BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Search This Blog

Monday, June 29, 2009

The revenue model for Google, Amazon.com, and eBay

Everything businesses succeed in its ability to acquire and earn profits where capture all necessary revenue and value from the customers through offering the right products and services. Three of the following businesses indicate their revenue model and how it's generated to make the business success.

Google

Google AdWords and Google AdSense - A pay per click advertisement program developed by Google that generates profits from receiving every payment from advertisers whenever the published ads were clicked by anyone that try to surf for information. Try find for more information about Google Adsense and Google Adwords here.












Last year (2008) through the above methods deployed by Google, it made a revenue of $ 21 million where is a 31% growth in the growth rate compare to past earnings. The financial statement of Google indicates that the business is going in a downfall because advertisers are becoming more and more concern about the fraud and error that will appear when advertised through online.



Served as one of the most successful third part e-commerce business, Amazon was first stand as an online bookstore wherein selling new and used books and other reading materials through online. Amazon can even provide more than 200,000 titles compare to those brick-and-mortar bookstores. Then the business diversified its product line by selling instead of books, Amazon sold videos, musics, computer software, furniture, apparel and etc.

Amazon Marketplace is one of the most successful determinant for Amazon success, it enable buyers to sort and browse for the products then buy it through online. By charging a commision rate based on the selling product's price where this act as a transactional fee wherein Amazon have a revenue of $19 billion over the year of 2008.



In 1996, Amazon launched an affiliate marketing program called aStore where by having website owners serve as affiliates of having the program installed on their website, Amazon rewards affiliates for every customers brought by the website owners.




The final example of business, eBay. eBay is an online auction and shopping website in which people and businesses buy and sell goods and services worldwide. You can possibly find whatever you can think of in eBay. It provides over millions of collectables, equipment, appliances and even vehicles. eBay generates two main kinds of fees that is the promotional fees and final value fees.

  • Promotional fees are the fees that charged for additional listing options that help attract attention for an item, for example those highlighted of bold items.

  • Final value fees are the commission that are charged to the seller at the end of the auction.
Online advertising tends to play an important role in eBay's revenue. On the trasaction fees revenue, eBay offers PayPal where enabling the holders of PayPal to exchange money over the Internet .

Furthermore, eBay generates its sales revenue through subsidiaries such as Half.com and eBay express. Where both of the subsidiaries offer a fixed price for selling the product but eBay will charge a 15% commission on the complete sales.




Sunday, June 28, 2009

Credit Card debts: Causes and Prevention

The cost of living has increase due to the economic crisis nowadays. This crisis creates many problems that direct and indirect towards consumers. Many consumers did not have enough cash in hand is one of the reason they would choose to use the credit card. Another reason is because is an extremely convenient tool can solve their problems immediate. This kind of situation lead the number of credit card debts increase and it may lead many consumers facing the problems of bankruptcies. It is because consumer did not realized of consequences financial and non financial perspectives.

Top 3 major causes of credit card debts:

  1. Unemployment
    Some of the consumers lost their job when the bad economies. This makes them unable to maintain their living expenses such as the groceries, utilities or education fees of children in that time. Moreover, they could not find a new job during the short period forced them to use the credit card to cover their basic living expenses.
  2. Poor Money Management
    Many consumers are unaware to conduct a monthly spending plan and do not keep monthly bills or receipt to record how many money are already spend. Without keeping the bills, they would not realize how much their spending and whether their debts have rise or not. Sometimes they maybe spend unnecessarily that do not have any value to their life.
  3. No saving cushion
    Most consumers using the future money when using the credit card and do not have extra money to save in bank. Besides that, they don’t understand the benefits of how money works and grows or how to save and invest the money for the emergency needs or expenses.

Prevention methods

  1. Making a budget plan
    Every person need to have a budget plan especially those credit card holders. This can help consumers to perceive that they will avoid the unnecessarily spending or will not overspending their budget. This plan must set before and prevent from the debts.
  2. Self control and discipline
    Have a direct set up is one of the best practices so that able to pay back the full amount each month and for emergency use only. Like this way, consumers can control themselves by limit the credit card amount and learn not to overspend more than their limit budget every month.
  3. Cash transaction
    Another way is stop charging items on the credit card and use cash to make transaction for the items they buy. Then the consumers do not need to pay the extra charges for the credit card debts.

