your visitor no.

Wednesday, July 9, 2008

Review a local e-commerce site - Lelong.com.my

Lelong.com.my is a pioneer auction website which bringing high standard of quality into homes and business by providing an avenue for on-line trading at a low cost. It starting based on Consumer-to-Consumer (C2C) transactions and now is moving to becoming a Business-to-consumer(B2C) relationship.

It selling many features of product such as:

1) computer
2) handphone

3) camera

4) categories which included :

a) feng shui
b) clothing and accessories

c) personal care

d) pets and

e) etc

The speed of downloading is depend on the internet speed subscribed by user. The website has presents the layout of the products, price/shipping, state, bids/views and the time left of bidding products. There have different language to choose according to consumer' preferences. In addition, Lelong safetrade provided to manage every aspects of the settlement process and remove risk from online transaction. Therefore, is giving a safenesses to buyer and seller.

The shopping cart is well equipping with the information needed by the buyer which given details such as payment methods and shipping methods. The website also provides a forum for users to give any opinion, problem and feedback when using its online trading.

Most of consumer prefer to use Lelong.com.my as a trade of products and services because it is easy to use and convenient compare to buy things at the shopping mall whereby a
pproximately 70% of all items posted for auction on the site are sold.

Friday, July 4, 2008

Corporate Blogging: A new marketing communication tool for companies

Corporate Blogging has now become very popular among businesses of all sizes. A corporate blog is a tool that help the organization fulfill a business goal. It can help the organizations to extend the company image in the marketplace. Companies can enhance their image through describe deeply about their companies such as the products or services they sell in the corporate blog. This will enable the customers know better about the companies. It also helps the organizations have an opportunity to open a two-way channel between employees and customers.

There are 2 major categories of corporate blogs which is Internal Blogs and External Blogs. The Internal Blogs divide into 3 types:
(1) Knowledge Blogs: give employees information relating to their work assignments.
(2) Collaboration Blogs: provide a working team with a tool for research, collaboration and discussion.
(3) Culture Blogs: strengthen organisational culture.

The External Blogs include:
(1) Sales Blogs: make citizens aware of public services, get donations for charities or political parties.
(2) Relationship Blogs: create, uphold or strengthen relationships.
(3) Branding Blogs: strengthen the brand, the profile, of the publishing organisation or individuals within it.

Corporate blogs have both advantages and disadvantages. The blogs help employees to keep themselves informed on all the current happenings in the organization. The blogs also allow employees to display their expertise on a particular topic, thereby becoming a recognized industry. Through blogging, an organization can build its relationship with its customers and promote their products at the same time. The disadvantages include some employees may use blogs to write negatively about the company which can lead to bad publicity. If organizations do not make sure that a blog complies with all applicable local, national and foreign requirements for doing business, it can lead to legal liabilities. Besides that, people may be talking out of the topic and cause the organizations loss of control over the message.

Blogging encourages communication and allows businesses more easily reach their customers. If used properly, corporate blogging will enhance customer loyalty, and can make the business more successful.

Thursday, July 3, 2008

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

Auction can be defined as a market mechanism by which buyers make bids and sellers place offers and is characterized by the competitive and dynamic nature by which the final product is reached. However , e-auctions is the auctions conducted online. http://www.lelong.com.my/ and http://www.ebay.com.my/ are the examples of it.



There are several types of e-auction fraud such as:

  • Bid shielding: Tactic used by the buyer to push down the price,
  • Shilling : Tactic used by the seller to push up the price,
  • Fake photo and misleading description: In reaching for bidders’attention, some sellers distort what they can truly sell.
  • Selling reproductions: A seller sells something that the seller claims is original, but it turns out to be a reproduction.
  • High shipping cost and handling fees: Some seller just want to get a little more cash out of bidders. Postage and handling rates vary from seller to seller. Some charge extra to cover “handling” cost and other overhead intangibles, whereas other charge to cover the cost of packaging supplies, even though such supplies are aften available for free.
  • Failure to ship merchandise: Money was paid out but the merchandise never arrives,

Since the buyers cant see item , they may get a defective item and sometimes the buyers also can commit fraud. Therefore the fraud rate of e-auction is quite high. Thus , something should be take note to prevent it. We can protecting against e-auction fraud by :


1) User identity verification : Verify their IC number , driver’s license number or date of birth. For example, eBay uses the services of Equifax to verify user identities for a $5 fee.


