and password. Completing a transaction is as simple as clicking your mouse. All you have to do is confirm your purchase and you&#39;re done.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt; &lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFputz0_Vx9Datf8RT7PrZozp3Kc7uXel58f5bBp54L-YkfUo8baeC3e-F25xxeFHNCVdiN_t5h5NoCYeW6_7FSAhvSBdoQZLDI05h_1VYxvtAlxHpiT2VSpvv4WiMTNoBwgsBpJfS_PWR/s1600-h/onlinepayment.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359318985726836626&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 173px; CURSOR: hand; HEIGHT: 205px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFputz0_Vx9Datf8RT7PrZozp3Kc7uXel58f5bBp54L-YkfUo8baeC3e-F25xxeFHNCVdiN_t5h5NoCYeW6_7FSAhvSBdoQZLDI05h_1VYxvtAlxHpiT2VSpvv4WiMTNoBwgsBpJfS_PWR/s320/onlinepayment.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;2. E-payment lowers costs for businesses.&lt;/span&gt;&lt;br /&gt;Low set-up and transaction fees. The more payments they can process electronically, the less they spend on paper and postage. Offering e-payment can also help businesses improve customer retention. A customer is more likely to return to the same e-commerce site where his or her information has already been entered and stored.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;3. No risks.&lt;br /&gt;&lt;/span&gt;When processing the order, you can be sure, that the order has been paid for. Your credit risks are thereby significantly reduced.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBjTwnJ9cFtEG9oF-tzpDSYy6bzPoiFNq3rafSLtYtB_7JZXv2-DKF1e2RISAdDjjpHx_sNpc6KdgnueD6SE8c4t9cLrt66GTY5w9JQXVr3QOlqRBjlnnzqoZKSZY9APFOerd_otQbkbfj/s1600-h/electronic-payment_small.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359293562515344930&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 188px; CURSOR: hand; HEIGHT: 159px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBjTwnJ9cFtEG9oF-tzpDSYy6bzPoiFNq3rafSLtYtB_7JZXv2-DKF1e2RISAdDjjpHx_sNpc6KdgnueD6SE8c4t9cLrt66GTY5w9JQXVr3QOlqRBjlnnzqoZKSZY9APFOerd_otQbkbfj/s400/electronic-payment_small.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;4. It is simple.&lt;/span&gt;&lt;br /&gt;It is easy for customers to pay with e-payment. They only have to use their Solo Internet codes to approve the pre-filled payment order and the transaction is done!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000000;&quot;&gt;5. Speed.&lt;br /&gt;&lt;/span&gt;Confirmation of the payment made by customers reaches the organization in moments.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;color:#000000;&quot;&gt;6. In addition, below are some of the points of benefits of Electronic Payment:&lt;/span&gt;&lt;br /&gt;(a) Easy to integrate into the merchant web site.&lt;br /&gt;(b) Comprehensive reporting tools provided via the e-payment web site with secure log in.&lt;br /&gt;(c) Ability to acquire a merchant account with multiple banks.&lt;br /&gt;(d) 24-hour support line.&lt;br /&gt;(e) Outsourcing of security means less reason for merchant site to be attacked.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;strong&gt;Concerns about Electronic Payment&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;1. &lt;strong&gt;Identity theft&lt;/strong&gt;. The main drawbacks to e-payments are concerns over privacy and the possibility of identity theft. Fortunately, there are many safeguards available to protect your sensitive personal information from falling into the wrong hands. You can defend yourself against identity theft by using virus protection software and a firewall on your computer. You should also make sure that you send your credit card information over a secure server. Your Internet browser will notify you when a server is secure by showing a lock or key icon. In addition, the URL on a secure site is usually designated by the prefix &quot;https&quot; instead of &quot;http.&quot; Retailers do their part by using data encryption, which codes your information in such a way that only the key holder can decode it.&lt;br /&gt;&lt;br /&gt;2. Privacy concerns aside, some people simply &lt;strong&gt;dislike making e-payments.&lt;/strong&gt; They find the setup too time-consuming and do not want more logons and passwords to remember. Others simply prefer the familiarity of writing checks and dropping envelopes in the mail. For some people that do not have the basic computer skill, there mind be a problem for them to do e-payment as well. Regardless of these concerns, e-payment will likely continue to rise in popularity.&lt;br /&gt;&lt;br /&gt;3. There is a &lt;strong&gt;great risk&lt;/strong&gt; involves in the theft or losing of the smart cards. In case the cards fall in unsafe hands, there is a danger of the expenditure of your entire bank balance. There are measures to inform the concerned authorities about the loss of the card. But, the time between losing the card and informing the authorities is critical. Unauthorized users may carry out transactions in your name during this period of time.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#990000;&quot;&gt;CONCLUSION:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;This was not to discourage you from taking to electronic payments although there are some disadvantages of e-payment. It was rather to make you aware of the disadvantages of electronic payment systems. While we are moving towards a paperless environment, we are inviting issues related to electronic security.&lt;br /&gt;&lt;br /&gt;With all the benefits of e-payment, it is no wonder that its use is on the rise. E-payments grew as payment by check declined, which means that e-payments are replacing checks.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://communication.howstuffworks.com/electronic-payment.htm&quot;&gt;http://communication.howstuffworks.com/electronic-payment.htm&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://star-techcentral.com/tech/story.asp?&quot; file=&quot;&#39;/2008/1/1/technology/19850887&amp;amp;sec=&quot;&gt;http://star-techcentral.com/tech/story.asp?&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://ezinearticles.com/?Disadvantages-of-Electronic-Payment-Systems&amp;amp;id=2003183&quot;&gt;http://ezinearticles.com/?Disadvantages-of-Electronic-Payment-Systems&amp;amp;id=2003183&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/7362824651639937160/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/electronic-payment.html#comment-form' title='12 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7362824651639937160'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7362824651639937160'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/electronic-payment.html' title='Electronic Payment'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggjYEdzoEE0v5oCoIUR213l8Ktibru5MWWbaEBTAhzgUcWso_iIAf9cjA-va7AAmCUsA7qf2ZY025TwOR0LxRrw6rGgd5rkLlo78IpiHgKf7xRyVSoelFhLVmfMme4eAJKIuYqC-r07qBB/s72-c/epayment_image.jpg" height="72" width="72"/><thr:total>12</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-1911324553240569851</id><published>2009-07-15T10:37:00.014+08:00</published><updated>2009-07-17T13:36:49.282+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="E-learning"/><category scheme="http://www.blogger.com/atom/ns#" term="Electronic learning"/><title type='text'>A discussion on E-learning offered in Malaysian universities: Pros and Cons from the students perspective</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUhqa5VSjojS7STIekxTa4ypKtoQgy4l2ZvAb7Vi98UG6Q0cDGnAcEQnoE8YamyH8Eip6wkGLAO7yZPIcD_4Ha2jOlZdLRR6dlWIXh_7xFg5bJfPVpnP73OX11oJlrOx6c1I6S-l3cEnq2/s1600-h/e-learning_pic4.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359298572589145314&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 287px; CURSOR: hand; HEIGHT: 281px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUhqa5VSjojS7STIekxTa4ypKtoQgy4l2ZvAb7Vi98UG6Q0cDGnAcEQnoE8YamyH8Eip6wkGLAO7yZPIcD_4Ha2jOlZdLRR6dlWIXh_7xFg5bJfPVpnP73OX11oJlrOx6c1I6S-l3cEnq2/s320/e-learning_pic4.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;strong&gt;Electronic learning&lt;/strong&gt; (or E-Learning) is a term for all types of technology-enhanced learning (TEL), where technology is used to support the learning process. Often the medium of instruction is through computer technology, particularly involving digital technologies. E-learning has been defined as &quot;&lt;a title=&quot;Pedagogy&quot; href=&quot;http://en.wikipedia.org/wiki/Pedagogy&quot;&gt;pedagogy&lt;/a&gt; empowered by digital technology&quot;. In some instances, no face- to- face interaction takes place.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;E-learning is used interchangeably in a wide variety of contexts. Lately in most Universities, E-learning is used to define a specific mode to attend a course or programmed of study where the students rarely, if ever, attend face-to-face for on-campus access to educational facilities, because they study online. Universities which provide online degrees involve more and more electronic facilities to give their online students fast and qualified assistance.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;There are several benefits and challenges to E-learning. Here are some pros and cons from the students’ perspective.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Pros:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;(a) All of students’ class materials, assignments, lectures, quizzes are made available by students’ instructor online. This benefit is particularly advantageous for those of students who have ever lost class documents. Now students can go back to the class webpage (eg: utar called it as wble) and print out copies whenever they need them. With an e-learning course, students can also review assignment details and lecture materials any time.&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359298149735848498&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 239px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkZo6QuUymHFw0IbYKIEgG2z4pN7ZS6BSqJjkN7Vetl5rQ8Me8gmoEPWRZCaQdjV46o86Yrak1ptBcnTY-93Jad1XzBhHXHc2rhqzHFqdaNgIq67WXBRljM6ZHLnfuy6eLf0uIYcvgHFTC/s400/v3.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;(b) Students can access the information online from any internet-ready computer. Non-traditional students, for examples those with full-time jobs and/or those with children and other family priorities, will enjoy this flexible learning environment that allows them to dedicate time and attention to their day-to-day responsibilities and still be successful students.&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359298281447506434&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 284px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheaXU8LgicxpgaPOnn-sJqyeJLAjiea9Flbgtr3Yy4K9ZBAecTO_jJci1zTGdtHwxS_Hx0z9Akuzho5ZBM_uVGDiIp85QTQy48_W2-Mbh_iihQJBTWakDMKtVTN-Gc0ovVFGSgTEp3wjYg/s400/elearning_pic2.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;(c) Support different learning styles (using flexible learning materials).&lt;br /&gt;It accommodates multiple learning styles using a variety of delivery methods geared to different students and is more effective for certain learners.&lt;br /&gt;&lt;br /&gt;(d) Encourage anytime, anyplace access to course materials.&lt;br /&gt;24/7 accessibility makes scheduling easy and allows all the students access to the e-learning site (eg: wble) anytime. This on-demand access means learning can happen precisely when needed.&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359298383094235698&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 288px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4Y0Em7T6TFBZ_VBOZOGYaEpmIcpq0MIMBvhBHRwuwS4lf9cYmsMcbUO7QkB1Q6J-qLjG0lcQL6zsGJsaidxDhHX12PJ-BLXASLnBjBm-MTJUUkjoclW8QZ7J1oLx8tNLvfVWTTF1pS3C8/s400/elearning_pic_1.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;(e) Fosters greater student interaction and collaboration&lt;br /&gt;Increase opportunities for student participation, encouraging less confident students to take part. Students can have better interaction and discussion in the forum. The online environment is far easier (and often more comfortable) to work in since students do not have to be face-to-face.&lt;br /&gt;&lt;br /&gt;(f) Travel time and associated costs (parking, fuel, and vehicle maintenance) are reduced or eliminated. Students no need purposely go to universities to get some information.&lt;br /&gt;&lt;br /&gt;(g) Overall student costs are frequently less (tuition, residence, food, transportation) if compare with offline learning.&lt;br /&gt;&lt;br /&gt;(h) Fosters greater student or instructor contact. This can facilitate the communication between students or promoting peer group support. This can also improve communication with course tutor and teaching assistants.&lt;br /&gt;&lt;br /&gt;(i) Enhances computer and Internet skills. By having E-learning, students must have some computer and internet skills to make our learning process successful.&lt;br /&gt;&lt;br /&gt;(j) Provide self-directed and self-paced learning, allowing students to keep track of their own progress.&lt;br /&gt;&lt;br /&gt;(k) Promote student engagement (using interactive learning materials), improving learner motivation and satisfaction.&lt;br /&gt;&lt;br /&gt;(l) Give direct access to relevant and up-to-date information.&lt;br /&gt;&lt;br /&gt;(m) Alternate and complementary ways of learning often help to facilitate students’ understanding.&lt;br /&gt;&lt;br /&gt;(n) Improve universities of course materials.&lt;br /&gt;&lt;br /&gt;(o) Students can do preparation of future topics, and revision of previous topics.&lt;br /&gt;&lt;br /&gt;(p) Increase the accessibility of information and course materials to students with disabilities.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Cons:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;(a) Large classes are more challenging to teach online than in the classroom. In most cases, 15 students are the largest number of students that an instructor can accommodate within an online class.&lt;br /&gt;&lt;br /&gt;(b) Lack of face-to-face communication with lecturers and tutors contribute lack of understanding between students and lecturers or tutors. While a lecturers or tutors cannot easily feel a student&#39;s demands, interests and motivations, a student can simply be lazy being non-motivated enough and having free time schedule for his or her E-learning. This may result a low scope of the student&#39;s knowledge and the lecturers&#39; or tutors’ accusation in lack of proficiency.&lt;br /&gt;&lt;br /&gt;(c) Next, online classes, &lt;a href=&quot;http://www.articlealley.com/&quot; target=&quot;_top&quot;&gt;conferences&lt;/a&gt; and discussions are limited in time and totally exclude emotional interactivity. Though some universities which provide online courses and give online degrees evolve voice communication through &lt;a href=&quot;http://www.articlealley.com/&quot; target=&quot;_top&quot;&gt;networking technologies &lt;/a&gt;but there is still lack of gestures, vivid dialogue and feeling of students’ interlocutor&#39;s presence.&lt;br /&gt;&lt;br /&gt;(d) Of course, less motivated employees will have difficulty dealing with the lack of structure in a self-paced E-learning program. Deal with that issue by scheduling time off for your employees so they can complete the assigned module. Also consider setting up an area that&#39;s quiet and conducive to learning, so workers can focus on their coursework.&lt;br /&gt;&lt;br /&gt;In conclusion, like any form of teaching, E-learning requires various resources to be developed successfully. Things to keep in mind is E-learning does not have to be the only way of students course is delivered. It is often E-learning is delivered through &quot;blended learning&quot;, in which E-learning is used to complement traditional educational methods. Besides that, E-learning could be a large or small part of students’ course.&lt;br /&gt;&lt;br /&gt;E-learning has been becoming more and more popular among students living in Malaysia. There are pros and cons on e-learning studies. So, there is no good or bad on E-learning studies, but by having E-learning, there are much more benefits if compared with the disadvantages. As a students, need to make good use of the E-learning that provided by universities.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://garts.latech.edu/tamaram/elearning/page2.htm&quot;&gt;http://garts.latech.edu/tamaram/elearning/page2.htm&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://www.worldwidelearn.com/elearning-essentials/elearning-benefits.htm&quot;&gt;http://www.worldwidelearn.com/elearning-essentials/elearning-benefits.htm&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.nottingham.ac.uk/elan/getting_started/benefits&quot;&gt;http://www.nottingham.ac.uk/elan/getting_started/benefits&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://en.wikipedia.org/wiki/Electronic_learning&quot;&gt;http://en.wikipedia.org/wiki/Electronic_learning&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/1911324553240569851/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/electronic-learning-or-e-learning-is.html#comment-form' title='55 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/1911324553240569851'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/1911324553240569851'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/electronic-learning-or-e-learning-is.html' title='A discussion on E-learning offered in Malaysian universities: Pros and Cons from the students perspective'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUhqa5VSjojS7STIekxTa4ypKtoQgy4l2ZvAb7Vi98UG6Q0cDGnAcEQnoE8YamyH8Eip6wkGLAO7yZPIcD_4Ha2jOlZdLRR6dlWIXh_7xFg5bJfPVpnP73OX11oJlrOx6c1I6S-l3cEnq2/s72-c/e-learning_pic4.gif" height="72" width="72"/><thr:total>55</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-6879027266980694453</id><published>2009-07-12T14:09:00.014+08:00</published><updated>2009-07-12T22:05:42.962+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Corporate Blogging"/><title type='text'>Corporate Blogging: A new marketing communication tool for companies</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyPrMhJRIjL2d15usepvCbLtiDxCtftuaQpUvkVuK067_anXV9adiGtunYMoG6Nu01E6A38WjJf5lZq1xEih0ryY8GiabZChFg1bPEyHCdF_KJ1hTT2kHEa99pqBOd6p2XhA-OEnWUB7kn/s1600-h/blog-image.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357572040506840610&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 150px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyPrMhJRIjL2d15usepvCbLtiDxCtftuaQpUvkVuK067_anXV9adiGtunYMoG6Nu01E6A38WjJf5lZq1xEih0ryY8GiabZChFg1bPEyHCdF_KJ1hTT2kHEa99pqBOd6p2XhA-OEnWUB7kn/s200/blog-image.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;BLOGS, defined as web pages that serves as a publicly accessible personal journals have been attracting media and public eye for the last few years. The amount of registered blogs is huge and still increasing. Such phenomenon, appreciated and popularized by many internet users, has also been regarded in literature as innovative communication tool for business. That is why the new term has been coined – corporate blog.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357572165369451490&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 200px; CURSOR: hand; HEIGHT: 145px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKfu4yTK0ZkZWh3xsuir3T7e5zaFWwrIuKuBmjdmEKkyYGbh5ZZTStHOYNHkPsp-Q-ccpoj2TnQTzMogCZoZgZQSdDCPxuuEzhWD4ZUAEuhMtqYRfXLuYHGGWGnJXTLSo5f17n9yD_abPR/s200/corporate_bloggers.jpg&quot; border=&quot;0&quot; /&gt;Corporate blog is a weblog published and used by an organization to reach its organizational goals. The purposes of blog usage can be grouped in three fields – brand building (include leadership), customer service (include product development) and promotion (include sponsorship and advertising).&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Corporate blogs have some unique features which make them perfect alterative or upgrade to typical corporate web pages which are usually exemplified by minor usage of user generated content – i.e. the communication is one sided or asymmetric and the users do not have many opportunities to provide company with valuable information, not mentioning about the possibility of having on-line dialogue with company’s employees and other clients.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Bellow are the types of corporate blogs:&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color:#9999ff;&quot;&gt;1. Leadership corporate blogs&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;in which particular person from company is thoroughly chosen to represent the company not only for brand building, but also for presenting company’s views on various aspects. Such blogs are mainly used by companies which are market leaders.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#9999ff;&quot;&gt;2. Group corporate blogs&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;in which all employees have right to participate in the development of company’s blog. In such case, company uses only one blog, which is usually incorporated within the structure of company’s corporate web site and the blog has many co-authors.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#9999ff;&quot;&gt;3. Corporate blogs platform&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;consisting of many blogs written by employees or company’s business partners. Such blogs can promote particular individuals as specialists in given fields and are often used as customer service support.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#9999ff;&quot;&gt;4. Promotional blogs&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;such as sponsored blogs, advertising and contest blogs where the leading role is played by product, event or other marketing action, not by an author.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Corporate blogging provides a way for companies and readers to meet on common ground and discuss ideas, products and services in the hopes of building an audience that can become customers. A corporate blog provides a cost-effective alternative to having a website. For small and medium sized business entrepreneurs without the time and the means to set up a website, corporate blogging offers an inexpensive tool to herald the company&#39;s presence on the powerful Internet. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;Corporate blogs provide small and medium sized businesses with an avenue to share their expertise and knowledge with a bigger audience. Both online and offline small and medium sized businesses can use blogs to take their products and services to a wider audience increasing web traffic and boosting sales. The fact is corporate blogging is fast becoming a sustainable marketing strategy for any online marketer. There are numerous ways a business can benefit from a blog.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;An effective corporate blog can help give a human face to a business. Blogs bring a personal dimension to the web. Blogs make business sites more personal. Since blogs are updated by individuals, the &quot;voice&quot; of the blogger will resonate through. This will assure potential customers that there are real people behind the blog engaging them in real conversations. Blogs can be opinionated, informative, at other times infused with humor thus eliciting better response from target audience.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;A corporate blog if used productively can improve customer service. It provides instant customer feedback through comments. It allows one&#39;s audience to comment on a post and create a dialogue with them. A blog can act as a question and answer forum. Customers can post questions and receive instant replies. An effective corporate blog functions as a central knowledge base of articles, tutorials, product development status, and other relevant product or service information. This is good customer service.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;A corporate blog keeps an archive of older posts organized by date and categorized by topic. This gives the target audience easier access to information. With corporate blogs, it is also easy to add new information on a regular basis. Frequent updates in the form of fresh new posts mean visitors will have all the reasons to keep coming back thus building loyal readers and best potential clients.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;A corporate blog can increase the chances of prospective clients to visit a company&#39;s website. For a start, visitors to a corporate blog can be redirected to the company&#39;s main site through links and special offers. Use of relevant keywords and popular links to specific sales pages improve search engine ranking of both the business blog and the main website. Just like the main website, top search result rank equals traffic. With more and more people turning to the all-powerful Internet to search for products and services, it is essential for small businesses to be easily crawled by search engines. Since search engines thrive on new content, the more likely the search engines are going to visit the blog and share it with the world.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Regularly posting valuable content on a corporate blog builds company credibility and creates sound business reputation. A corporate blog can help project a company as an expert in a chosen business area. Customers feel more comfortable transacting business with a reputable company.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;A corporate blog can be an avenue to introduce company products or services. Ideally, a blog is not about selling. A blog can be used to mention new products or services and direct visitors to the company&#39;s main website in the process generating more sales. Interestingly, several advertising programs such as Google Adsense allow companies to monetize their business blogs and generate extra revenue.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;However, a corporate blog is not urgent but important for small and medium sized businesses. A corporate blog alone is not enough to market a company product or service. But it is good investment for startup businesses to have conversations with customers and prospective clients. Corporate blogging is an effective way to start conversing with visitors interested in ones products or services but it is in no way to be viewed as a standalone strategy. Yes, corporate blogging can do wonders. But it is not going to work on its own. A corporate blog is most effective when it is used in conjunction with other online communication tools such as e-mail, press release, pay per click, company websites, to name a few.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Setting up and maintaining a great corporate blog that visitors will find useful and relevant is just like having an effective built-in public relations staff that will spread the word about the business. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;Starting a business blog is easy but transforming it into a marketing tool that drives traffic and sales to a business takes time, dedication and consistency.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#000099;&quot;&gt;15 Most Popular Corporate Blogs (&lt;/span&gt;&lt;a href=&quot;http://technorati.com/&quot;&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Technorati&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000099;&quot;&gt; ranked) – May 2008&lt;/span&gt;&lt;/div&gt;&lt;div&gt;No.1 &lt;a href=&quot;http://googleblog.blogspot.com/&quot;&gt;Google&lt;/a&gt; – Authority: 8492&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWOPRW3Ymwqx5iIPEGGM3zj8vY4PAswur3JiiDdQq9o0JA04CFhuUdDDdRMq032on25AZ8XBrSuCVLBjScXlUwKdgeTSYgnRc-tXbNTU-9PJvT6Mw8oWA_thQsdWdnZQHYoi2qCUfSH5Fz/s1600-h/corporate-blogging.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357574140617389474&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 187px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWOPRW3Ymwqx5iIPEGGM3zj8vY4PAswur3JiiDdQq9o0JA04CFhuUdDDdRMq032on25AZ8XBrSuCVLBjScXlUwKdgeTSYgnRc-tXbNTU-9PJvT6Mw8oWA_thQsdWdnZQHYoi2qCUfSH5Fz/s200/corporate-blogging.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;No.2 &lt;a href=&quot;http://blogs.adobe.com/&quot;&gt;Adobe&lt;/a&gt; – Authority: 1797&lt;br /&gt;No.3 &lt;a href=&quot;http://blog.flickr.net/en&quot;&gt;Flickr&lt;/a&gt; – Authority: 1744&lt;/div&gt;&lt;div&gt;No.4 &lt;a href=&quot;http://blog.facebook.com/&quot;&gt;Facebook&lt;/a&gt; – Authority: 1478&lt;/div&gt;&lt;div&gt;No.5 &lt;a href=&quot;http://www.ysearchblog.com/&quot;&gt;Yahoo! Search&lt;/a&gt; – Authority: 1130&lt;br /&gt;No.6 &lt;a href=&quot;http://direct2dell.com/one2one/&quot;&gt;Dell&lt;/a&gt; – Authority: 799&lt;/div&gt;&lt;div&gt;No.7 &lt;a href=&quot;http://blog.digg.com/&quot;&gt;Digg&lt;/a&gt; – Authority: 641&lt;/div&gt;&lt;div&gt;No.8 &lt;a href=&quot;http://blog.linkedin.com/&quot;&gt;LinkedIn&lt;/a&gt; – Authority: 591&lt;/div&gt;&lt;div&gt;No.9 &lt;a href=&quot;http://blog.ask.com/&quot;&gt;Ask&lt;/a&gt; – Authority: 364&lt;/div&gt;&lt;div&gt;No.10 &lt;a href=&quot;http://fastlane.gmblogs.com/&quot;&gt;General Motors&lt;/a&gt; – Authority: 364&lt;/div&gt;&lt;div&gt;No.11 &lt;a href=&quot;http://yodel.yahoo.com/&quot;&gt;Yahoo!&lt;/a&gt; – Authority: 297&lt;/div&gt;&lt;div&gt;No.12 &lt;a href=&quot;http://blog.delta.com/&quot;&gt;Delta&lt;/a&gt; – Authority: 252&lt;/div&gt;&lt;div&gt;No.13 &lt;a href=&quot;http://1000words.kodak.com/&quot;&gt;Kodak&lt;/a&gt; – Authority: 105&lt;/div&gt;&lt;div&gt;No.14 &lt;a href=&quot;http://monster.typepad.com/monsterblog/&quot;&gt;Monster&lt;/a&gt; – Authority: 73&lt;/div&gt;&lt;div&gt;No.15 &lt;a href=&quot;http://www.boeing.com/randy/&quot;&gt;Boeing&lt;/a&gt; – Authority: 67&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Source: &lt;a href=&quot;http://www.thenewpr.com/wiki/pmwiki.php?pagename=Resources.CorporateBlogsList&quot;&gt;New PR Wiki&lt;/a&gt;, provides the listing of corporate blogs&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;1. &lt;a href=&quot;http://en.wikipedia.org/wiki/Corporate_blog&quot; target=&quot;_blank&quot;&gt;http://en.wikipedia.org/wiki/Corporate_blog&lt;/a&gt;&lt;/div&gt;&lt;div&gt;2. &lt;a href=&quot;http://www.enterpriseblogs.info/corporate-blogging/advantages&quot; target=&quot;_blank&quot;&gt;http://www.enterpriseblogs.info/corporate-blogging/advantages&lt;/a&gt;&lt;/div&gt;&lt;div&gt;3. &lt;a href=&quot;http://www.blogopreneur.com/2007/03/30/the-benefits-of-corporate-blogging/&quot; target=&quot;_blank&quot;&gt;http://www.blogopreneur.com/2007/03/30/the-benefits-of-corporate-blogging/&lt;/a&gt;&lt;/div&gt;&lt;div&gt;4. &lt;a href=&quot;http://www.backbonemedia.com/blogsurvey/23-advantages-corporate-blog.htm&quot; target=&quot;_blank&quot;&gt;http://www.backbonemedia.com/blogsurvey/23-advantages-corporate-blog.htm&lt;/a&gt;&lt;/div&gt;&lt;div&gt;5. &lt;a href=&quot;http://www.internetviz-newsletters.com/bulldog/e_article000404957.cfm&quot; target=&quot;_blank&quot;&gt;http://www.internetviz-newsletters.com/bulldog/e_article000404957.cfm&lt;/a&gt;&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/6879027266980694453/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/corporate-blogging-new-marketing.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/6879027266980694453'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/6879027266980694453'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/corporate-blogging-new-marketing.html' title='Corporate Blogging: A new marketing communication tool for companies'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyPrMhJRIjL2d15usepvCbLtiDxCtftuaQpUvkVuK067_anXV9adiGtunYMoG6Nu01E6A38WjJf5lZq1xEih0ryY8GiabZChFg1bPEyHCdF_KJ1hTT2kHEa99pqBOd6p2XhA-OEnWUB7kn/s72-c/blog-image.