Friday, June 26, 2009

Phishing: Examples And Its Prevention Methods



What Is Phishing?


In the field of computer security, phishing is a form of criminal activity using social engineering techniques. Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake.

You might see a phishing scam:

In e-mail messages, even if they appear to be from a coworker or someone you know.

On your social networking Web site.

On a fake Web site that accepts donations for charity.

On Web sites that spoof your familiar sites using slightly different Web addresses, hoping you won't notice.

In your instant message program.

On your cell phone or other mobile device.


Often phishing scams rely on placing links in e-mail messages, on Web sites, or in instant messages that seem to come from a service that you trust, like your bank, credit card Company, or social networking site.

Typically, phishing attacks will direct the recipient to a web page designed to mimic a target organization’s own visual identity and to harvest the user's personal information, often leaving the victim unaware of the attack. Obtaining this type of personal data is attractive to black hats because it allows an attacker to impersonate their victims and make fraudulent financial transactions. Victims often suffer significant financial losses or have their entire identity stolen, usually for criminal purposes. As a successful and lucrative form of financial fraud, phishing made its mark on the networked landscape in 2004. Today, it is a booming segment of the identity theft “industry”. In January of 2004, there were 174 phishing Web sites identified by the cross-vendor Anti-Phishing Working Group. By December, there were over 1700. Finally, that year, the reported consumer loss due to Internet-based fraud was estimated between US$500 million (according to the Federal Trade Commission) and US$2 billion (according to the Anti-Phishing Working Group). Financial institutions and law enforcement agencies alike were ill-prepared to deal with organized, technically literate, internationally-based criminals.


Examples of Phishing Scam


Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, Best Buy, and America Online.

This phish claims that Washington Mutual Bank is adopting new security measures which require confirming ATM card details. As with other phishing scams, the victim is directed to visit a fraudulent site and any information entered on that site is sent to the attacker.

The email warns that failing to comply with the instructions may result in account suspension. Note the use of the SunTrust logo.This is a common tactic with 'phishers' who often use valid logos they have simply copied from the real banking site in an attempt to lead credence to their phishing email.

As with the SunTrust example, this eBay phishing email includes the eBay logo in an attempt to gain credibility. The email warns that a billing error may have been made on the account and urges the eBay member to login and verify the charges.

There is no shortage of irony in the Citibank phishing example. The attacker claims to be acting in the interests of safety and integrity for the online banking community. Of course, in order to do so, you are instructed to visit a fake website and enter critical financial details that the attacker will then use to disrupt the very safety and integrity they claim to be protecting.

As seen with the previous Citibank phishing scam, the Charter One phishing email also pretends to be working to preserve the safety and integrity of online banking. The email also includes the Charter One logo in an attempt to gain credibility.

PayPal and eBay were two of the earliest targets of phishing scams. In the example, this PayPal phishing scams tries to trick recipients by pretending to be some sort of security alert. Claiming that someone 'from a foreign IP address' attempted to login to your PayPal account, the email urges recipients to confirm their account details via the link provided.

As with other phishing scams, the displayed link is bogus - clicking the link actually takes the recipient to the attacker's website.A security flaw on a US government website has been exploited by a phishing scam claiming to be an IRS refund notification. The phishing email claims the recipient is eligible for a tax refund of $571.94. The email then tries to gain credibility by instructing recipients to copy/paste the URL rather than clicking it. That's because the link actually does point to a page on a legitimate government website, http://www.govbenefits.gov. The problem is, the page being targeted on that site allows the phishers to 'bounce' the user to another site altogether.


Prevention methods


There are several (technical or non-technical) ways to prevent phishing attacks:

  • Educate users to understand how phishing attacks work and be alert when phishing-alike e-mails are received;
  • Use legal methods to punish phishing attackers;
  • Use technical methods to stop phishing attackers.


Social Responses


Users who are contacted about an account needing to be "verified" can take steps to avoid phishing attempts, by contacting the company that is the subject of the email to check that the email is legitimate, or by typing in a trusted web address for the company's website into the address bar of their browser, to bypass the link in the suspected phishing message. The Anti-Phishing Working Group, an industry and law enforcement association has suggested that conventional phishing techniques could become obsolete in the future as people are increasingly aware of the social engineering techniques used by phishers. They propose that pharming and other uses of malware will become more common tools for stealing information.


