CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »

Sunday, June 29, 2008

The application of pre-paid cash card for consumers


Nowadays, advance in technology allow more and more consumer move toward the electronic payment rather than cash payment. Prepaid cash card is a universal example of electronic payment. Today, the usage of prepaid cards is growing rapidly and generally replacing cash payment instruments .The theory behind the prepaid card is similar as the prepaid mobile phone SIM card that is pay now and use at your convenience. They are similar to cash in that they are value-based payment system and are also widely accepted .They are activated by loaded desire money into the card.


Indeed, there are not require any account to use these cards, it is look like a credit or debit card, and provide consumers the ability to spend after loaded. Most of the card can be reloaded via bank, post office, bank transfer, credit card. Many prepaid cards charge a range of fees including activation, annual and monthly maintenance fees.When using the card for the payment, the users just have to show the card to the cashier and enter the pin number in the electronic keypad or sign a payment slip, the transaction will complete after the amount automatically transfer from the card. Besides that, cardholders can make transactions or withdraw cash whenever they need it, rather than carrying large sums of cash. Access to funds on a prepaid card is also protected by a PIN and signature of the users. The risk of debt can be reduced as well by using prepaid card since it limited the amount in the card so the users can only spend the balance that has been preloaded into the card. For people without a bank account, prepaid cards provide the convenience since there are no credit checks or without requiring an existing banking relationship to obtain a card.

Mobile Payment systems in Malaysia: Its potentials and consumers' adoption strategies


Would you like it one day, you can without bring your wallet instead with your mobile phone?! All these and more are enabled by a new technology called mobile payment

Mobile payment is a new collection money method via a mobile device such as mobile phone, SmartPhone, Personal Digital Assistant (PDA) or other such device from the consumer. In Malaysia, there is a tremendous potential for mobile telecommunication networks to become an important electronic payment channel in the country considering that 88 percent of the Malaysian population are subscribing to mobile phone services.

Mobile payment makes consumer more convenient and safety. However, in order to attract consumer adoption, promotion and advertisement are needed. It is because consumer may not easy to accept and adopt a new payment style, and they may tend to worry about the system’s security issue.

Hence, the particular company should improve the security system for using mobile payment and promoted it to the consumer in the aim of improve their confidence of using these new technology.

As conclusion, there have potential of mobile payment in Malaysia market. Nevertheless, its take time for consumer to change their behavior from using cash payment instead of mobile payment.


Website which recommendated to get more information for Mobile Payment


Credit Card Debts-Causes and Prevention


Nowadays credit card becomes very common in our life, more and more people apply to be a credit card user once they meet the required status. It is one of the typical payment methods in this century as the result of credit card transaction is often more secure than other forms of payment. However, it creates a enormous problem which is credit card debts because the credit card user is spending the future money and without saving at this moment.

There are numbers of causes to this debt. One of the major factors is users keep on spending without thinking whether they are afford. This situation usually happens in ladies as they are always losing their rational in shopping complex. For the economic factor, Poor people are more likely to be in debt as they are using credit cards as a ‘crutch’. After one of the credit card debts excesses its limit, they will apply another credit card to cover the previous one which led to the larger debts. Moreover, self-esteem also assists in the credit card debts. A high self-esteem person is easy to create credit card debts because they like to buy branded product which they are not afford to show off in front the people.


To avoid this enormous debt, we should always bear in mind that Credit cards should be used for emergencies only and remember that we have to pay off what we borrowed. It is also essential to effectively manage our finances. When we go out shopping, try to leave the credit card at home and do not spending money for the luxury goods that we are not afford to it. For the bill settlement, we should pay double for the minimum amount if we can afford because it could cover the interest and pay the balance more quickly. Indeed, the most effective way is cut off the credit card but it is advised that save one card for emergencies.

Friday, June 27, 2008

Electronic Currency


Electronic currency is a method of trading currencies through an online brokerage account. It involves converting base currency to a foreign currency at the market exchange rates through an online brokerage account. Electronic currency has been widely used throughout the world on an institutional level for more than 20 years. Electronic currency trading is wholly electronic, execution speeds are extremely fast, therefore allowing electronic currency traders to quickly but and sell currencies to cut losses and earn profits at a moment’s notice.