2)Authentication services : Product authentication is a way to determine whether an item is genuine and described appropriately. Authentication is very difficult to perform because it relies on the expertise of the authenticators. Because of their training and experience, expert can (for a fee) often detect counterfeits based on subtle details. However, two expert authenticators may have different opinion about the euthenics of the same item.


3) Escrow services : Ensure that both sellers and buyers in a deal are protected with a independent third party who will hold onto the money until confirmation of good received. An example of a provider of online escrow services is tradenable.com


4) Grading services: Grading is a way to determine the physical condition of an item, such as “poor quality” or “ mint condition”. The actual grading system depend on the type of the item being graded. Different items have different grading system- for example, trading card are graded from A1 to F1 , whereas coins are graded from poor to prefect uncalculated.


5) Non payment punishment: for example, eBay implemented a policy against those who do not honor their wining bids. To help protect sellers, a first-time nonpayment results in a friendly warning. A sterner warning is issued for a second time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.

Wednesday, July 2, 2008

E-Government in Malaysia

In 1997, the Malaysia Government launched the Electronic Government initiative, generally known as e-Government, to reinvent itself to lead the country into the Information age. E-Government seeks to enhance the convenience, accessibility and quality of interaction with the public and business at large. At the same time, it will improve information flow and processes within the government, improve speed and quality of policy development, and improve coordination and enforcement.

There are seven main projects were identified to be the core of the e-Government applications, which is Electronic Procurement (eP), Project Monitoring System(PMS), Electronic Services Delivery (eServices), Human Resource Management Information System (HRMIS), Generic Office Environment (GOE), E-Syariah and Electronic Lobour Exchange (ELX).

One of the e-Government project implementations is Electronic Procurement (eP) Project, also known as ePerolehan. E-Perolehan is an electronic procurement system provided by the government to enable suppliers to sell their products or services on the internet. Through ePerolehan, suppliers and contractors can receive, manage, and process orders or payment from government agencies through transactions done electronically on the internet.

However, there are some problems facing by the user of e-Perolehan, such as some consumers lack of online procurement knowledge. Further, some consumer may felt lack of trustily and confidential of the system. It is because the risk of losing information is higher in ePerolehan system and the challenge is even greater compared to paper environment, therefore change and risk management must be in place to ensure information available overtime.


Sunday, June 29, 2008

The application of pre-paid card for consumers

A prepaid cash card is a payment card that similar with credit card or debit card. It gives users the ability to purchase goods without paying by cash. It different with credit card or debit card, it contains a concept of “pay now, spend later”. It means users must firstly load money onto the card then only spend it when make a purchase.

There are some popular prepaid cash card frequently being used, such as in Malaysia -Touch n Go, Singapore - ez-link card and Hong Kong - Octopus Card. Touch n Go is an electronic purse that can be used at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme park.






The benefit of using Touch ‘n Go are increasing the speed of paying, eliminating debt risk which it has no credit or overdraft facility. It ensuring users won’t overspend and prevent users using “future money”. Moreover, it provides users a convenient way to pay transportation fees. By just load on money to the card and simply scan it to a machine for passing road tolls or paying LRT fees without long wait in queue at the cash lane. And it can protect our personal safety from carrying cash in hand.

The balance of the Touch ‘n Go can be reload at toll plazas, train stations, Automated Teller Machines(ATM), Cash Deposit Machines, Petrol kiosks and at authorized third party outlets.

Friday, June 27, 2008

Electronic currency

As many people buy books, CDs, and other products and services over the Internet every day, there appears a growing demand for e-micropayment technologies that enable the purchase of items and services such as MP3 music files, magazine and newspaper articles, Web-based comics, and other products.

PayLoadz's PayLoadz.com system is one of the e-micropayment products. PayLoadz, Inc. was founded in 1996 as a web development company. It is a long standing leader in the digital content and delivery sector. The privately-held company has over 60,000 registered users selling over 280,000 downloadable goods. PayLoadz is a service that sell intangible products such as softwares, e-books, digital art, manuals, articles and anything else that can be downloaded, it also manages the transactions through eBay and provides the server space to store the files.