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-7094615724660310132</id><published>2009-07-11T23:02:00.001+08:00</published><updated>2009-07-17T13:38:42.808+08:00</updated><title type='text'>E-government in Malaysia : Its Implementation So Far and Citizen&#39;s Adoption Strategies</title><content type='html'>E-government is a short form for electronic government. E-government is also known as e-gov, digital government, transformational government and lastly online government. Basically, e-government is the use of technology to enhance the access to and delivery of government services to benefit citizens, business partners and employees.The local, state and federal government set up a central website where the public can find the public information, download government forms and contact government representatives. It involves computerized and automation of existing paper-based procedures. E-gov aims to make the interaction between government and citizens (G2C), government and business enterprises (G2B), and inter-agency relationships (G2G).&lt;br /&gt;&lt;br /&gt;The implementations of e-government in Malaysia are:&lt;br /&gt;&lt;strong&gt;a) Generic Office Environment (GEO)&lt;br /&gt;b) Electronic Procurement (eP) Project&lt;br /&gt;c) Human Resource Management Information System&lt;br /&gt;d) Project Monitoring System (PMS)&lt;br /&gt;e) Electronic Services Directory (eServices)&lt;br /&gt;f) Electronic Labor Exchange (ELX)&lt;br /&gt;g) E-Syariah&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;a. Generic Office Environment (GEO)&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;The goal of GEO is to introduce a fully integrated, distributed and scalable office environment that leverages the use of multimedia information technology. This project is to have an effective and efficient communication among the workers, allowing collaboration across the workers within the organisation and to ensure the right information reaching the right person in a timely manner.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359075986452386738&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 238px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEGaufVSeYAcWWiGTuYgbR9gNmRKCplBwWJL43D-bBHrr7DS_kimlx0-fDlKsvcObCsGnG_MYZHA4_sl15KC1l2YfTBJ2aN7uiPhVcfUdfbK7XruClWjA_Il4opKlQztqg5X_jpvDTYd8U/s400/GEO.jpg&quot; border=&quot;0&quot; /&gt;&lt;strong&gt;&lt;span style=&quot;color:#996633;&quot;&gt;&lt;span style=&quot;color:#663300;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#996633;&quot;&gt;&lt;span style=&quot;color:#663300;&quot;&gt;b. Electronic Procurement (eP) Project&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;The aim of eP is to re-engineer, automate, and transform the current procurement system. Electronic procurement covers central contract, tender, and direct purchases. Besides, the use of eP is save time, money and encourages the electronic and joins K-economy.&lt;br /&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359075701851557010&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 281px; CURSOR: hand; HEIGHT: 300px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxx6k-kWnMjdt7Uvm32x89dFO0GqO4HkpL8il44nFBggyzVya5GxkWssQ8OpMWkhtCthIoVqPezh-7aeCkAe6BJRroLvdH3zbtLptK7ZweZMRhfPxmZsuMmdiQeKd3Gwdfmt2TvY_AIyEi/s400/eP1.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;c. Human Resource Management Information System (HRMIS)&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;HRMIS provide a single interface for government employees to perform human resource function effectively and efficiently in an integrated environment. It standardizes human resource processes for federal, state, statutory body and local authority services. HRMIS is not just record keeping but it also provide transactional functions such as employee selection, recruitment, leave application and loan processing.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNBCR5s-Mg68lUG3punYgh7VMyuuVNTGGCtWka298BiWfOsf2zo6mlXb_1hQD_UD2waSspxeeK8urVERsigTa2KwDHT01ISAS16-LVrnRpIvkCGfFDVJOxkfnKLOj3XCZE4RZWT-4aSVWX/s1600-h/HRMIS1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359076324859562482&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 192px; CURSOR: hand; HEIGHT: 153px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNBCR5s-Mg68lUG3punYgh7VMyuuVNTGGCtWka298BiWfOsf2zo6mlXb_1hQD_UD2waSspxeeK8urVERsigTa2KwDHT01ISAS16-LVrnRpIvkCGfFDVJOxkfnKLOj3XCZE4RZWT-4aSVWX/s400/HRMIS1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359076470085297314&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 280px; CURSOR: hand; HEIGHT: 347px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivbvinXsClK-tSMQNjtf3qkvFHroLHx-oqLonj8EEY6WolIcIpoeQ7uOsZ5jV3GyTPIqoSyGLmHVToj7T6ecpjGFW4XKZ2cx9yn9zNU_TreDdugcKQcFoUOtjgI0paAC2yKSySZS8iwlz4/s400/HRMIS.jpg&quot; border=&quot;0&quot; /&gt;&lt;span style=&quot;color:#663300;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;d. Project Monitoring System (PMS)&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;PMS create a mechanism that monitors the project implementation throughout various government agencies and statutory bodies. Besides, it provides a platform to exchange idea and to demonstrate best practices in information management and communication services. PMS consist of 3 services which are Application Services, Data Services and Communication Services. &lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359076994745804994&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 275px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvBTaHNUmr_k0-6JAP1A2dL-V0phfyW6zJwdCU6nj8TQCB0aTiWzlcCevqGQP00nUGAa76zpYRRAEtS5dq9k8hiZeWCK11DZwzGpc_RZ8CFmEtD4xVj8X-86zK6U-2hyphenhyphenasP9lI6BX6Gchl/s400/project+monitoring.jpg&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;e. Electronic Services Directory (eServices)&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;It is a pilot project which allows the Malaysian citizens to engage in transactions with government and utilities payment such as telephone and electricity bills, police summons, Road and Transport Department Services and so forth. Besides, it is accessed through multi channel service delivery such as Internet and kiosks machine. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359076873323269538&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 267px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyBMl3RQCAn04q7eXMhQPaPj-5I40J0VhguUqilN2TlycwGTy_pcoHgWvXEHPvxXDqRh8j8bcHxKPngqrVGh_WG87FTIQZnhYpiBjoc-pA4Nna1zIPk5riVAYeZ2oMKzDfM22rBTHYCU3u/s400/eservices.jpg&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;f. Electronic Labor Exchange (ELX)&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;ELX aim is to improve the mobilization of human resources and optimize work force utilization through systematic matching of job seekers to job vacancies. Besides, it also enables the Ministry of Human Resources (MOHR) to be one-step centre for labor market information that will be accessible to the public.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359075324961143218&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 369px; CURSOR: hand; HEIGHT: 400px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiymyFHJ9fZl-Xlfd07IRfLY3qsXejb3m_Oi69jd21NwfUF_JC-vLwJ8JxXXOX0IlPrvE6-57a1y1bVw74j1kOccUIlVMjgIzCbNDJceg5-KJV_etZcM2w5fWUPBhYeRWaS55e8q5arXwzF/s400/ELX4.jpg&quot; border=&quot;0&quot; /&gt; &lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#663300;&quot;&gt;g. E-Syariah&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;The main aim of e-syariah is to implement the quality of service in syariah courts. Basically, it enhances Islamic Affairs Department’s effectiveness through better monitoring and co-ordination if its agencies and improves the management of its 102 syariah courts. E-syariah application consists of Syariah Court Case Management System, Office Automation System, E-syariah Portal, Syarie Lawyers Registration System and Library Management System.&lt;br /&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359077077132443010&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 220px; CURSOR: hand; HEIGHT: 320px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiXu5-MmeoSkv4U99hBQ9gYgQsJQW8eSGtjo4zB0E1_CRjJYsXj-clAaJtnoSNPBhq6g3XwvoycZtYR4oAk_GriHG3KquIXPa7fDVKYS0rWuSqYUuHT59aCjwer-0hGMCiKcmvNQOOrYU7/s400/esyariah.gif&quot; border=&quot;0&quot; /&gt;* The above is adopt from an article wrote by Mohsin bin Haji Ahmad&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;&lt;strong&gt;Citizen’s adoption strategies&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;&lt;span style=&quot;color:#996633;&quot;&gt;&lt;strong&gt;a) Customer satisfaction&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;E-government is able to increase customer satisfaction. Nowadays, customer is able to solve their inquiry and also enquiry through online government services. Whatever public information customer is able to obtain through the website and they don’t need to make a call to the office. Everything can be done online.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#996633;&quot;&gt;b) Service quality&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Online service quality for e-Government could be measured in terms of quality of content provided on the website. The example would be the speed of responding to citizen’s query with a solution to it. Besides, there is also telephone and fax number of the personnel to whom the citizen might want to interact with about other mean if necessary.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;&lt;span style=&quot;color:#cc9933;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#996633;&quot;&gt;c) Website design&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;The design of online government could build the relationship with the visitor and enhance their experience. This is due to the personalization of websites and customization of product offerings. Basically, it give visitors a sense of control and participation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#663366;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;/span&gt;&lt;a href=&quot;http://webopedia.com/TERM/E/e_government.html&quot;&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;http://webopedia.com/TERM/E/e_government.html&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;&lt;br /&gt;2. &lt;/span&gt;&lt;a href=&quot;http://en.wikibooks.org/wiki/E-government/Definition&quot;&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;http://en.wikibooks.org/wiki/E-government/Definition&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;&lt;br /&gt;3. &lt;/span&gt;&lt;a href=&quot;http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf&quot;&gt;&lt;span style=&quot;font-family:lucida grande;&quot;&gt;www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/7094615724660310132/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/e-government-in-malaysia-its.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7094615724660310132'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7094615724660310132'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/e-government-in-malaysia-its.html' title='E-government in Malaysia : Its Implementation So Far and Citizen&#39;s Adoption Strategies'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEGaufVSeYAcWWiGTuYgbR9gNmRKCplBwWJL43D-bBHrr7DS_kimlx0-fDlKsvcObCsGnG_MYZHA4_sl15KC1l2YfTBJ2aN7uiPhVcfUdfbK7XruClWjA_Il4opKlQztqg5X_jpvDTYd8U/s72-c/GEO.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-8464301680568527427</id><published>2009-07-10T12:41:00.002+08:00</published><updated>2009-07-17T16:36:02.590+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Dell"/><category scheme="http://www.blogger.com/atom/ns#" term="Locat transactional e-commerce site"/><title type='text'>Review a local, transactional e-commerce site</title><content type='html'>&lt;strong style=&quot;color: rgb(51, 51, 153);&quot;&gt;Electronic Commerce&lt;/strong&gt; consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with widespread Internet usage. People who shop online are most familiar with transactional e-commerce site. A &lt;strong&gt;&lt;span style=&quot;color: rgb(51, 51, 153);&quot;&gt;transactional site&lt;/span&gt;&lt;/strong&gt; may be an electronic storefront for a brick-and-mortar retailer or a catalog business, like Lands’ End, or a manufacturer showroom for those wishing to sell directly to the public like Dell Computer. Transactional sites conduct full “end-to-end” transactions via the website, allowing customers to search for, order, and pay for products online as well as allowing them to contact the company for after-sales service. The most sophisticated sites create efficiencies by integrating the transaction process with back-office systems such as accounting, inventory, sales and others like Amazon.com.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdUyAmLo6-YhXFGG86lrAsLTZLtjNSfod3K7fmFhYk2TC9XGLlfIu8xpRqYgsrYtx9UoFUHav5_hNNkAvU5lP_S0bwuMjOUd4NDnSwxrJlDGVXYAgAi88g3ber5ULxVlyhLldDZh08zSSZ/s1600-h/dell-logo001.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 235px; height: 235px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdUyAmLo6-YhXFGG86lrAsLTZLtjNSfod3K7fmFhYk2TC9XGLlfIu8xpRqYgsrYtx9UoFUHav5_hNNkAvU5lP_S0bwuMjOUd4NDnSwxrJlDGVXYAgAi88g3ber5ULxVlyhLldDZh08zSSZ/s320/dell-logo001.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359340969273829810&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.dell.com.my/&quot;&gt;http://www.dell.com.my/&lt;/a&gt; is one of the local transactional e-commerce sites. Dell was founded in 1984 by Michael Dell on a simple concept, by selling computer systems directly to customers, could best understand their needs and efficiently provide the most effective computing solutions to meet those needs. Dell evolving business strategy combines the revolutionary direct customer model with new distribution channels to reach commercial customers and individual consumers around the world.&lt;br /&gt;&lt;br /&gt;The way people connect and communicate is changing, and changing the world. A truly globalized information technology infrastructure and those who build, run and use it are creating a new era — the Connected Era. Already, IT connects communities, governments and businesses to one another and to a storehouse of information larger than we can imagine. In the Connected Era, these trends will only accelerate. While the future of the Connected Era will be shaped by many forces, Dell believes four inevitable priorities will define the next stage of technology which are regenerating, simplifying, listening and connecting.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaK1OolHtE9E_j4WTBub1gHYp3Tj7Qusln5v5NJvr76xiCa70Xeesod40WGwQskDod12hl18YgufAxNSxyXSQCAtEWaHFIZraIjfdFWM3sPtKBZcIOFGWvXCON5WFjf24i-Et7VlrEy9YS/s1600-h/dell.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 265px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaK1OolHtE9E_j4WTBub1gHYp3Tj7Qusln5v5NJvr76xiCa70Xeesod40WGwQskDod12hl18YgufAxNSxyXSQCAtEWaHFIZraIjfdFWM3sPtKBZcIOFGWvXCON5WFjf24i-Et7VlrEy9YS/s400/dell.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359342738401758546&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;In Dell website, consumer may from the Store &lt;span style=&quot;color: rgb(102, 51, 255);&quot;&gt;welcome page&lt;/span&gt;, start by clicking on the icon for the particular brand and system type which are interested in. If the customer unfamiliar with the product line, can select &quot;Learn More&quot; to connect to online product catalog and get more detailed information about each of the system families listed. Then, proceed as directed.&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyHVvjVl1XDaXIbmsNetMy9V4L3SSx1Hlw17NWFg2_7QPfKQTng_DMD1WTUvQM7foGQWQnX8qGf9GM9OeHuK09_SQRAyesFZpNH6SlJrs4UHp-5MKoiQ7JWLY9ltQhbzgv86z7DlmnrkZx/s1600-h/dell+1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 245px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyHVvjVl1XDaXIbmsNetMy9V4L3SSx1Hlw17NWFg2_7QPfKQTng_DMD1WTUvQM7foGQWQnX8qGf9GM9OeHuK09_SQRAyesFZpNH6SlJrs4UHp-5MKoiQ7JWLY9ltQhbzgv86z7DlmnrkZx/s400/dell+1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359342741554646210&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRYcIrwttqoJVZvauPjOe3c3L8OE-7fALDOsf6gg85Jf6MfajL9uUmTowNT4uNeKt_fKB_mp5_XryaQUtrpwHf_1AOVxxuzChKtiZaRc_v5zDgbUAMpmgYNRCflBvq3G0zV7u6z8wguxgJ/s1600-h/dell2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 162px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRYcIrwttqoJVZvauPjOe3c3L8OE-7fALDOsf6gg85Jf6MfajL9uUmTowNT4uNeKt_fKB_mp5_XryaQUtrpwHf_1AOVxxuzChKtiZaRc_v5zDgbUAMpmgYNRCflBvq3G0zV7u6z8wguxgJ/s400/dell2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359342746798077154&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Dell provides varieties of &lt;span style=&quot;color: rgb(102, 51, 255);&quot;&gt;products and services&lt;/span&gt;. After choosing a system type of interest on the Store welcome page or after selecting &quot;Continue&quot;, on a product page in Dell online catalog, click on one of the systems listed for the brand of interest. Dell also provides &lt;span style=&quot;color: rgb(102, 51, 255);&quot;&gt;comparison features&lt;/span&gt;. Customer can select few models and made comparison based on the price, capacity and so on to help they consider which product most suitable for them.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlqAm_TE0KNKR333Pm_eNx-EM_21DCcsfzXrKKcM6uJoRoZOLAW_jryeSYdDDYuQ6jyONESQlCW4hTVkX0P1SzF-qdLGIxRu2uIIlBVM3iC8V-5GoSNZI7PPnlOasHaybnIgnSV_vG3yGM/s1600-h/dell3.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 321px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlqAm_TE0KNKR333Pm_eNx-EM_21DCcsfzXrKKcM6uJoRoZOLAW_jryeSYdDDYuQ6jyONESQlCW4hTVkX0P1SzF-qdLGIxRu2uIIlBVM3iC8V-5GoSNZI7PPnlOasHaybnIgnSV_vG3yGM/s400/dell3.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359342752030681810&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;After made up your mind, customer lick anywhere on the system&#39;s description to begin &lt;span style=&quot;color: rgb(102, 51, 255);&quot;&gt;customizing own system&lt;/span&gt;. Dell’s systems are sorted by key attributes such as desktop type (e.g., mini-tower, mid-size, low-profile), processor type, and processor speed. Prices for systems, as they have been configured by Dell, are shown to help guide customer selection. But system price can vary greatly from that displayed based on the component selections make when customizing.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU0nKASE8M6za35fmpdgwYWyYJdheJazeyLpXk-4KLcbKiroIX9bpoqkMTFqYRCzJDYr7T87y1klw_6uc2f18_H6paKjXImAchXmGakYS7GPSkPUuUhEcsM8z8XPyFliMnEF1ABsx6LE5D/s1600-h/dell4.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 266px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU0nKASE8M6za35fmpdgwYWyYJdheJazeyLpXk-4KLcbKiroIX9bpoqkMTFqYRCzJDYr7T87y1klw_6uc2f18_H6paKjXImAchXmGakYS7GPSkPUuUhEcsM8z8XPyFliMnEF1ABsx6LE5D/s400/dell4.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359342754274049106&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;After customized, customer can review the order and able to view the full details including total cast and tax. Then customer needs to confirm whether the billing and shipping address are the same. The checkout page consists of 3 steps: delivery information, payment information and order information. Once the customer provide the information requested then can submit order to finalize the purchase.&lt;br /&gt;&lt;br /&gt;Of course, the &lt;span style=&quot;color: rgb(102, 51, 255);&quot;&gt;security and privacy&lt;/span&gt; of order information always are the main issue to the consumer. At Dell, consumer right to privacy and data security is a primary concern. That&#39;s why, when visit to dell.com, they help you maintain control over your personal data on the Internet. Dell only asks for specific types of personal information that will enable to enhance the site, to assist with purchase and technical support issues. It is completely optional for customer to participate. Dell only uses personal information for specific purpose. The information provided will be kept confidential and used to support customer relationship with Dell.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(102, 0, 204);&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://www.export.gov/sellingonline/typesofsites.asp&quot;&gt;http://www.export.gov/sellingonline/typesofsites.asp&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://www1.ap.dell.com/content/topics/global.aspx/about_dell/company/history/history?c=my&amp;amp;l=en&amp;amp;s=corp&quot;&gt;http://www1.ap.dell.com/content/topics/global.aspx/about_dell/company/history/history?c=my&amp;amp;l=en&amp;amp;s=corp&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www1.ap.dell.com/content/topics/global.aspx/about_dell/company/connected_era/connected_era?%7Eck=ln&amp;amp;c=my&amp;amp;l=en&amp;amp;lnki=0&amp;amp;s=corp&quot;&gt;http://www1.ap.dell.com/content/topics/global.aspx/about_dell/company/connected_era/connected_era?~ck=ln&amp;amp;c=my&amp;amp;l=en&amp;amp;lnki=0&amp;amp;s=corp&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://www1.ap.dell.com/content/topics/topic.aspx/ap/topics/storeinfo/en/howtobuy?c=in&amp;amp;l=en&amp;amp;cs=inbsd1&quot;&gt;http://www1.ap.dell.com/content/topics/topic.aspx/ap/topics/storeinfo/en/howtobuy?c=in&amp;amp;l=en&amp;amp;cs=inbsd1&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/8464301680568527427/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/review-local-transactional-e-commerce.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/8464301680568527427'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/8464301680568527427'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/review-local-transactional-e-commerce.html' title='Review a local, transactional e-commerce site'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdUyAmLo6-YhXFGG86lrAsLTZLtjNSfod3K7fmFhYk2TC9XGLlfIu8xpRqYgsrYtx9UoFUHav5_hNNkAvU5lP_S0bwuMjOUd4NDnSwxrJlDGVXYAgAi88g3ber5ULxVlyhLldDZh08zSSZ/s72-c/dell-logo001.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-2838512276116674051</id><published>2009-07-04T19:33:00.022+08:00</published><updated>2009-07-17T13:40:17.116+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Pre-paid cash card"/><title type='text'>The application of pre-paid cash card for consumers</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5mvSq1qEJx6FXMCpZLIhB9L0ERkV01mItYyJAtcsARNAJ3eQEOl0i5xjd-i6Ljug9Q8eZbyhqyeF4TwqDe4M0i63osEyn1sEXwSzeucJnZvQTgDmQGnVHi6nmg9RAOjnEmHznCuDSY0jI/s1600-h/prepaid_cash_card.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355643769956884146&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 199px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5mvSq1qEJx6FXMCpZLIhB9L0ERkV01mItYyJAtcsARNAJ3eQEOl0i5xjd-i6Ljug9Q8eZbyhqyeF4TwqDe4M0i63osEyn1sEXwSzeucJnZvQTgDmQGnVHi6nmg9RAOjnEmHznCuDSY0jI/s400/prepaid_cash_card.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Prepaid cash cards look like credit and debit cards and they offer the same ability to purchase products and services but with a crucial difference – people can only spend the balance that has been preloaded onto the card. This means there is no risk of running into debt as it has no credit or overdraft facility.&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;Customers will be give a Pin number when their purchase a card, and once money has been credited, it can be used in the same way as a debit or credit card – for high street, online or telephone purchases, as well as cash withdrawals from ATMs.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Money can be loaded onto a prepaid cash card by cash at a bank, Post Office, at Payzone or PayPoint terminals or via a bank transfer. However, not all prepaid providers offer all of these loading options, so customers need to bear this in mind when comparing deals as some are more flexible than others.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;The application of pre-paid cash card for consumers are stated below:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;(i) Buying petrol and groceries at petrol station&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwCxmJ38hNr-Si-YIQAveEgJHlwtFaUssoV5xcJ0an_v9vRilckT7-DgjIqwyLJokTGo7JiDbRapen_8J5iZjuWOgPuCRnxmRp7k_jI2GX-t531gX5tCedPUoa7olh_v6SuVVQhElmcrzt/s1600-h/petrol_station.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355640400300383906&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 126px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwCxmJ38hNr-Si-YIQAveEgJHlwtFaUssoV5xcJ0an_v9vRilckT7-DgjIqwyLJokTGo7JiDbRapen_8J5iZjuWOgPuCRnxmRp7k_jI2GX-t531gX5tCedPUoa7olh_v6SuVVQhElmcrzt/s400/petrol_station.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;(ii) Pay bills&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx54OjjsVs3qcNGUe3IbwqoHKcP6LPTXWOdsVU1ZdesucVL230nJdYAkghfmu4FW91qaTKixMt8ioyjclsARjNv9VRSDnJFVGsdNFymFY1kmHxpmWBegBYtJ7DW6RoqPXIBmZe7diathWu/s1600-h/pay_bills.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355640881146714498&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 133px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx54OjjsVs3qcNGUe3IbwqoHKcP6LPTXWOdsVU1ZdesucVL230nJdYAkghfmu4FW91qaTKixMt8ioyjclsARjNv9VRSDnJFVGsdNFymFY1kmHxpmWBegBYtJ7DW6RoqPXIBmZe7diathWu/s400/pay_bills.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;(iii) For people who wish to use foreign currency on a holidays.&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaS2WJiyl1E0SZnVDGq-mQz9R9UNzVRc_QJ34gZNYF1XzPA2ei7yMpuBDPrJA6fmqRRyDy-gPjJzX_86enW8Sp8Yjf6BADk3LAn6Q58XwLuOe4ttQtT30u5eIiIxbg7MBXU2d-dtRhRe6Q/s1600-h/foreign_currency.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355641086547927634&quot; style=&quot;WIDTH: 199px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaS2WJiyl1E0SZnVDGq-mQz9R9UNzVRc_QJ34gZNYF1XzPA2ei7yMpuBDPrJA6fmqRRyDy-gPjJzX_86enW8Sp8Yjf6BADk3LAn6Q58XwLuOe4ttQtT30u5eIiIxbg7MBXU2d-dtRhRe6Q/s400/foreign_currency.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;(iv) Withdrawn money from ATMs&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuc67HMWtk15AEvZrBVwsixGvW7wgCbQSmjOUq5Kpv-P4abv9uIQ8ZJzOQ2t-KUs0tc3aRNFjNcCoXiSYhveQgmqkIV5IVulY7010pi-My9JfujVXvnqENvmIJVNBWNgdgKk8xokrULQi7/s1600-h/atm.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355641266233277794&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 134px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuc67HMWtk15AEvZrBVwsixGvW7wgCbQSmjOUq5Kpv-P4abv9uIQ8ZJzOQ2t-KUs0tc3aRNFjNcCoXiSYhveQgmqkIV5IVulY7010pi-My9JfujVXvnqENvmIJVNBWNgdgKk8xokrULQi7/s400/atm.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;(v) Internet shopping&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqA3bP9NDflRHFD-SW1xQO9YP7qIURmJQO8VckE2BpVWBMTtGO5uc1UebpFRbWLkQuUSF-OB09mR2toh81DTl4KUqZvw5fBt0E9Rk7zYgHU_a8mbU5v2xkwc0HzMsBSHBl3KbufWD32v9I/s1600-h/internet_shopping.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355642521862206322&quot; style=&quot;WIDTH: 317px; CURSOR: hand; HEIGHT: 229px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqA3bP9NDflRHFD-SW1xQO9YP7qIURmJQO8VckE2BpVWBMTtGO5uc1UebpFRbWLkQuUSF-OB09mR2toh81DTl4KUqZvw5fBt0E9Rk7zYgHU_a8mbU5v2xkwc0HzMsBSHBl3KbufWD32v9I/s400/internet_shopping.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;(vi) For people who have a poor credit rating or a history of bad debt, it is difficult for them to get a credit card. So, it is another choice for them to apply prepaid cash card.&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCtyIJItNTT5BlHBrAZZDQm2hXf2WTh49ucKiu9qJMe3HJM2oaYbBLP_bNx6AdP0cUuCMrEGkhdEcNS2I-s36Avc-a3HY6r_JW5jTBgX9hiTJWTh-N-dl-0vk7CKTovS3Cgdj7PS80NHmx/s1600-h/poor_credit.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355642698473634930&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCtyIJItNTT5BlHBrAZZDQm2hXf2WTh49ucKiu9qJMe3HJM2oaYbBLP_bNx6AdP0cUuCMrEGkhdEcNS2I-s36Avc-a3HY6r_JW5jTBgX9hiTJWTh-N-dl-0vk7CKTovS3Cgdj7PS80NHmx/s400/poor_credit.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;(vii) Top up mobile phone&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNip8SqPUppO6hOKwOXbpb0_K-1EAcN1qmCrO5q4kt9Wtg01Mtc-3yeJgNuy7s2fukT9TmJRjx_Zb4ckbnZ13nkCl8t_ecDVaYbWEOhLkhT3Bs8sUbjNS4vZosVB8Eg0qdxjByvgsqXHRd/s1600-h/iphone_hardware3_20081215.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355643232721899138&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 248px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNip8SqPUppO6hOKwOXbpb0_K-1EAcN1qmCrO5q4kt9Wtg01Mtc-3yeJgNuy7s2fukT9TmJRjx_Zb4ckbnZ13nkCl8t_ecDVaYbWEOhLkhT3Bs8sUbjNS4vZosVB8Eg0qdxjByvgsqXHRd/s320/iphone_hardware3_20081215.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;The advantages of using prepaid cash card:&lt;/span&gt;&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvf0DRX1YcGNlZp8cUZzarNP22sGqjMhs8zU0EsiuExmULAZRTNWIYkA2bCl1b6lQSf41_LNfZ62s8YJukKZOiKnZdvthc34utwOoCyxhkjvzNUlKh9fal1mtlpnM1-4lEgHvhUISO8wm_/s1600-h/282124-1081-13.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355643552720674530&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 133px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvf0DRX1YcGNlZp8cUZzarNP22sGqjMhs8zU0EsiuExmULAZRTNWIYkA2bCl1b6lQSf41_LNfZ62s8YJukKZOiKnZdvthc34utwOoCyxhkjvzNUlKh9fal1mtlpnM1-4lEgHvhUISO8wm_/s400/282124-1081-13.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;span style=&quot;color:#333399;&quot;&gt;(a) Easy to Get, Easy to Use&lt;/span&gt;&lt;br /&gt;&lt;div&gt;There is no credit check and no bank account required. When you carry a prepaid card, you can leave your cash at home and enjoy some of the benefits of a bank account without actually having one.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#333399;&quot;&gt;(b) Easy to pay bills and manage expenses&lt;/span&gt;&lt;/div&gt;&lt;div&gt;No more waiting in line for money orders. Use your card to pay bills and manage your expenses easily with your statement and online financial tools.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#333399;&quot;&gt;(c) Availability&lt;/span&gt;&lt;/div&gt;&lt;div&gt;There are no credits checks, which mean you can get a card without worrying about your credit history. All prepaid card providers will carry out an identity check to confirm you are who you say you are.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#333399;&quot;&gt;(d) Control&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Prepaid cash cards are an ideal way to budget for yourself or help to manage your children’s spending. Like a credit card you get a full breakdown of spending on the card so you can see what has been purchased, who from and when.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#333399;&quot;&gt;(e) No debt risk&lt;/span&gt;&lt;/div&gt;&lt;div&gt;With a prepaid cash card there is no chance of spending too much as you are limited to the amount you put on your card.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#000099;&quot;&gt;(f) The card for travel&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Prepaid cash cards are a good option if customers are going overseas. They are popular with students heading off on gap years and children who go abroad on school trips as parents can load them up.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;em&gt;In conclusion, with a prepaid cash card, it makes our life easier.&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;color:#993399;&quot;&gt;&lt;strong&gt;Related links:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;1. &lt;a href=&quot;http://www.moneysupermarket.com/c/prepaid-cards/guide/1/&quot;&gt;http://www.moneysupermarket.com/c/prepaid-cards/guide/1/&lt;/a&gt;&lt;/div&gt;&lt;div&gt;2. &lt;a href=&quot;http://www.mastercard.com/us/personal/en/aboutourcards/prepaid/index.html&quot;&gt;http://www.mastercard.com/us/personal/en/aboutourcards/prepaid/index.html&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhetXx8nbvhOtDwehwAdoPuzdEdGJVFK7EjiVOgCiCmOqARNo40yCdkjJMuaKvtoAF-R9hOQjgojEw81Uz4J2YQk4mBuJJ1eBJA0PCreLb5Ga36fYd_wj2ZvpONQGLQmhByJbWmINJzioQq/s1600-h/prepaid+cash+card.jpg&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/2838512276116674051/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/application-of-pre-paid-cash-card-for.