Sunday, July 11, 2010

E-COMMERCE IN THE FUTURE


By:Abbas Saghali

As well as Amazone,e-bay and Netflix announced their in the last week of 2008,net income of all of them had been improved. It showed that their performance was better than expected.Some of largely retailers had serious chalenges with these giant online firms but they finally could edge their way out of those retailars.Although online sales are growing some analysts such as Laurie Windham  believe that e-sale will decrease in future instead of increasing.Windham justifies that market of net consumers may be spoiled in the future .she believes that online firms mostly push their customers to buy cheap goods and if they cannot find them go to another site.she says e-commerce is a ficker world with the least customer loyalty(e-loyalty)and this issue strongly threats the future of e-commerce.so the question is really what will happen in the future internet-based market.May be we should agree with Sramana Mitra  when she says the end of this movie is yet unknown.

Friday, July 9, 2010

CYBER-TERRORISM,LOGIC BOMBS AND PROTECTION METHODS


By:Abbas Saghali

Hacking into computer system of a police station or a hospital and changing an individual's prescription to a lethal dosage for different motivation such as revenge can be viewed as some examples of Cyber-terrorism.In order to better protection of computer system, computing experts should be sufficiently aware of their weakness area against professional hackers which attack to systems in terms of Cyber-terrorism.It should be suggested that a complete secure system can never be accessed by any experts,but danger of Cyber-terrorism can be  reduced.For instance,most of government economical and political classified documents are kept in  separate systems  without any connection to outside. Another way to prevention of Cyber-terrorism is promotion the use of firewall to monitor all communication in a system such as email messages which  may unpredictably carry logic bombs.At the end , we should point out encryption which is  the most common method of protection from Cyber-based attacks.
Cyber-terrorism Links      

Wednesday, July 7, 2010

WHO ARE THEY?

By:Abbas Saghali

A professional  group of hackers which calls itself "Iranian Cyber Army"   carried out two high profile cyber attack in the world during last December and January. At first attack in December 17 this unknown group hacked twitter by redirection of twitter users to a web page which was followed by this message:

Iranian Cyber Army
THIS SITE HAS BEEN HACKED BY IRANIAN CYBER ARMY
iRANiAN.CYBER.ARMY@GMAiL.COM

U.S.A. Think They Controlling And Managing Internet By Their Access, But THey Don’t, We Control And Manage Internet By Our Power, So Do Not Try To Stimulation Iranian Peoples To….

NOW WHICH COUNTRY IN EMBARGO LIST? IRAN? USA?
WE PUSH THEM IN EMBARGO LIST ;)

Take Care.

The considerable point in their message was their writing style which apparently and consciously had  joked with English grammar such as what e.e.commings,us great poet, did in his poetry by grammar rules and capital words.
For second time this group hacked china's most popular search engine,Baidu.Hackers again had redirected users to a web page displaying a message claiming that the same group had blocked access to that site.It should be suggested that hackers of Iranian Cyber Army have attacked to some Iranian leading opposition web sites and blogs during last months after cheating in Iranian presidential election.
Now question is: Really these kind of group-hackers  are going to  drive globe to
world cyber war 1?what will happen in the future? 

Tuesday, July 6, 2010

E-GOVERNMENT IN UK

By:Abbas Saghali

According a recent survey in 2010, south  Korea has been able to lead E-Government issues in the world. In this ranking ,UK is placed after Australia,Canada and USA .The other countries which are  between top 10 nations which have provided online services for their citizens in terms of E-Government are Netherlands,Norway,Denmark, Spain and France.
Although E-Government can accelerate a great amount of services for government members and people,somebody believes it is not always systematically effective.Micheal Cross in Guardian point outs that  E-Government is not a financial cure-all. In addition ,he writes that the current buzzword is smarter government  while prime minister of UK and the chancellor of Exchequer put on emphasis of cost reduction of E-Government services more than its quality.

Sunday, July 4, 2010

PRIVACY POLICY IN FACEBOOK


By:Abbas Saghali

Facebook updated its privacy policy in April 22,2010.Last revision has eight sections including introduction, information facebook receives,information members share with third parties,sharing information on facebook,how members use their information,how facebook share information,how members can view,change or remove information,and how this popular social network protect information.
Facebook has announced if anybody has question about their privacy policy can contact with their team through  their help page .This page also has been provided for somebody who has complaints about their privacy issues.They have provide  the other page by the name of TRUSTe for those members which are not satisfied with their team's responses. 
There are some links such as :

statement of rights and responsibilities
facebook site Govenance
privacy settings
requesting deletion for non-user
reporting and blocking third party applications

which are completely helpful in this regard.

Friday, July 2, 2010

WORLDWIDE COMPUTER CRIME

By:Abbas Saghali

According one official report in USA which was published in 2008,among 300 million internet users in all of the globe more than one million were involved with computer crime.These crimes included fraud,vandalism,disposal of stolen goods,and embezzlement.It should be interesting to know that distributed denial of service is the most reported computer crime in the world.As well as digital world has a great deal of global advantages,crimes by internet also cannot be limited geographically.Financial networks are mostly target by internet criminals and control of online fraud sometimes is extremely difficult.Online child pornography is another e-crime that FBI launched its "innocent images" prob to track it down in 1995.This effort by more than 200 convictions resulted in 1999.

Thursday, July 1, 2010

TRADEMARK CONFLICT WITH DOMAIN NAME


BY:Abbas Saghali

We can define a trademark as a name,symbol,motto and design which  legally introduces a company and is representative for its products and services.But from the first days that  domain name was improved in cyber space,stakeholders of companies had a conflict with it.The Ninth Circuit U.S. Court of Appeals recently ruled that a firm in  business  must use its domain name to sell products  and its services.this is accomplished in order to have a protection on  the name.In other words ,just reserving a domain name cannot be sufficient for a company and they should use their trademark in terms of domain name.
Fortunately, it's easy to register your domain name as a trademark:
Conduct a trademark search  helps to find any trademarks that conflict with those type of names that you want to use as domain name.At this point,the notorious conflict between trademark and domain name users can be decreased.Although regarding of using famouse trademarks for some individuals and groups, Conduct a trademark search is not full stop for the conflict. 
ALL BUSINESS