Nowadays, nearly all of the deposit currencies banking systems are handled electronically in the world. Current electronic currency systems vary in their effects on privacy from total secrecy, in which personally identifiable records are not created to audited systems that collect and store every aspect of each transaction.


Electronic currency unlike real cash, it is secret.
There is no way to obtain information about the customer when an electronic currency amount is sent from a customer to a trader. This is one significant difference between electronic currency and credit card systems which unlike credit card companies that collect a customer's spending habits and sell this data to third parties, the bank will have no record of the customer involved in the electronic currency transaction. Thus, by using electronic currency, the bank is unable to obtain personal information about the consumer. Therefore, this effectively protects the privacy rights of the customer.

Electronic currency is a system that essentially allows a person to pay for goods or services by transmitting a number from one computer to another.
These transactions are carried out electronically, transferring funds by either a debit or credit from one party to another. These funds are secured by using strong secret code in order to eliminating the payment risk to the consumer. Electronic currency is the digital representation of money, or more accurately, the digital representation of currency.

Saturday, June 21, 2008

Phishing-Examples and Prevention Methods


Example of Phishing!!!!

What is phishing? Phishing is not really new and it is a form of identity theft that used to be done over the telephone but nowadays usually made through email, to steal your personal information. Phishing e-mail usually appears sending from well-known organization such as eBay and PayPal. The e-mail usually direct the users to visit a website to update information, for example credit card number, bank account number, password, however, when u do so, it is actually lead the users to a fake page that set up to steal their information.

For example, in year 2003, many eBay customers received e-mail claiming that the users account was about to suspended and restricted and have to click the link that provided to update their credit card information. In fact, the link was linking to a fake web page looked just like eBay's home page and incorporated all the eBay internal links. It was a prime example of phishing. Another example is Paypal phish spelling mistakes in the e-mail and the presence of an IP address in the link are both clues that this is a phishing attempt.
There are some ways we can get hook by phising scam. The most directive way is do not reply the e-mail which is asking for financial information. We also have to beware some scammers use Voice over Internet Protocol technology to access user’s information when they make a call. Users can call the number on your financial statements or on the back of the credit card when they need to contact the organization. Besides that, regular update anti-virus and anti-spyware software, as well as a firewall is also a must to prevent some phishing emails contain software that can harm your computer and internet activities.

On the same time, also have to be caution when opening the attachment and downloading files from e-mail because it might contains virus that weaken the computer. We also needed to review credit card and bank account statements as soon as we receive them to check for unauthorized charges. If users found that they have been scammed, they can complaint at ftc.gov, and then visit the FTC's Identity Theft website at ftc.gov/idtheft. They can become victims of identity theft. If an identity thief is opening credit accounts in the user’s name, these new accounts are likely to show up on the credit report. Therefore, all internet users have to beware the phishing e-mail by recognizing it through the example above and practice the prevention mentioned above to reduce the phishing risk.

Ways to safeguard out personal and financial information

As we can see, disclosure of personal and financial information online may have a certain risk of financial and personal data theft. There are several steps we can take to safeguard our personal and financial information.

  • Do not share the password and login ID with others. The password and login ID should change periodically.
  • Disclose the personal and financial information whenever it is necessary required and make sure there is a clear guideline to safeguard data privacy.
  • Save the personal or financial information into removable storage instead of keep it into computer.
  • Check to make sure the contact is legitimate before disclose the personal or financial data on the phone, through the mail.
  • Be aware when using third-party computers that we are not familiar, fully logged off is necessary.
  • Do not open an email if we are not recognize the sender and never download the attachment-it could contain a security threat, like Trojan and Spy ware.
  • Care must be taken before respond to competitions, surveys or promotions which may be an intention to steal the information.
  • Anti virus, firewall and anti-spam software are vital for our computer, regularly update is required.
  • Make sure there is a “lock” icon before submit the information online.
  • Detected the Phishing Attack to protect ourselves. There are some typical characteristics of Phishing Attack which included an email contain an ‘urgent’ tone, email within an attachment and a pop-up window appears from an unrecognized company’s website. Additional information can be found at www.antiphishing.org.

The risk of your financial and personal data being theft can be lower if you are able to follow above steps.