PayLoadz operates using PayPal's online payment system and Google Checkout. PayLoadz offers two types of pricing, one is a flat monthly fee that is based on the size of sellers’ files, and another one is a fee that is a percentage of sellers’ sales, typically 15 percent. PayLoadz is a member of the PayPal Developer Advisory Board and is often a featured speaker at PayPal developer conferences. One requirement to use PayLoadz is that sellers need to have a Paypal Merchant Account which they can register themselves anytime for free. It is simple for anyone to use and works seamlessly with their PayPal account to enable them to offer digital goods available for sale from their web site or online auctions.

There are various benefits through using PayLoadz. It offers free trial for first month on all premium and corporate accounts, it also secure file storage on its servers. Besides that, it automatically deliver the sellers’ digital goods immediately after payment and sell the sellers’ products anywhere online which can at the sellers’ own site, PayLoadz Store, eBay and more.

In brief, PayLoadz is a powerful e-commerce service and it is definitely worth considering for company selling downloadable digital files.

Wednesday, June 25, 2008

Credit Card Debts: Causes and Prevention

Credit card debt is an example of unsecured consumer debt. It results when a client of a credit card company purchase an item or service through the card system. The debt will accumulates and increase via interest and certain penalties will be imposed when the consumers do not pay the company for the money he/she has spent.

We can found that there are certain factors will due to credit card debt . There are as following :

1) For the average individual struggling with credit card debt, the problem begins because they have not created a realistic budget . They often expense over the figure that they can afford.
2) Bank and other credit card issuers will justify big market budgets to get the client money since the credit card interest rate are high and will result a high profit.
3) It is very easy to get multiple credit cards .And, the issuer will take into account the risk factors when setting interest rate. That’s why the interest rate is high .
4) The people around them all probably have multiple credit cards and flash them from time to time, this will influence their own attitude to credit card debt.
5) Immediate gratification that is ‘have now, pay later’ will lead to a person loss their common sense.
6) Spend in the area that they are not needed. For example, when see other people buy furniture or go on exotic vacation all the time , they may want the same even though do not have immediate cash.

Since overburdened with credit card debt can undoubtedly cause both worry and stress not just for the debtor but their immediate families too, therefore we should prevent it to happened. It cannot be denied that setting up budget is the first step that should be taken. Follow by setting a saving goal such as vacation or car. Reward program which do not compromise our finance is the best motivators. Another method for prevention is teaching our youngest generation all about money before they even qualify for a credit card. This is because the earlier the children learn how to mange finances, the less likely they will be to fall into credit card and debt problems as an adult. Further prevention can be avoid extra expenses, get the right card which is no or lower interest rate, and use the cash not credit if you can.

As a conclusion, avoid credit card debt will be a cash convert for the rest of your affluent life.

Monday, June 23, 2008

Mobile payment system in Malaysia

Nowadays, mobile phone function not merely can contact people, now you can make a payment through the mobile phone. Recent technology development has also driven the use of mobile commerce technology. Mobile commerce is another form of payment but it has ability to embrace new ideas concerning digital money as mobile device have grown to become an essential personal needs.

What is mobile payment system? Mobile payment system is a system that allows the shopper uses a mobile device to conduct a payment transaction coupled with a 6 digit security PIN via SMS. This PIN based mobile payment solution designed by Mobile Money International Sdn Bhd to address the limitations and bottlenecks created by cash, cheques, and credits cards. It unlocks the power of the mobile phone to make payments, allowing registered user to pay for goods and services at anytime and anywhere.

In Malaysia, with 25 million mobile phone subscribers, therefore there are immense opportunities to leverage on mobile phones to accelerate the migration to electronic payment. The higher the number of mobile phone subscribers, the higher rate of participation of the population in the banking system. With this favorable market condition, there are many mobile banking have been launched in recent years. However, by up to date information, there are only 1.8% mobile phone subscribers in Malaysia registered to the mobile baking and payment service. Therefore, there is a potentially lucrative market for mobile banking and payment services.

In summary, mobile payment system has bring benefits to the users, such as provided shopper with ubiquitous purchase possibilities, timely access to financial assets and an alternative to cash payment. Mobile payments are commonly increase consumer convenience by reducing the need for cash in small transactions and increasing the availability of purchase possibilities.

Saturday, June 21, 2008

How to safeguard our personal and financial data?