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/2838512276116674051'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/2838512276116674051'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/application-of-pre-paid-cash-card-for.html' title='The application of pre-paid cash card for consumers'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5mvSq1qEJx6FXMCpZLIhB9L0ERkV01mItYyJAtcsARNAJ3eQEOl0i5xjd-i6Ljug9Q8eZbyhqyeF4TwqDe4M0i63osEyn1sEXwSzeucJnZvQTgDmQGnVHi6nmg9RAOjnEmHznCuDSY0jI/s72-c/prepaid_cash_card.jpg" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-5977916139746457548</id><published>2009-07-03T12:22:00.002+08:00</published><updated>2009-07-17T16:09:43.139+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Causes of credit card debts"/><category scheme="http://www.blogger.com/atom/ns#" term="Credit card debts"/><category scheme="http://www.blogger.com/atom/ns#" term="Prevention of credit card debts"/><title type='text'>Credit Card debts: Causes and Prevention</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYBGWkhQkPOdSgDEzuEw-0Ne_QKcO5tpCuB_x8qc3irJOCTvZpJkxc43QNPzi7bgvJUYdkJ3TaSgzFk3tXgWiIVsTpCPehyphenhyphen3kE1V03RSw6Lsz2N1XzWtc7fFLeBXlcohsWoZmU9rsfoi_4/s1600-h/credit_card_debt2009-03-10-1236707997.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 296px; height: 223px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYBGWkhQkPOdSgDEzuEw-0Ne_QKcO5tpCuB_x8qc3irJOCTvZpJkxc43QNPzi7bgvJUYdkJ3TaSgzFk3tXgWiIVsTpCPehyphenhyphen3kE1V03RSw6Lsz2N1XzWtc7fFLeBXlcohsWoZmU9rsfoi_4/s320/credit_card_debt2009-03-10-1236707997.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359336922085331186&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;A &lt;strong style=&quot;color: rgb(0, 0, 102);&quot;&gt;credit card&lt;/strong&gt; is part of a system of payments named after the small plastic card issued to users of the system. It is a card entitling its holder to buy goods and services based on the holder&#39;s promise to pay for these goods and services. The issuer of the card grants a line of credit to the consumer (or the user) from which the user can borrow money for payment to a merchant or as a cash advance to the user.&lt;br /&gt;&lt;br /&gt;Most of the time holding credit card is equal to holding debts. &lt;strong style=&quot;color: rgb(0, 0, 102);&quot;&gt;Credit debt&lt;/strong&gt; results when a client of a credit card company purchases an item or service through the card system. Debt accumulates and increases via interest and penalties when the consumer does not pay the company for the money he or she has spent.&lt;br /&gt;&lt;br /&gt;Is RM24.4 billion big money? This is the amount of credit card debt owed by Malaysians, according to Bank Negara Malaysia’s statistics as at end of March 2009. Speaking of credit debt reasons, we can pick out a host of various factors that may have a dramatic impact on financial situation.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8WgmQjzxAH_LXmJmVgP3kW8M9GRVjfGT1u5SwiVYkqfvLjdb3WNV9izN28pvmrxMmFz-Muk_-7Gdmn-LWlBvednbBLnm8DO1d48cGU4yvYWZVlGrs4vNFE_jMYl7-REw5RrlvPgsEZpiA/s1600-h/credit+debt+1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 330px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8WgmQjzxAH_LXmJmVgP3kW8M9GRVjfGT1u5SwiVYkqfvLjdb3WNV9izN28pvmrxMmFz-Muk_-7Gdmn-LWlBvednbBLnm8DO1d48cGU4yvYWZVlGrs4vNFE_jMYl7-REw5RrlvPgsEZpiA/s400/credit+debt+1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359333373832840050&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong style=&quot;color: rgb(51, 0, 153);&quot;&gt;&lt;/strong&gt;&lt;span style=&quot;font-weight: bold; color: rgb(51, 0, 153);&quot;&gt;Causes of debt ~&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;span style=&quot;font-weight: bold; color: rgb(51, 51, 153);&quot;&gt;1. Poor Money Management&lt;/span&gt;&lt;br /&gt;Poor money management is one of the best reasons why so many people accumulate lots of debt. Not having a monthly spending plan and not keeping track of monthly bills makes you unaware of where your money is going. People might be spending hundreds of dollars every month toward items that are useless and have no value in life, yet do not realize it. While money is going towards purchasing useless items, you might also be charging your necessary purchases on your credit card, forcing you to pay interest on these purchases every month.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 204, 255);&quot;&gt;&lt;strong style=&quot;color: rgb(51, 51, 153);&quot;&gt;2. Less Income, More Expenses&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;People prefer to pay with credit card because it is convenient and can be used regardless whether there is any money in your account. It so happens that the main breadwinner of the household loses the job but monthly expenses are not cut down in line with the reduction in income. People always hold more than one credit card, so they will use one card to cover the debts of the other cards. This obviously leads to higher interest rates and a rise in debt.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(51, 204, 255);&quot;&gt;&lt;span style=&quot;color: rgb(51, 51, 153);&quot;&gt;3. Savings little or not at all&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;Savings is the most simple and important way to avoid debt. We can pay with credit card for many things and it is crucial for us to pay off the balance each month. Sometimes we might have some unexpected expenses, if without some savings or during the layoff time we are not able to pay back the credit card bill and end up with a rise in debt.&lt;br /&gt;&lt;br /&gt;&lt;strong style=&quot;color: rgb(51, 51, 153);&quot;&gt;&lt;/strong&gt;&lt;span style=&quot;font-weight: bold; color: rgb(51, 51, 153);&quot;&gt;4. Social Pressure&lt;/span&gt;&lt;br /&gt;Social pressure one of the most common reasons people sight for getting into debt, it is the need to feel like they are keeping up with everyone else. In other words, it leads many people to unnecessarily spend money on things that they don’t really need so they can feel like they fit in. It is an age old cycle with devastating consequences.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;span style=&quot;font-weight: bold; color: rgb(51, 51, 153);&quot;&gt;5. High Interest Rates&lt;/span&gt;&lt;br /&gt;Everyone can use the credit card but not everyone able to pay off the balance. Carrying a balance, though, is very costly. Interest rates can be as high as 21% and by paying the minimum payment per month (usually about 2% of the balance) credit card companies are quite happy to loan money for your purchases. If you unable to pay off, debt plus interest plus compounded interest it will cause accumulation of debts.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEBuyrBYPoDz5VOlO_pYkRUUeZ9wJB5LjmJSUqw_LpsHV12PbEcapXCaSZEW_kkNkywDEeyqcE-z2M8x1n9tjf6HmoxAL-0I9BC8Ivt0yedyusfsjioA8EEqE2kQlOjZ6DhFtaVH5-PD4C/s1600-h/debt-credit-card.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 261px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEBuyrBYPoDz5VOlO_pYkRUUeZ9wJB5LjmJSUqw_LpsHV12PbEcapXCaSZEW_kkNkywDEeyqcE-z2M8x1n9tjf6HmoxAL-0I9BC8Ivt0yedyusfsjioA8EEqE2kQlOjZ6DhFtaVH5-PD4C/s400/debt-credit-card.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359333374182119602&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;span style=&quot;color: rgb(51, 0, 153); font-weight: bold;&quot;&gt;Prevention ~&lt;/span&gt;&lt;br /&gt;The key to good health begins with a dose of prevention. Financial health is no different. By taking a few steps of prevention today, tomorrow your finances will have a clean bill of health freeing you to live a life of opportunity rather than of difficulty.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(153, 51, 153);&quot;&gt;1. Manage your finances&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;First step is &lt;strong&gt;determining your monthly income and needed expenses&lt;/strong&gt;. As part of these monthly expenses, figure in a portion of the income to set aside for emergencies, long range savings. If you have some savings then you &lt;strong&gt;avoid having to put large amounts of debt on a credit card&lt;/strong&gt; in times of a crisis. Next, you have to stick to your budget and it is often more difficult task. In order to help you keep on track of the budgets, you may put motivators in place. But just keep in mind that whatever you choose as a reward, it shouldn’t compromise the hard work you’ve done in managing your finances.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 51, 153);&quot;&gt;&lt;strong&gt;2. Pay the balance in full and pay on time&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Pay the balance in full&lt;/strong&gt; is important in keeping control of your credit cards. Before using a credit card for a purchase, often ask yourself whether have fund to pay for this. In cases of emergencies where your emergency fund won’t cover the whole amount you need to charge, at least pay more than the required minimum payment. &lt;strong&gt;Never make a late&lt;/strong&gt; is also a very important concept. Because of the universal default clause in credit cards’ terms and conditions, credit card companies can raise your interest rate if you are late paying any creditor or even your utility company.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 51, 153);&quot;&gt;&lt;strong&gt;3. Know the interest rate&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;Regardless if you pay the balance in full each month, you need to &lt;strong&gt;know the interest rate&lt;/strong&gt;. This means not only knowing what interest rate you were offered, but also the interest rate the issuer actually gives you on approval. In addition, check the rate on your monthly statements because credit card issuers can raise your rates for little or no apparent reason and with little warning.&lt;br /&gt;&lt;br /&gt;Even those who don’t carry a balance need to know their interest rate because &lt;strong&gt;emergencies do happen&lt;/strong&gt;. While it’s always a good idea to have an emergency fund, sometimes the job search takes longer than expected leaving you with no other choice but to put some expenses on the card. If you’re not up to date on your interest rate, you might end up paying more in interest than you have to.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(51, 153, 153);&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(153, 51, 153);&quot;&gt;4. Keep the right perspectives&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;Now today, nearly&lt;span style=&quot;color: rgb(51, 51, 51);&quot;&gt; &lt;/span&gt;&lt;strong style=&quot;color: rgb(0, 0, 0);&quot;&gt;everyone has access to a credit card&lt;/strong&gt;. Much of the problem with credit card debt problems comes from changes in credit card availability, advertising, and values. There is a shift from saving for the future to a society of trying to keep up with&lt;strong&gt; satisfying the desire of the moment&lt;/strong&gt;. Add the purchasing power that comes with a credit card and you have the perfect formula for disaster. There’s one thing that consumers have to know, it’s that &lt;strong&gt;you don’t have to be a slave to the credit card company&lt;/strong&gt; or even to the seduction to be a slave to the credit card company or even to the seduction of advertising. You can have control over your financial health without depending on a credit card.&lt;br /&gt;&lt;br /&gt;Other than that, credit card holders also can cut up cards so that not tempted to use them and just save one card for emergencies. Do not overspend. Yielding to the sale offers for something that you don&#39;t really need, is a big mistake that leads to overspending. Prevention is always better than cure. If we use credit card appropriately, we can enjoy the benefit of the cards and at the same time free ourselves from the problem of credit card debts.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(102, 0, 204);&quot;&gt;&lt;strong&gt;Related Links:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;1. &lt;a href=&quot;http://www.3debtconsolidation.com/top10-causes.html&quot;&gt;http://www.3debtconsolidation.com/top10-causes.html&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://en.wikipedia.org/wiki/Credit_card_debt&quot;&gt;http://en.wikipedia.org/wiki/Credit_card_debt&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.credit-land.com/articles/articles_page_68600_1881780_120.php&quot;&gt;http://www.credit-land.com/articles/articles_page_68600_1881780_120.php&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://www.nurido.at/news/social-pressure-a-cause-of-credit-card-debt-124653.html&quot;&gt;http://www.nurido.at/news/social-pressure-a-cause-of-credit-card-debt-124653.html&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://www.cardratings.com/howtoavoidcreditcarddebt.html&quot;&gt;http://www.cardratings.com/howtoavoidcreditcarddebt.html&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/5977916139746457548/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/credit-card-debts-causes-and-prevention.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/5977916139746457548'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/5977916139746457548'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/credit-card-debts-causes-and-prevention.html' title='Credit Card debts: Causes and Prevention'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYBGWkhQkPOdSgDEzuEw-0Ne_QKcO5tpCuB_x8qc3irJOCTvZpJkxc43QNPzi7bgvJUYdkJ3TaSgzFk3tXgWiIVsTpCPehyphenhyphen3kE1V03RSw6Lsz2N1XzWtc7fFLeBXlcohsWoZmU9rsfoi_4/s72-c/credit_card_debt2009-03-10-1236707997.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-4918427421462212197</id><published>2009-07-02T21:25:00.000+08:00</published><updated>2009-07-17T12:40:28.432+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="E-currency"/><category scheme="http://www.blogger.com/atom/ns#" term="E-gold"/><category scheme="http://www.blogger.com/atom/ns#" term="E-money"/><category scheme="http://www.blogger.com/atom/ns#" term="MEPS cash"/><category scheme="http://www.blogger.com/atom/ns#" term="PayPal"/><category scheme="http://www.blogger.com/atom/ns#" term="Touch N Go"/><title type='text'>Electronic currency</title><content type='html'>Over the years, money as we know it has been undergoing transformation. The shape and form of money has changed from precious metals to metal coins and paper money with no intrinsic value and today it presents us with a formless form in the name of digital or e-currency. E-currency refers to money or scrip which is exchanged only electronically. The digitization of money appears to be inevitable in the light of the recent developments with regards to the Internet and the various e-commerce opportunities presented by the World Wide Web. &lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;There are several benefits of using e-currency:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;em&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;Using Online&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div&gt;1. The e-currency can be used on the internet related commercial applications such as shopping on the internet and doing personal investment via internet.&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV0LzVysL8cMoLTsbrVYWhTlWqAN6VJQ7DUwZSfz0dq53P7nNb2qd_JnfHSi_m8DxVD1Gnd2GAO2Bm9kQllOyvzoKOlhbVA5J7GrLEZVrp4Iu-097iW3ecKcXnSuMWhh4bJptyeqK52chw/s1600-h/260_shopping2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356022897647636450&quot; style=&quot;WIDTH: 260px; CURSOR: hand; HEIGHT: 280px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV0LzVysL8cMoLTsbrVYWhTlWqAN6VJQ7DUwZSfz0dq53P7nNb2qd_JnfHSi_m8DxVD1Gnd2GAO2Bm9kQllOyvzoKOlhbVA5J7GrLEZVrp4Iu-097iW3ecKcXnSuMWhh4bJptyeqK52chw/s320/260_shopping2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNw9lGboyeviItZUFQMFpD16xUj_1-AP4S_Sq22C0gSSg_HD6E-AsIzzyFBpUO1ZxPMILEmL0un4pHlE_8FK_w92jiQ15N_2l4UYh2ZTPskf-X579y8aXX4AZC3AeUw5OQmQatKDq0STw-/s1600-h/investment2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356023097767990530&quot; style=&quot;WIDTH: 295px; CURSOR: hand; HEIGHT: 279px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNw9lGboyeviItZUFQMFpD16xUj_1-AP4S_Sq22C0gSSg_HD6E-AsIzzyFBpUO1ZxPMILEmL0un4pHlE_8FK_w92jiQ15N_2l4UYh2ZTPskf-X579y8aXX4AZC3AeUw5OQmQatKDq0STw-/s320/investment2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;2. The using of the e- currency services for example &lt;a href=&quot;http://www.e-gold.com/&quot;&gt;e-gold&lt;/a&gt; and &lt;a href=&quot;http://www.paypal.com/&quot;&gt;PayPal&lt;/a&gt; brings people a new way not to use their credit card as the only payment method on the internet since sometime there exists a big risk to provide your credit card information to the merchant you do not know them very well and most of them are far away in the other side of the earth.&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg92FGJPKFp-11xtQjMT7AV2Nmy6t3aNF7gLclraOCuEXYvXKrQMj05KkaEZJ1ZEKynP24Djj_ankuRtadb4Y8ULM3Efo_kO3chVbYgF4jfChmCNU5By9IV2B15n_oCX1En38HzUx5O0igS/s1600-h/untitled.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356022690177462242&quot; style=&quot;WIDTH: 305px; CURSOR: hand; HEIGHT: 269px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg92FGJPKFp-11xtQjMT7AV2Nmy6t3aNF7gLclraOCuEXYvXKrQMj05KkaEZJ1ZEKynP24Djj_ankuRtadb4Y8ULM3Efo_kO3chVbYgF4jfChmCNU5By9IV2B15n_oCX1En38HzUx5O0igS/s320/untitled.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;3. The e-currency service companies such as &lt;a href=&quot;http://www.blogger.com/http:/www.e-gold.com/&quot;&gt;e-gold&lt;/a&gt; and &lt;a href=&quot;http://www.paypal.com/&quot;&gt;PayPal&lt;/a&gt; can provide both the buyers and merchant the convenient way to send and receive the payment just by clicking the confirm button and the deal is done. None of the payment methods in the world right now can provide this kind of efficiency capability.&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7okTywi9VUsVYzZATNWZJh64sZU89Hx1KEvMlyuUWPs0_-ZsmsKOZYohEajOvTYW9LsAqf225bidBqPeqcMkaQVocoD3lfVN6XRT_26YIPLZO07z5S0iUAh1g7ZYGICsZl_TeLzNPxDUJ/s1600-h/logo.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356022099437109890&quot; style=&quot;WIDTH: 105px; CURSOR: hand; HEIGHT: 54px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7okTywi9VUsVYzZATNWZJh64sZU89Hx1KEvMlyuUWPs0_-ZsmsKOZYohEajOvTYW9LsAqf225bidBqPeqcMkaQVocoD3lfVN6XRT_26YIPLZO07z5S0iUAh1g7ZYGICsZl_TeLzNPxDUJ/s400/logo.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-TqAAQyBs4bn9ZMvWO73WymRZ3zz90PaSn4dNbQDQ6D0TE_1L5VYvJaFki2ycUh2hzu9vNTOg0O2P9PaBi7DVUVhB-9Huf2iCdqXgnk1O2OoEH5OuVinM8e_EA-XTo5DvAhBkg0cIhdIt/s1600-h/600px-PayPal_logo_svg.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356022366391013266&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 54px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-TqAAQyBs4bn9ZMvWO73WymRZ3zz90PaSn4dNbQDQ6D0TE_1L5VYvJaFki2ycUh2hzu9vNTOg0O2P9PaBi7DVUVhB-9Huf2iCdqXgnk1O2OoEH5OuVinM8e_EA-XTo5DvAhBkg0cIhdIt/s200/600px-PayPal_logo_svg.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;em&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;Using Offline&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div&gt;1. The user is anonymous unless he commits a double expenditure.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;2. The bank can effectively detect a double spender.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;3. The bank doesn&#39;t need to synchronize its servers very often. This is mostly done via batch updates.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;There are several disadvantages of using e-currency:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;em&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;Using Online&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div&gt;1. Security and anonymity cost become a bottleneck of the system. This can happen at times during real-time verifications.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;2. The bank will have to maintain a detailed and confidential database.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;3. The bank needs to synchronize its server every time transaction is made. It would be insanely impractical to maintain.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;em&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;Using Offline&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div&gt;1. Double spending may not be prevented effectively and immediately.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;2. The implementation expenditure is high. The required additional hardware is quite costly to install.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#000066;&quot;&gt;Types of e-currency&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;There are two major types of e-currency in the world. The major different is their backed base.&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQixt4-lEA-rflwTt4pkxrI3y291XOddMY2TzL5RyUsTj-pRBgb7g6KYtbyuj733_2UfaGg-eo-HMrhe5aGEd-FMHzzqNIHRol0nRpcBtALW7qPOtT-6L-B_eXbpdlwbgECgQEl8ayzlgv/s1600-h/gold-bars-636.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356021863973012578&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 150px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQixt4-lEA-rflwTt4pkxrI3y291XOddMY2TzL5RyUsTj-pRBgb7g6KYtbyuj733_2UfaGg-eo-HMrhe5aGEd-FMHzzqNIHRol0nRpcBtALW7qPOtT-6L-B_eXbpdlwbgECgQEl8ayzlgv/s200/gold-bars-636.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;One is backed by precious metal such as e-gold is backed by gold.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2_32gQkLtdonkk2JZmd9oVP1OiLI-9L43RqnLB6Ufnwbz-HyQNWsEjIHu3sm2HG4cQnIAbs5V7ibreD6UuxpeB9qF0_WPoWQKWM6iVxBJF9k5HMT0yXUN1nELbGzkRgb937ubArQakEb/s1600-h/currency_transfers.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356021686889303714&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 133px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2_32gQkLtdonkk2JZmd9oVP1OiLI-9L43RqnLB6Ufnwbz-HyQNWsEjIHu3sm2HG4cQnIAbs5V7ibreD6UuxpeB9qF0_WPoWQKWM6iVxBJF9k5HMT0yXUN1nELbGzkRgb937ubArQakEb/s200/currency_transfers.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Another type of e-currency is backed by hard currency like Paypal.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;Both of them are all called e-currency. Digital Gold Currencies (DGCs) are a form of Internet money denominated in gold weight. The typical unit of account for such currencies is the gold gram or the troy ounce, although other units such as the gold dinar are sometimes used. Due to its rarity and durability, gold has long been used as a means of payment. The exact nature of the evolution of money varies significantly across time and place, though it is believed by historians that gold&#39;s high value for its utility, density, resistance to corrosion, uniformity and easy divisibility made it useful both as a store of value and as a unit of account for stored value of other kinds.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;In several countries there is electronic currency equal to real paper money. This kind of currency is very easy in use and it does not need any bills, checks or other bank documents. The main advantage of such money, comparing with its real equivalent, is very low costs of transactions, especially inner (from one account to another). These low costs allow using e-currency for small transactions where usual cashless funds are not comfortable. This plus during time becomes more and more important.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;One rare success has been Hong Kong&#39;s Octopus card system, which started as a transit payment system and has grown into a widely used electronic cash system. Singapore also has an electronic money implementation for its public transportation system (commuter trains, bus, etc), which is very similar to Hong Kong&#39;s Octopus card and based on the same type of card (FeliCa). There is also one implementation in the Netherlands, known as Chipknip.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQhVhFFqHbJyg9-W_nP0Hk-7OOPAdEqrFDE6SYq6g1GSc3QDlCheEqP0WB_FL01xJuqwTP4Muy97svKcgnkXHNQGBActz4iq0MBNtpLbi8yvH3fYZHzNmM-n5u0DwB96lQXpgz7oih3eZn/s1600-h/AdultOctopusCard.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356021416126653794&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 202px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQhVhFFqHbJyg9-W_nP0Hk-7OOPAdEqrFDE6SYq6g1GSc3QDlCheEqP0WB_FL01xJuqwTP4Muy97svKcgnkXHNQGBActz4iq0MBNtpLbi8yvH3fYZHzNmM-n5u0DwB96lQXpgz7oih3eZn/s320/AdultOctopusCard.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;The Octopus card is a rechargeable contactless stored value smart card used to transfer electronic payments in online or offline systems in Hong Kong. The Octopus card is also used for payment at convenience stores, supermarkets, fast-food restaurants, on-street parking meters, car parks, and other point-of-sale applications such as service stations and vending machines.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbahRDTiF_kW5fgG43FjeC1g56Q8mWsGgPQ_9xAYnWMvlapWQDepdgWYXD8a4EX2ZeZO5UGltoz4JGh6MUn6Dmh7mmkwwQPZpD-f2z8FUITMZQrHBrGgJeu0BIbwPIte3dZsqzsmXQiQB4/s1600-h/octopus.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356021254941190610&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 240px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbahRDTiF_kW5fgG43FjeC1g56Q8mWsGgPQ_9xAYnWMvlapWQDepdgWYXD8a4EX2ZeZO5UGltoz4JGh6MUn6Dmh7mmkwwQPZpD-f2z8FUITMZQrHBrGgJeu0BIbwPIte3dZsqzsmXQiQB4/s320/octopus.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Making or recording a payment using the card for public transport or purchases at Octopus-enabled retailers can be done by holding the card against or waving it over an Octopus card reader from up to a few centimetres away without the user taking out the card. The reader will acknowledge payment by emitting a beep sound, and display the amount deducted and the remaining balance of the card.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRheFHBcscuUNqdVBuQpPLI3JXVWsCGxnBQPfltUF2_v1tKjiqNwpbuzexP33h5C8XM1SQxKkhLczV0_AxHbkKF5y3FWHYCBH0Ub6LknnCZZCW5D86KtPMkyMoWLgDVck86QRYKjGj1Yz-/s1600-h/mepscashLogo.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356021106381257570&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 88px; CURSOR: hand; HEIGHT: 69px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRheFHBcscuUNqdVBuQpPLI3JXVWsCGxnBQPfltUF2_v1tKjiqNwpbuzexP33h5C8XM1SQxKkhLczV0_AxHbkKF5y3FWHYCBH0Ub6LknnCZZCW5D86KtPMkyMoWLgDVck86QRYKjGj1Yz-/s400/mepscashLogo.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;In Malaysia, the first attempt at e-currency implementation was in 1999 with the introduction of MEPS cash in the Klang Valley. The initial response was not encouraging at all. The facilities to reload the cards with cash was limited, the outlets where MEPS cash was accepted was also few in numbers. However, the situation is quite different today where almost every ATM machine in the country is equipped with the ability to reload MEPS cash.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNrUbUkjLViEGCoISE5i8qkUCj-GhNmDrojqeQPd95DthPUI1tfQRhaD8-Hp-_0vDSkbThI_KVJ01n2Er52oUVB9WMwVkCF89yjPih3Wrr0zdkvZ9-tNVrmWp7YuEhCiTRll95NEOq_OGi/s1600-h/TNGcards.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5356020839974260450&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 205px; CURSOR: hand; HEIGHT: 148px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNrUbUkjLViEGCoISE5i8qkUCj-GhNmDrojqeQPd95DthPUI1tfQRhaD8-Hp-_0vDSkbThI_KVJ01n2Er52oUVB9WMwVkCF89yjPih3Wrr0zdkvZ9-tNVrmWp7YuEhCiTRll95NEOq_OGi/s320/TNGcards.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Another effort in implementing electronic money in Malaysia came in the form of the Touch and Go cards offered by Rangkaian Segar which is a private company. Touch ‘n Go cards were originally intended for toll payments along the Malaysian highways. The cards may either be linked to ones credit or bank card with automatic reload facilities to a stipulated maximum level once the amount on the cards fall to a predetermined minimum level. The cards may also be reloaded at some of the toll booths or at some banks ATM terminals. Despite the availability of these cards, it is not surprising to find long queues during peak hours along the cash booths along the local highways. Nevertheless, it is interesting to note that today the Touch ‘n Go cards are also used for other payments such as parking bays and train and bus fares.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;As the allegro expansion of internet economical applications, the using of e-currency will be the trend in the coming future just like credit card application before. But however there is no unified definition to the e-currency service industries .For example ,Will we define a e-currency company as the bank service or just a financial service firm ? This question remains gray area.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#330099;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://en.wikipedia.org/wiki/Electronic_money&quot;&gt;http://en.wikipedia.org/wiki/Electronic_money&lt;/a&gt;&lt;/div&gt;&lt;div&gt;2. &lt;a href=&quot;http://projects.exeter.ac.uk/RDavies/arian/emoney.html&quot;&gt;http://projects.exeter.ac.uk/RDavies/arian/emoney.html&lt;/a&gt;&lt;/div&gt;&lt;div&gt;3. &lt;a href=&quot;http://www.persiox.com/2009/04/methods-of-using-perfect-money.html&quot;&gt;http://www.persiox.com/2009/04/methods-of-using-perfect-money.html&lt;/a&gt;&lt;/div&gt;&lt;div&gt;4. &lt;a href=&quot;http://www.digitalibrary.my/dmdocuments/malaysiakini/266_20Dr_Balachandher.pdf&quot;&gt;http://www.digitalibrary.my/dmdocuments/malaysiakini/266_20Dr_Balachandher.pdf&lt;/a&gt;&lt;/div&gt;&lt;div&gt;5. &lt;a href=&quot;http://www.buzzle.com/articles/advantages-and-disadvantages-of-electronic-cash.html&quot;&gt;http://www.buzzle.com/articles/advantages-and-disadvantages-of-electronic-cash.html&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/4918427421462212197/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/electronic-currency.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/4918427421462212197'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/4918427421462212197'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/electronic-currency.html' title='Electronic currency'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV0LzVysL8cMoLTsbrVYWhTlWqAN6VJQ7DUwZSfz0dq53P7nNb2qd_JnfHSi_m8DxVD1Gnd2GAO2Bm9kQllOyvzoKOlhbVA5J7GrLEZVrp4Iu-097iW3ecKcXnSuMWhh4bJptyeqK52chw/s72-c/260_shopping2.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-5275457837500014513</id><published>2009-07-01T22:49:00.000+08:00</published><updated>2009-07-17T12:39:18.322+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Customer&#39;s adoption strategies"/><category scheme="http://www.blogger.com/atom/ns#" term="Mobile payment systems"/><category scheme="http://www.blogger.com/atom/ns#" term="Potentials of mobile payment system"/><title type='text'>Mobile payment systems in Malysia: Its potentials and customers&#39; adoption strategies</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmdIl4NzIzQekl_yJGdSVWYgfbyXkHzxcIr-aPsoMjubrhyphenhyphenCNBovtaNA-6DlxsM797eMnsO0Mh_e8eYHf7CLbZErQlqGC0jAzGKAB6ttusO8zAGgOXiWfutT79acGunLWESVIhhjEY8c1D/s1600-h/Mpayment.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357838242127334594&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 240px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmdIl4NzIzQekl_yJGdSVWYgfbyXkHzxcIr-aPsoMjubrhyphenhyphenCNBovtaNA-6DlxsM797eMnsO0Mh_e8eYHf7CLbZErQlqGC0jAzGKAB6ttusO8zAGgOXiWfutT79acGunLWESVIhhjEY8c1D/s320/Mpayment.