Legal Responses


Microsoft has joined the effort to crack down on phishing. On March 31, 2005, Microsoft filed 117 federal lawsuits in the U.S. District Court for the Western District of Washington. The lawsuits accuse "John Doe" defendants of using various methods to obtain passwords and confidential information. March 2005 also saw Microsoft partner with the Australian government to teach law enforcement officials how to combat various cyber crimes, including phishing. Microsoft announced a planned further 100 lawsuits outside the U.S. in March 2006.


Technical Responses


If we can cut off one or several of the steps that needed by a phishing attack, we then successfully prevent that attack.

  • Detect and block the phishing websites in time:

If we can detect the phishing Web sites in time, we then can block the sites and prevent phishing attacks. It’s relatively easy to (manually) determine whether a site is a phishing site or not, but it’s difficult to find those phishing sites out in time.

  • Enhances the security of the websites:

One method to enhance the security is to use hardware devices. Another method is to use the biometrics characteristic (e.g. voice, fingerprint, iris, etc.) for user authentication. With these methods, the phishers cannot accomplish their tasks even after they have gotten part of the victims’ information. However, all these techniques need additional hardware to realize the authentication between the users and the Web sites hence will increase the cost and bring certain inconvenience. Therefore, it still needs time for these techniques to be widely adopted.

  • Block the phishing e-mails by various spam filters:

The phishers hide their identities when sending the spoofed e-mails, therefore, if anti-spam systems can determine whether an e-mail is sent by the announced sender, the phishing attacks will be decreased dramatically. From this point, the techniques that preventing senders from counterfeiting their Send ID can defeat phishing attacks efficiently. The spoofed e-mails used by phishers are one type of spam e-mails. From this point of view, the spam filters, can also be used to filter those phishing e-mails. Most of these anti-spam techniques perform filtering at the receiving side by scanning the contents and the address of the received e-mails. Furthermore, spam filters are designed for general spam e-mails and may not very suitable for filtering phishing e-mails since they generally do not consider the specific characteristics of phishing attacks.

  • Install online anti-phishing software in user’s computers:

Despite all the above efforts, it is still possible for the users to visit the spoofed Web sites. As a last defense, users can install anti-phishing tools in their computers. The anti phishing tools in use today can be divided into two categories: blacklist/white list based and rule-based.


Related links:

  1. http://en.wikipedia.org/wiki/Phishing
  2. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916037,00.html
  3. http://www.honeynet.org/papers/phishing/
  4. http://www.microsoft.com/protect/yourself/phishing/identify.mspx
  5. http://antivirus.about.com/od/emailscams/ss/phishing_9.htm
  6. http://y2u.co.uk/Knowledge_Information/Technology/RN_Computer_Phishing_Scam.htm
  7. http://research.microsoft.com/en-us/um/people/chguo/phishing.pdf

Tuesday, June 23, 2009

How to safeguard our personal and financial data?

Internet is very common in nowadays. Every person need to use computer to complete their task or job everyday. They all rely on computer to save our personal data and through online financial services to do the financial transaction such as online payment, online banking to save time.

It is very convenient but internet is not a safe place especially for those people using online banking or payment. It is because hackers have the expertise and ability to intercept and do falsely when they using the information such as credit card numbers. So we need to take some prevention to increase internet security and decrease the probability of data being stolen. There are some suggestions stated in below:

  1. Avoid using password that easy for memorize, use those password hardly to guess by other people. Beside that, don’t write down the password and carry it in your wallet. Use combination of numbers and letters if it possible
  2. Install or use updated antispyware and antivirus software to protect. For example, Symantec, Norton and Avg antivirus are most popular software use by computer users. Its clean computer and protect personal information, financial data and etc.
  3. Avoid accessing financial information in public. User must avoid logging in to check its own bank account or other sensitive personal data when using a free wireless connection that outside coffee shop, airports and other public places provided.
  4. Biometric device. Biometric devices using some biometric identifier to access program, computers or rooms to safeguard our own personal and financial data. Those biometric devices include fingerprint scanners, hand geometry systems, face recognition systems, voice verification systems, signature verification systems and iris recognition systems. Advantages of using this method is the data won’t lose although it is being stolen.