Here have few approaches on how to safeguard our personal and financial data. FIRSTLY, choose your PIN number wisely. DO NOT use your birth date or child's name as your PIN number or password. SECONDLY, be careful when using ATM machine and be aware those seems interested in your transaction. Use your free hand to shield the keypad when entering PIN. THIRDLY, be cautious when providing personal information via internet that you don't know or haven dealt with before even its say important to know to update your information. Besides that, you must ACT QUICKLY if you know your personal information have been used and immediately review your credit reports, place a fraud alert on your accounts, close any accounts opened or used fraudulently or file a report with the police. In order to safe your financial information, you should LOG OUT properly after finish access the website. Access may not be terminated if you simply close or minimize your browser or type in a new web address when you’re done using your online account. In addition, install antispyware and antivirus software. Symantec, Norton, Avg antivirus are popular used by computer users. It cleans computer and protect personal information, financial data and etc. Lastly, it is safer using own computer to access brokerage account than using public computer. Public computer may contain software that capture password to providing that information to others at your expense. If you do use public computer, be sure to DELETE your “Temporary Internet Files” or “Cache” and clear all of your “History” after you log off your account. You should also DOUBLE CHECK to make sure that no one else has attached any device or added programs to your computer without your knowledge or consent.

Friday, June 20, 2008

The threat of online security: How safe is our data?

The Internet has rapidly become an important tool nowadays. Many people use the Internet daily for work or private purposes. Along with the increasing use of Internet, the threat of online security has become more serious.

Many Internet users display more of their personal information on social networking Web sites, and office workers upload more sensitive data to online software programs, it makes computer hackers devise small attacks that can fly under the radar of traditional security software to pry that information loose. As a result, the personal data of the users may be embezzled and the undisclosed financial data or proprietary design and engineering information of organizations may be stolen by hackers because those intellectual properties can be sold for a lot of money.

Even if you connected to the Internet only to play the latest games or to send email to friends and family, your computer may be a target. It is because intruders (hackers, attackers, or crackers) may be able to cause damage to your computer by reformatting your hard drive or changing your data. Intruders are always discovering new vulnerabilities to exploit in computer software. Most of the incident reports of computer break-ins received at the CERT/CC due to system administrators and users did not keep their computers up-to-date with patches and security fixes. Also, some software applications have default settings that allow other users to access your computer. For example, web browsers could allow someone to place harmful programs on your computer that run when you click on them.

In short, users should be careful when access to Internet and do not simply give away any sensitive personal information like password, account number, or other log-in information via e-mail or instant message.

A review on Internet Security : Growing threat from mobile malware



Is the time to worry about mobile malware?
If you are planning to buy the latest mobile phone, first you should ensure that the mobile is protected by anti-virus software, lest the new phone device crashes due to virus or phishing attack. Nowadays, the mobile devices can also be infected with mobile malicious software (malware).

Mobile malware is capable by spreading via Bluetooth, MMS, sending SMS message, infecting files, blocking memory card, etc. The threat of mobile phone malware is expected to become a nightmare for mobile phone users in the not too distant future. Mobile threats have been increasing rapidly in recent years, according to the report, which claims that five times as many security events were reported by mobile operators in 2006 than in 2005. Although the number of attacks remains low, this is mirrored by low levels of risk awareness in the corporate and consumer segments.

In June 2004, TrendLabs noticed that mobile phones were vulnerable to such attacks. SYMBOS_CABIR.A was the first malware noticed and this is said to have spread only via the Bluetooth-enabled devices.

There is potential threat through the mobile malware, which is cyber-crime. It occur in the mobile networks such as the social engineering activities, for example SMS or a call to persuading users to provide their personal and financial information. Further, there are other potential threats for mobiles user, such as spyware sneaked into the phones and monitor voice and text traffic, user's web surfing as well as intercepting passwords and account numbers.

Wednesday, June 18, 2008

Phishing" Examples and its prevention methods

In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Paypal, eBay and online banks are common targets.