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Mobile payment is known as m-payment. M-payment is a real-time payment which is made with the use of a mobile device, such as cell phone, Smartphone, or personal digital assistant (PDA). It involves submitting an electronic remittance for an outstanding bill. Instead of paying with cash, check or credit cards, a consumer can use his or her mobile phone to pay for the goods and services which they purchased. Those goods and services are:-&lt;br /&gt;a) Music, videos, ringtones, online game subscription, wallpapers and other digital goods.&lt;br /&gt;b) Transportation fare such as bus, subway or train, parking meters and other services.&lt;br /&gt;c) Books, magazines, tickets and other hard goods.&lt;br /&gt;&lt;br /&gt;There are a total of four types of model payment which is available in Malaysia. Those models are:-&lt;br /&gt;a) Premium SMS based transactional payments&lt;br /&gt;b) Direct mobile billing&lt;br /&gt;c) Mobile web payment (WAP)&lt;br /&gt;d) Contactless Near Field Communication (NFC)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;&lt;strong&gt;1) Premium SMS based transactional payment&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;Premium SMS based transactional payment enables customer to send a payment request via SMS text messages to a short code. A premium charge will be stated in the customer’s phone bill. Premium SMS transaction is normally used by customer who enjoys downloading music, ringtones, themes and so forth using their SMS. Customer only need to key in the specific code of the particular item to confirm that they want to purchase. The merchant involved is then informed of the payment success and can then release the paid for goods.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span style=&quot;color:#ffcc00;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;2) Direct mobile billing&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;Direct mobile billing enable customer to use mobile billing option during checkout at an ecommerce site. For example an online gaming site to make a payment. After the two factors which involve authentication of PIN and PASSWORD, the customer’s mobile account is automatically charged for the purchase. This is one of the methods where it does not require the use of credit card, debit card or even pre-registration online payment solution such as PayPal. The benefit is, it bypass the bank and credit card companies all together. There are other benefits that can be seen when using direct mobile billing, such as:-&lt;br /&gt;&lt;strong&gt;i. &lt;span style=&quot;color:#000000;&quot;&gt;Security&lt;/span&gt;&lt;/strong&gt; – two factor authentication and risk management engine in order to prevent fraud.&lt;br /&gt;&lt;strong&gt;ii. &lt;span style=&quot;color:#000000;&quot;&gt;Convenience&lt;/span&gt;&lt;/strong&gt; – no pre-registration and no new mobile software is required.&lt;br /&gt;&lt;strong&gt;iii. &lt;span style=&quot;color:#000000;&quot;&gt;Easy&lt;/span&gt;&lt;/strong&gt; – it is just another option during a checkout process.&lt;br /&gt;&lt;strong&gt;iv.&lt;span style=&quot;color:#000000;&quot;&gt; Fast&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;color:#ff6666;&quot;&gt; &lt;/span&gt;– most of the transaction are completed in less than 10 seconds.&lt;br /&gt;&lt;span style=&quot;color:#ffcc00;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;3) Mobile web payments (WAP)&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;&lt;br /&gt;&lt;/span&gt;Mobile web payments enable user uses web pages displayed or additional application he/ she download and install on his/her phone to make a payment. It uses WAP as underlying technology which inherits all the advantages and disadvantages of it. The benefits of using WAP are:-&lt;br /&gt;&lt;strong&gt;i. &lt;span style=&quot;color:#000000;&quot;&gt;Follow-on sales&lt;/span&gt;&lt;/strong&gt; – it can lead the consumer back to a store/ to other goods whichever they like. These pages have its own URL which can be a bookmark making it easy for the user to re-visit/share with their friends.&lt;br /&gt;&lt;strong&gt;ii. &lt;span style=&quot;color:#000000;&quot;&gt;High customer satisfaction&lt;/span&gt;&lt;/strong&gt; – customer are satisfied using WAP due to the quick and predictable payments.&lt;br /&gt;&lt;strong&gt;iii. &lt;span style=&quot;color:#330000;&quot;&gt;Ease of use&lt;/span&gt;&lt;/strong&gt; – it is a familiar set of online payment pages making user who uses it easier understand how does the WAP work.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;4) Contactless Near Field Communication (NFC)&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;Contactless NFC is mainly used when making payment for the purchases made in the physical stores/transportation services. Most of the time, a transaction do not require authentication but there is still some transaction that need authentication like using PIN in order to complete a transaction. The payment made could be directly deduct from pre-paid account/charged to mobile or even bank account. Payments that use NFC faces vital challenges for wide and fast adoption, meanwhile, there are some phone manufacturers are enthusiastic due to lack of supporting infrastructure.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#663300;&quot;&gt;&lt;strong&gt;Potentials&lt;/strong&gt; &lt;/span&gt;&lt;br /&gt;As we know, mobile payments have been rapidly developing and are well used in Malaysia.&lt;br /&gt;Nowadays, almost everyone is using mobile payments in their daily life. Users feel like and easy whenever they use mobile payment. They do not need to carry along credit cards, debit card of even cash. It is very convenient for the user because they just need to pay it through their mobile phones. For example, customer who uses this system does not need to queue up for the bill payment in the restaurant. The system is available for prepaid and postpaid service billings. Besides, it also covers most of the mobile operator in Malaysia.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#663300;&quot;&gt;&lt;strong&gt;Customers’ adoption strategies&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;a) Educate consumers about mobile payments, how to use and introduce its functions.&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;Mobile payments are widely used in Malaysia but there is still a group of people who does not familiar with this system. Therefore is important to teach this group of people how to use the systems. Having a campaign would be the best solution to it. Through this campaign, public are able to know the advantages of using the system such as making their life more convenient when making payment.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#663366;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;b) Enhance security and confidence to mobile users&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;Customer can now purchase goods through online without disclosing their credit card information. Through mobile payments, customer can purchase whatever goods or services they like without disclosing credit card information. It makes the user feel more secured and have confidence when using it.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#ffcc00;&quot;&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;c) Maintain customer’s loyalty&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;In order to maintain customer’s loyalty, company can reward customer who is using this systems. Reward can be in the form of gifts after customer purchase until a certain level or giving them extra credits in order for them to purchase more. Rewarding the customer is one of the ways to keep them using this system.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#663366;&quot;&gt;Related Link:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html&quot;&gt;http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci772807,00.html&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://en.wikipedia.org/wiki/Mobile_payment&quot;&gt;http://en.wikipedia.org/wiki/Mobile_payment&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.wisegeek.com/what-is-m-payment.htm&quot;&gt;http://www.wisegeek.com/what-is-m-payment.htm&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/5275457837500014513/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/mobile-payment-systems-in-malysia-its.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/5275457837500014513'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/5275457837500014513'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/mobile-payment-systems-in-malysia-its.html' title='Mobile payment systems in Malysia: Its potentials and customers&#39; adoption strategies'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmdIl4NzIzQekl_yJGdSVWYgfbyXkHzxcIr-aPsoMjubrhyphenhyphenCNBovtaNA-6DlxsM797eMnsO0Mh_e8eYHf7CLbZErQlqGC0jAzGKAB6ttusO8zAGgOXiWfutT79acGunLWESVIhhjEY8c1D/s72-c/Mpayment.bmp" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-3151900940569364760</id><published>2009-06-29T15:30:00.000+08:00</published><updated>2009-07-17T13:03:33.650+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AirAsia"/><title type='text'>Buy Air Asia merchandise online</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWV0JEr3KdWQgyBhQKqUmYd9DlZZPG0HZzTyAWnNYi60_lTFG3HT41z8yrKF8XTJ6XgBXll_ogNKm4DqQ25xuNsaw1EMQmETBAVcE9kFiz5abPMvEAtL2JXScF_c1TVNTbTb8CVPy4YZzz/s1600-h/282px-AirAsia_Edited_svg.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357847620969902306&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 282px; CURSOR: hand; HEIGHT: 106px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWV0JEr3KdWQgyBhQKqUmYd9DlZZPG0HZzTyAWnNYi60_lTFG3HT41z8yrKF8XTJ6XgBXll_ogNKm4DqQ25xuNsaw1EMQmETBAVcE9kFiz5abPMvEAtL2JXScF_c1TVNTbTb8CVPy4YZzz/s320/282px-AirAsia_Edited_svg.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;AirAsia, the leading and largest low-cost carrier in Asia, services the most extensive network with 122 routes covering more than 65 destinations. Within the grasp of 7 years of operation, AirAsia has carried over 65 million passengers and grown its fleet from just two aircraft to 80. The airline today is proud to be a truly Asean (Association of Southeast Asian Nations) airline with established operations based in Malaysia, Indonesia and Thailand, servicing a network stretching across all Asean countries, China, India and Bangladesh. This is further complemented by AirAsia X, its low cost long-haul affiliate carrier that currently flies to destinations in China, Australia and the UK. AirAsia is the only regional carrier with the largest destination network and highest flight frequencies. AirAsia has been awarded the 2009 World’s Best Low Cost Airline in the annual World Airline Survey by Skytrax.&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;Recently AirAsia just launched its online store offering its own merchandise - The Red Megastore. Now we need not wait until go to the plane only can buy the merchandise, we can buy it anytime and anywhere where you can online with affordable price. Isn&#39;t that sound nice?&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;The affordable AirAsia merchandise range from fashionable, exclusively designed caps and tee-shirts to practical items like universal travel adaptors, watches, thermos mugs, in-flight comfort kits and durable leather passport holders.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_aQugt_UvXtJSUWbTrxejSYTUhyphenhyphenX-bayTIB0MkGgLlW-_u3Mg5sbZlaup5N8wDg8DyFeZtqwSYOCyU1EthkbVm094MuFGbIIdGLu3QiNILfr4srnVHHKJiVgQ4uj4gXLwBFPpmox7BtZS/s1600-h/watch_med.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357848632071447682&quot; style=&quot;WIDTH: 152px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_aQugt_UvXtJSUWbTrxejSYTUhyphenhyphenX-bayTIB0MkGgLlW-_u3Mg5sbZlaup5N8wDg8DyFeZtqwSYOCyU1EthkbVm094MuFGbIIdGLu3QiNILfr4srnVHHKJiVgQ4uj4gXLwBFPpmox7BtZS/s200/watch_med.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggeRyBbAZAbinYGjWw21uqP7bpISSRXn3ZfKhhgbOLmEuOp3uQlXO4lZd88pydlqaI6RAoPTRlbe6VgfNZR0ylt0kbiJMkSstO-IysxOU5VXpUKZ_7M9Y-_vwWPVYiIly9xOlp3HYMSuBq/s1600-h/red_side_motif_cap_med.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357848808765053570&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 152px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggeRyBbAZAbinYGjWw21uqP7bpISSRXn3ZfKhhgbOLmEuOp3uQlXO4lZd88pydlqaI6RAoPTRlbe6VgfNZR0ylt0kbiJMkSstO-IysxOU5VXpUKZ_7M9Y-_vwWPVYiIly9xOlp3HYMSuBq/s200/red_side_motif_cap_med.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2Ho1RmtTUqMQCCXFICJoICRO8x6qswv_BI2RqPurcys2vCdgapNIomAwfsV0h8Sjhk8xosfSAPYccVXOvAOF5r2awDTvUNA8zhBsKBi2AQMHvXCGCm3J-wJHbMA81UpK3QyXuJ5QcA0Ym/s1600-h/Thermos-Mug_med.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357850054592719186&quot; style=&quot;WIDTH: 152px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2Ho1RmtTUqMQCCXFICJoICRO8x6qswv_BI2RqPurcys2vCdgapNIomAwfsV0h8Sjhk8xosfSAPYccVXOvAOF5r2awDTvUNA8zhBsKBi2AQMHvXCGCm3J-wJHbMA81UpK3QyXuJ5QcA0Ym/s200/Thermos-Mug_med.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Products also include USB flash drives – encased in cartoon-like, miniature Airbus A320s for easy document storage on the go.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm4Ywiela_DFK0TB5irPF5Cchr3ZNf4kExDybMqu9CquNrylhI-OZotaXipjKI7FcAjwOPKNnBuDDasekW-86QSs4UMjpS0OF9B6jlnwG7I1TU6g5HnMEr8UZjeJUTM-xU6LNyTH-VgsSL/s1600-h/aathumbdrive_med4gb.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357848303418605522&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 152px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm4Ywiela_DFK0TB5irPF5Cchr3ZNf4kExDybMqu9CquNrylhI-OZotaXipjKI7FcAjwOPKNnBuDDasekW-86QSs4UMjpS0OF9B6jlnwG7I1TU6g5HnMEr8UZjeJUTM-xU6LNyTH-VgsSL/s200/aathumbdrive_med4gb.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwJuVcZ3m2RapsJyxI-dWDnQhEWgrZ6FoaRs_ob7l__3jbF2aw1h_89Ry8LY0HdGl7TV399J8iwy92d3oAYXIAdCYwZLBEbJqjcM8HweFChP1NKYOhLepF1NPUtqkTsDbZ7XsaYN6v98Vc/s1600-h/USB_med.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357848478854998562&quot; style=&quot;WIDTH: 200px; CURSOR: hand; HEIGHT: 152px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwJuVcZ3m2RapsJyxI-dWDnQhEWgrZ6FoaRs_ob7l__3jbF2aw1h_89Ry8LY0HdGl7TV399J8iwy92d3oAYXIAdCYwZLBEbJqjcM8HweFChP1NKYOhLepF1NPUtqkTsDbZ7XsaYN6v98Vc/s200/USB_med.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1Ztss1zvVSdyOU_tPcN-43C8Om4G5RRPcgXoKFttpwc-PchALyoyt1inmJxW3U6G1389vq4rQqEwBg5umXJVVRFoyNhMJ-Dp-vXTwBJjDncU3mdMY9AMrzW089PTl-962dmoIN2UfC7n0/s1600-h/A320_1-100_small.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5357849501957204610&quot; style=&quot;WIDTH: 133px; CURSOR: hand; HEIGHT: 133px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1Ztss1zvVSdyOU_tPcN-43C8Om4G5RRPcgXoKFttpwc-PchALyoyt1inmJxW3U6G1389vq4rQqEwBg5umXJVVRFoyNhMJ-Dp-vXTwBJjDncU3mdMY9AMrzW089PTl-962dmoIN2UfC7n0/s200/A320_1-100_small.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/div&gt;&lt;div&gt;All you have to do is just log on to &lt;a href=&quot;http://www.redmegastore.com/&quot;&gt;http://www.redmegastore.com/&lt;/a&gt;, from the comfort of home or anywhere you can go online.&lt;/div&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359279099409032722&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 513px; CURSOR: hand; HEIGHT: 325px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWwcrymcIz7_buZL-Jg1AcXYsPQ8ecTix-L2Pcyn50uCfZVyuQZJIEGBEzVvSpeEBwARzLYtPfnZAmkLjYc2B_aX3rbqzXQjNmzvmhvISdvtLXy6rOVMY6UdIRzLA-F4KpyeCq5T697l5C/s400/web.JPG&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;With a click of the mouse shoppers can browse through the store’s online catalogue which organised under specific categories so shoppers can easily navigate through the portal and choose the products that they wish to purchase.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Extending its motto of providing everyday low fares, AirAsia also ensures that all products sold via the Red Megastore are meticulously designed and manufactured to meet the highest quality standards, while maintaining its affordability.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The Red Megastore which accepts payments via Visa and MasterCard, also ensures that delivery of purchases will reach customers in Malaysia within seven days and for overseas shipments to major cities, 14 days from the date of order.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/3151900940569364760/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/buy-air-asia-merchandise-online.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/3151900940569364760'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/3151900940569364760'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/buy-air-asia-merchandise-online.html' title='Buy Air Asia merchandise online'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWV0JEr3KdWQgyBhQKqUmYd9DlZZPG0HZzTyAWnNYi60_lTFG3HT41z8yrKF8XTJ6XgBXll_ogNKm4DqQ25xuNsaw1EMQmETBAVcE9kFiz5abPMvEAtL2JXScF_c1TVNTbTb8CVPy4YZzz/s72-c/282px-AirAsia_Edited_svg.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-4060452059605091369</id><published>2009-06-28T10:41:00.014+08:00</published><updated>2009-07-03T09:22:52.691+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="3rd party certification"/><category scheme="http://www.blogger.com/atom/ns#" term="Digicert Sdn Bhd"/><category scheme="http://www.blogger.com/atom/ns#" term="Msctrustage.com"/><title type='text'>The application of 3rd party certification programme in Malaysia</title><content type='html'>In today&#39;s world, electronic commerce is a fast growing industry. Businessmen are transferring their businesses onto the Web in order to increase the sales of their goods and services beyond their geographical area. This helps them to use better options for selling and buying. They also have the option to sell their products directly without the help of distributors or middlemen.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;Building trust in e-commerce is essential for any online retailer. If you&#39;ve launched an ecommerce site but your e-business isn&#39;t doing as well as you hoped, it could be that prospective customers simply don&#39;t trust you.&lt;br /&gt;&lt;br /&gt;When it comes time to enter personal information or complete a business transaction on the Internet, most people hesitate, and understandably so. They&#39;ve read about credit card fraud, identity theft, spoofing, hacking, phishing and other abuses. It should come as no surprise that many e-shoppers are still concerned about security and privacy issues. As such, you&#39;ve got to convince them that you are trustworthy in three specific areas: security, privacy and reliability.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;When you are shopping on a website, how do you know that the website isn&#39;t set up by somebody posing as the e-merchant? How do you know that the data you enter will be protected as it flies across the Internet?&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The de facto mechanism for ensuring e-commerce security is the digital certificate.&lt;br /&gt;&lt;br /&gt;In fact, the sole goal of digital certificates is to make sure online shoppers feel secure, by authenticating the legitimacy of the certificate owner and by protecting your sensitive data.&lt;br /&gt;Digital certificates are issued by a third-party certificate authority. The certificate authority will only issue a digital certificate after they have thoroughly checked out a company. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;Once you get a digital certificate, you can post a logo on your website. Presumably, customers who see a digital certificate logo prominently displayed on your site will trust you considerably more than if you didn&#39;t have the digital certificate. They know that you&#39;ve gone through a vetting process and that the personal data they submit to your site will be encrypted.&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Xu8Hx7-Kx6TcPpwYmf_q53q0YDMHMt2FfizHvRTpWgpOCXe8UoNJEL7y-VUvBU9coJF216e71g1SRwhWUPDTS6o2METe2JredmtDMDxGwOYlhq7ZtyA6clQEDb7x-mqbKrhUkqtwhXl3/s1600-h/DigiCert_Only_Trans.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5352664353465840226&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 97px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Xu8Hx7-Kx6TcPpwYmf_q53q0YDMHMt2FfizHvRTpWgpOCXe8UoNJEL7y-VUvBU9coJF216e71g1SRwhWUPDTS6o2METe2JredmtDMDxGwOYlhq7ZtyA6clQEDb7x-mqbKrhUkqtwhXl3/s320/DigiCert_Only_Trans.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Digicert Sdn Bhd is the first certification authority in Malaysia licensed to issue digital signature and digital certificate. DIGICERT is a smart partnership between POS Malaysia Berhad and MIMOS Berhad. They are the leading Certification Authority (CA) in Malaysia providing trust solutions fore-businesses. It provides a safe environment for business-to-business transactions, a sure route to reduce costs and gain efficiency. It allows consumers that trade through the Internet to sign electronically - in the form of adigital signature that is in line with the requirements of the Malaysian Digital Signature Act 1997 and the Digital Signature Regulations 1998. Its trust solutions are legally recognized under Malaysian law.&lt;/p&gt;&lt;p&gt;DIGICERT is proud to be the Certification Authority in many strategic projects, to name a few eGovernment, ePerolehan, Online Pharmaceutical, MyKad PKI and PKI-based Internet Banking. The launching of e-Filing Lembaga Hasil Dalam Negeri (LHDN) project in which DIGICERT was chosen to be the premier CA, marked another milestone to the healthy growth of secured e-commerce and transactions using a digital certificate over the Internet in Malaysia. Their projects are from various sectors of the economy, including manufacturing, education, technology, emerging business, professional services, healthcare, telecommunications, financial, architecture and insurance sectors.&lt;br /&gt;&lt;br /&gt;DIGICERT provides certification management services as follows: &lt;/p&gt;&lt;p&gt;* Screening of the authority of the people that apply for issuance and revocation of certificates. &lt;/p&gt;&lt;p&gt;* Issuance, revocation and publication of certificates. &lt;/p&gt;&lt;p&gt;* Delivery, storage and archiving of certificates and certificates revocation list.&lt;br /&gt;&lt;br /&gt;The end-user product of the service is a digital certificate. A digital certificate is used by an entity as a credential to provide virtual identity or other security-related functions. The entity that possesses the certificate is known as a Subscriber. A Subscriber can be an individual, an organization, a device or an individual. The credential is then used, for example, to access a website or service of a business. An organization that relies on the digital certificate as a form of identity is known as a &quot;Relying Party.&quot; DIGICERT uses PKI-based Identity Management that has distinct entities with defined areas of responsibilities. These entities include Certification Authority (CA), Subscribers, and Relying Parties (RP). Each entity has specific roles, with associated obligations, and may have direct contractual relationships with one another or be non-affiliated. Digital certificate is stored on smartcard e.g. MyKad, USB token, floppy disk and computer hard disk.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhun_BOBpFakWDG2G4wM7-2P9pnNaoY-iW2gvV4Tk-d4UcZsRWwQyGkn5dN8sX9yXAe-NL_O04NU_XVErDhE4n4X6sLgYa_YEYchV6LuB6r0umS_Ji47Ja4NfzjD6xpMbwnMlY5RvW_gdlb/s1600-h/t2-logo.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5352666544969533458&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 300px; CURSOR: hand; HEIGHT: 66px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhun_BOBpFakWDG2G4wM7-2P9pnNaoY-iW2gvV4Tk-d4UcZsRWwQyGkn5dN8sX9yXAe-NL_O04NU_XVErDhE4n4X6sLgYa_YEYchV6LuB6r0umS_Ji47Ja4NfzjD6xpMbwnMlY5RvW_gdlb/s320/t2-logo.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Msctrustage.com is the second certification authority company in Malaysia to provide security services such as issuing digital certificates, establishing public key infrastructureand providing cryptographic technology to various Internet markets. Since its formation, MSC Trustgate.com Sdn Bhd, as the Malaysia&#39;s premier licensed Certification Authority and an affiliate of VeriSign Inc., an international Internet security company, has diligently geared itself to become a disciplined, market-leader and strategic provider of cutting-edge security infrastructure solutions. Today, MSC Trustgate.com is the leading provider of Internet trust and security solutions in ASEAN. Over 500 companies across industry rely on our solution for secure e-business and e-commerce.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;strong&gt;Related Links:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;1. &lt;a href=&quot;http://www.gaebler.com/Conveying-Trustworthiness-in-E-Commerce.htm&quot;&gt;http://www.gaebler.com/Conveying-Trustworthiness-in-E-Commerce.htm&lt;/a&gt; &lt;/div&gt;&lt;div&gt;2. &lt;a href=&quot;http://www.ucertify.com/article/security-of-an-e-commerce-site.html&quot;&gt;http://www.ucertify.com/article/security-of-an-e-commerce-site.html&lt;/a&gt; &lt;/div&gt;&lt;div&gt;3. &lt;a href=&quot;http://majlis.fsktm.um.edu.my/document.aspx?FileName=173.pdf&quot;&gt;http://majlis.fsktm.um.edu.my/document.aspx?FileName=173.pdf&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;4. &lt;a href=&quot;http://www.digicert.com.my/&quot;&gt;http://www.digicert.com.my/&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;5. &lt;a href=&quot;http://www.msctrustgate.com/&quot;&gt;http://www.msctrustgate.com/&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/4060452059605091369/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/application-of-3rd-party-certification.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/4060452059605091369'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/4060452059605091369'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/application-of-3rd-party-certification.html' title='The application of 3rd party certification programme in Malaysia'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Xu8Hx7-Kx6TcPpwYmf_q53q0YDMHMt2FfizHvRTpWgpOCXe8UoNJEL7y-VUvBU9coJF216e71g1SRwhWUPDTS6o2METe2JredmtDMDxGwOYlhq7ZtyA6clQEDb7x-mqbKrhUkqtwhXl3/s72-c/DigiCert_Only_Trans.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-7623042573305863390</id><published>2009-06-28T09:33:00.000+08:00</published><updated>2009-07-17T12:38:41.130+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Safeguard financial data"/><category scheme="http://www.blogger.com/atom/ns#" term="Safeguard personal data"/><title type='text'>How to safeguard our personal and financial data?</title><content type='html'>&lt;span style=&quot;color:#000000;&quot;&gt;Nowadays, internet is one of the ways that connect billions of computers throughout the world. People rely mostly on the computer especially the internet to store and manage their so called personal and financial information. Information travels rapidly through the internet. Information becomes vulnerable and easily expose to threat when they are travelled via the internet. That is why internet security is very important for most of the internet user.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;There are few ways which users are able to safeguard their personal and also financial data:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(a) Install a firewall&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;A firewall is a software program designed to allow good people in and keep bad people out. Nowadays, most of the computers come with firewalls integrated into their operating systems. Users who use DSL or cable modem have an added layer of protection because these modems come with another firewall built in.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihEdjmAj_vEGuXZhjTbV5aKRiSywt9NRdug_UBQyo7TJVmGnqT3_Zo1wJvC2r3QcJ-8HRfyBejkrddwCkwajkhh0oQKSAPo982GeJsmJ1lFPWGmBoX6B8IpGMt-Yfid3gZQ9IkBLVP6YMs/s1600-h/Firewall.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355649106711231586&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 176px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihEdjmAj_vEGuXZhjTbV5aKRiSywt9NRdug_UBQyo7TJVmGnqT3_Zo1wJvC2r3QcJ-8HRfyBejkrddwCkwajkhh0oQKSAPo982GeJsmJ1lFPWGmBoX6B8IpGMt-Yfid3gZQ9IkBLVP6YMs/s400/Firewall.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(b) Install and update antispyware and antivirus programs&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Microsoft and numerous application vendors offer users regular updates to existing antispyware programs, so be on the lookout. As for antivirus protection, Symantec and Norton antivirus are popular choices.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMZ9tNLZMI7M3cERmEEipMEZ_-tLnKGx3toIwDPe2et60KFIdn_8Pfyrq_x4NF_aTEIb-lHQCuuwkYCYoSCVQE-LLMq4e6db5FH2cdePdAqZ19HztVmb-xwLL0mq8s26XrswcC79F6OaCe/s1600-h/antispyware_scrshot2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355649402851012386&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 246px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMZ9tNLZMI7M3cERmEEipMEZ_-tLnKGx3toIwDPe2et60KFIdn_8Pfyrq_x4NF_aTEIb-lHQCuuwkYCYoSCVQE-LLMq4e6db5FH2cdePdAqZ19HztVmb-xwLL0mq8s26XrswcC79F6OaCe/s400/antispyware_scrshot2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(c) Avoid accessing financial information in public&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;It is best for the user not to check their bank balance when working from a coffee shop such as starbucks, coffee bean that offers free wireless access. Although the system are convenient to access but it is unknown. Casual users have no way of assessing how sturdy their firewalls are.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(d) Update your browser&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;User is encouraged to update theirs browser on a regular basis. This is can help plug up security holes, so as to make it a habit.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCb_fX1uNZeDmtkTDaUs7VaYWvxNPAB4oYkQIDLkTePEv-7urzSBuN_MV67S47hf-HzlE-JNNrCoH2qavkWak0C8YwafpMXIlraIqwdymp_nszyvx6qK4V1O22S7U8terSHH4DGzenMEja/s1600-h/yap-browser-may-screen-shot.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355649236059457666&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 240px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCb_fX1uNZeDmtkTDaUs7VaYWvxNPAB4oYkQIDLkTePEv-7urzSBuN_MV67S47hf-HzlE-JNNrCoH2qavkWak0C8YwafpMXIlraIqwdymp_nszyvx6qK4V1O22S7U8terSHH4DGzenMEja/s400/yap-browser-may-screen-shot.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(e) Look for &quot;locks&quot;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;How can you tell if your financial site is really secure before you log on? The Web address should start with &quot;https&quot; instead of &quot;http&quot; says Weston. Also, look for small lock icon in the lower-right corner of the browser window.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX_uBal1wOEaphqgt2yFDmsJpyS7SKa8q60GCINmaEZv7l-AtdKc2PBiPEAH4DLBipc_avR4uds-NVmLNxVrBqLS2diBCHw0Q82xKAOrgAwA8T0MKMBXtuiz1Rs1UkNYCmS8lAInOJYx1r/s1600-h/computer%2520lock.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355649861005197730&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 239px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX_uBal1wOEaphqgt2yFDmsJpyS7SKa8q60GCINmaEZv7l-AtdKc2PBiPEAH4DLBipc_avR4uds-NVmLNxVrBqLS2diBCHw0Q82xKAOrgAwA8T0MKMBXtuiz1Rs1UkNYCmS8lAInOJYx1r/s400/computer%2520lock.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSZzFNFRq5SrNg-8SFD9ft9401vaddaE7nmKkEZFHvAb-xJhCEyY8VwG2frF4i7a2o52i6d51E05rGCn4W2aZa4yZg9g3No4ULfcho8j-g2dzOh3ECs-cvV_q_geIm1Krdf2WL-P62B3GT/s1600-h/ComputerLocked.