Additional informations:
1) Six ways to safeguard your online assets
2) Keep your financial data safe online
3) http://www.us-cert.gov/cas/tips/ST06-008.html
4) http://www.msisac.org/awareness/news/2007-03.cfm

Sunday, June 21, 2009

An example of an E-commerce success and its cause


For example - eBay


eBay is a global online marketplace where practically anyone can trade practically anything. Launched in 1995, eBay started as a place to trade collectibles and hard-to-find items.


eBay founded in Pierre Omidyar's San Jose, a computer programmer, wrote the code for an auction website that he ran from his home computer in September 1995. It was from start meant to be a marketplace for the sale of goods and services for individuals.


Today, eBay is the world's largest online community of buyers and sellers. With a global presence in 38 markets, including the US, and over 241 million registered users worldwide, eBay offers boundless opportunity to come together in one Internet site and be able to buy and trade a wide range of items, including fine collectibles. It allows people pursue their interests and their passions in the areas of their hobbies and their collectibles.


eBay has built an online person-to-person trading community on the Internet, using the World Wide Web. Buyers and sellers are brought together in a manner where sellers are permitted to list items for sale, buyers to bid on items of interest and all eBay users to browse through listed items in a fully automated way. The items are arranged by topics, where each type of auction has its own category. It's convenient and easy to be found by people.


eBay has both streamlined and globalized traditional person-to-person trading, which has traditionally been conducted through such forms as garage sales, collectibles shows, flea markets and more, with their web interface. This facilitates easy exploration for buyers and enables the sellers to immediately list an item for sale within minutes of registering.


eBay has done a regular basis to promote eBay, they have had isolated campaigns through radio and print, and they've also done some tradeoffs and some banner ads on other sites. But the really unique thing about eBay is that when compare theirs to traditional businesses or other e-commerce sites, they have done very little external promotion to build membership.


eBay is such a unique community that they've been able to build their membership through the word-of-mouth of their users and they've also attracted new members due to the amount of media attention that has come to the site in the past few years.

Another cause has helped to make eBay as successful as it has been, is that people really enjoy the experience of the shopping bazaar. They enjoy looking around for merchandise. The other component is they really enjoy the competition of the bidding process. Everybody likes to get a bargain, and in some way, shape or form, likes to haggle a little bit over the price. eBay's auction format allows users to do that.


Obviously, people are becoming more and more comfortable with shopping online and they're getting more and more accustomed to doing that. That's another factor why eBay is grateful.

Thursday, June 18, 2009

The History And Evolution Of E-commerce



Definition Of E-commerce

E-commerce can be defined as a modern business methodology that addresses the needs of organizations, merchants, and consumers to cut costs while improving the quality of goods and services and the increasing speed of service delivery, in which transactions take place over networks, mostly the Internet. It is the process of electronically buying and selling goods, services and information. Certain E-commerce applications, such as buying and selling stocks and airline tickets on the internet, are growing very rapidly, exceeding non-Internet trading.

E-commerce is not just about buying and selling, it also is about electronically communicating, collaborating, and discovering information (sometimes referred to as e-business). It is about e-learning, e-government, social networks, and much more. E-commerce will have an impact on a significant portion of the world, affecting businesses, professions, and, of course, people.

History Of E-commerce

The history of E-comme
rce basically starts in the 1960s.History of E-commerce dates back to the invention of the very old notion of “sell and buy”, electricity, cables, computers, modems, and the Internet. E-commerce became possible in 1991 when the Internet was opened to commercial use. Since that date thousands of businesses have taken up residence at web sites. At first, the term E-commerce meant the process of execution of commercial transactions electronically with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) which gave an opportunity for users to exchange business information and do electronic transactions. The ability to use these technologies appeared in the late 1970s and allowed business companies and organizations to send commercial documentation electronically. Evolution Of E-commerce
The evolution of e-commerce can be attributed to a combination regulatory reform and technological innovation. Through Internet (which played an important role in the evolution) appeared in the late 1960s, e-commerce now took off with the arrival of the World Wide Web and browsers in the 1990s.