Following is one of the examples of phishing email scam subject line that attempts to make you panic so you will sign on without thinking:
Need your help! In God we trust!
Sometimes, they often use God in the subject line to try and get people's attention. These emails usually need you to help wire transfer the money. Your reward will be part of the profits, sometimes millions of dollars. Avoid this email all together, these are obviously fake because whatever they can get from you, you will see no money in return.
Example of PHISHING:










For further examples, click the link below:
http://www.consumerfraudreporting.org/phishing_examples.php

However, not all phishing attacks require a fake website , the can also be a phone phishing such as there is a messages that claimed to be from a bank told the users to dial a phone number regarding problems with their bank accounts. Once the phone number ( owned by the phished, and provided by a Voice over IP service)was dialed, prompts told users to enter their acount numbers and PIN. Vishing( voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

There are several different techniques can be used to combat phishing. One of the strategy for it is to train people to recognize phishing attempts and do deal with them. For example, Do NOT click the links in the emails and Do NOT panic because you got an email. If you have any doubts, open your browser and sign on SEPARATELY without clicking any email link and WITHOUT following any instructions in the email. The using of browsers such as Microsoft's IE7 browser, Mozilla Firefox 2.0, and Opera can alerting the users to fraudulent websites or help to identify the legitimate site.

Besides that, certain specialized spam filters which rely on machine learning and natural language processing approaches to classify phishing e-mails can be used to reduce the number of phishing e-mails that reach their addressees' inboxes. Legal responses are another method use to fight the phishing. For example, the federal anti-phishing bill can proposes that criminals who create fake web sites and send bogus e-mails in order to defraud consumers could be fined up to $250,000 and be jailed for up to five years.

As a conclusion, the damage caused by phishing ranges are from denial of access to email to substantial financial loss. Be careful out there!!!!!!!

Friday, June 13, 2008

An example of an e-commerce success and its causes!

Dell.com is an example of e-commerce success. Michael Dell, founder of Dell. Dell is a leader in the global technology industry. Dell currently direct sales in 13 markets which are Australia, Brunei, China, Hong Kong, India, Japan, Korea, Macau, Malaysia, New Zealand, Singapore, Taiwan and Thailand.

Dell key success factors: FIRSTLY, created a disciplined culture that focuses on optimizing its operational model, responding to its customers' needs in a timely and reasonable manner and sustaining a self-motivated workforce. SECONDLY, Dell selling computers via web site. It convenient to customer to buy computer, it save cost and time. THIRDLY, information is a powerful strategic weapon. Information is king at Dell; it is widely distributed, analyzed and acted upon. People can know where they and their business units stand at any time. Customer can easily obtain information any detail about their preferable products through their website. FOURTHLY, being a low cost provider creates flexibility and market advantage. Being a low cost provider unlocks market opportunities. LASTLY. Dell also improves the product quality at the lower costs. The reason because there is no intermediation cost incurred between Dell Company and customers which been called customer-focused direct business model.

More companies are relying on Dell to help them simplify IT With Dell's Global Customer Program because Dell is able to provide a specific suite of services to its Asian customers with worldwide operations.

Thursday, June 12, 2008

The History of E-commerce


What’s e-commerce? It consist of buying and selling goods and services, exchange of ideas through using computer telecommunication networks, of which the internet is one of the such network system. Therefore, e-commerce became possible in 1991when the Internet was opened to commercial used.

E-commerce application seems started after World War 2, around the year of 1948 to 1949. This is because of the blockade of city was under impractical and not often impossible to conduct business in the normal manner by using paper documents. Therefore, the US Army started using telephone, telex and radio-type instead. Credit goes to Edward Guilbert, a logistics officer who devised this first electronic commerce system.

Over the years since then other businesses and organizations also
started using and devising electronic transfer system and by the year 1975, the first general standard was excepted because of the emerge of Electronic Data Interchange standard (EDI) which is universal and flexible enough to handle most of the electronic transaction. However, in the year 1984, The ASC X 12 standard was created in order to deal with EDI. It was also a dependable means of dealing with a large number of transactions at once. Since it severely reduced the potential pandemonium of e-commerce, thereby most of the people deem that was a defining moment for e-commerce.

In year 1994, Marc Andreessen began the creation of a browser by the name of Mosaic which was then adapted into the Netscape browser. It providing users a simple browser to surf the internet and a safe online transaction technology called Secure Sockets Layer.

Moreover, in the year 1995, Amazon.com and eBay.com (which are two of the biggest names in e-commerce) are launched.Besides that, AOL (America Online) and Time Warner announced their merger in January 2000. The fusing of these two companies has a significant impact on the world e-commerce. On the same year of February, many e-commerce titans including Yahoo.com, Amozon.com, But.com and eBay.com were attacked by computer hackers. The attacks raised concerns about the security of shopping online which the industry responded to with obvious security upgrades. Even though, e-commerce was still there to stay. However, in May, there was a moratorium on the taxation of internet sales until year 2005. Some argue that the e-commerce market is a volatile market with many highs and lows is a significant causes concern over government taxation.