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355649581758907794&quot; style=&quot;WIDTH: 250px; CURSOR: hand; HEIGHT: 247px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSZzFNFRq5SrNg-8SFD9ft9401vaddaE7nmKkEZFHvAb-xJhCEyY8VwG2frF4i7a2o52i6d51E05rGCn4W2aZa4yZg9g3No4ULfcho8j-g2dzOh3ECs-cvV_q_geIm1Krdf2WL-P62B3GT/s400/ComputerLocked.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(f) Don&#39;t open mystery attachments&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;It is very important to never open an attachment or click on a link sent to user by an unknown party. The attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(g) Use a credit card with a small limit&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;User is encouraged to use a credit card with a small limit for mail-order and online purchases. It is very easy for a dishonest sales clerk to use user’s credit card information. If the card user use for these purchases has a low credit limit, at least thieves won&#39;t be able to rack up many bills before hitting a wall.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg6xiNpHJCjtLlx2HSim_dIJ0NTK0sevDW63yTenm6zQmoNupA5LS9FnfkTk0ERSn4Tfe5ogIHXvHpO_rk_UMyngto2eO9pjLaztWujm9hQ0Q1x3zukpBE-S2uZzNVa4esY53qPV4eZMn3/s1600-h/cc.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355650201093019906&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 249px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg6xiNpHJCjtLlx2HSim_dIJ0NTK0sevDW63yTenm6zQmoNupA5LS9FnfkTk0ERSn4Tfe5ogIHXvHpO_rk_UMyngto2eO9pjLaztWujm9hQ0Q1x3zukpBE-S2uZzNVa4esY53qPV4eZMn3/s400/cc.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ_OtKAZVJCOGxc4TZaehcLCWwbI-jj-FGWa49Ivi9qQDll27ZBmLKFCrQZdTeLUjfZ0QTsYJFCs5qng0xumKwsjjiQAIocNaHDrn8LcOjZQ93DgN5UklM3UdyPQS5tVYRbfUwkP9l1ckW/s1600-h/cc2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355650529568407026&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 214px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ_OtKAZVJCOGxc4TZaehcLCWwbI-jj-FGWa49Ivi9qQDll27ZBmLKFCrQZdTeLUjfZ0QTsYJFCs5qng0xumKwsjjiQAIocNaHDrn8LcOjZQ93DgN5UklM3UdyPQS5tVYRbfUwkP9l1ckW/s400/cc2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(h) Choose your PIN wisely&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;When user wants to choose something that he or she could easily remember, the pin should not be something that a clever thief could figure out just by learning your birth date or your child&#39;s name. A combination of uppercase and lowercase letters, numbers, and symbols will offer user more security.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;(i) Pay attention when using an ATM&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;User must keep his or her eyes peeled for anyone who seems a little too interested in the transactions. Use a free hand to shield the keypad when entering the PIN. Besides that, banker can add on fingerprint scanning on ATM machine.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1byGSgq1cuwHl7GuLGCSorw10MyF2Nefh9qCaT8p1O6rs6EqY70PGk-d7TaeYNcWYlKga_sg6MoYUCpuFtImBe1YHgnNm4SFBVgc6fZ_sJgVUiJYhLdhFNQ9I7Jbk3Vg0J8SmOQX5gNQb/s1600-h/atm.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5355650699531180978&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 221px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1byGSgq1cuwHl7GuLGCSorw10MyF2Nefh9qCaT8p1O6rs6EqY70PGk-d7TaeYNcWYlKga_sg6MoYUCpuFtImBe1YHgnNm4SFBVgc6fZ_sJgVUiJYhLdhFNQ9I7Jbk3Vg0J8SmOQX5gNQb/s400/atm.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#330099;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://finance.yahoo.com/banking-budgeting/article/103893/Six-Ways-to-Safeguard-Your-Online-Assets&quot;&gt;http://finance.yahoo.com/banking-budgeting/article/103893/Six-Ways-to-Safeguard-Your-Online-Assets&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://abcnews.go.com/Technology/wireStory?id=5351346&quot;&gt;http://abcnews.go.com/Technology/wireStory?id=5351346&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.fool.com/personal-finance/general/2006/09/23/safeguard-your-financial-life.aspx&quot;&gt;http://www.fool.com/personal-finance/general/2006/09/23/safeguard-your-financial-life.aspx&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://amazingcommerce.wordpress.com/2008/06/18/how-to-safeguard-our-personal-and-financial-data/&quot;&gt;http://amazingcommerce.wordpress.com/2008/06/18/how-to-safeguard-our-personal-and-financial-data/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/7623042573305863390/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/how-to-safeguard-our-personal-and.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7623042573305863390'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7623042573305863390'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/how-to-safeguard-our-personal-and.html' title='How to safeguard our personal and financial data?'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihEdjmAj_vEGuXZhjTbV5aKRiSywt9NRdug_UBQyo7TJVmGnqT3_Zo1wJvC2r3QcJ-8HRfyBejkrddwCkwajkhh0oQKSAPo982GeJsmJ1lFPWGmBoX6B8IpGMt-Yfid3gZQ9IkBLVP6YMs/s72-c/Firewall.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-723997058203730523</id><published>2009-06-27T20:49:00.004+08:00</published><updated>2009-07-17T15:17:26.861+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Example of phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing prevention methods"/><title type='text'>Phishing: Examples and its prevention methods</title><content type='html'>The term &lt;span style=&quot;font-weight: bold; color: rgb(51, 51, 153);&quot;&gt;phishing&lt;/span&gt; comes from the fact that Internet scammers are using increasingly sophisticated lures as they &quot;fish&quot; for users&#39; financial information and password data.&lt;br /&gt;&lt;br /&gt;In the field of computer security, &lt;span style=&quot;font-style: italic; color: rgb(51, 51, 153);&quot;&gt;phishing&lt;/span&gt; is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting public.&lt;br /&gt;&lt;br /&gt;Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. (This is why phishing is also called &lt;span style=&quot;font-style: italic; color: rgb(51, 51, 153);&quot;&gt;brand spoofing&lt;/span&gt;). Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.&lt;br /&gt;&lt;br /&gt;A phishing technique was described in detail in 1987, and the first recorded use of the term &quot;phishing&quot; was made in 1996. The term is a variant of fishing, probably influenced by &lt;span style=&quot;font-style: italic; color: rgb(51, 51, 153);&quot;&gt;phreaking&lt;/span&gt;, and alludes to baits used to &quot;catch&quot; financial information and passwords.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Free Money in Three Easy Steps&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;The first step is to reach as many possible potential victims in the shortest amount of time with the least amount of effort. The below is a typical e-mail call to action as rendered by Microsoft’s Outlook Express.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJVWb05gHWrxsbLxa5WaL7q8o2gvXA5_YdPY3uRMYPF-Izf-Zf1bt9ucx1udcbNEi67EFKIRAjDzrCi3WApxGAA-SjTeRua44Z3tCcYznsYzNMwz99Go3Y0w9ULKHfhdpKw-fN9-O-F_aW/s1600-h/paypal1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 328px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJVWb05gHWrxsbLxa5WaL7q8o2gvXA5_YdPY3uRMYPF-Izf-Zf1bt9ucx1udcbNEi67EFKIRAjDzrCi3WApxGAA-SjTeRua44Z3tCcYznsYzNMwz99Go3Y0w9ULKHfhdpKw-fN9-O-F_aW/s400/paypal1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359323124416725266&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;In later sections, the structure of various tactics of phishers will be explored. Generally speaking, most phishing e-mail will appear similar in both appearance and structure. Virtually all will have one common feature: a clickable link to a fake site that has been built to look similar or identical to the legitimate site it&#39;s masquerading as.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;The Catch:&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;A fraction of the potential victim pool, sometimes as much as two to three percent, fulfill the following criteria:&lt;br /&gt;• They are customers of the phisher’s chosen brand (Citibank, PayPal, etc.).&lt;br /&gt;• They become sufficiently convinced the message (and supplied link) is a valid communication from their financial institution.&lt;br /&gt;• Their immediate action is required to prevent a catastrophe (or, rarely, collect a reward).Once these requirements are met, the attacker must also provide these qualified victims with a credible facsimile of the targeted brand’s login page, such as the (fake) site below:&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTWvwJ7gxjWM46U8jmO3J0_R38OpvIr30U1q2BSjRYUO0Uv1Kg8u4EuGTf5vJUUXALOjmy0z5B0WBmY7d5LSBAVDxU1BSz9HyVkUXyBUwHNI_Fi-B84_JosPsGcc5-TAbAgpF7a3OGNrR5/s1600-h/paypal2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 271px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTWvwJ7gxjWM46U8jmO3J0_R38OpvIr30U1q2BSjRYUO0Uv1Kg8u4EuGTf5vJUUXALOjmy0z5B0WBmY7d5LSBAVDxU1BSz9HyVkUXyBUwHNI_Fi-B84_JosPsGcc5-TAbAgpF7a3OGNrR5/s400/paypal2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359320876092895106&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Often, these forms lead to a second page, which collects even more account-relevant information, specifically, account numbers and PINs.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj-Kf5XW_ldA7KPyIDNRKMuciaTfs262FvHD-0MSQSmdYSGWlC5oKBdqPKurZHo8bcwtXx4hmdfO5-sTO4CrUkchwVJuRHU0UGCKPZBjz4cVpkR__e8ml_HZBTinarub8ZO75VT0jXCP5Z/s1600-h/paypal3.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 363px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj-Kf5XW_ldA7KPyIDNRKMuciaTfs262FvHD-0MSQSmdYSGWlC5oKBdqPKurZHo8bcwtXx4hmdfO5-sTO4CrUkchwVJuRHU0UGCKPZBjz4cVpkR__e8ml_HZBTinarub8ZO75VT0jXCP5Z/s400/paypal3.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359320878156134690&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;However, even if a user provided an accurate password, that could change before the phisher has a chance to log in to the newly acquired victim account. So once account information has been collected, the most straightforward next step would be to log in to the phished account and perform an electronic funds transfer.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color: rgb(102, 0, 204);&quot;&gt;Examples of phishing:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Phishers typically include upsetting or exciting (but false) statements in the emails to get people to react immediately. They will ask for information such as usernames, passwords, credit card numbers, social security numbers, date of birth, etc. PayPal showed above is only one of the examples of phishing email. Besides that, there are First Generic Bank, Citibank, Bank of America, Bank of Scotland, HSBC, ebay, Intelligent Finance, Nationwide and so on. The phishing threat is spread all over the world through internet.&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpEmMfB4fl4HiOILzMHaBEOkCRFQHwJ0m6JZQbtQTKSBfwDdIUD5QlfNDekrk8xUbIuYzClceREuldPN_cXPZGcjEZC7SJ-69SatXVnciQjOb8zd1NbeiQNJ0B3BI4J9mziH6yqgvZxpPH/s1600-h/genericbank.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 312px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpEmMfB4fl4HiOILzMHaBEOkCRFQHwJ0m6JZQbtQTKSBfwDdIUD5QlfNDekrk8xUbIuYzClceREuldPN_cXPZGcjEZC7SJ-69SatXVnciQjOb8zd1NbeiQNJ0B3BI4J9mziH6yqgvZxpPH/s400/genericbank.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359320898753574626&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAAJzA17mXz8yQKcpMay_t3spksKHwGNWTFu-Akv8kclH0KdCWlJW6k7ZGjzgJicR7WNzdzzm54OA0LSj81sgWAtQJQGNoJks5vhZBtwwccjel7gYgaL2bFS-xLNj982RnH1Dtaf0KMT2W/s1600-h/genericbank1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 335px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAAJzA17mXz8yQKcpMay_t3spksKHwGNWTFu-Akv8kclH0KdCWlJW6k7ZGjzgJicR7WNzdzzm54OA0LSj81sgWAtQJQGNoJks5vhZBtwwccjel7gYgaL2bFS-xLNj982RnH1Dtaf0KMT2W/s400/genericbank1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359320902424375266&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKcyLTkUhqkSrAqKCgcQHjeRuqw1G802QSPZvFfFMV4hR1tSpkNa-M2oPWHnrL7DkDTx6NBf8yTXFxK7tn3uijQ-FhNof12nosimYZEflZP3jjzsCEbHctoUvV6IVhMoNrDZw3GfJ4DdHM/s1600-h/BankofAmerica.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 324px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKcyLTkUhqkSrAqKCgcQHjeRuqw1G802QSPZvFfFMV4hR1tSpkNa-M2oPWHnrL7DkDTx6NBf8yTXFxK7tn3uijQ-FhNof12nosimYZEflZP3jjzsCEbHctoUvV6IVhMoNrDZw3GfJ4DdHM/s400/BankofAmerica.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359321562830435586&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_y-NNmzbnxnmZWeCyKx8sKZsO6aGfhBDGuUflNou7bBtaMES3pgiSmNBwv5Slb-5qi2hLCKpOmfBLe15saHaYURaOPqjudkaC9hRneRNoYvOUToy35p7kmLVnJxtK8IZqmHVdFr2hP_su/s1600-h/citibank.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 334px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_y-NNmzbnxnmZWeCyKx8sKZsO6aGfhBDGuUflNou7bBtaMES3pgiSmNBwv5Slb-5qi2hLCKpOmfBLe15saHaYURaOPqjudkaC9hRneRNoYvOUToy35p7kmLVnJxtK8IZqmHVdFr2hP_su/s400/citibank.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359321569540691346&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjucVHRVn27XJrTcvJaEmjGo6OiyQbhlyXfXFFfDb6Gpjo-LJx967le5uQvHJ4EBt1aNKRwGJv6RxHfH2XMNW9p2_Z6ew3Rl96UPmAez5iBpZII_vtfpLGZaZyUuDsx0Yi0dDNuGso34ajA/s1600-h/ebay.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 329px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjucVHRVn27XJrTcvJaEmjGo6OiyQbhlyXfXFFfDb6Gpjo-LJx967le5uQvHJ4EBt1aNKRwGJv6RxHfH2XMNW9p2_Z6ew3Rl96UPmAez5iBpZII_vtfpLGZaZyUuDsx0Yi0dDNuGso34ajA/s400/ebay.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5359321575918565794&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong style=&quot;color: rgb(51, 0, 153);&quot;&gt;Prevention methods&lt;/strong&gt;&lt;br /&gt;In order to prevent becoming the victim of phishing, users must always alert of the emails received. There are tips on how to avoid the Internet scam:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Be suspicious of any email with urgent requests for personal financial information unless the email is digitally signed.&lt;/li&gt;&lt;li&gt;If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body. Instead, call the company on the telephone, or log onto the website directly by typing in the Web address in your browser.&lt;/li&gt;&lt;li&gt;Avoid filling out forms in email messages that ask for personal financial information. You should only communicate information such as credit card numbers or account information via a secure website or the telephone.&lt;/li&gt;&lt;li&gt;Before submitting financial information through a Web site, look for the &quot;lock&quot; icon on the browser&#39;s status bar. It means your information is secure during transmission.&lt;/li&gt;&lt;li&gt;If you are uncertain about the information, contact the company through an address or telephone number you know to be genuine.&lt;/li&gt;&lt;li&gt;Consider installing a Web browser tool bar to help protect you from known fraudulent websites. These toolbars match where you are going with lists of known phisher Web sites and will alert you.&lt;/li&gt;&lt;li&gt;Regularly log into and check your online accounts, bank, credit and debit card statements to ensure that all transactions are legitimate. Don&#39;t leave it for as long as a month before you check each account. If anything is suspicious or you don&#39;t recognize the transaction, contact your bank and all card issuers.&lt;/li&gt;&lt;li&gt;If you unknowingly supplied personal or financial information, contact your bank and Credit Card Company immediately.&lt;/li&gt;&lt;li&gt;Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly. And always be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them.&lt;/li&gt;&lt;li&gt;Forward phishing emails to &lt;a href=&quot;mailto:spam@uce.gov&quot;&gt;spam@uce.gov&lt;/a&gt; – and to the company, bank, or organization impersonated in the phishing email. You also may report phishing email to &lt;a href=&quot;mailto:reportphishing@antiphishing.org&quot;&gt;reportphishing@antiphishing.org&lt;/a&gt;. Suspicious e-mail can be forwarded to uce@ftc.gov, and complaints should be filed with the state attorney general&#39;s office or through the FTC at &lt;a href=&quot;http://www.ftc.gov/&quot;&gt;http://www.ftc.gov/&lt;/a&gt;. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Besides that, users can install Phishing Filter. It offers dynamic new technology to help protect internet users from Web fraud and the risks of personal data theft. Scams known as &quot;phishing scams” typically attempt to lure users into visiting phony Web sites where the personal information or credit card information can be collected for criminal use. This form of identity theft is growing quickly on the Web.&lt;/p&gt;&lt;p&gt;Phishing Filter includes several patent-pending technologies designed to warn or block users from potentially harmful Web sites. There are three ways Phishing Filter helps to protect:&lt;/p&gt;&lt;p&gt;1. &lt;strong&gt;A built-in filter&lt;/strong&gt; in your browser that scans the Web addresses and Web pages you visit for characteristics associated with known online Web fraud or phishing scams, and warns you if sites you visit are suspicious.&lt;/p&gt;&lt;p&gt;2. &lt;strong&gt;An online service&lt;/strong&gt; to help block you from confirmed scams with up-to-the-hour information about reported phishing Web sites. (Phishing sites often appear and disappear in 24–48 hours, so up-to-the-hour information is critical to protection.)&lt;/p&gt;&lt;p&gt;3. &lt;strong&gt;A built-in way for you to report suspicious sites or scams&lt;/strong&gt;. With Phishing Filter, you can help provide valuable information on any Web sites you believe are potentially fraudulent phishing attacks. You submit the information to Microsoft and Microsoft evaluates it. If the information is confirmed, the online service adds the information to a database to help protect the community of Internet Explorer users.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: rgb(102, 0, 204);&quot;&gt;&lt;strong&gt;Related Links:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;1. &lt;a href=&quot;http://en.wikipedia.org/wiki/Phishing&quot;&gt;http://en.wikipedia.org/wiki/Phishing&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://www.wordspy.com/words/phishing.asp&quot;&gt;http://www.wordspy.com/words/phishing.asp&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.planb-security.net/wp/503167-001_PhishingDetectionandPrevention.pdf&quot;&gt;http://www.planb-security.net/wp/503167-001_PhishingDetectionandPrevention.pdf&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://www.phishtank.com/what_is_phishing.php?view=website&quot;&gt;http://www.phishtank.com/what_is_phishing.php?view=website&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://www.flickr.com/photos/brennansg/290704431/sizes/o/&quot;&gt;http://www.flickr.com/photos/brennansg/290704431/sizes/o/&lt;/a&gt;&lt;br /&gt;6. &lt;a href=&quot;http://www.flickr.com/photos/23385905@N04/3333805334/&quot;&gt;http://www.flickr.com/photos/23385905@N04/3333805334/&lt;/a&gt;&lt;br /&gt;7. &lt;a href=&quot;http://www.antiphishing.org/consumer_recs.html&quot;&gt;http://www.antiphishing.org/consumer_recs.html&lt;/a&gt;&lt;br /&gt;8. &lt;a href=&quot;http://www.onguardonline.gov/topics/phishing.aspx&quot;&gt;http://www.onguardonline.gov/topics/phishing.aspx&lt;/a&gt;&lt;br /&gt;9. &lt;a href=&quot;http://www.microsoft.com/protect/products/yourself/phishingfilter.mspx&quot;&gt;http://www.microsoft.com/protect/products/yourself/phishingfilter.mspx&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/723997058203730523/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/phishing-examples-and-its-prevention.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/723997058203730523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/723997058203730523'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/phishing-examples-and-its-prevention.html' title='Phishing: Examples and its prevention methods'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJVWb05gHWrxsbLxa5WaL7q8o2gvXA5_YdPY3uRMYPF-Izf-Zf1bt9ucx1udcbNEi67EFKIRAjDzrCi3WApxGAA-SjTeRua44Z3tCcYznsYzNMwz99Go3Y0w9ULKHfhdpKw-fN9-O-F_aW/s72-c/paypal1.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-6704854881893048431</id><published>2009-06-27T17:26:00.019+08:00</published><updated>2009-07-17T13:44:46.356+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Online security"/><title type='text'>The threat of online security: How safe is our data?</title><content type='html'>Just about anyone that gets online is at risk. Online security threats are one of the biggest challenges on the Internet today. The problem is that the people that want to attack your computer and the computers of the people that you know don&#39;t create difficult methods to create problems instead they focus on common failures that will give them access. When those that get on the Internet know how these attacks take place, these attacks can be lessened and even prevented in most cases.&lt;br /&gt;&lt;br /&gt;The best thing you can do if you get on the Internet at all is to use security software and hardware such as firewalls and authentication servers, as this is the most effective way to protect your computer and your personal information.&lt;br /&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;The problem is that every day there are new viruses and security threats that are launched all over the Internet, which means you need programs that can be updated continuously and don&#39;t just target one specific type of problem.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;It is best if you choose hardware and software that will update itself each time you are on the Internet, without you having to remember. It&#39;s also very important that you choose your passwords carefully, so that those that might want access to your information won&#39;t be able to guess as to what password you might use.&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;strong&gt;Some of the online security threats are:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjak89EYfhsdlHJ_2iSMTv6Mg_joOHlxtsZ-9jwnyWwRD1S1GU0gw-0YcNAcdM9ZF4kBdZqvr020uWwXlFCZji00xcqY84mgSH0nCmKMd_riN2KTK4a72avugxI5bfxhONKt8j2eH7xKse9/s1600-h/virus.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353320020620011330&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 163px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjak89EYfhsdlHJ_2iSMTv6Mg_joOHlxtsZ-9jwnyWwRD1S1GU0gw-0YcNAcdM9ZF4kBdZqvr020uWwXlFCZji00xcqY84mgSH0nCmKMd_riN2KTK4a72avugxI5bfxhONKt8j2eH7xKse9/s200/virus.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;1. Computer viruses&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;The most common form of malicious code is a computer virus, a program or a fragment of code that replicates by attaching copies of itself to other programs.&lt;br /&gt;&lt;br /&gt;There are four main classes of viruses:&lt;br /&gt;(a) The first class consists of file infectors, which imbed themselves into ordinary executable files and attach to other system executables when the file is run.&lt;br /&gt;&lt;br /&gt;(b) The second category is system or boot-record infectors, which infect the first sector on a driver from which the operating system is booted-up. These viruses are not as prevalent now that floppy disks are less frequently used.&lt;br /&gt;&lt;br /&gt;(c) The third group of viruses is called macro viruses, which infect data files that include scripting &quot;macros.&quot;&lt;br /&gt;&lt;br /&gt;(d) Finally, viruses that use more than one attack method are called multi-part viruses.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtAxaxMfeLCaAfYmmg6H7hoWRUcPSiyoZjOo7Bkinry0wiKKN0W6zFuob_FQ2VphPy7XrdoGvk9XvvFJ2K0IojL6x8tSUitO3cX3vJ4ZotHaVBY1VQ8k3204qeqD0GUu-y-VALn_VBRVSd/s1600-h/i+love+you+virus.bmp&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSpFmBZbS7nXHyP4jhE0825_KON0YRYQP9bM9Q1ceIi0_Sm1vyHZ9MqtymQidqbsvcOKjehyphenhyphenB6akB65s4YGA9AU7cbAwL3n73N-HdXB6iHTHCIRBAp6Qxq-i1Ij8t6oiTSFGbynRxCn1ps/s1600-h/i+love+you+virus.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353320918848163394&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 222px; CURSOR: hand; HEIGHT: 254px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSpFmBZbS7nXHyP4jhE0825_KON0YRYQP9bM9Q1ceIi0_Sm1vyHZ9MqtymQidqbsvcOKjehyphenhyphenB6akB65s4YGA9AU7cbAwL3n73N-HdXB6iHTHCIRBAp6Qxq-i1Ij8t6oiTSFGbynRxCn1ps/s320/i+love+you+virus.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;For example, the May 2000 &quot;&lt;span style=&quot;color:#ff0000;&quot;&gt;I LOVE YOU&lt;/span&gt;&quot; virus was even simpler a small piece of code attached to electronic mail. Double-clicking on the executable caused it to send an e-mail to everyone in an address book, subsequently damaging victims&#39; machines. Fast-spreading viruses like &quot;I LOVE YOU&quot; cause e-mail servers to overload and businesses to shut down email correspondence. For example, in one day, the &quot;I LOVE YOU&quot; virus caused over $100 million in United States damages and over $1 billion in worldwide losses.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj26cTFi2AKw0PdNu9y9E3ox0CJxE2jM1PbPBpsd9x0tGjcdyy7VolF1hFPAxxz2x4J5HtSb6grWoBAW-vP_tA6v8CEjRVCnn_URw3lZYqn9TAh0xL5jlAxVCIZcxUOyXMBfzhFe9VED9Gd/s1600-h/DOS.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353321685791571058&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 221px; CURSOR: hand; HEIGHT: 320px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj26cTFi2AKw0PdNu9y9E3ox0CJxE2jM1PbPBpsd9x0tGjcdyy7VolF1hFPAxxz2x4J5HtSb6grWoBAW-vP_tA6v8CEjRVCnn_URw3lZYqn9TAh0xL5jlAxVCIZcxUOyXMBfzhFe9VED9Gd/s320/DOS.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;2. Denial of Service Attacks (DOS)&lt;/span&gt;&lt;/strong&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhetpW9xu1mxmrln_czlOvHKXpucFv-QlAXnw4C1G_NDUZ1RkYzB0saDXsyrbmz-mYtAp5yp-l6Qczpk1_DvY5Zd4mxL2vIMULIbxDC79ibQBp9g1XqlLYyDPng3xfGTKickS3pbhXgkGE1/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;br /&gt;DOS is another form of malicious code, are carefully crafted and executed. DOS attacks are not new, yet they are growing in sophistication. Traditional DOS attacks usually involve one computer attacking another, but the use of multiple computers in a highly organized attack is becoming increasingly common. Such attacks, known as &lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;strong&gt;Distributed Denial of Service attacks&lt;/strong&gt; (&lt;strong&gt;DDOS&lt;/strong&gt;&lt;/span&gt;), were witnessed in a number of large corporate computer shutdowns in 2000. Understanding the technical components of a DDOS attack is important, since these attacks precisely reveal the vulnerabilities inherent to the Internet. A DDOS attack functions by overwhelming a server with a deluge of messages that appear to be normal.&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353328003185082306&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 233px; CURSOR: hand; HEIGHT: 188px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s320/DDOS+attacks.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0El4jxQxZmFLDx1hz_01R8-Er3q_mzTiO94aAqQxT_w5AYoAaRX_N5A3WRKwYZHUx4S4lInLMJ9AnkzsUpS8asRQa9SK13SZt6Fwi2j5ayHqq9BZooqh1_tTKOFLONrtW9zlLhyphenhyphenQB8gd/s1600-h/DDOS+attacks.gif&quot;&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;/p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;&lt;div align=&quot;justify&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir-HUPpOvsy8p-v9CNCkWNhsuy2DbsHNyfiYSclSmhChjo9GfBoq76CY90cOmRy5TJHDyu0bL6GbAHGEsN58B8eRGE0FKcGsIAN3fEJEdeynv9IRM_q1cRkO7uk7vmdK3ph9iJ5KdITHjm/s1600-h/online+fraud.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353322790941287378&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 291px; CURSOR: hand; HEIGHT: 212px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir-HUPpOvsy8p-v9CNCkWNhsuy2DbsHNyfiYSclSmhChjo9GfBoq76CY90cOmRy5TJHDyu0bL6GbAHGEsN58B8eRGE0FKcGsIAN3fEJEdeynv9IRM_q1cRkO7uk7vmdK3ph9iJ5KdITHjm/s320/online+fraud.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;3. Online fraud&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;It is a broad term covering Internet transactions that involve falsified information. Some of the most common forms of online fraud are the sale via Internet of counterfeit documents, such as fake IDs, diplomas, and recommendation letters sold as credentials; offers of easy money, such as work at-home offers that claim to earn individuals thousands of dollars for trivial tasks; prank calls, in which dial-up connections lead to expensive long distance charges; and charity facades, where donations are solicited for phony causes.&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1IRB5SL3_KVDaXTmQZYTTZRvkKba3Sex_e23FqCvcjpOOPdCDamJ4vOl-v2yJODQDbf_j0-oCMYCXDOLiQDLMpawa5H5cfE0fH_raoYyBFFkU_9K3uMVfsrkJAdBd-_IuKKGQvoYmWHjq/s1600-h/phishing.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353323127537072818&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 135px; CURSOR: hand; HEIGHT: 109px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1IRB5SL3_KVDaXTmQZYTTZRvkKba3Sex_e23FqCvcjpOOPdCDamJ4vOl-v2yJODQDbf_j0-oCMYCXDOLiQDLMpawa5H5cfE0fH_raoYyBFFkU_9K3uMVfsrkJAdBd-_IuKKGQvoYmWHjq/s200/phishing.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;4. Phishing&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;It is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses. These authentic-looking messages are designed to fool recipients into divulging personal data such as account numbers and passwords, credit card numbers. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8P709R7vy77p7CpVZ5nUVoyotoWGFrBDsofH7RGtwNCVgmerJ2bsZ7uclMNMLBN_YpgdgTxxbIfD8YIyVMAwFq36PUF7Daq3VlqRdGb3reQ_J6kl9AtM8Crjj-pXfDFo8VE5giY1C9h59/s1600-h/worms.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353323368983763858&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 196px; CURSOR: hand; HEIGHT: 200px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8P709R7vy77p7CpVZ5nUVoyotoWGFrBDsofH7RGtwNCVgmerJ2bsZ7uclMNMLBN_YpgdgTxxbIfD8YIyVMAwFq36PUF7Daq3VlqRdGb3reQ_J6kl9AtM8Crjj-pXfDFo8VE5giY1C9h59/s200/worms.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;5. Worms&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;A computer worm is a self-replicating &lt;a title=&quot;Computer program&quot; href=&quot;http://en.wikipedia.org/wiki/Computer_program&quot;&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;computer program&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color:#000000;&quot;&gt;.&lt;/span&gt; It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver&#39;s address book, and the manifest continues on down the line.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTQzksjux3dPQ1olpdsp7K0a0ynHIf79wMdva6SFUXVuGf-KEIqNb0ecCHzbGCIdc632bk1ZpZwzMszwKH_w122VznV19KgVVlHCpf_zOAGqu0FnNEcvKq3NBz04FBHjphg40N3fzuruvL/s1600-h/trojan+horse.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353323807815647282&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 224px; CURSOR: hand; HEIGHT: 286px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTQzksjux3dPQ1olpdsp7K0a0ynHIf79wMdva6SFUXVuGf-KEIqNb0ecCHzbGCIdc632bk1ZpZwzMszwKH_w122VznV19KgVVlHCpf_zOAGqu0FnNEcvKq3NBz04FBHjphg40N3fzuruvL/s200/trojan+horse.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;6. Trojan horse&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;The Trojan Horse, at first glance will appear to be useful &lt;a href=&quot;http://www.webopedia.com/TERM/s/software.html&quot;&gt;software&lt;/a&gt; but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your &lt;a href=&quot;http://www.webopedia.com/TERM/d/desktop.html&quot;&gt;desktop&lt;/a&gt;, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a &lt;a href=&quot;http://www.webopedia.com/TERM/b/backdoor.html&quot;&gt;backdoor&lt;/a&gt; on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;7. Web servers and services&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Many default HTTP web servers expose visitors every time they log on to these websites. You should be sure that you have the patches available that have been released over the last few years and that your computer isn&#39;t utilizing a default configuration. &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6btoNTPkpZcsJBMafXY1n0ZorFO_2PIqdGh6gGWya7pSP2iypvV43ktk9ZZwSWs0QA3hfoowwxNPpSYpMroIipnbp-HTkMojYbVSRxiaYjfTuwqGJIw1M3Au_xd0sEaggzwNwa1QgguFk/s1600-h/spyware.