Threat of online security

Online security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It protects the confidentiality, integrity and availability of information. Online security is now a high priority for business and individuals. On the other hand, it prevents the unauthorized access, manage the authorized users and protect computer system content and transaction integrity. However, there are some threats of online security. For instance, online identity thefts are method of stealing network identities used for Internet online transactions. Examples for network identities include Personal Identity Number for bank cards, credit card numbers, online passwords, driver’s license numbers and etc.


Governments, financial institutions, hospitals, and private businesses collect a great deal of confidential information about their employees, customers, products, research, and financial status. Protecting confidential information is a business requirement and in many cases also an ethical and legal requirement. If the confidential information about a businesses customers or finances fall into the hands of a competitor, such a breach of security could lead to a lost business or destroy a business, law suits, long-term effects on the business or even bankruptcy of the business. For example, hackers apparently gained access to personal information of some customers when the staff mistakenly accepted an e-mail attachment sent by the hackers.


Management of online network access and use continue to be a problem even highly secure systems. The development of the Internet has increased the popularity of online shopping. However, many Internet users avoid shopping online due to online security and privacy. For many consumers, security is one of the most significant concerns when purchasing online. Since buyers and sellers do not interact face-to-face and the virtual environment allows high secrecy, online shopping involves greater concerns than traditional trading. The buyers are becoming more aware of security threats to themselves and, more importantly, of the security of the information such as credit card details they leave with online sellers. They are more likely to place their trust in something that provides safeguards and guarantee.

Online security varies and can include protection of information from theft or fraud, or the safeguarding of availability. Safeguarding data in your files and on your computers is just basic to protect business secrecy. After all, if that information falls into the wrong hands, it can lead to fraud or identity theft. Hence, businesses and individuals who own, control, access, use or stored data may have a responsibility to protect the confidentiality and integrity of such data. Besides, it also responsible for using appropriate security methods in order to fulfill different data security requirements.


Friday, June 20, 2008

Blog Review

Do you even try to tapping into the other’s home wireless network (WIFI) connection using your computer to access Internet?! If you did it, and still doing it now you should read this blog in order to know the consequences!

There is a case in Singapore that a teenager to be charged in Singapore under the law for tapping to gain unauthorized access into other’s home WIFI. If convicted, he can go to the jail up to 3 years and fined up to S$ 10,000.

So, before you trying to tap into other’s home WIFI, first checking out Malaysia Law to determine whether any Act will make you get end up in the jail by this act.
The question is who is responsible to secure the home WIFI system? Whether is the owner or the service provider?!

In my own opinion, both of them are responsible to secure the home WIFI system. For owner, they must secure their WIFI system by setting a password and ensure the password didn’t know by others. Without setting a password, when others access into their network, the owner will have no one to blame. Besides that, owner can search the net, to get more information in order to protect their own WIFI system.

In most circumstances, the owner may not know that others are tapping into their wireless network. Hence, service provider plays an important role to protect customer’s WIFI system being unauthorized access by others. The service provider should form a system which is able to discover that the consumer’s network is being unauthorized accesses by others or a system which can strongly prevent unauthorized access.

As a conclusion, in order to prevent unauthorized access, owner and the service provider are playing an important role. Owner should take own responsibility within their capabilities to protect their own network and the service provider create a stronger system in the aim to protect customer’s benefit.

This is my review website:
http://ecommerze.blogspot.com/search/label/Internet%20Security
My review blog :
Unauthorised tapping into home WIFI – Teenager is facing a jail term.

This website is recommended to identify what can be done by the owner to protect their network:
http://www.dailywireless.com/features/secure-wireless-lan-021507/

Thursday, June 12, 2008

The History and Evolution of E-commerce

E-commerce this word has becomes well-known in this century, by looking at this word; we will know that it means that any commerce that takes place electronically. It most likely implies that we can do shopping at any place, any leisure time and even in our pajamas. In fact, the history of E-commerce is relatively a short story. It began less than fifty years ago and its humble beginnings look nothing like the kind of electronic business transactions that we see today. It began before personal computer become prevalent and the first key step came from development of EDI, or Electronic Data Interchange was standardized through ASC X12 in 1984, it enables the transferring of large amount of transactions become stable and reliable. The Mosaic web-browser was made available in 1992 and it developed into a downloadable browser, Netscape, which enable user surfing the net in a more simple way. History of ecommerce is unthinkable without Amazon and Ebay which were among the first Internet companies to allow electronic transactions established in 1995.