E-Commerce were first developed in the early 1970s with innovations like:

  • Electronic Funds Transfer (EFT) - funds can be routed electronically from one organization to another.
  • Electronic Data Interchange (EDI) – used to electronically transfer routine documents, that expanded electronic transfers from financial transactions to other types of transaction processing.
  • Inter Organizational System (IOS) – a system which allows the flow of information to be automated between organizations in order to reach a desired supply-chain management system, which enables the development of competitive organizations.
Since 1995, many innovative applications, ranging from direct online sales to e-learning experiences had been developed. Almost every organization in the world has a Web site.

In 1999, the emphasis of e-commerce shifted from B2C to B2B.

In 2001, from B2B to B2E, e-government, e-learning, and m-commerce.

In 2005, social networks started to rise and so did l-commerce and wireless applications.

E-commerce will undoubtedly continue to shift and change in the future.


Year
Event
1984
EDI, or electronic data interchange, was standardized through ASC X12. This guaranteed that companies would be able to complete transactions with one another reliably.
1992
Compuserve offers online retail products to its customers. This gives people the first chance to buy things off their computer.
1994

Netscape arrived. Providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer.

1995
Two of the biggest names in e-commerce are launched: Amazon.com and eBay.com.
1998
DSL, or Digital Subscriber Line, provides fast, always-on Internet service to subscribers across California. This prompts people to spend more time, and money, online.
1999
Retail spending over the Internet reaches $20 billion, according to Business.com.
2000
The U.S government extended the moratorium on Internet taxes until at least 2005.
2001
E-commerce was adapted by almost every major retail company such as Wal-Mart. The transactions that took place between the businesses where recorded at around $700billion.
2002
eBay acquires PayPal for $1.5 billion. Niche retail companies CSN Stores and Netscape are founded with the concept of selling products through several targeted domains ratherthan a central portal.
2003
Amazon.com posts first yearly profit
2005
The U.S. government extended the moratorium on Internet taxes until this year.
2007
Business.com acquired by R.H. Donnelley for $345 million.Fortune magazine have ranked Dell as the 34th largest company in the Fortune 500 list and 8th on its annual Top 20 list of the most successful and admired companies in the USA in recognition of the company’s business model.
2008
The U.S. E-commerce and Online Retail sales projected to reach $204 billion, an increase of 17% over year 2007.

Early Adopters Of E-commerce

History of ecommerce is unthinkable without Amazon and Ebay which were among the first Internet companies to allow electronic transactions. Thanks to their founders we now have a handsome ecommerce sector and enjoy the buying and selling advantages of the Internet.

Amazon.com, Inc. is one of the most famous ecommerce companies and is located in Seattle, Washington (USA). It was founded in 1994 by Jeff Bezos and was one of the first American ecommerce companies to sell products over the Internet. After the dot-com collapse Amazon lost its position as a successful business model, however, in 2003 the company made its first annual profit which was the first step to the further development.

At the outset Amazon.com was considered as an online bookstore, but in time it extended a variety of goods by adding electronics, software, DVDs, video games, music CDs, MP3s, apparel, footwear, health products, etc. The original name of the company was Cadabra.com, but shortly after it become popular in the Internet Bezos decided to rename his business “Amazon” after the world’s most voluminous river. In 1999 Jeff Bezos was entitled as the Person of the Year by Time Magazine in recognition of the company’s success. Although the company’s main headquarters is located in the USA, WA, Amazon has set up separate websites in other economically developed countries such as the United Kingdom, Canada, France, Germany, Japan, and China. The company supports and operates retail web sites for many famous businesses, including Marks & Spencer, Lacoste, the NBA, Bebe Stores, Target, etc.

Amazon is one of the first ecommerce businesses to establish an affiliate marketing program, and nowadays the company gets about 40% of its sales from affiliates and third party sellers who list and sell goods on the web site. In 2008 Amazon penetrated into the cinema and is currently sponsoring the film “The Stolen Child” with 20th Century Fox.