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5353324280009215186&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 245px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6btoNTPkpZcsJBMafXY1n0ZorFO_2PIqdGh6gGWya7pSP2iypvV43ktk9ZZwSWs0QA3hfoowwxNPpSYpMroIipnbp-HTkMojYbVSRxiaYjfTuwqGJIw1M3Au_xd0sEaggzwNwa1QgguFk/s320/spyware.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color:#cc66cc;&quot;&gt;8. Spyware attacks&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Spyware attacks are something that we are probably all familiar with, as they are the most common online security threat faced by Internet users. Spyware is simply a computer program that is designed to steal information from your computer without your knowledge. The software will typically be installed on your computer without you even knowing it, and then it will send your personal information such as documents, passwords, credit card numbers, bank accounts, and many others to another source. Common spyware includes Trojan horses, key loggers, dialers, and adware programs.&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color:#006600;&quot;&gt;&lt;em&gt;Online threats are very real, but if you know how you become vulnerable, you will be able to better protect yourself. You should be able to get online without constantly worrying.&lt;br /&gt;&lt;/div&gt;&lt;/em&gt;&lt;/span&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;Below are some of the tips for keeping the company data safe:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;1. Encrypt it&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;It&#39;s one of the most overlooked-and easily fixable-precautions that a small business can take.&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;2. Back it up&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;When data goes missing, it is often the only copy. Not only has the information potentially fallen into the wrong hands, but it&#39;s probably also lost forever. Make sure to back up all important files onto the company servers before leaving town. If those servers are in turn backed up to an e-vaulting provider, it may be possible to restore your files directly from the provider to your hastily-purchased replacement.&quot;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;3. Travel smart with your technology&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;A few simple precautions can prevent data loss, that is never leave your laptop unattended. Don&#39;t leave it in the car, in the conference room, or in the workspace you&#39;re using at a client&#39;s office unless it is locked.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;4. Do not work from an unsecured computer&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Many hotels and conference centers offer courtesy PCs to guests so they can access e-mail while they&#39;re away. The single most important tip for securing road warrior information is to minimize work done on a local computer. The better way will be directly connect to a remote server for document and data management, preferable from your own PC or PDA. Many of these public computers are infected with spyware that monitors and records your keystrokes. It is important to not be lulled into a false sense of security.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;5. Use a password&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Believe it or not, many mobile devices lack even the most basic password-protection. Passwords are among the simplest and most reliable form of data protection available. There are four basic password rules. First, make sure your password is at least eight characters. Second, include at least one number, one capital letter and one special character, such as &quot;#&quot; (but don&#39;t use numbers instead of letters, such as m0us3, since password crackers check for these). Third, never use a word that can be found in a dictionary, thereby preventing a &quot;dictionary attack.&quot; And finally, resist the urge to use personal information such as your birthday because this information can be found out.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;6. Get on a stick&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Instead of carrying your company&#39;s sensitive data on a PC or PDA, keep it on a memory stick or portable hard drive. It doesn&#39;t matter if your laptop is stolen or damaged, your data will be fine as long as you have the USB memory device. As a bonus, many of these devices allow you to encrypt the information on them, so even if they are lost, they&#39;re useless.&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;7. Get a security policy and stick to it&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Having an ironclad policy about how to treat company laptops will take you a long way in keeping your data safe. Such a policy should be comprehensive. It should address what to do with a laptop, anytime and anywhere, regardless if the laptop is on, off or even online. A server that is deployed on the enterprise premise should terminate secure tunnels and manage user credentials, patch management and security policies.&lt;/div&gt;&lt;br /&gt;&lt;div align=&quot;justify&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;8. Inoculate your laptops before releasing them into the wild&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;There is a lot of bad stuff out there. Make sure your employees&#39; mobile computing devices are protected. Be sure your laptop is equipped with the right blend of IT security: anti-spam, anti-spyware, a Virtual Private Network and a personal firewall because hackers use a variety of tactics to defeat security.&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;9. Educate your employees&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;If your people do not know what is out there, how can they take the necessary precautions? Mobile users should be aware of every site they visit and every communication they open on their mobile devices. Unsolicited communications, no matter how inviting, can contain threats to the mobile device. People should only open communications from known sources and limit mobile Internet browsing to trusted sites.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;10. Don&#39;t be stupid&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;People display highly sensitive data, like company secrets and even information that could facilitate identity thefts, on their laptops. They do not bother to install an inexpensive polarizing overlay that could avoid shoulder-surfing. In other words, if your case says &quot;IBM&quot; or &quot;HP&quot; or &quot;DELL&quot; or even a well-known manufacturer of computer bags, you have increased your radar profile for thieves. There are lots of less noticeable bags out there that can help you avoid being the next victim.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;11. Consider data-level security precautions&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;These add yet another layer of security to your documents, protecting them from would-be thieves. There are cost-effective security solutions on the market that are easily integrated with Microsoft products like Exchange, SharePoint and the Office suite. They provide a simple way for small businesses to benefit from these solutions without radically changing existing IT policies and procedures.&quot;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;12. Do not leave well enough alone&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;If you&#39;re really concerned with security, these precautions just represent a good start. Experts say you should always be working to improve your safeguards, even as the bad guys try to crack your defenses. You have to control who can access your data. For companies that are serious about security, a user ID and password are not good enough. There should be some form of two-factor authentication, like a Smart Card, USB token or SoftCerts. But do not rely solely on passwords. Keeping your data safe while you&#39;re out of the office is an ongoing challenge.&lt;br /&gt;&lt;br /&gt;Besides that, another way for company to secure customer information is &lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;outsourcing security service&lt;/span&gt;&lt;/strong&gt;. But company has to be careful not to outsource privacy completely, or to rely too much on the consultant to make important decisions. Turn to outside help for direction, but always remain of its own programme.&lt;br /&gt;&lt;br /&gt;Company should also &lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;limit the connectivity&lt;/span&gt;&lt;/strong&gt; for example, limit downloads. Do not simply download software that you have never heard of, instead stick with the names that you know. You should also take care to scan all files before they are downloaded.&lt;br /&gt;&lt;br /&gt;The employees of the company &lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;use only authorized media&lt;/span&gt;&lt;/strong&gt; for loading data and software.&lt;br /&gt;&lt;br /&gt;On the other hand, enforce the &lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;mandatory access controls&lt;/span&gt;&lt;/strong&gt;. The employees of the company should always remember to scan their computer with &lt;strong&gt;&lt;span style=&quot;color:#339999;&quot;&gt;Anti-virus&lt;/span&gt;&lt;/strong&gt;. Delete all the cookies in the computer to prevent track on the history or password and on the&lt;strong&gt; &lt;span style=&quot;color:#339999;&quot;&gt;firewall&lt;/span&gt;&lt;/strong&gt; to prevent hackers.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#000066;&quot;&gt;In conclusion, with a few precautions and by taking a long view on mobile security, you can make sure the company’s valuable information does not fall into the wrong hands.&lt;/span&gt;&lt;/strong&gt; &lt;/span&gt;&lt;/em&gt;&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;span style=&quot;color:#000066;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;div align=&quot;justify&quot;&gt;1. &lt;a href=&quot;http://www.tech-faq.com/online-security-threats.shtml&quot;&gt;http://www.tech-faq.com/online-security-threats.shtml&lt;/a&gt;&lt;br /&gt;2.&lt;a href=&quot;http://www.microsoft.com/smallbusiness/resources/technology/security/Keep-data-safe-on-the-road-12-tips.aspx#Keepdatasafeontheroad12tips&quot;&gt;http://www.microsoft.com/smallbusiness/resources/technology/security/Keep-data-safe-on-the-road-12-tips.aspx#Keepdatasafeontheroad12tips&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp&quot;&gt;http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp&lt;/a&gt; &lt;/div&gt;&lt;div align=&quot;justify&quot;&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/6704854881893048431/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/threat-of-online-security-how-safe-is.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/6704854881893048431'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/6704854881893048431'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/threat-of-online-security-how-safe-is.html' title='The threat of online security: How safe is our data?'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjak89EYfhsdlHJ_2iSMTv6Mg_joOHlxtsZ-9jwnyWwRD1S1GU0gw-0YcNAcdM9ZF4kBdZqvr020uWwXlFCZji00xcqY84mgSH0nCmKMd_riN2KTK4a72avugxI5bfxhONKt8j2eH7xKse9/s72-c/virus.jpg" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-5976349448421609914</id><published>2009-06-22T12:49:00.001+08:00</published><updated>2009-07-17T13:45:08.043+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Advantages of E-Commerce"/><category scheme="http://www.blogger.com/atom/ns#" term="Disadvantages of E-Commerce"/><title type='text'>Advantages and disadvantages of E-Commerce</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0t7X_DZzcKLiC5zSiShly0bKl_FH363ea3ZDcYopHYC1w2rn_B0H9A3Qm2q9iRBLOgIUr9khB84C9ZlCABFgda6WlLSIW3lTe__E6ZkdQUgO6Ozicq1s-n3CECNNHfnW3hJh-xR69BsXZ/s1600-h/img_ecommerce.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5359288790016672690&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 350px; CURSOR: hand; HEIGHT: 300px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0t7X_DZzcKLiC5zSiShly0bKl_FH363ea3ZDcYopHYC1w2rn_B0H9A3Qm2q9iRBLOgIUr9khB84C9ZlCABFgda6WlLSIW3lTe__E6ZkdQUgO6Ozicq1s-n3CECNNHfnW3hJh-xR69BsXZ/s400/img_ecommerce.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;strong&gt;E-Commerce&lt;/strong&gt; is playing a very essential role in the online business world. Although it is one of the best and cheapest intermediate ways for reaching out to new customers in the online market, but, if e-commerce implemented effectively, it also offers a smart way of doing online business &amp;amp; expanding it more. Furthermore, e-commerce is planned and implemented to provide customer with a convenient, satisfying and protected shopping experience.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#006600;&quot;&gt;Advantages&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33cc00;&quot;&gt;1. Being able to conduct business&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;E-commerce systems can operate throughout the day. The physical storefront does not need to be open in order for customers and suppliers to be doing business with the company electronically.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33cc00;&quot;&gt;2. Access the global marketplace&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;The Internet spans the world, and it is possible to do business with any business or person who is connected to the Internet. Simple local businesses such as specialist record stores are able to market and sell their offerings internationally using e-commerce. This global opportunity is assisted by the fact that, unlike traditional communications methods, users are not charged according to the distance over which they are communicating.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33cc00;&quot;&gt;3. Speed&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;Electronic communications allow messages to traverse the world almost instantaneously. There is no need to wait weeks for a catalogue to arrive by post: that communications delay is not a part of the Internet / e-commerce world.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33cc00;&quot;&gt;4. Marketplace&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;The market in which web-based businesses operate is the global market. It may not be evident to them, but many businesses are already facing international competition from web-enabled businesses&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33ff33;&quot;&gt;&lt;span style=&quot;color:#33cc00;&quot;&gt;5. Opportunity to reduce costs&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;The Internet makes it very easy to &#39;shop around&#39; for products and services that may be cheaper or more effective than we might otherwise settle for. It is sometimes possible to, through some online research, identify original manufacturers for some goods - thereby bypassing wholesalers and achieving a cheaper price.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;Disadvantages&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33ccff;&quot;&gt;1. Time for delivery of physical products&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;E-commerce is often used to buy goods that are not available locally from businesses all over the world, meaning that physical goods need to be delivered, which takes time and costs money.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33ccff;&quot;&gt;2. Physical product, supplier &amp;amp; delivery uncertainty&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;In some aspects e-commerce purchases are made on trust. This is because, firstly, not having had physical access to the product, a purchase is made on an expectation of what that product is and its condition. Secondly, because supplying businesses can be conducted across the world, it can be uncertain whether or not they are legitimate businesses and are not just going to take your money. Thirdly, even if the item is sent, it is easy to start wondering whether or not it will ever arrive.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33ccff;&quot;&gt;3. Returning goods&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;Returning goods online can be an area of difficulty. The uncertainties surrounding the initial payment and delivery of goods can be exacerbated in this process. Will the goods get back to their source? Who pays for the return postage? Will the refund be paid? Will I be left with nothing? How long will it take? Contrast this with the offline experience of returning goods to a shop.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#33ccff;&quot;&gt;4. Privacy, security, payment, identity, contract&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Many issues arise - privacy of information, security of that information and payment details, whether or not payment details (e.g. credit card details) will be misused, identity theft, contract, and, whether we have one or not, what laws and legal jurisdiction apply.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://www.smarte-commerce.com/advantages-of-e-commerce-in-present-business-scenario/&quot;&gt;http://www.smarte-commerce.com/advantages-of-e-commerce-in-present-business-scenario/&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://www.marcbowles.com/sample_courses/amc/ec1/ec1_3.htm&quot;&gt;http://www.marcbowles.com/sample_courses/amc/ec1/ec1_3.htm&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.isos.com.my/ecommerce/advantages.htm&quot;&gt;http://www.isos.com.my/ecommerce/advantages.htm&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://wiki.media-culture.org.au/index.php/E-commerce_-_Overview_-_Advantages&quot;&gt;http://wiki.media-culture.org.au/index.php/E-commerce_-_Overview_-_Advantages&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/5976349448421609914/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/advantages-and-disadvantages-of-e.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/5976349448421609914'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/5976349448421609914'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/07/advantages-and-disadvantages-of-e.html' title='Advantages and disadvantages of E-Commerce'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0t7X_DZzcKLiC5zSiShly0bKl_FH363ea3ZDcYopHYC1w2rn_B0H9A3Qm2q9iRBLOgIUr9khB84C9ZlCABFgda6WlLSIW3lTe__E6ZkdQUgO6Ozicq1s-n3CECNNHfnW3hJh-xR69BsXZ/s72-c/img_ecommerce.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-9207841757788564141</id><published>2009-06-21T02:25:00.025+08:00</published><updated>2009-06-22T16:32:31.411+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Amazon.com"/><category scheme="http://www.blogger.com/atom/ns#" term="E-Commerce Revenue Model"/><category scheme="http://www.blogger.com/atom/ns#" term="eBay"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><title type='text'>Revenue Model for Google, eBay &amp; Amazon.com</title><content type='html'>&lt;span style=&quot;;font-family:&#39;;&quot; &gt;E-Commerce Revenue Model describes how the publisher’s websites will earn revenue, generate profits, and produce a superior return on invested capital. The 5 major types are &lt;em&gt;sales&lt;/em&gt;, &lt;em&gt;transaction fees&lt;/em&gt;, &lt;em&gt;subscription fees&lt;/em&gt;, &lt;em&gt;advertising fees&lt;/em&gt;, &lt;em&gt;affiliate fees&lt;/em&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; &lt;/span&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(204, 0, 0);font-family:&#39;;&quot; &gt;Sales&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; - Sales of goods, merchandise information and services provided in the publishers&#39; websites.&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; &lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;color: rgb(255, 102, 0);font-family:&#39;;&quot; &gt;Transaction fees&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; - Commission earned based on either the volume of the transactions&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; (the higher the volume, the higher the transaction fees will be) or fees per transaction conducted on the website (a fixed fee per trade regardless of the volume). &lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: rgb(0, 153, 0);font-family:&#39;;&quot; &gt;&lt;br /&gt;Advertisement fees&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; - Publishers can allocate some advertisements spaces in their website for other companies to place their banners or advertisement, in return for a fee named advertisement fees.&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; &lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: rgb(51, 51, 255);font-family:&#39;;&quot; &gt;&lt;br /&gt;Subscription fees&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; - customers would have to pay a fixed amount of fees either monthly or yearly when they are subscribing to contents and services offered by the website.&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; &lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(102, 51, 255);font-family:&#39;;&quot; &gt;Affiliate fees&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; - Companies receive commissions for referring customers to others&#39; websites.&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; It can include CPM (cost per thousand impressions), CPC (cost per click) and CPA (cost per acquisition/action). &lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:&#39;;&quot; &gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN_aNEHjNfz98VL9VPK3yQaG-fwjD0Nxp4dk-oZmKHng45DJNnBXhKQdbdWXlCl5LiE36zwV9eKGXF-0TyhjkkFyUhbyauKFsYBO-AuD_igBcJL7j7zfoCBMdihujX6X4KHp7jKQmbaX6b/s1600-h/Google.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349662938495166210&quot; style=&quot;margin: 0px 10px 10px 0px; float: left; width: 320px; height: 111px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN_aNEHjNfz98VL9VPK3yQaG-fwjD0Nxp4dk-oZmKHng45DJNnBXhKQdbdWXlCl5LiE36zwV9eKGXF-0TyhjkkFyUhbyauKFsYBO-AuD_igBcJL7j7zfoCBMdihujX6X4KHp7jKQmbaX6b/s320/Google.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Google Inc.&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; is an American public corporation, earning &lt;i style=&quot;color: rgb(51, 102, 255);&quot;&gt;revenue from advertising&lt;/i&gt; related to its Internet search, e-mail, online-mapping, office productivity, social networking and video sharing&lt;a title=&quot;YouTube&quot; href=&quot;http://en.wikipedia.org/wiki/YouTube&quot;&gt;&lt;/a&gt; services as well as selling advertising-free versions of the same technologies. 99% of Google&#39;s revenue is derived from its advertising programs. For the 2006 fiscal year, the company reported US$10.492 billion in total advertising revenues and only US$112 million in licensing and other revenues. Google offers targeted advertising solutions and global Internet search solutions. Its principal products and services include:&lt;/span&gt; &lt;/p&gt;&lt;div&gt;&lt;strong&gt;Google AdWords.&lt;/strong&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; &lt;strong&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;It&lt;/span&gt;&lt;/strong&gt; is Google&#39;s flagship advertising product and main source of revenue ($21 billion in 2008). &lt;i style=&quot;color: rgb(51, 0, 153);&quot;&gt;AdWords&lt;/i&gt; is a &lt;strong style=&quot;color: rgb(51, 0, 153);&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;pay per click advertising program&lt;/span&gt;&lt;/i&gt;&lt;/strong&gt; of Google designed to allow the advertisers to present advertisements to people at the instant the people are looking for information related to what the advertiser has to offer. When a user searches Google&#39;s search engine, ads for relevant words are shown as &quot;sponsored link&quot; on the right side of the screen, and sometimes above the main search results. Google generate most of the revenue from &lt;i style=&quot;color: rgb(51, 0, 153);&quot;&gt;Google AdWords&lt;/i&gt;. Google recognize as revenue the fees charged advertisers when their ads are published in magazines. &lt;i style=&quot;color: rgb(51, 0, 153);&quot;&gt;Pay-Per-Click (PPC)&lt;/i&gt;&lt;span style=&quot;color: rgb(51, 0, 153);&quot;&gt; &lt;/span&gt;is an online advertising payment model in which payment is based on qualifying click-through. An advertiser has to pay every time his ad receives a click. The Advertisers decide the keywords relevant to their offer that should display their ad and the maximum amount they are willing to pay per click for that keyword.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwFvSNGv0pyRuHms2NfFJrA2mXX57wFVP9QzlPehyphenhyphen-O82Zpr_KlRiOzaLSMYMHbQOXPPZPEOM8ozES1w9cYn9EUCVs3-FRBFTI_EpybIz5YHfe3yL6aj0a-qqSPLGIgYb7ErgADAdZ6-Bg/s1600-h/Untitled.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 417px; height: 194px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwFvSNGv0pyRuHms2NfFJrA2mXX57wFVP9QzlPehyphenhyphen-O82Zpr_KlRiOzaLSMYMHbQOXPPZPEOM8ozES1w9cYn9EUCVs3-FRBFTI_EpybIz5YHfe3yL6aj0a-qqSPLGIgYb7ErgADAdZ6-Bg/s400/Untitled.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5350064304861054162&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;strong&gt;Google AdSense&lt;/strong&gt;&lt;strong&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;. It&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; is an &lt;strong&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;ad serving&lt;/span&gt;&lt;/strong&gt;&lt;b&gt; &lt;/b&gt;program run by Google&lt;strong&gt;&lt;/strong&gt;. It provides a fast and easy way for website publishers of all sizes to display relevant Google ads on their website&#39;s content pages and earn money. It&#39;s also a way for website publishers to provide Google web and site search to their visitors, and to earn money by displaying Google ads on the search results pages. &lt;strong&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Website&lt;/span&gt;&lt;/strong&gt; owners can enroll in this program to enable text, image and, video &lt;strong&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;advertisements&lt;/span&gt;&lt;/strong&gt;&lt;b&gt; &lt;/b&gt;on their sites. Revenue is generated through &lt;i style=&quot;color: rgb(51, 102, 255);&quot;&gt;affiliate fees&lt;/i&gt; which on a per-click or per-thousand-ads-displayed basis and the ads are administered by Google. AdSense program includes AdSense for search and AdSense for content. &lt;strong style=&quot;color: rgb(51, 0, 153);&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;AdSense for search&lt;/span&gt;&lt;/i&gt; &lt;/strong&gt;was launched in the first quarter of 2002 and is Google’s service for distributing relevant ads from its advertisers for display with search results on the Google Network members’ sites. &lt;strong style=&quot;color: rgb(51, 0, 153);&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;AdSense for content&lt;/span&gt;&lt;/i&gt;&lt;/strong&gt;, launched in the first quarter of 2003, distributes ads from Google’s advertisers that are relevant to content on Google Network members’ sites. Google advertisers are required to pay Google a fee each time a user clicks on one of their ads displayed on Google Network members’ web sites.&lt;/span&gt;&lt;/div&gt;&lt;p align=&quot;center&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtGZGzzaF8krCGKsLfZtP232ZqilJGQhN0B6g37G0et1RB8_LUDoj78QaHMfXn4ifnIvn6odKHLrCL0DR7nUjuNJbBvgvt2ZT46IIk5oRgSmx2_ORnMtUZEJU2qmydvJ2FEfPM3Njb2mBU/s1600-h/AAA.bmp&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349481930812800082&quot; style=&quot;width: 456px; cursor: pointer; height: 273px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtGZGzzaF8krCGKsLfZtP232ZqilJGQhN0B6g37G0et1RB8_LUDoj78QaHMfXn4ifnIvn6odKHLrCL0DR7nUjuNJbBvgvt2ZT46IIk5oRgSmx2_ORnMtUZEJU2qmydvJ2FEfPM3Njb2mBU/s400/AAA.bmp&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div&gt;&lt;span style=&quot;font-weight: bold;font-family:&#39;;&quot; &gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP7A9sPZOXLri5_1JUUr68IWDZfS0nWT54H754Wa9jymhzsAS2l9wrT6lMtdFVQe7I0Vrcfi5bQkqihYBc1YjM7nflNH_E7bBh4chlRUJ58NrJAeeshp_rpSDrewtGQh01pXgAQNaZnqee/s1600-h/800px-EBay_Logo_svg.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349661922242845250&quot; style=&quot;margin: 0px 10px 10px 0px; float: left; width: 320px; height: 133px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjP7A9sPZOXLri5_1JUUr68IWDZfS0nWT54H754Wa9jymhzsAS2l9wrT6lMtdFVQe7I0Vrcfi5bQkqihYBc1YjM7nflNH_E7bBh4chlRUJ58NrJAeeshp_rpSDrewtGQh01pXgAQNaZnqee/s320/800px-EBay_Logo_svg.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;eBay Inc.&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; is an American Internet company that manages eBay.com, an online auction and shopping website in which people and businesses buy and sell a broad variety of goods and services worldwide. eBay do not have inventory, it generates revenue from a number of fees. The eBay fee system is quite complex; there are fees to list a product (&lt;i&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;Insertion Fee&lt;/span&gt;&lt;/i&gt;) and fees when the product sells (&lt;i&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;Final Value F&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt;&lt;i style=&quot;color: rgb(51, 102, 255);&quot;&gt;ee&lt;/i&gt;), plus several optional adornment fees, all based on various factors and scales. eBay may earned &lt;em&gt;transaction fees&lt;/em&gt; from each successful transaction made by the bidders or sellers.&lt;span style=&quot;font-size:0;&quot;&gt;&lt;span style=&quot;font-size:0;&quot;&gt; &lt;/span&gt;&lt;/span&gt;eBay now owns the &lt;a href=&quot;http://www.paypal.com/&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;Paypal&lt;/span&gt; &lt;/a&gt;payment system which has fees of its own. Paypal founded in 1998 and acquired by eBay Inc. in October 2002. Paypal enables any individual or business with an email address to securely, easily and quickly send and receive payments online. Paypal&#39;s service builds on the existing financial infrastructure of bank accounts and credit cards and uses the world&#39;s most advanced proprietary fraud prevention systems to create a safe payment solution. A global leader in online payment solutions, Paypal has tens of millions of registered accounts and is accepted by millions of merchants worldwide, on and off eBay. &lt;span class=&quot;body&quot;&gt;Revenues from PayPal&#39;s transaction fees were $243.9 million, a gain of 51 percent from the year-ago quarter and 145 percent from querter2 2003. And the number of registered PayPal users shot up to 79 million from 50 million a year ago. ebay also earn &lt;i style=&quot;color: rgb(51, 102, 255);&quot;&gt;advertising fees&lt;/i&gt; for allow some advertiser posting their advertisement on the website. &lt;/span&gt;eBay offers several advertising programs that may help advertisement publishers increase their sales cost-effectively.&lt;/span&gt; &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifBhaj4ruJVfjCRmcdBdtiUtHPI9PpaeUhSVNjFpAAFWn8lmPaFNsjdprxjMVBSApkQ2WUcy8lFR0lhVhHcsnoKVmwZkamZx3KHFYzh9oi4u3OP0BSNtpwKQlUcvMVJBuAln0uN6oFn2zv/s1600-h/300px-Amazon_com_logo_svg.