The evolution of E-commerce has not just gone through a smoothly way, it faced a great challenges in year 2000 which the dot-com collapse led to unfortunate results and many of ecommerce companies disappeared. However, the evolution did not stop because of this breakdown, in a short period, the electronic companies reanimate. By the end of 2001, the largest form of ecommerce, Business-to-Business (B2B) model, had around $700 billion in transactions. Other varieties also growing such as Consumer-to-Consumer (C2C) where consumers sell to each other, for example through auction sites and Peer-to-Peer (P2P) is another form of e-commerce that allows users to share resources and files directly. Besides Amazon and Ebay, there are many companies such as Dell, Staples, Office Depot and Hewlett Packard also joined to the e-commerce family successfully. Without any doubts, E-commerce play an important role in business in our time, it provides another platform for people making transactions. It really brings a huge convenience to us and the availability of high speed Internet has increased the ability of people to work from home. These two factors encouraged more and more people start to take part in e-commerce. To cut a long story short, there is no mistaken that we said that e-commerce has become a part of our daily lives.

Monday, June 9, 2008

Successful story of E-commerce-- Amazon.com

Amazon is an e-commerce company in America which is founded by Jeff Bezos in 1994,which is an e-commerce company best known as the first online retailer in the world. Jeff Bezos launched Amazon online in 1995 and built it into a $1.6 million company that sold everything started by on-line book store to power tools. The objective of Amazon is to provide a platform for the customer to find and discover anything they want to buy online. Amazon is a world wide company , it has developed separate websites throughout the world, included Canada, United Kingdom, Germany, France, China, and Japan. The company sold over 18 million products to over 22 million customers around the world; it was the 48th most recognized brand worldwide. In 1999, Bezos was named Person of the Year, by Time Magazine for the success in on-line shopping.



The factor driving behind the success of Amazon is based on varies factors. The team in Amazon is given authorities and empowered to solve problem in anyway they like. Amazon forces the developers to focus on the usefulness of the product or services rather than focus on technology advance. Amazon usually begin with a press release of what product’s features the users will see and work backwards to measure product is valuable. Simplicity is an important way to operate the large distribution system for them.
Amazon is currently operating the Internet business with its best marketing strategic in relation to the market trends and demands of its customers. It is the only website that combines altogether web books, business brands and retails on a single web-based business. Amazon expanding its e-commerce business with its wide range of book with variety of subjects and topics, they are also offering difference electronic item related to any age, all interest and all field. Since Amazon hold less inventory than the traditional stores in the market, therefore it provides a lower cost to its customer due to the causes that have a lower operating costs


Amazon achieve success in the filed of e-commerce through the effective of management and consumer identification in the market. Amazon makes its different from the other e-commerce organizations by adopting the strategy to work better and developing a strong base of selling products.Furthermore, the way to deal with the customer is efficiency and the priority providing to them such as a constantly excellent customer services focus on them, makes Amazon.com on top of all the other e-commerce companies.

In order to achieve success in their goals, they hire local employees in foreign countries as they did in Germany and U.K. this will helped them obtain the information about the local market, the demand of the people of these countries and also to promote Amazon in these foreign countries to provide them a familiar look to this e-commerce company

How E-Commerce reduce cycle time, improve employees' empowerment and facilitate customer support

Cycle time is the amount of time between a customer placing and order and receiving the goods. Reducing cycle times can increase competitive advantage, decrease carrying costs, increase buyer productivity, increase accuracy of orders and inventory, minimize paper use and storage and improve cash flow. E-commerce allows providers to automate the request and logging of authorization for services. Electronic posting of payment advices can reduce staff time and it also increases the correctness and accuracy of postings. Besides, the automatic payment of invoices can improve the speed and effectiveness of information delivery and reducing the time to complete tasks, transactions or processes. Through e-commerce, delivered virtually in the form of data, therefore it can remove barriers such as cycle time. For instance, speed of e-mail inquiries and live chat is faster than to getting on the phone, especially when that business is closed for the day. There is also a faster delivery cycle with online sales, helping strengthen the customer or business relationship. Moreover, e-commerce also enables users to share an online resource.