As a conclusion, history of e-commerce is a history of a new, virtual world which is evolving according to the customer advantage. It is a world which we are all building together brick by brick, laying a secure foundation for the future generations.

An Example of an e-commerce failure and its causes


Kozmo.com (1998-2001)
Kozmo.com was a short-lived online store and delivery service that promised fast, friendly and without delivery charge of anything from snacks to movies. The founder of this company are Joseph Park and Yong Kang, they started the business in March 1998 at New York City. The great idea in this company was that you could order anything at any time and have them delivered direct to your house within one hour with free of delivery charge.

Kozmo.com is one of the top 10 tech we miss which hailed by CNET.com. Kozmo.com had a business model that promised deliver small goods with free of charge, by using bicycle messengers. On the other hand, it entered a five co-marketing agreement with Starbucks in February 2000 in order to promote its services in their coffee shops by paying $150 million. However, Kozmo.com ended it services in March 2001 after paying out $15 million.

In July 2000, at the height of its business, the company expanded to seven cities. It was familiar with college student, young professionals, and the urbanites, but soon the company still went out of business. It is because later they found that it was cost too much to deliver a DVD and a pack of gum. Eventually a $10 minimum charge was introduced, but that did not stop it from closing in March 2001. Before the layoffs, Kozmo had filed an IPO with the SEC, but it never went public. Consistent with documents filed with the SEC , the company had revenue of $3.5 million in the year 1999, with a resulting net loss of $26.3 million.

As a summary, although Kozmo.com had a great idea to have an online business, but their business still come to failure with the reason of they did not had a proper business plan. Without a proper business plan, Kozmo was too late to learn that its primary attraction of free delivery was also its causes of defeat.

Discuss how E-Commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support

E-Commerce is rapidly expanded and becomes more popular nowadays. There are various benefits through using E-Commerce which will discuss some of them below.
Cycle time is the amount of time between a customer placing an order and receiving the goods. In e-marketplaces on B2C direct marketing, the delivery time of digitized products and services can be reduced to seconds. Besides that, the administrative work related to physical delivery, especially across international borders, can be reduced significantly, cutting the cycle time by more than 90 percent. For example, TradeNet in Singapore, which reduced the administrative time of port-related transactions from days to minutes. Besides that, cycle time also can be reduced through improvements along the supply chain such as by using Radio frequency identification (RFID).
E-Commerce also can improve employees’ empowerment. Since internet is growing rapidly nowadays, employees can access to internet conveniently to search the information that they required so as enable them to make decision about their job. The Department of Labor (DOL) has developed “elaws Advisors” which are web-based interactive systems that provide easy-to-understand information to employees about the laws and regulations administered by DOL. These Advisors give the regulated community access to information about their employment rights and responsibilities 24 hours a day, seven days a week.
In order to facilitate customer support, customer services should be provided. Retaining customers by satisfying their needs is the core of customer service. By enabling customers to find detailed information online, customer service can be greatly improved. For instance, FedEx and other shippers allow customers to trace the status of their packages. Using Customer relationship management (CRM) methods, customers can order online more easily, check their orders and accounts, and collaborate with the company better.

Wednesday, June 11, 2008

who i am??

Hello everyone, nice to meet you all, my name is loh sin jing, and you all can call me ah jing, jing jing, or pretty jing!! Haha. I’m 21 years old, come from seri kembangan. I have 10 family members, they are my parents, 4 eldest brothers 1 youngest brother, 2 sister-in-law and me. I play many roles in family such as, guai guai daughter, fierce fierce sister, nice nice aunt and lazy lazy university student!!

Everyone sure have their own hobbies and interests, right? Yeah, me too!! i like to cycling, chatting with friends, swimming and playing badminton. Because I don’t like sweating, therefore, I love swimming.

I trust, when we were kids, we have a lot ambition. But when after SPM, we need to decide and clearly know about our future. Therefore, I choose to study nursing course and wanted to be a kindly, pretty, helpful and hardworking nurse. BUT, my family NOT ALLOWED!! My dream gone, because I thought I can marry with a handsome and responsibility doctor. Anyway, I hope I can be an auditor.