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349663677769802290&quot; style=&quot;margin: 0px 10px 10px 0px; float: left; width: 300px; height: 70px;&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifBhaj4ruJVfjCRmcdBdtiUtHPI9PpaeUhSVNjFpAAFWn8lmPaFNsjdprxjMVBSApkQ2WUcy8lFR0lhVhHcsnoKVmwZkamZx3KHFYzh9oi4u3OP0BSNtpwKQlUcvMVJBuAln0uN6oFn2zv/s320/300px-Amazon_com_logo_svg.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Amazon.com, Inc&lt;/span&gt;.&lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt; is an American-based multinational electronic commerce company. Amazon.com is a well known online shopping on the web, it provides a wide range of advertising channels to reach the most demographic availability. Amazon uses the internet as the sole method for selling goods to its consumers. Its major revenue is come from the&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt; &lt;/span&gt;&lt;i style=&quot;color: rgb(51, 102, 255);&quot;&gt;sales&lt;/i&gt; included books, movies, musics, computer, electronic, toys, sports and others on domestic and international Websites, such as Amazon Marketplace. Since year 2000, Amazon.com entered &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt;into new partnerships designed to increase the firm&#39;s revenue and make it profitable. Example like through its agreement with Greenlight.com, Amazon.com added cars to its product offerings in August 2000. The new link presented information on automobiles and trucks in the standard Amazon.com &lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt;format. &lt;/span&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;;font-family:&#39;;&quot; &gt;Amazon charges a commission rate based on the &lt;i style=&quot;color: rgb(51, 102, 255);&quot;&gt;sales&lt;/i&gt;&lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt; price&lt;/span&gt;, a &lt;i style=&quot;color: rgb(51, 102, 255);&quot;&gt;transaction fee&lt;/i&gt;, and a &lt;span style=&quot;color: rgb(51, 102, 255);&quot;&gt;variable closing fee&lt;/span&gt; for each successful sale. Amazon.com Inc. said that earnings climbed to $177 million, or 41 cents per share, in the first quarter in year 2009 was thanks to strong sales of products. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;;font-family:&#39;;font-size:100%;color:#6600cc;&quot;   &gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;&lt;span style=&quot;;font-family:&#39;;font-size:100%;&quot;  &gt;&lt;strong&gt;Related Links:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;1. &lt;a href=&quot;http://en.wikipedia.org/wiki/Google&quot;&gt;http://en.wikipedia.org/wiki/Google&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;2. &lt;a href=&quot;http://www.organicspam.com/google_revenue_model.asp&quot;&gt;http://www.organicspam.com/google_revenue_model.asp&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;3. &lt;a href=&quot;http://en.wikipedia.org/wiki/AdWords&quot;&gt;http://en.wikipedia.org/wiki/AdWords&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;4. &lt;a href=&quot;http://en.wikipedia.org/wiki/EBay&quot;&gt;http://en.wikipedia.org/wiki/EBay&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;5. &lt;a href=&quot;http://www.ecommerce-guide.com/essentials/ebay/article.php/3522981&quot;&gt;http://www.ecommerce-guide.com/essentials/ebay/article.php/3522981&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;6. &lt;a href=&quot;http://ecommerce.hostip.info/pages/29/Amazon-Com-NEW-PARTNERS-HELP-INCREASE-REVENUE.html&quot;&gt;http://ecommerce.hostip.info/pages/29/Amazon-Com-NEW-PARTNERS-HELP-INCREASE-REVENUE.html&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/9207841757788564141/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/revenue-model-for-google-ebay-amazoncom.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/9207841757788564141'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/9207841757788564141'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/revenue-model-for-google-ebay-amazoncom.html' title='Revenue Model for Google, eBay &amp; Amazon.com'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN_aNEHjNfz98VL9VPK3yQaG-fwjD0Nxp4dk-oZmKHng45DJNnBXhKQdbdWXlCl5LiE36zwV9eKGXF-0TyhjkkFyUhbyauKFsYBO-AuD_igBcJL7j7zfoCBMdihujX6X4KHp7jKQmbaX6b/s72-c/Google.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-606327990919369668</id><published>2009-06-21T01:01:00.035+08:00</published><updated>2009-07-13T15:02:13.019+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Causes of e-commerce failure"/><category scheme="http://www.blogger.com/atom/ns#" term="Example of E-Commerce failure"/><category scheme="http://www.blogger.com/atom/ns#" term="Toys &quot;R&quot; Us"/><title type='text'>An Example of an E-Commerce failure and its causes</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrri_61DeiWYZNJOM4Jn17bOTnSmH6XjESuLsmIl0YLE-A8fdkFVe5LoKQbakf9RFzsHScGFokw_SRBV9LzdAcWTKIns1ONBKABrg6oP1QGOA6hJEev1-ydKp6JwM9O8sEAspVX8FtHFpZ/s1600-h/297px-Toys_%2522R%2522_Us_logo_svg.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349650981667802786&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 297px; CURSOR: hand; HEIGHT: 82px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrri_61DeiWYZNJOM4Jn17bOTnSmH6XjESuLsmIl0YLE-A8fdkFVe5LoKQbakf9RFzsHScGFokw_SRBV9LzdAcWTKIns1ONBKABrg6oP1QGOA6hJEev1-ydKp6JwM9O8sEAspVX8FtHFpZ/s400/297px-Toys_%2522R%2522_Us_logo_svg.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Toys &quot;R&quot; Us (currently spelled Toys Я Us in the logo, and before as Toys &quot;Я&quot; Us with a reversal on the &quot;R&quot;.) is a toy store chain based in the United States. The chain also has locations in Europe, Asia, Oceania, Africa, and Canada. The company currently operates 585 stores in the United States and 716 stores in 34 other countries, with some of them under franchises or licenses. Being an $11 billion business with 1600 stores worldwide, this huge regime operates in five divisions:&lt;br /&gt;Toys &quot;R&quot; Us, U.S.&lt;br /&gt;&lt;div&gt;Toys &quot;R&quot; Us, International&lt;/div&gt;&lt;div&gt;Kids &quot;R&quot; Us&lt;/div&gt;&lt;div&gt;Babies &quot;R&quot; Us &lt;/div&gt;&lt;div&gt;Imaginarium &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJeRaaskDqBrS18LuHy9gDdZ58aezbaMkRTF3u773tkK6KlUpaNQpO9Kfv-o9ioZ90aKYbf2-RxnrPX7GAYwebDmYwCjZMetnC12XKjXpfLJFyCkb4h2UUC6e-Z6QwPf1ESw9NsNJ3ajiS/s1600-h/Babies%2521.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349647261612331154&quot; style=&quot;WIDTH: 300px; CURSOR: hand; HEIGHT: 70px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJeRaaskDqBrS18LuHy9gDdZ58aezbaMkRTF3u773tkK6KlUpaNQpO9Kfv-o9ioZ90aKYbf2-RxnrPX7GAYwebDmYwCjZMetnC12XKjXpfLJFyCkb4h2UUC6e-Z6QwPf1ESw9NsNJ3ajiS/s400/Babies%2521.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In order to provide the customers the products and services whenever and wherever they need, Toys &quot;R&quot; Us announced its plans to create an e-commerce subsidiary, &lt;a href=&quot;http://www.toysrus.com/&quot;&gt;Toysrus.com&lt;/a&gt;. In 1999, &lt;a href=&quot;http://www.toysrus.com/&quot;&gt;Toysrus.com&lt;/a&gt; has established as a premier online toy, video game and baby store outlet. Tragedy happened at the end of 1999.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;During Christmas 1999, &lt;a href=&quot;http://www.toysrus.com/&quot;&gt;Toysrus.com&lt;/a&gt; employees faced a real siege. The company’s “Black Sunday” came on Sunday, November 6, 1999 as 62 million advertising circulars were placed in local newspapers around the U.S. offering free shipping on Christmas toy orders placed over the Internet. When Toysrus.com was unable to fulfill orders in time for Christmas, the firm received numerous consumer complaints and negative publicity from newspaper and magazine articles and TV news reports about the firm’s problems. Toys &quot;R&quot; Us had the toys available in its warehouses, but was unable to pick, pack, and ship customer orders in a timely manner. Many employees worked for 49 straight days to fill orders, with some employees reported to pull sleeping bags out from under their desks to rest during the round-the-clock operation. Despite the heroic efforts, customers were still displeased. “I have never been exposed to fouler language,” explained Joel Anderson, a &lt;a href=&quot;http://www.toysrus.com/&quot;&gt;Toysrus.com&lt;/a&gt; vice president, as he described the angry e-mails from unhappy customers.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Failing to handle the orders flushed into its website, the company totally lost track of thousands of orders or failed to deliver them on time. When it was clear that the company was not going to be able to ship all its orders by the time Santa slid down the chimney, &lt;a href=&quot;http://www.toysrus.com/&quot;&gt;Toysrus.com&lt;/a&gt; took the unusual step of breaking the bad news to their customers via e-mail. They refunded 3% of the total orders and mailed $100 Toys “R” Us gift certificates to affected customers. Besides that, the Federal Trade Commission also fined Toys &quot;R&quot; Us $350,000 for not notifying customers soon enough. Although the company had pumped millions of dollars into setting up its own online operation and distribution network for order fulfillment it had to announce 75% slump in profits in 2000.&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;Technical errors were one reason for Toysrus.com&#39;s inability to fulfill some orders by the holidays. Toys &quot;R&quot; Us badly bungled the operations side of creating a Web site able to handle large traffic and shipping orders. They couldn’t execute their Web business effectively due to a lack of experience with both the front-end design and the back-end order fulfillment processes. As a result, one in 20 children failed to get presents in time for Christmas from Toys &quot;R&quot; Us.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In addition, &lt;a href=&quot;http://www.toysrus.com/&quot;&gt;Toysrus.com&lt;/a&gt; only had one distribution center, located in Memphis. Thousands of orders can arrive in almost no time. For example, if thousands of Sony PlayStation 2&#39;s were sold in only twenty- three seconds, thus, additional staffing, as well as more distribution centers are crucial for fulfillment.&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj-3O0U3EXj5D0yhAIHPpPWquGuJ-aI9m2ei2ZJIHe75HsNp0S7r6m3X8ugB4kg7pj0yyUORH45s2nfXKDO96H4zGq9ba0_zuw30-DFJ1FNqLeZJHjndeBXZieATWhR6DIhX1lLGjWqugd/s1600-h/0.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349648144229709090&quot; style=&quot;WIDTH: 240px; CURSOR: hand; HEIGHT: 180px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjj-3O0U3EXj5D0yhAIHPpPWquGuJ-aI9m2ei2ZJIHe75HsNp0S7r6m3X8ugB4kg7pj0yyUORH45s2nfXKDO96H4zGq9ba0_zuw30-DFJ1FNqLeZJHjndeBXZieATWhR6DIhX1lLGjWqugd/s400/0.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;em&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Toysrus.com&#39;s distribution center in Memphis&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;The entire process appears simple, but one glitch can cause the whole operation to collapse. As soon as the consumer types in an order, it is fed into a computer system in the distribution center. The order is printed out and &quot;picked off&quot; by a worker, who then packages it and sends it to be shipped. If a company is lacking in the technology to process the order and the bodies to distribute it, there&#39;s no guarantee that an order can be completed.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The company had to change its ailing e-commerce strategy and operation. In 2000, Toys &quot;R&quot; Us announced its Internet joint venture with &lt;a href=&quot;http://www.amazon.com/&quot;&gt;Amazon.com&lt;/a&gt;. Toys &quot;R&quot; Us would take charge of buying and managing inventory while Amazon will oversee all web operations of order fulfillment, and customer service. Toysrus.com&#39;s alliance with Amazon changes all the technical problems.&lt;br /&gt;&lt;/div&gt;&lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYfJ63BbuKMtQXiSNi9-J_LUBN4XdoIp_pANSofF5dKtfbTgtm-tPonU_CG66Gkpu8el12t5mBE1gAcGqP60MEk_fP0h3EZc8CgU1esk43wlPUmmi_j31gPXziChAmVk_JoaixqXE6w_SE/s1600-h/ONE.JPG&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349649139586050930&quot; style=&quot;WIDTH: 400px; CURSOR: hand; HEIGHT: 231px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYfJ63BbuKMtQXiSNi9-J_LUBN4XdoIp_pANSofF5dKtfbTgtm-tPonU_CG66Gkpu8el12t5mBE1gAcGqP60MEk_fP0h3EZc8CgU1esk43wlPUmmi_j31gPXziChAmVk_JoaixqXE6w_SE/s400/ONE.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;div align=&quot;center&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Toys &quot;R&quot; Us Website&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Video Clip&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;/div&gt;&lt;/span&gt;&lt;div&gt;&lt;object height=&quot;344&quot; width=&quot;425&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/y5S9xIsMeDo&amp;amp;hl=en&amp;amp;fs=1&amp;amp;&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/y5S9xIsMeDo&amp;hl=en&amp;fs=1&amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;344&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;div&gt;&lt;em&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;Toys &quot;R&quot; Us commercial in 1999 which aired during Christmas&lt;br /&gt;&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;/span&gt;&lt;/strong&gt; &lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div&gt;1. &lt;a href=&quot;http://www.toysrus.com/shop/index.jsp?categoryId=2255956&quot;&gt;http://www.toysrus.com/shop/index.jsp?categoryId=2255956&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;2. &lt;a href=&quot;http://en.wikipedia.org/wiki/Toys_R_Us&quot;&gt;http://en.wikipedia.org/wiki/Toys_R_Us&lt;/a&gt; &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;3. &lt;a href=&quot;https://www.cfo.com/article.cfm/2990820/c_2984379/?f=archives&quot;&gt;https://www.cfo.com/article.cfm/2990820/c_2984379/?f=archives&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;4. &lt;a href=&quot;http://www.cenktolunay.com/toysrus.htm&quot;&gt;http://www.cenktolunay.com/toysrus.htm&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;5. &lt;a href=&quot;http://www.ibam.com/pubs/jbam/articles/vol4/case4_2.htm&quot;&gt;http://www.ibam.com/pubs/jbam/articles/vol4/case4_2.htm&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;6. &lt;a href=&quot;http://www.youtube.com/watch?v=y5S9xIsMeDo&quot;&gt;http://www.youtube.com/watch?v=y5S9xIsMeDo&lt;/a&gt; - source from errantellipses&lt;/div&gt;&lt;div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/606327990919369668/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/example-of-e-commerce-failure-and-its.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/606327990919369668'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/606327990919369668'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/example-of-e-commerce-failure-and-its.html' title='An Example of an E-Commerce failure and its causes'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrri_61DeiWYZNJOM4Jn17bOTnSmH6XjESuLsmIl0YLE-A8fdkFVe5LoKQbakf9RFzsHScGFokw_SRBV9LzdAcWTKIns1ONBKABrg6oP1QGOA6hJEev1-ydKp6JwM9O8sEAspVX8FtHFpZ/s72-c/297px-Toys_%2522R%2522_Us_logo_svg.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-6854780709073131126</id><published>2009-06-21T00:38:00.030+08:00</published><updated>2009-06-21T17:25:49.034+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Causes of e-ccommerce success"/><category scheme="http://www.blogger.com/atom/ns#" term="eBay"/><category scheme="http://www.blogger.com/atom/ns#" term="Example of E-Commerce success"/><category scheme="http://www.blogger.com/atom/ns#" term="PayPal"/><category scheme="http://www.blogger.com/atom/ns#" term="Skype"/><title type='text'>An example of an E-Commerce success and its causes</title><content type='html'>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtS2u9SaMAQmuS4TYJtx3XUuyr9hgXwLEK71jxXIe8p3XQiGoPA1x9YDwGIysmAcMWTahmS_txG05z-kAjHHxkl8P2qW1eHC9SmHJsslmrEsOON3-IUGZJ-Y8tzfjdQL5D4jC6cm5uvY49/s1600-h/800px-EBay_Logo_svg.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349615838117654354&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 133px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtS2u9SaMAQmuS4TYJtx3XUuyr9hgXwLEK71jxXIe8p3XQiGoPA1x9YDwGIysmAcMWTahmS_txG05z-kAjHHxkl8P2qW1eHC9SmHJsslmrEsOON3-IUGZJ-Y8tzfjdQL5D4jC6cm5uvY49/s320/800px-EBay_Logo_svg.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; eBay is one of the success example for e-commerce. It is a well known website for everyone. How eBay started? eBay was born over Labor Day weekend in 1995, eBay founder Pierre Omidyar, in an experiment, put a broken laser pointer up for sale online, and to his surprise, found a buyer. When he told the buyer the item was broken, the buyer said: &quot;I&#39; m a collector of broken laser pointers.&quot; It was then that Omidyar knew anything was possible. It has around 14 years of history.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.ebay.com/&quot;&gt;eBay&lt;/a&gt; is The World’s Online Marketplace, enabling trade on a local, national and international basis. With a diverse and passionate community if individuals and small businesses. Besides that, eBay also offers an online platform where millions of items are traded each day. There are about 276 million registered eBay users worldwide until year 2008. More than US$2,039 (RM6,490) worth of goods are traded every second.&lt;br /&gt;&lt;br /&gt;Since its initial public offering in 1998, the company has continued to innovate and connect people and not just through its marketplaces. Two critical acquisitions have made eBay Inc. a global leader in online payments (&lt;a href=&quot;http://www.paypal.com/&quot;&gt;PayPal&lt;/a&gt;- acquired in October 2002) and communications (&lt;a href=&quot;http://http//www.skype.com/&quot;&gt;Skype&lt;/a&gt;- acquired in October 2005) as well.&lt;br /&gt;&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349615510608514594&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 320px; CURSOR: hand; HEIGHT: 86px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc2ko5sYLM7QLU_vjvadjEN4Kr80t6jvA1USiIWA1zw3Bch2enwL8N0NERNtiaPcBD8FagysB9bLQV2iD-vxWJbs9r5fkkCCvLteQdTRWJdEORsOt0dmCs0GryBG_meEteU7eq_dAVY9Bg/s320/600px-PayPal_logo_svg.png&quot; border=&quot;0&quot; /&gt;&lt;span style=&quot;color:#3366ff;&quot;&gt;&lt;a href=&quot;http://www.paypal.com/&quot;&gt;PayPal&lt;/a&gt;&lt;/span&gt; enables any individual or business with an email address to securely, easily and quickly send and receive payments online. Acquired by eBay Inc. in October 2002, PayPal builds on the existing financial infrastructure of bank accounts and credit cards and uses the world&#39;s most advanced proprietary fraud prevention systems to create a safe payment solution. Today, PayPal is a global leader in online payment solutions: It has 149 million registered users and is accepted by millions of merchants worldwide - on and off eBay. PayPal&#39;s Q1 2008 global total payment volume of $14.4 billion accounted for nearly 9 percent of worldwide eCommerce.&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Tb8tA1h1QWrD_xTAMotmiTF3tFXBBn6zkHS3ASb4e2hn1PVaHjGxvDcqqdbbnlsvAu8g0wGcYkZ1Jw1sM5YdebzpErSxCuqmjYaDul-HFTXGSYA-t34x5lqOjyJq4xoAuC-2xBHjuhKg/s1600-h/289px-Skype_logo2_svg.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349616002824060882&quot; style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 289px; CURSOR: hand; HEIGHT: 128px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_Tb8tA1h1QWrD_xTAMotmiTF3tFXBBn6zkHS3ASb4e2hn1PVaHjGxvDcqqdbbnlsvAu8g0wGcYkZ1Jw1sM5YdebzpErSxCuqmjYaDul-HFTXGSYA-t34x5lqOjyJq4xoAuC-2xBHjuhKg/s320/289px-Skype_logo2_svg.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNwbLnmy9XCgPmVa4WMDLxw-5baSNP9hjfqPhMYZGcvF3bT0grKwr0_yk14Wdyei6s0RPPVwVoMjbScrU3xhQhYVGcbjJpnVgU0AmsBsWQh0bDrig81jG8B4xQM5vFjSLwYc8T5SqXCnl4/s1600-h/289px-Skype_logo2_svg.png&quot;&gt;&lt;/a&gt;Acquired by eBay Inc. in October 2005, &lt;span style=&quot;color:#3366ff;&quot;&gt;&lt;a href=&quot;http://www.skype.com/&quot;&gt;Skype&lt;/a&gt;&lt;/span&gt; is an Internet communication company that has revolutionized the way people talk online. With more than 309 million registered users as of early 2008, Skype allows people everywhere to make unlimited voice and video calls online for free using its software. Skype is available in 28 languages and is used in almost every country on Earth. This business unit generates revenue through its premium offerings, such as calls (using its software) made to and from landline and mobile phones; voicemail; call forwarding; and personalization, including ringtones and avatars. In addition to its presence on eBay, Skype has relationships with a growing network of hardware and software providers.&lt;br /&gt;&lt;br /&gt;Other key acquisitions have strengthened eBay Inc.&#39;s portfolio of ecommerce companies, including &lt;span style=&quot;color:#3366ff;&quot;&gt;&lt;a href=&quot;http://www.shopping.com/&quot;&gt;shopping.com&lt;/a&gt;&lt;/span&gt;, a pioneer in online comparison shopping; Stubhub, a leading online marketplace for the resale of event tickets; &lt;span style=&quot;color:#3366ff;&quot;&gt;&lt;a href=&quot;http://www.rent.com/&quot;&gt;rent.com&lt;/a&gt;&lt;/span&gt;, the most visited online apartment listing service in the U.S.; StumbleUpon, an online solution that helps people discover and share content on the web; and market-leading online classifieds sites including &lt;span style=&quot;color:#3366ff;&quot;&gt;&lt;a href=&quot;http://www.loquo.com/&quot;&gt;LoQUo.com&lt;/a&gt;&lt;/span&gt;, Intoko, and Netherlands-based Marktplaats.nl. The company has also grown its classifieds business through Kijiji, which launched in the U.S. in 2007.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;Causes of its success:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;(a) eBay&#39;s success is based on its ability to transform many fragmented, primarily local markets into global ones at a relatively low cost to its users. People have always had a need and an interest in buying and selling used, surplus, and collectible items. Traditionally, they have done so through garage sales, classified advertising in local newspapers, and flea markets.&lt;br /&gt;&lt;br /&gt;(b) For a price comparable to advertising an item in the classifieds section of their local newspaper with three or four lines of text, users can post lengthy descriptions and pictures available to a worldwide audience. Concerns about fraud have been mitigated through a user feedback system escrow services. The company&#39;s ability to bring a large number of buyers and sellers together is what has driven its growth. The more buyers there are, the more sellers want to participate. Conversely, the more sellers there are, the more items are to buy, and the greater the attraction of the service to buyers. eBay has allowed many people to become entrepreneurs with little upfront expense or overhead and provides a method for companies and even governments to dispose of unwanted items.&lt;br /&gt;&lt;br /&gt;(c) &lt;a href=&quot;http://www.ebay.com/&quot;&gt;eBay&lt;/a&gt; makes money by charging listing fees and collecting a percentage of the selling price of items sold through the site. eBay also owns &lt;a href=&quot;http://www.paypal.com/&quot;&gt;PayPal&lt;/a&gt;, which makes money through investing its clients&#39; assets and from transaction fees. eBay&#39;s growth has been remarkable.&lt;br /&gt;&lt;br /&gt;(d) &lt;a href=&quot;http://www.ebay.com/&quot;&gt;eBay&lt;/a&gt; appears to have significant growth potential. It has successfully introduced new markets, such as car sales, which many thought would not be adaptable to its business model. Besides that, it is so successful because it meets its customer&#39;s needs better than any competing service. No one else has accumulated such a large number of buyers and sellers in a single marketplace.&lt;br /&gt;&lt;br /&gt;(e) According to the interview with the spokesperson of &lt;a href=&quot;http://www.ebay.com/&quot;&gt;eBay&lt;/a&gt;, Kevin Pursglove, he thinks that people really enjoy the experience of the shopping bazaar. They enjoy the hunt. They enjoy looking around for merchandise.&lt;br /&gt;&lt;br /&gt;(f) The other component is that Kevin Pursglove believes they really enjoy the competition of the bidding process. Everybody likes to get a bargain, and everybody, I think, in some way, shape, or form, likes to haggle a little bit over the price. Their auction format allows users to do that.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#6600cc;&quot;&gt;&lt;strong&gt;Video Clips:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#6633ff;&quot;&gt;1)Brief introduction of eBay&lt;/span&gt;&lt;br /&gt;&lt;object height=&quot;344&quot; width=&quot;425&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/Pt0qIPAeLXM&amp;amp;hl=en&amp;amp;fs=1&amp;amp;&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/Pt0qIPAeLXM&amp;hl=en&amp;fs=1&amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;344&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;2) eBay music video (Have fun XD)&lt;br /&gt;&lt;/span&gt;&lt;object height=&quot;344&quot; width=&quot;425&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/3YXHcbX36Ao&amp;amp;hl=en&amp;amp;fs=1&amp;amp;&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/3YXHcbX36Ao&amp;hl=en&amp;fs=1&amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;344&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#330099;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;1. &lt;a href=&quot;http://www.ebay.com/&quot;&gt;http://www.ebay.com/&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://www.ecommercetimes.com/story/2127.html?welcome=1213184390&quot;&gt;http://www.ecommercetimes.com/story/2127.html?welcome=1213184390&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://answers.google.com/answers/threadview?id=245309&quot;&gt;http://answers.google.com/answers/threadview?id=245309&lt;/a&gt;&lt;br /&gt;4. &lt;a href=&quot;http://www.neowave.com.my/malaysia_ecommerce_radar.asp&quot;&gt;http://www.neowave.com.my/malaysia_ecommerce_radar.asp&lt;/a&gt;&lt;br /&gt;5. &lt;a href=&quot;http://www.youtube.com/watch?v=Pt0qIPAeLXM&quot;&gt;http://www.youtube.com/watch?v=Pt0qIPAeLXM&lt;/a&gt; - source from WatchMojo&lt;br /&gt;6. &lt;a href=&quot;http://www.youtube.com/watch?v=3YXHcbX36Ao&quot;&gt;http://www.youtube.com/watch?v=3YXHcbX36Ao&lt;/a&gt; - source from dps001</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/6854780709073131126/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/example-of-e-commerce-success-and-its.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/6854780709073131126'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/6854780709073131126'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/example-of-e-commerce-success-and-its.html' title='An example of an E-Commerce success and its causes'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtS2u9SaMAQmuS4TYJtx3XUuyr9hgXwLEK71jxXIe8p3XQiGoPA1x9YDwGIysmAcMWTahmS_txG05z-kAjHHxkl8P2qW1eHC9SmHJsslmrEsOON3-IUGZJ-Y8tzfjdQL5D4jC6cm5uvY49/s72-c/800px-EBay_Logo_svg.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-7728609156305177766</id><published>2009-06-20T17:12:00.026+08:00</published><updated>2009-06-21T17:24:55.755+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Evolution of E-Commerce"/><category scheme="http://www.blogger.com/atom/ns#" term="History of E-Commerce"/><title type='text'>The history and evolution of E-Commerce</title><content type='html'>&lt;div align=&quot;left&quot;&gt;&lt;strong&gt;Definition of Electronic Commerce&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;Electronic Commerce&lt;/span&gt;&lt;/strong&gt; commonly known as electronic marketing or e-commerce. E-commerce consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. E-commerce uses paperless exchange of business information using electronic data interchange (EDI), e-mail, electronic bulletin boards, fax transmissions, and electronic funds transfer.The amount of trade conducted electronically has grown extraordinarily with the widespread of Internet usage. Modern e-commerce typically uses the World Wide Web (known as www) at least at some point in the transaction&#39;s lifecycle. The concept of e-commerce is all about using the Internet to do business better and faster. It is about giving customers controlled access to your computer systems and letting people serve themselves. It is about committing your company to a serious online effort and integrating your Web site with the heart of your business. If you do that, you will see results!&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;History of Electronic Commerce&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;a) Early development&lt;/strong&gt;&lt;br /&gt;In the beginning the Earth was without form, void and darkness was on the face of the deep. Telegraph (demonstrated in 1844) spread with the railroads in the mid 1800’s. This can be seen through the wire transfer of funds (backed by physical transit later on by Express), the promise of goods and of payment, and, so forth.&lt;br /&gt;&lt;/div&gt;&lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNoSC6VG_-WvsewHjGc-Lwq613FdxN505z-x4TD2qVS45WEyEu59O8XCd7_SD-i2No1Gsq9H0z2aTBIeYwj0xW6_69M27jY917OLLhy9rf_a5nA-m5d8ma5_BrKLZw8NQUW3cp1J37Ru6N/s1600-h/Picture1.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349366621496935938&quot; style=&quot;WIDTH: 302px; CURSOR: hand; HEIGHT: 118px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNoSC6VG_-WvsewHjGc-Lwq613FdxN505z-x4TD2qVS45WEyEu59O8XCd7_SD-i2No1Gsq9H0z2aTBIeYwj0xW6_69M27jY917OLLhy9rf_a5nA-m5d8ma5_BrKLZw8NQUW3cp1J37Ru6N/s320/Picture1.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p align=&quot;center&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349366834382896034&quot; style=&quot;WIDTH: 211px; CURSOR: hand; HEIGHT: 248px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6gf3uAT1bXqqOFLIdp8rjS-BGrLREJhXMIlDX5qWHYtxIdAU9vp_aMeGX8XqitZUTBvLQb5hAbCoRJRAEHnjFtA56okUIVhondI1VkN3FPh3z9yP4yHCB6jorFOdtgFlqBVguhyphenhyphenRkx32F/s320/Picture2.png&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;/p&gt;&lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDztc_dVFwBxF1CseUfXaZK94o4zEzo_M8yl1Ujvmdi3TtVenDSdkQBiVw6BCkIFRRrIic8FpasXwEqyQPDhDdgiznJ8z3O9rgbu7ormTgEIsZWJN-_iFqJvj4CBPiZB-iNoPUpz-8qhsA/s1600-h/Picture3.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349367058825871698&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 220px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDztc_dVFwBxF1CseUfXaZK94o4zEzo_M8yl1Ujvmdi3TtVenDSdkQBiVw6BCkIFRRrIic8FpasXwEqyQPDhDdgiznJ8z3O9rgbu7ormTgEIsZWJN-_iFqJvj4CBPiZB-iNoPUpz-8qhsA/s320/Picture3.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;p align=&quot;left&quot;&gt;&lt;br /&gt;History of ecommerce dates back to the invention of the very old notion of “sell and buy”, electricity, cables, computers, modems, and the Internet. The trading of goods has been a major drive of human survival since the beginning of recorded history and beyond. The mass adoption of Internet has created a paradigm shift in the way businesses are conducted today. The past decade has seen an emergence of a new kind of commerce, the buying and selling of goods, through human-computer interaction over the Internet. Today, the line between e-commerce and traditional commerce is becoming more blurred as more businesses start and continue to integrate the Internet and e-commerce technologies into their business processes.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;a) Timeline&lt;br /&gt;&lt;/strong&gt;1. &lt;span style=&quot;color:#6600cc;&quot;&gt;1990:&lt;/span&gt; Tim Berners-Lee writes the first web browser, World Wide Web, using a NeXT computer.&lt;br /&gt;&lt;br /&gt;2. &lt;span style=&quot;color:#6600cc;&quot;&gt;1992:&lt;/span&gt; J.H. Snider and Terra Ziporyn publish Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martin&#39;s Press. ISBN 0312063598.