Retail managers must accept the difference in culture and speed of e-commerce business. They should empower employees who can meet the creative, technological and strategic demands of setting up a new site offer for customer to purchase goods with convenient in another way. E-commerce provides managers with access to data and process-status information which enables them to make more accurate and informed business decisions. E-commerce also improves the analysis of pricing changes and promotional ties. Furthermore, it can help employees access to the maximize product availability, despite shifting demand by enabling faster analysis and recognition of demand trends.

The e-commerce such as internet opens up a brand new marketplace to businesses moving online. Nowadays, customers in marketplace want quality products and information in a quick and easy manner. E-commerce main benefit is that of speed and convenience. Therefore, business which uses the e-commerce as the core for business dealings can help make a company more customer-friendly in addition to many other things. With e-commerce customers receive highly customizable service, and communication is often more effective, thus it can facilitate customer support. The internet is a powerful channel for reaching new markets and communicating information to customers and partners. By having a better understanding of your customers we are able to improve customer satisfaction in order to facilitate customer support.


Identify and compare the revenue model for Google,Amazon.com and eBay


I’m sure all of you will surf net everyday. However, do you even think about how the net you are surfing being survived, how they earn their income in order to maintain the website. This blog will tell you the revenue model of Google.com, Amazon.com and ebay.com.

Firstly, let us discuss about Google.com. All of us will know that Google.com is a famous search engine, however, besides that; Google is also the top employer in the world. It has more that 12,000 employees and it has over 40 offices which located in more than 20 countries. How Google maintain the huge amount of expenses? What is it revenue model?

The main sources of revenue generate by Google.com is from advertising. It has a system calls Google AdWord. Google generate almost 90% of its revenue from Google AdWord. Google AdWords is a pay per click advertising program. It is designed by Google to allow the advertisers to present advertisements to people at the instant the people are looking for information related to what the advertiser has to offer. The advertisements are shown in the right hand side or above the main search result. Once the users click the advertisement link, the advertiser has to pay as his ad received a click. This calls Pay per Click Advertisement. The Advertisers decide the keywords relevant to their offer that should display their ad and the maximum amount they are willing to pay per click for that keyword. So, you and I can be the people who help Google earn revenue. Just click on the advertisement which display beside the search result!!!:)

Secondly, I will discuss about Amazon.com’s revenue model. Amazon is a well-known on-line bookstore, but it soon to be diversified of DVD, computer software, video games, etc. The revenue model of Amazon.com is by earning transaction revenue. There have 2 types of transaction revenue model which are match maker and distribution. The transaction revenue model which use by Amazon.com is the distribution model. In the distributor model, the intermediary takes ownership of the product. As a result, it realizes the total revenues it gets off the product's sale. For example, a supplier purchases a product for $1.00 and resells it for $2.00. The $1.00 is the supplier's margin before costs. Once cost is factored in, however, the gross margin can be substantially less.

Lastly, I will introduce the Ebay.com revenue model. Ebay is an online auction and shopping website in which people and businesses buy and sell goods and services worldwide. Ebay.com earn transaction revenue but with match maker model. In this model, the product is owned by the supplier. Ebay will receive commission for the product sale. Under this approach, the portal extracts a toll from each transaction. The fee will determine by the complexity of the transaction.
Recommendated website:

Friday, June 6, 2008

Keat Leong's Self Introduction

Hi, everyone, my name is Keat Leong; you can also call me Daniel. I come from Kuala Lumpur and I am staying in Bandar Baru Sentul which is nearby the Sentul LRT station. I am 21 years old and now studying in Utar. I am a football and basketball crazy fans. The players that I admire most are Kobe Bryant and Fernando Torrez. Without any doubts, my hobbies are playing basketball, badminton at least once a week. Moreover, I also like to watch football, listen to music, and play games. The website that I visited the most is www.msn.com which I used to find information and chatting with friends. I also visited www.lowyat.net frequently to get the updated price for IT and mobile products. Anyone who is interested to buy any IT product or handphone can find me. The third website is www.tom365.com that I used to download some Hong Kong drama and movie. Besides that, I also searched some new songs in www.baidu.com. Last but not least, I usually visited www.utar.edu.my to check the time table and information. It is really nice to meet you all, my msn address is danielchen917@hotmail.com.