According to the research conducted in 2008, the domain Amazon.com attracted about 615 million customers every year. The most popular feature of the web site is the review system, i.e. the ability for visitors to submit their reviews and rate any product on a rating scale from one to five stars. Amazon.com is also well-known for its clear and user-friendly advanced search facility which enables visitors to search for keywords in the full text of many books in the database.

eBay allows just about anyone to be an online merchant. Founder Pierre Omidyar started eBay when he developed AuctionWeb, a site from which he offered a broken laser pointer. It sold – to a collector of broken laser pointers. The idea was that the Internet was the great leveler. Since its beginnings in 1995, eBay has developed a sophisticated system that allows anyone to set up a storefront and sell merchandise.

Currently there are 5 largest and most famous worldwide Internet retailers: Amazon, Dell, Staples, Office Depot and Hewlett Packard. According to statistics, the most popular categories of products sold in the World Wide Web are music, books, computers, office supplies and other consumer electronics.

Related links:

  1. http://www.ecommerce-land.com/history_ecommerce.html
  2. http://newmedia.medill.northwestern.edu/courses/nmpspring01/brown/Revstream/history.htm
  3. http://www.bestshoppingcartreviews.com/content/history-of-ecommerce.html
  4. http://ecommercesite.wordpress.com/2008/06/11/the-history-evolution-of-e-commerce/
  5. http://ecommerze.wordpress.com/2008/06/12/the-history-and-evoltion-of-e-commerce/

Thursday, June 11, 2009

Group Profile

Lo Hiok Leong (Leader)

Hi, this is the first time i've ever manage a blog if its not for the subject that I'm taking this semester (E-commerce), I think i will be clueless about what is the meaning og blogging. First of all, let me introduce myself...

My name is Lo Hiok Leong, which i strongly recommend people to just call me Ah Leong. I'm 21 years old in my current semester in UTAR branched at Sungai Long and this is my 3rd consecutive year in pursuing my studies at UTAR. People might know me as outgoing and sometimes even kinf of noisy but i normally think of myself quite quiet and shy. The hometown i come from is Pahang, Kuantan (you can actually find the freshes salted-fish you can possibly find in all around Malaysia... I do believe that's true though~). Kuantan is quite well known for not only it's salted-fish but also the romantic and gorgeous view of the beaches such as Teluk Champedak, Cherating Beach, Black Stone Beach and many more... This takes me to my first hobby, though i'm quiet but I'm very sporty, I loves all kinds of sport (basketball, volleyball, badminton, swimming...). I like drawing either because by drawing, i get to express my feeling that lies within my mind and my thought because of that, I love watching movies and comics A LOT~ Culinary and baking is also one of my favourite activity when i have to much free time to waste.

The Top 5 Website in my list and the activities I do with those Website:
  1. http://www.hotmail.com/ - I login to the website very often to check my mail because I just cant stand my mail box being flooded.
  2. http://dm.99manga.com/ - This website is where I read my comics the most, there are tonnes of comics you can possibly find here and this website update very often to keep their comics in track.
  3. http://www.tom365.com/ - I usually download movies through this website, but if you planned to view the contents (moveis) you are required to download a program calles QVOD player where its licensed so you don't have to worry about illegal downloads.
  4. http://www.facebook.com/ - This website porvides to fullest public social facilities ranging from profile sharing to communication to online gaming which will lead to total addiction.
  5. http://www.epicwar.com/ - A website for gamers (DotA) to download their favourite gaming maps.

Tan Hye Guan's Profile

Before I start... I have to tell u all, my English is very poor, so please forgive me if u you do not understand my blog...

It time to introduce myself now I think... Nothing much about me. My name is Tan Hye Guan. I am a very young boy. Age? It's secret!!! Like girls is it? Hope you all wont mind... But one thing that I can tell you all is that my horoscopes is Aries. A very aggressive and hot-tempered Aries as you all know. I was born in a beautiful place in Malaysia, in a hospital!!! Surprise? Hope that my friend wont laugh and punch me... Actually I was born in the central of Malaysia, of course everyone know where it is, Kuala Lumpur a.k.a KL. Being born in a city doesn't allowed me to enjoy and have a wonderful, fantastic, colorful and of course, marvelous life... In fact, I am just an ordinary boy. Yes, everyone know, i am a boy... Nothing much but a boy...

Now, i will reveal some of my hobbies. First, of course, playing computer games for sure. But besides that, i also use comeputer to do other things such as search information and others. Second, watching movies and dramas. Of course, musics too. Third, doing some sport activities such as playing badminton and ohters. Others hobbies, maybe next time I only tell you all because now i can't think more about my hobbies....