&lt;br /&gt;&lt;br /&gt;3. &lt;span style=&quot;color:#6600cc;&quot;&gt;1994:&lt;/span&gt; Netscape releases the Navigator browser in October under the code name Mozilla. Pizza Hut offers pizza ordering on its Web page. The first online bank opens. Attempts to offer flower delivery and magazine subscriptions online. Adult materials also becomes commercially available, as do cars and bikes. Netscape 1.0 is introduced in late 1994 SSL encryption that made transactions secure.&lt;br /&gt;&lt;br /&gt;4. &lt;span style=&quot;color:#6600cc;&quot;&gt;1995:&lt;/span&gt; Jeff Bezos launches Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio start broadcasting. Dell and Cisco begin to aggressively use Internet for commercial transactions. eBay is founded by computer programmer Pierre Omidyar as AuctionWeb.&lt;br /&gt;&lt;br /&gt;5. &lt;span style=&quot;color:#6600cc;&quot;&gt;1998:&lt;/span&gt; Electronic postal stamps can be purchased and downloaded for printing from the Web.&lt;br /&gt;&lt;br /&gt;6. &lt;span style=&quot;color:#6600cc;&quot;&gt;1999:&lt;/span&gt; Business.com sold for US $7.5 million to eCompanies, which was purchased in 1997 for US $149,000. The peer-to-peer filesharing software Napster launches. ATG Stores launches to sell decorative items for the home online.&lt;br /&gt;&lt;br /&gt;7. &lt;span style=&quot;color:#6600cc;&quot;&gt;2000:&lt;/span&gt; The dot-com bust.&lt;br /&gt;&lt;br /&gt;8. &lt;span style=&quot;color:#6600cc;&quot;&gt;2002:&lt;/span&gt; &lt;a href=&quot;http://www.ebay.com/&quot;&gt;eBay&lt;/a&gt; acquires &lt;a href=&quot;http://www.paypal.com/&quot;&gt;PayPal&lt;/a&gt; for $1.5 billion. Niche retail companies CSN Stores and NetShops are founded with the concept of selling products through several targeted domains, rather than a central portal.&lt;br /&gt;&lt;br /&gt;9. &lt;span style=&quot;color:#6600cc;&quot;&gt;2003:&lt;/span&gt; &lt;a href=&quot;http://www.amazon.com/&quot;&gt;Amazon.com&lt;/a&gt; posts first yearly profit.&lt;br /&gt;&lt;br /&gt;10. &lt;span style=&quot;color:#6600cc;&quot;&gt;2007:&lt;/span&gt; Business.com acquired by R.H. Donnelley for $345 million .&lt;br /&gt;&lt;br /&gt;11. &lt;span style=&quot;color:#6600cc;&quot;&gt;2008:&lt;/span&gt; US E-Commerce and Online Retail sales projected to reach $204 billion, an increase of 17 percent over 2007.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Evolution of Electronic Commerce&lt;/strong&gt;&lt;br /&gt;E-Commerce was birth out of the World-Wide-Web (WWW). Although many people use the terms WWW and Internet interchangeably, the WWW is just one of the many services available on the Internet. The aspect of the WWW actually is a relatively new aspect of the Internet. While the Internet was developed in the late 1960s, the WWW came into existence more than a decade ago - in the early 1990s. Since then, it has grown phenomenally to become the most widely used service on the Internet. The Web has made online shopping possible for many businesses and individuals. Now, even banks have been using electronic funds transfer (EFT, also called wire transfer), which are electronic transmissions of account exchange information over private communication networks.&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p align=&quot;center&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm1jp4mNQ4FwM-Zvx3uMQ2JQQgiz_TQEEygZfqAD0ol6DcAgsVr_meJpS30wjJFmiLk8hp_Q2TVbDZOKBbOMBsTkHZIExhCYUI2JtbRwl-rHmvc-LCB9E07vezGt-PlQJH4ZCo3sKl39H4/s1600-h/Picture4.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349367702561212594&quot; style=&quot;WIDTH: 319px; CURSOR: hand; HEIGHT: 320px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm1jp4mNQ4FwM-Zvx3uMQ2JQQgiz_TQEEygZfqAD0ol6DcAgsVr_meJpS30wjJFmiLk8hp_Q2TVbDZOKBbOMBsTkHZIExhCYUI2JtbRwl-rHmvc-LCB9E07vezGt-PlQJH4ZCo3sKl39H4/s320/Picture4.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p align=&quot;center&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349368079640233682&quot; style=&quot;WIDTH: 215px; CURSOR: hand; HEIGHT: 320px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuN3VIg26COYsuWoDCaAvXLqk2irPLnXYtYrjo22F9aui89V-XtJHuMzFb2_f_CqcjATtoNAacZIxDq5tahLuV1c6fU44njbbZDhhUhdJZk1QqyTBIsrTA8SwmxJd41pX9i_JgGqSVK7rl/s320/Picture5.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;p align=&quot;left&quot;&gt;&lt;br /&gt;Businesses also have been engaging in a form of electronic commerce, known as electronic data interchange, for many years. Electronic Data Interchange (EDI) occurs when business transmits computer-readable data in a standard format to another business. In the 1960s, businesses realized that many of the documents they exchange related to the shipping of goods - such as invoices, purchase orders, and bills of lading - and included the same set of information for almost every transaction. They also realized that they were spending a good deal of time and money entering these data into their computers, printing paper forms, and then re-entering the data on the other side of the transaction. Although the purchase order, invoice, and bill of lading for each transaction contained much of the same information such as item numbers, descriptions, prices and quantities - each paper form had its own unique format for presenting that information. By creating a set of standard formats for transmitting that information electronically, businesses were able to reduce errors, avoid printing and mailing costs, and eliminate the need to re-enter the data.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div align=&quot;left&quot;&gt;&lt;embed id=&quot;myytplayer&quot; style=&quot;WIDTH: 418px; HEIGHT: 417px&quot; src=&quot;http://www.youtube.com/v/LW4X3b_j0eE&amp;amp;autoplay=&quot; width=&quot;418&quot; height=&quot;417&quot; type=&quot;application/x-shockwave-flash&quot; fs=&quot;1&amp;amp;showinfo=&quot; showsearch=&quot;0&amp;amp;rel=&quot; autoplay=&quot;&amp;amp;&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; wmode=&quot;opaque&quot;&gt;&lt;/embed&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;  style=&quot;font-size:0.9em;&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;The Evolution of E-Commerce&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#330099;&quot;&gt;Related Links:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;History websites&lt;br /&gt;1. &lt;a href=&quot;http://en.wikipedia.org/wiki/Electronic_commerce&quot;&gt;http://en.wikipedia.org/wiki/Electronic_commerce&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;http://www.flysyk02.netfirms.com/Ecommerce/History.htm&quot;&gt;http://www.flysyk02.netfirms.com/Ecommerce/History.htm&lt;/a&gt;&lt;br /&gt;3. &lt;a href=&quot;http://www.ecommerce-land.com/history_ecommerce.html&quot;&gt;http://www.ecommerce-land.com/history_ecommerce.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Evolution websites&lt;br /&gt;1. &lt;a href=&quot;http://www.youtube.com/watch?v=LW4X3b_j0eE&quot;&gt;http://www.youtube.com/watch?v=LW4X3b_j0eE&lt;/a&gt; – source from sandeepchagger&lt;br /&gt;2. &lt;a href=&quot;http://www.klein.com/dvk/publications/ecommerce.ppt&quot;&gt;http://www.klein.com/dvk/publications/ecommerce.ppt&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/7728609156305177766/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/history-and-evolution-of-e-commerce.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7728609156305177766'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7728609156305177766'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/history-and-evolution-of-e-commerce.html' title='The history and evolution of E-Commerce'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNoSC6VG_-WvsewHjGc-Lwq613FdxN505z-x4TD2qVS45WEyEu59O8XCd7_SD-i2No1Gsq9H0z2aTBIeYwj0xW6_69M27jY917OLLhy9rf_a5nA-m5d8ma5_BrKLZw8NQUW3cp1J37Ru6N/s72-c/Picture1.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-7828492581561246695</id><published>2009-06-18T21:32:00.000+08:00</published><updated>2009-07-17T12:59:07.752+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Self-introduction"/><title type='text'>About - Mei Yee -</title><content type='html'>My name is Chiang Mei Yee. Currently I’m studying in University Tunku Abdul Rahman (UTAR) which is located in Sungai Long. This is the third year in UTAR. I major in Accounting. This is my 1st time writing a blog about myself. I’ve never write a blog before. In my perception a blog is where people write about their problems and also expressing their own feelings not writing about themselves.&lt;br /&gt;&lt;br /&gt;What about myself? I am a girl that really can fool around when I am with my close friends. This the time where I really play and be myself. It does not happen when I am studying. Besides, I like to mix around with different types of people. People tend to notice that there is a difference when they 1st know me and after knowing me. I love to go for a vacation during my semester break. This is the time when I really can relax my mind and have no worries about my studies. It is also another way to motivate myself to work harder for the next semester. There is one thing that I enjoy doing, which is, cooking. Cooking can be considered as one of my hobby. Besides, it is also one of the ways I express my feelings. Whether I am happy or sad, I’ll express it through cooking. I enjoy seeing my family eats the food I cook for them. I cook whenever I am free. Other than that, I like to spend time with my family during the weekend.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;The top 5 websites that I visited the most are:&lt;br /&gt;&lt;/span&gt;1) &lt;a href=&quot;http://www.google.com.my/&quot;&gt;http://www.google.com.my/&lt;/a&gt;&lt;br /&gt;Google is like a garbage in and garbage out website where I can obtain whatever information I need. It is a user-friendly website. Whenever I need to search for information, google will be my best choice. Just type in whatever you want to search and the information needed will be displayed.&lt;br /&gt;&lt;br /&gt;2) &lt;a href=&quot;http://www.facebook.com/&quot;&gt;http://www.facebook.com/&lt;/a&gt;&lt;br /&gt;Lately, I found a new website that is facebook. I often visit this website also. Facebook enable me to connect with my friends easily, that is through online conversation. Furthermore, there are a lot of games like pet society, restaurant city and lot more.&lt;br /&gt;&lt;br /&gt;3) &lt;a href=&quot;http://www.chrunchyroll.com/&quot;&gt;http://www.chrunchyroll.com/&lt;/a&gt;&lt;br /&gt;I love to watch Korean and Taiwan drama. Crunhcyroll is my choice of watching Korean and also Taiwan drama. They have the latest drama you need. Just name it!!! Whenever I am free I will spend my time watching dramas.&lt;br /&gt;&lt;br /&gt;4) &lt;a href=&quot;https://iveette.blogspot.com/&quot;&gt;https://iveette.blogspot.com/&lt;/a&gt;&lt;br /&gt;Iveette blogspot is one of my best friend’s website. Both of us are far apart and one of the ways to know what her current condition is through her blogs. Although we don’t chat much but we know each other conditions through msn and also her blogs.&lt;br /&gt;&lt;br /&gt;5) &lt;a href=&quot;http://www.zedge.net/&quot;&gt;http://www.zedge.net/&lt;/a&gt;&lt;br /&gt;Not only that I also enjoy downloading themes from zedge.net. There is variety of categories themes which I get to download. I love to have a lot of themes inside my handphone. I will not get boring with latest themes.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#cc33cc;&quot;&gt;The top 5 internet activities that I always do are:&lt;br /&gt;&lt;/span&gt;1. Chatting with friends using facebook and also Windows Live Messanger (MSN).&lt;br /&gt;2. Sign in yahoo to check my emails.&lt;br /&gt;3. Open PPStream to watch online drama without any lagging.&lt;br /&gt;4. Open TTPlayer to listen to songs and also understand the meaning of the lyric.&lt;br /&gt;5. Read news through CNN or TheStarOnline to know what is happening to the world at outside</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/7828492581561246695/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-mei-yee.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7828492581561246695'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7828492581561246695'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-mei-yee.html' title='About - Mei Yee -'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-8850454217039185164</id><published>2009-06-17T17:55:00.000+08:00</published><updated>2009-07-17T12:58:48.147+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Self-introduction"/><title type='text'>About - Seok Fen -</title><content type='html'>Hi everyone, I am seok fen. I was born in Kuala Lumpur. Currently I am taking my degree at Utar Sg Long, main in Accounting. I like white colour very much. Number 30 is my lucky number. I am especially interested in watching movie. It is an amusement during my leisure time. I like to cycle and play badminton with my cousin in my spare time. I will back to home every weekend because when schooling, I stay at hostel. As a result, gathering and chatting with my family on weekend is the most enjoyable moment in my life. Family is the most important in my life. However, I am an emotional people, sometimes when I was moody, my family will be the one that I can released all my feeling to them. They forgive me with all my wrongdoing, but then I felt sorry with what I done with them especially when I talk loudly to them. I try to control my emotion to become a people with high EQ. Besides that, got one thing that always obsession me, that is my eyes dark circle problem. It is born inherent. But since I sleep very late very often, as a result, it becomes more serious. That why, I have a pair of panda eyes.&lt;br /&gt;&lt;br /&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5349708861351591250&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 365px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz4p-0eaClJtxCyjLRdi0lQaslthyphenhyphenptmgb9deoawfaSgvFkmrsZcJUxtsBbjAmMaFmQ0ZtU1cSVWaVk9e_fXd3YfPMDaaNLHUokiM_DaMnbefVYQw5WyNLEJiBiGw0MZg2_NgnFJ-Cd10H/s400/my_family.JPG&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;The top 5 websites that I visited the most are:&lt;/span&gt;&lt;br /&gt;1) &lt;a href=&quot;http://www.facebook.com/&quot;&gt;http://www.facebook.com/&lt;/a&gt;&lt;br /&gt;This website brings me to connect with my primary and secondary schoolmates and also college friends. I felt grateful for that. Besides that, there are many applications to play on facebook. It is very useful to me when I felt bored. In addition, I can know a lot of friends from different country and know about their culture. It is quite interesting.&lt;br /&gt;&lt;br /&gt;2) &lt;a href=&quot;http://www.hotmail.com/&quot;&gt;http://www.hotmail.com/&lt;/a&gt;&lt;br /&gt;This is the place where I can check all my electronic mail that sent by my friends. I have received many different types of e-mail such as horror, funny, comedy, romantic, meaningful, informative and etc. I can also know some general knowledge about our life through checking the e-mail.&lt;br /&gt;&lt;br /&gt;3) &lt;a href=&quot;http://wble.utar.edu.my/&quot;&gt;http://wble.utar.edu.my/&lt;/a&gt;&lt;br /&gt;wble is known as Web Based Learning Environment. All my subjects will be uploaded at there by the lecturers. So, as a student, I need to surf this website very often to download all the lecture notes and tutorial questions. There are no spoon feed anymore because we are an adult already. As a result, I need to be independent and download them by myself.&lt;br /&gt;&lt;br /&gt;4) &lt;a href=&quot;http://www.google.com/&quot;&gt;http://www.google.com/&lt;/a&gt;&lt;br /&gt;I can find all the information that I needed through this website. It is very easy as I just have to type the keywords under search engine there and all the relevant result will be available for me. It is very convenient and time saving.&lt;br /&gt;&lt;br /&gt;5) &lt;a href=&quot;http://www.gougou.com/&quot;&gt;http://www.gougou.com/&lt;/a&gt;&lt;br /&gt;I visit this website to download all my favorite songs especially jay chou’s song. I like his singing very much and I find that he is a very talented people. He knows to play different types of music instruments. All the latest songs are available in this website.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;The top 5 internet activities that I always do are:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;1) Chatting with friends using the Windows Life Messenger.&lt;br /&gt;2) Open facebook to play games and see other people’s profile.&lt;br /&gt;3) Open PPStream to watch drama through online.&lt;br /&gt;4) Update my antivirus software every day.&lt;br /&gt;5) Surf the relevant website to find journals and articles.&lt;br /&gt;&lt;br /&gt;Internet is one of the great inventions from people. It helps us a lot. No matter where we are, where we from, we can connect with each other by using internet. Nowadays, people cannot live without internet. It has become an important part in our life.</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/8850454217039185164/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-seok-fen.html#comment-form' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/8850454217039185164'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/8850454217039185164'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-seok-fen.html' title='About - Seok Fen -'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz4p-0eaClJtxCyjLRdi0lQaslthyphenhyphenptmgb9deoawfaSgvFkmrsZcJUxtsBbjAmMaFmQ0ZtU1cSVWaVk9e_fXd3YfPMDaaNLHUokiM_DaMnbefVYQw5WyNLEJiBiGw0MZg2_NgnFJ-Cd10H/s72-c/my_family.JPG" height="72" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-1274082265514382636</id><published>2009-06-16T17:41:00.002+08:00</published><updated>2009-07-31T11:21:13.995+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Self-introduction"/><title type='text'>About - Hui Jing -</title><content type='html'>Hello everyone! Welcome to our blog. I am Hui Jing and was born on the 9th November 1988. That makes me 21 this year and a Scorpio. I come from Penang which was known as Prince of Wales Island. It is a wonderful state in Malaysia and also a home to many great tourist attractions. Penang is famous with beaches, temples, heritage, flora &amp;amp; fauna and of course delicious food. I miss my CharKoayTeow, Hokkien Mee, Laksa so much .. Haha !!&lt;br /&gt;&lt;br /&gt;I am currently pursuing my final year in Bachelor of Commerce (Hons) Accounting at University Tunku Abdul Rahman, Sg Long campus. After receive my degree I will take the ACCA. There is no particular reason, just everyone tells me that accountant with ACCA qualification can make a lot of money. Muahaha ~&lt;br /&gt;&lt;br /&gt;Internet is a very important part of my life. I am a Korean hit. My favourite korean artist are dong bang shin ki, super junior,BoA,SNSD all SM town family, 2pm and so on. Everyday I will look for their latest news and download their latest stuff. I like to watch korean drama and HK drama so much. I will always keep myself up-to-date with all these. I can’t live without internet and my laptop .. Definitely .. Haha !! Other than, what I will do during my free time is just sleep and eat ~~&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKlCCoVv9Dx-vIDAMmC8rjX-IoIHTjQnH1cXRC1QXzFOaDDw1OhAVN8Z01dDc5al4iuJryNfyM0rDOKmN4p2PoOHw0DYaogINR9HIR_my9pBVTiB3zWOxi6ZGJUXCikE_xSX-K4xL_FWq_/s1600-h/big.jpg&quot;&gt; &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(102,0,204)&quot;&gt;&lt;/span&gt;&lt;span style=&quot;FONT-STYLE: italic; COLOR: rgb(102,0,204)&quot;&gt;TVXQ&lt;/span&gt; &lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz6OpDHOQANbCC-aDTjUK_IXmRoo_-4nwqoaBrtDh_G7R1mSplOoC9Zuz4tzvzBXi1H04LJGZPGKMqAZAiLJ1_OuNuhSJarPS4WnqUfQ7ySKxSbeWIbSlyE7a-taNqcrHmadG2R5K3ZRsW/s1600-h/big.jpg&quot;&gt;&lt;img style=&quot;WIDTH: 162px; HEIGHT: 145px; CURSOR: pointer&quot; id=&quot;BLOGGER_PHOTO_ID_5348956222695182354&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz6OpDHOQANbCC-aDTjUK_IXmRoo_-4nwqoaBrtDh_G7R1mSplOoC9Zuz4tzvzBXi1H04LJGZPGKMqAZAiLJ1_OuNuhSJarPS4WnqUfQ7ySKxSbeWIbSlyE7a-taNqcrHmadG2R5K3ZRsW/s320/big.jpg&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLG4GqdBaaSSdNlW2RQFJ03IWent4UFg8Y7uZdsPYkWTf7REHMcwm3ZrqUCdK7JXrn-i7_lZh7Iz76z6nVrOSzuPFpqPIc5fCREZqwwbk16WttvSZI12k6tXGkWlgKHfrrJz_AU8PjDQ1B/s1600-h/super-junior-in-japan-8.jpg&quot;&gt;&lt;img style=&quot;WIDTH: 190px; HEIGHT: 144px; CURSOR: pointer&quot; id=&quot;BLOGGER_PHOTO_ID_5348956220699117778&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLG4GqdBaaSSdNlW2RQFJ03IWent4UFg8Y7uZdsPYkWTf7REHMcwm3ZrqUCdK7JXrn-i7_lZh7Iz76z6nVrOSzuPFpqPIc5fCREZqwwbk16WttvSZI12k6tXGkWlgKHfrrJz_AU8PjDQ1B/s320/super-junior-in-japan-8.jpg&quot; /&gt;&lt;/a&gt; &lt;span style=&quot;FONT-STYLE: italic; COLOR: rgb(102,0,204)&quot;&gt;SJ&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;FONT-STYLE: italic; COLOR: rgb(102,0,204)&quot;&gt;BoA &lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1lzw5MpX82et12_EczT63wds30auN-H1mbREkPZ3t17q-ULKInY0dxyZCROV_GH1SHQZRi1UJGytVoREJMJEPTbSMX0cfl6kVxR_kxB9uUb3plJA5ENyVviYxnGRwMrpqzzeCrSz0VgoJ/s1600-h/korea-kwon-boa-002.jpg&quot;&gt;&lt;img style=&quot;WIDTH: 124px; HEIGHT: 148px; CURSOR: pointer&quot; id=&quot;BLOGGER_PHOTO_ID_5348952857172870034&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1lzw5MpX82et12_EczT63wds30auN-H1mbREkPZ3t17q-ULKInY0dxyZCROV_GH1SHQZRi1UJGytVoREJMJEPTbSMX0cfl6kVxR_kxB9uUb3plJA5ENyVviYxnGRwMrpqzzeCrSz0VgoJ/s320/korea-kwon-boa-002.jpg&quot; /&gt;&lt;/a&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDCCReJieLqI1hxXu4ZL5N3J5hSSb_Y64jouxqOMWaOOy1Hv8cmuoecnCXF656f5ZNSQ15iBGCvjKqUj3x8tAazCfPBq-bVzaifmb_lMJqPQJWhioyN-XEvEvQk5eoX1fuM4BLbCU_zVGu/s1600-h/113007_snsd.jpg&quot;&gt;&lt;img style=&quot;WIDTH: 210px; HEIGHT: 147px; CURSOR: pointer&quot; id=&quot;BLOGGER_PHOTO_ID_5348954954576458354&quot; border=&quot;0&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDCCReJieLqI1hxXu4ZL5N3J5hSSb_Y64jouxqOMWaOOy1Hv8cmuoecnCXF656f5ZNSQ15iBGCvjKqUj3x8tAazCfPBq-bVzaifmb_lMJqPQJWhioyN-XEvEvQk5eoX1fuM4BLbCU_zVGu/s320/113007_snsd.jpg&quot; /&gt;&lt;/a&gt; &lt;span style=&quot;FONT-STYLE: italic; COLOR: rgb(102,0,204)&quot;&gt;SNSD&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(204,0,0)&quot;&gt;The top 5 websites I visited the most:&lt;/span&gt;&lt;br /&gt;1) tvxqfamily (&lt;a href=&quot;http://www.tvxqfamily.com/bbs/index.php&quot;&gt;http://www.tvxqfamily.com/bbs/index.php&lt;/a&gt;). TVXQ or Dong Bang Shin Ki is my favourite Korean artist. In this forum I can update myself with their latest news, can download their latest songs and photos and also know many others Cassiopeia (fans of TVXQ) from all over the world. Besides that, as I am obsessed with Korean hit, I can download other Korean artist stuff from this websites too.&lt;br /&gt;&lt;br /&gt;2) ‘BaoLanGe’ (&lt;a href=&quot;http://sjbluecn.ifensi.com/index.php&quot;&gt;http://sjbluecn.ifensi.com/index.php&lt;/a&gt;). This is the forum of Super Junior whose also one of my favourite Korean group. I can get their latest news and download many other Korean variety shows and music shows from here.&lt;br /&gt;&lt;br /&gt;3) Youtube (&lt;a href=&quot;http://www.youtube.com/&quot;&gt;http://www.youtube.com/&lt;/a&gt;). I can upload and share the videos with the world and watch the latest music video, movie trial in the first time. I also able to look for the old video, music and show in youtube.&lt;br /&gt;&lt;br /&gt;4) Facebook (&lt;a href=&quot;http://www.facebook.com/&quot;&gt;http://www.facebook.com/&lt;/a&gt;). It helps me to connect with my friend and also provides a lot of games, quiz and application that can play and interacts with all of my friends.&lt;br /&gt;&lt;br /&gt;5) Googles (&lt;a href=&quot;http://www.google.com/&quot;&gt;http://www.google.com/&lt;/a&gt;). It is the most common searching tool and it provides all the information I wish to know. It is especially important for me in order to complete all the assignments.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(51,102,255)&quot;&gt;&lt;span style=&quot;COLOR: rgb(204,0,0)&quot;&gt;The top 5 internet activities :&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;1) use msn chat with my friends &amp;amp; family&lt;/span&gt; &lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;2) open facebook play games, quiz and look for friends updates&lt;/span&gt; &lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;3) go to forum chat and download songs and show&lt;/span&gt; &lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;4) visit baidu to read news and read on the novel wrote by China friends&lt;/span&gt; &lt;span style=&quot;COLOR: rgb(0,0,0)&quot;&gt;&lt;br /&gt;5) google ~~ search for anything &lt;/span&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/1274082265514382636/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-hui-jing_15.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/1274082265514382636'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/1274082265514382636'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-hui-jing_15.html' title='About - Hui Jing -'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgz6OpDHOQANbCC-aDTjUK_IXmRoo_-4nwqoaBrtDh_G7R1mSplOoC9Zuz4tzvzBXi1H04LJGZPGKMqAZAiLJ1_OuNuhSJarPS4WnqUfQ7ySKxSbeWIbSlyE7a-taNqcrHmadG2R5K3ZRsW/s72-c/big.jpg" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1187625316738706200.post-7421096538648607605</id><published>2009-06-15T17:34:00.006+08:00</published><updated>2009-06-20T17:12:40.346+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Self-introduction"/><title type='text'>About - Pei Yee -</title><content type='html'>Hello everyone. When you step into G14 and if you heard people calling “ Ah Geh “, it is me. Actually my name is Pei Yee, but most of the time my friend will only call me “Ah Geh” as Geh is my surname. I was born and raised in the beautiful country of Malaysia and my hometown is Butterworth which is in the state of Penang. I am majoring in Accounting. Currently I am studying in UTAR Sg Long. This is my final year here. I am going to graduate with a degree in accounting in a year time. I like to watch drama, listen to music and watch Korean variety shows. Normally I only listen to Korean songs. I am a KPOP fan. I like Korean artist very much especially TVXQ! and Super Junior. Besides that, I also like Rain, BoA, Big Bang, SHINee, 2AM, 2PM, Wonder Girls, SNSD and so on. All of them are Korean artists. I will go online everyday to read about the news of the artists whom I like and download the music, drama and variety shows.&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcdfwLmdgcX9y7N_ZCal1uUg3Dn5vD2NC_ssZl8DiuveSjKB-Q_MO7g8QH72F1pNiEwshN-mTGbDY_RCw5viGMqQanU1lRuu0OAqeHpDiziKYJKmlpywDKAeMP1C_kfezJYYFlI1fhnQJV/s1600-h/25605c99894e53431d06c65e1f38be0e.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5348239136102648114&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 254px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcdfwLmdgcX9y7N_ZCal1uUg3Dn5vD2NC_ssZl8DiuveSjKB-Q_MO7g8QH72F1pNiEwshN-mTGbDY_RCw5viGMqQanU1lRuu0OAqeHpDiziKYJKmlpywDKAeMP1C_kfezJYYFlI1fhnQJV/s320/25605c99894e53431d06c65e1f38be0e.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;em&gt;&lt;span style=&quot;color:#6666cc;&quot;&gt;&lt;/span&gt;&lt;/em&gt;&lt;em&gt;&lt;span style=&quot;color:#6666cc;&quot;&gt;TVXQ!&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5348240540357577298&quot; style=&quot;WIDTH: 320px; CURSOR: hand; HEIGHT: 294px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKIvTnbnB7PAMSi6vIHu-e-z86ndGkNnd-U7BC6AFMnV7JqphscKG7vRnM-fYguzwDHKgMmBdHrYRE3xFI3Jfkdqc5tTEeiuGaS29bctoIhIcyptmigdKsV_4A982IMWjrWK8sFfC36ymN/s320/SJ.jpg&quot; border=&quot;0&quot; /&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;em&gt;&lt;span style=&quot;color:#6633ff;&quot;&gt;&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;&lt;em&gt;Super Junior&lt;/em&gt; &lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;span style=&quot;color:#993399;&quot;&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;The top 5 websites that I visited the most are listed below:&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;1. &lt;a href=&quot;http://www.tvxqfamily.com/bbs/&quot;&gt;&lt;span style=&quot;color:#333399;&quot;&gt;http://www.tvxqfamily.com/bbs/&lt;/span&gt;&lt;/a&gt; [TVXQFamily]&lt;br /&gt;This is TVXQ!’s forum in China. I always visit this forum to get the latest news of TVXQ! , download the variety show of TVXQ! and chat with Cassiopeia in China. (Cassiopeia are the fans of TVXQ!)&lt;br /&gt;&lt;br /&gt;2. &lt;a href=&quot;http://sjbluecn.ifensi.com/index.php&quot;&gt;&lt;span style=&quot;color:#333399;&quot;&gt;http://sjbluecn.ifensi.com/index.php&lt;/span&gt;&lt;/a&gt; [SJBlueCN]&lt;br /&gt;This is Super Junior’s forum in China. I always visit this forum to get the latest news of Super Junior, download the variety show of Super Junior and chat with the E.L.F in China. (E.L.F are the fans of Super Junior).&lt;br /&gt;&lt;br /&gt;3. &lt;a href=&quot;http://bbs.kanhanguo.com/&quot;&gt;&lt;span style=&quot;color:#000099;&quot;&gt;http://bbs.kanhanguo.com/&lt;/span&gt;&lt;/a&gt; [KANHANGUO]&lt;br /&gt;This is the forum for all the KPOP fans in China as well. I always visit this forum to get the latest news of other Korean artists and also download the latest Korean music and variety show. (KPOP stands for Korean Pop)&lt;br /&gt;&lt;br /&gt;4. &lt;a href=&quot;http://www.tskscn.com/&quot;&gt;&lt;span style=&quot;color:#000099;&quot;&gt;http://www.tskscn.com/&lt;/span&gt;&lt;/a&gt; [TSKSCN]&lt;br /&gt;I always visit this forum because I can download all the latest Korean drama with Chinese subtitle here.&lt;br /&gt;&lt;br /&gt;5. &lt;a href=&quot;http://www.cyworld.com.cn/main/&quot;&gt;&lt;span style=&quot;color:#000099;&quot;&gt;http://www.cyworld.com.cn/main/&lt;/span&gt;&lt;/a&gt; [CYWORLD]&lt;br /&gt;I always visit this website as my mini home is located here. Besides that, I can also leave message in the mini home of the artist I like and they will read it.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt;The top 5 internet activities that I always do are listed below:&lt;/span&gt;&lt;br /&gt;1. Go to the forum and chat with all the fans.&lt;br /&gt;2. Open Windows Live Messenger and chat with my friends.&lt;br /&gt;3. Open TVANTS and watch the Korea TV Channel Live. ( TVANTS is the software where we can watch most of the TV channel all around the world live.)&lt;br /&gt;4. Go to my mini home and update my diary.&lt;br /&gt;5. Go to Facebook and play games.&lt;br /&gt;My life will be bored without internet. That is the reason why I will go online every day.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5347754857107581010&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 300px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIU-87AS17BZGRxxqh4V4rP9FVXT1Yi_mm8YKuf8ucYDJa3L6d7UkXQWSsKVSkL8J3QBDMw8gNADN0OaW-lQdY9U471wFTBegYSp3SQgef-KgVSzkRGqG27iVUmNSNOE6wxsqdb7hbZUCK/s400/PhotoFunia-2575ede.jpg&quot; border=&quot;0&quot; /&gt;&lt;em&gt;&lt;span style=&quot;color:#6600cc;&quot;&gt; From the left : Hui Jing, Mei Yee, Seok Fen and Pei Yee&lt;/span&gt;&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://cybertopia14.blogspot.com/feeds/7421096538648607605/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-pei-yee_15.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7421096538648607605'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1187625316738706200/posts/default/7421096538648607605'/><link rel='alternate' type='text/html' href='http://cybertopia14.blogspot.com/2009/06/about-pei-yee_15.html' title='About - Pei Yee -'/><author><name>cybertopia</name><uri>http://www.blogger.com/profile/16514562902588185295</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcdfwLmdgcX9y7N_ZCal1uUg3Dn5vD2NC_ssZl8DiuveSjKB-Q_MO7g8QH72F1pNiEwshN-mTGbDY_RCw5viGMqQanU1lRuu0OAqeHpDiziKYJKmlpywDKAeMP1C_kfezJYYFlI1fhnQJV/s72-c/25605c99894e53431d06c65e1f38be0e.jpg" height="72" width="72"/><thr:total>5</thr:total></entry></feed>