Chun Hoong's Self-Introduction

Hi, I am Chun Hoong... A boy who is born on 5th February at a historical and peaceful place called Taiping. I am the one who likes to enjoy the life, because the life is short so I will always try to contribute in many activities to make my life wonderful. Although I have interest in many kind of activities, however due to some constraint such as time or money, what I currently like to do is listening music, camping, shopping and browsing the website.
Browsing the website is the daily activities in my life. Among the various websites which I had browsing, they are some websites that will always take my attention such as
www.sougua.com , .this website contains many kinds of song and mtv that are available for download and it is free of charge. The following website which I like is www.cari.com.my , it is a website which is also called forum, in these forum I can discuss my problem with others person, and learn many things. www.lelong.com.my is a online trading website which is first time I buy something via internet, this website provide a platform for the sellers and buyers to make a deal, the website is so efficient, safely and unique . www.youtube.com is a popular website in the world, the reason I like it is same as others that is funny and fantastic. When I am doing the assignment for my study I always obtain the information from www.google.com a useful search engine.

Mimi's Self Introduction

My name is Chew Mee Xue, some of my closer friend will call me Mimi. I live in Selayang, Selangor but now staying at Sg Long for studying purpose.
I’m just who I am. I’m just an ordinary girl and an ordinary student. Everyday go for class, rushing for assignment, and overnight prepare for examination or test. My life is quite boring. I seldom watch movie, dislike shopping and just like to stay at home. I like listening to the classic music.
How do I spend my daily time except for class?! This may be a difficult question to me. What is my hobby? I think, my hobby is reading newspaper. Everyday I must read the newspaper, without newspaper I will seem like without eating. Without reading newspaper, I don’t even know what I can do. Surfing net? Even I’m surfing the net, I also go to the e-newspaper website such as
www.sinchew-i.com, and www.chinapress.com.my to reading the most updated news. So both of this website is the website I visited the most. From this, you will know how boring I am.
Other than that, the others top website that I visit is
www.google.com, www.friendster.com and www.hotmail.com. I’m using the Google web to searching information for assignment purpose, since it is the world top searching engine. I also always visit Friendster web since there is a place that give me to keep in touch with my secondary school and even primary school friend. Even we seldom meet each other, but though the Friendster, I can view the photos which upload by them and getting known of their recent life. Lastly, I would like to visit the Hotmail website for checking mail purpose. The mail that I received mainly is the forward mail. Even though it is forward e-mail, but some of them may be so meaningful.
What would be the top 5 internet activities for me? Firstly, it should be chatting with friend by using Window Life Messenger. Every time I switch on my computer, it will automatically sign in and I will chat with my friend. Besides simply chat with friend, it is a place for me to held discussion with assignment group mates. Secondly, I would like to blogging. I having my own blog in MSN Space. There is a place for me to release my feeling. Even though I did not create new blog each day, as long as I have any unhappy or anything wish to share I will add a new blog. Other than this, my internet activities include surfing news web and searching information for assignment purpose.
That all about me, welcome to our blog. Hope you will enjoy for this blog!

.

Wan Sum's Self Introduction

Hello, welcome to our group blog. To start, let me introduce myself, my name is Cheah Wan Sum, and you can also call me Chloe. I born in Kuala Lumpur since 30 November 1987.I live in a sweet family with my dear parents and three of my pretty sisters. They are the most important people in my life. I just an ordinary girl that always forgets something and blur at all the time. I have a simple hope which is hope all my dreams will come true. Moreover, i am 100% dolphin fan!!
Now, I am 20 years old and studying in Utar year 3 semester 1 for accounting course. I will be graduate soon. It is very hard for me to study this course because there are many challenges which make me feel suffer and stressful. However, I will try my best to continue my study in a gentle way. My hobbies are taking photo, listening music and watching movie. Besides, I also enjoying traveling and climbing. During holiday, I will invite my friends to travel some interesting places if I have enough money.
The top five website that I visited the most are google.com, facebook.com, friendster.com, utar.edu.my and wretch.cc. I usually used
www.google.com and www.utar.edu.my website to search some information for my assignment. I like to visit www.wretch.cc website to read my friends blog, so that I can know more about them in order to get closer with them. Through this website, I will also download some short and funny clips to watch and look out all the news about my idol. Sometimes, I will visit www.facebook.com and www.friendster.com website to meet new friends. I will also uploading some of my photo, send gift or leave a message to my friends. On the other hand, I will play some online games when I feel boring.