Currently, i am pursuing my study at University Tunku Abdul Rahman a.k.a UTAR, Faculty of Accountancy and Management at Bandar Sungai Long. I am undergoing the degree of Business Administration (Hons) Entrepreneurship. Many people will ask me what and why I choose this course. Well, the answer is, this is a course that receive little attention. Funny ? Maybe...I was being allocated into tutorial group 2. I was proud to be in this group as i can get to know many friends and they are very friendly and helpful. Thanks to you all for being helpful always to help me solve my problems. This is the last year that i am studying in this campus and this semester there is a subject that needed us to create a blog. So, here I am...

Below are the top 5 websites that i visited the most:

  1. http://www.google.com.my/ - This websites helps me to find anythings that i want.
  2. http://www.yahoo.com/ - this also can let me search anything that i want.
  3. http://www.youtube.com/ - This website can let me find musics and videos such as movie clips and etc.
  4. http://www.msn.com/ - A website that i can search anything and to check my mails and sending mails to my friends.
  5. http://verycd.com/ - A website that i can search musics and videos to download.

Top 5 Internet activities are:

  1. Check mails
  2. Search for music to listen
  3. Finding movies to download
  4. Chatting with my friends
  5. Search for information


John Profile

hey , everybody. My name is Tan John Kern , born in Bukit Mertajam, Pulau Pinang but stay in Sg Petani Kedah. My age now is 21 years old, still alone ( wait people introduce to me but must pretty de ) . In my family, I got two eldest sister and I am the youngest brother. So my family love and protect me a lot and I also love my family. For my home town, Sg Petani. Although it not advance as Kuala Lumpur but the enviroment here is the best . The air here are fresh and peaceful. Furthermore, the food is delicous such as laksa, rojak, char keow teow, ice kacang, mee goreng. All those food is my favourite, so i quite fatty, haha.

My hobby ..... haha sure is playing computer games, espically DOTA. What is dota ? Dota is a strategy game and a team work game . It is very interesting and need to concentrate and collabration to win the game. Second of my hobby is reading novel (武俠小說), espically written by Jin yong and gulong . I have collect many of their novel and hope one day i can meet Jin Yong and let him sign the signiture on the book. Besides that, i also like sport a lot. Almost every week wednesday, I will go futsal with my best friends at Kajang . Sometimes we also will play Badminton or go swimming .

My top 5 visited web sites :

  1. http://www.faceboook.com/ This web site let me easy to communicate with others friendsand it have a lot of games let me to play.
  2. http://www.hotmail.com/ I using hotmail to email and check my mail.
  3. http://www.google.com/ When i want to do my research, i will use google to search myinformation.
  4. http://www.youtube.com/ This web site having a lot of vedio. I usally will watch thefootball video in this website
  5. http://www.sina.cn/ This is the web site that i reading the news .

Joe’s profile

My name is Lee Hwee Lei can also call me as Joe. The place I born is a small town in Johor where is called Tangkak. My lovely hometown doesn’t have much more delicious food but it near the nature. That also one of the reason I went beck always.

I came to the UTAR campus in Sungai Long to pursue my degree after I finish study the Foundation in PJ campus. As I know, gain more knowledge and education are the steps before I can pursue my dream also the successful I want in the future. Besides that, I also have gain some working experiences when having the semester break. This can help me reduce the fear when facing a new environment in the future working place. Not only this, build the good relationship with people who outside the campus is one of the experiences can gain through the part time job and that could not learn from university life.

The top 5 websites I visited more:

  1. www.hotmail.com – check mail is the important thing I need do it daily so I won’t miss any announcement or updating message through email.
  2. www.facebook.com – one of the methods I keep in touch with all my friends. Sometimes will make some new friends when playing the games is provided.
  3. www.google.com – can search or get the information I need when I doing assignment.
  4. www.gougou.com – this is one of the websites can find the music album, movie, and drama also.
  5. www.publicmutual.com.my – get the updating information about the mutual funds and those activities provided.

Top 5 internet activities are:
a) Checking mails
b) Listening music, watching drama and movie online.
c) Chatting with my friends through msn
d) Playing online games in Facebook.
e) Search the information I need from the Internet.