The five websites that I most visited are www.friendster.com, www.gmail.com, www.hotmail.com, www.utar.edu.my and www.google.com. As a university student, always have a lot of assignment and test. Therefore, I need google to help me find those assignment information. Hotmail for msn, gmail for email, friendster website for searching those friends I knew. Lastly, utar web need to use to download all those past year questions and check my final result.


Who am i?? is me lo!!! Get to know more about me after read my blog?? Haha, gambatee everyone..


Thursday, June 5, 2008

About me~~

Hi, I’m Gan Sin Yin comes from Kluang, Johor which has another name of “bat town”. I am 21 years old. I am a girl that do not like to talk much especially with the persons that I am not so familiar with. There are six persons in my family, they are my father, mother, three brothers and I. I am the youngest daughter in my family. Therefore, my family very dotes on me. I like to listen song, read novel and watch drama. There are no special animals that I like but dog is the animal that I do not like the most.


The five websites that I visit the most are
www.hotmail.com, www.friendster.com, www.yahoo.com, www.google.com, and www.utar.edu.my. I am able to make friends with the people around the world through the friendster websites. When I want to search information, I will visit yahoo and google websites as I think that these two websites provide the most information that I required. Besides that, I also frequently visit the Utar website because this website provides some information that does not include in the lecture notes. Besides that, we can check our results through visiting the Utar website.


That’s all for my introduction. Please leave your message if you have any comment about me. Thank you!

Hi...

Hi, I’m Kee Wen come from Taiping, Perak. Let’s me briefly introduce myself. I am a short girl, keep a short hair style, and like to wear short pants. For my personal character traits may be positive or negative, depending on the situation. For example, sometime I’m courage, but at certain situation I will become cowardice.

As I like to eat, so you can probably guess what activity I spend most of my time. That’s right, is cooking. Sometime I will create my own new recipe, even though the taste is not very nice, but my family and friends still happy to be the taster for my new recipe. Besides cooking, I also like to travel, sewing, read the stories book and listen music.

The top 5 websites that I visited the most are:
1.
www.utar.edu.my
2. www.google.com
3. www.yahoo.com
4. www.hotmail.com
5. www.sinchew.com.my
By visiting those websites I would able to get the latest information that I cannot easily get from my education. Also, those websites are my communication tools (e.g. yahoo.com and hotmail.com) and entertainment tools (e.g. google.com and sinchew.com.my). The purpose I visited UTAR website is get latest information that related to my course, for example view my timetable and check my final examination result.

That’s all my self-introduction. For further information about me, please contact me. And also, I’m very welcome you all give a comment about me or leave a message to me. Thank you.

About myself..........

Hello everyone, I’m Mei Yin comes from Malacca. I think all of you got always heard that the women’s age is a secret, therefore the ages also becomes my confidential information that could not easily disclosure to the stranger. Hahaha……

For me, playing badminton is one of the activities that is the most I like among the others such as watching drama, listen song, jogging and so on. Hence, I will play badminton with my “brothers” when I was free. However, reading text book is the most I dislike because it is too bored already. When I see it, I will automatically feeling sleepy. That’s why it becomes my hypnotic.

Now, let’s us discuss about our “bright future”—ambition. Everyone will got his or her own ambition, me too. But it will changes along with my age. Why I will saying like that? This is because when I was at primarily school, I still remember that my ambition is becomes a professional lawyer or doctor since watching too many drama already. The looks of them always so stylish or professional(sometimes also can use “cool” to describe them) in the drama. However, when my age becomes bigger, my mind already ‘wake up’(mature), it is impossible for me to be a doctor or lawyer by reason of my poor result. In the no choice circumstances, I choose to study accounting and hopefully I can become an accountant.

Moreover, the 5 web sites that I always visit are http://www.utar.edu.my/ , http://www.friendster.com/ , http://www.msn.com/ , http://www.google.com/ , and http://www.yahoo.com/ website. Visit to Utar website(wble) is because want to download the lecture slide which do not include in our notes from there. Sometimes also log in there to check my examination result. Friendster and Msn just are the communicating tools for me .However, for google and yahoo website are most for me to find information that I need.

That’s all for my introduction. If got any comment or question want to ask, can leave word for me. I will reply you as soon as possible. Hehehe…..