Sunday, July 11, 2010
E-COMMERCE IN THE FUTURE
By:Abbas Saghali
As well as Amazone,e-bay and Netflix announced their in the last week of 2008,net income of all of them had been improved. It showed that their performance was better than expected.Some of largely retailers had serious chalenges with these giant online firms but they finally could edge their way out of those retailars.Although online sales are growing some analysts such as Laurie Windham believe that e-sale will decrease in future instead of increasing.Windham justifies that market of net consumers may be spoiled in the future .she believes that online firms mostly push their customers to buy cheap goods and if they cannot find them go to another site.she says e-commerce is a ficker world with the least customer loyalty(e-loyalty)and this issue strongly threats the future of e-commerce.so the question is really what will happen in the future internet-based market.May be we should agree with Sramana Mitra when she says the end of this movie is yet unknown.
Friday, July 9, 2010
CYBER-TERRORISM,LOGIC BOMBS AND PROTECTION METHODS
By:Abbas Saghali
Hacking into computer system of a police station or a hospital and changing an individual's prescription to a lethal dosage for different motivation such as revenge can be viewed as some examples of Cyber-terrorism.In order to better protection of computer system, computing experts should be sufficiently aware of their weakness area against professional hackers which attack to systems in terms of Cyber-terrorism.It should be suggested that a complete secure system can never be accessed by any experts,but danger of Cyber-terrorism can be reduced.For instance,most of government economical and political classified documents are kept in separate systems without any connection to outside. Another way to prevention of Cyber-terrorism is promotion the use of firewall to monitor all communication in a system such as email messages which may unpredictably carry logic bombs.At the end , we should point out encryption which is the most common method of protection from Cyber-based attacks.
Cyber-terrorism Links
Wednesday, July 7, 2010
WHO ARE THEY?
By:Abbas Saghali
A professional group of hackers which calls itself "Iranian Cyber Army" carried out two high profile cyber attack in the world during last December and January. At first attack in December 17 this unknown group hacked twitter by redirection of twitter users to a web page which was followed by this message:
Iranian Cyber Army
THIS SITE HAS BEEN HACKED BY IRANIAN CYBER ARMY
iRANiAN.CYBER.ARMY@GMAiL.COM
U.S.A. Think They Controlling And Managing Internet By Their Access, But THey Don’t, We Control And Manage Internet By Our Power, So Do Not Try To Stimulation Iranian Peoples To….
NOW WHICH COUNTRY IN EMBARGO LIST? IRAN? USA?
WE PUSH THEM IN EMBARGO LIST ;)
Take Care.
The considerable point in their message was their writing style which apparently and consciously had joked with English grammar such as what e.e.commings,us great poet, did in his poetry by grammar rules and capital words.
For second time this group hacked china's most popular search engine,Baidu.Hackers again had redirected users to a web page displaying a message claiming that the same group had blocked access to that site.It should be suggested that hackers of Iranian Cyber Army have attacked to some Iranian leading opposition web sites and blogs during last months after cheating in Iranian presidential election.
Now question is: Really these kind of group-hackers are going to drive globe to
world cyber war 1?what will happen in the future?
A professional group of hackers which calls itself "Iranian Cyber Army" carried out two high profile cyber attack in the world during last December and January. At first attack in December 17 this unknown group hacked twitter by redirection of twitter users to a web page which was followed by this message:
Iranian Cyber Army
THIS SITE HAS BEEN HACKED BY IRANIAN CYBER ARMY
iRANiAN.CYBER.ARMY@GMAiL.COM
U.S.A. Think They Controlling And Managing Internet By Their Access, But THey Don’t, We Control And Manage Internet By Our Power, So Do Not Try To Stimulation Iranian Peoples To….
NOW WHICH COUNTRY IN EMBARGO LIST? IRAN? USA?
WE PUSH THEM IN EMBARGO LIST ;)
Take Care.
The considerable point in their message was their writing style which apparently and consciously had joked with English grammar such as what e.e.commings,us great poet, did in his poetry by grammar rules and capital words.
For second time this group hacked china's most popular search engine,Baidu.Hackers again had redirected users to a web page displaying a message claiming that the same group had blocked access to that site.It should be suggested that hackers of Iranian Cyber Army have attacked to some Iranian leading opposition web sites and blogs during last months after cheating in Iranian presidential election.
Now question is: Really these kind of group-hackers are going to drive globe to
world cyber war 1?what will happen in the future?
Tuesday, July 6, 2010
E-GOVERNMENT IN UK
By:Abbas Saghali
According a recent survey in 2010, south Korea has been able to lead E-Government issues in the world. In this ranking ,UK is placed after Australia,Canada and USA .The other countries which are between top 10 nations which have provided online services for their citizens in terms of E-Government are Netherlands,Norway,Denmark, Spain and France.
Although E-Government can accelerate a great amount of services for government members and people,somebody believes it is not always systematically effective.Micheal Cross in Guardian point outs that E-Government is not a financial cure-all. In addition ,he writes that the current buzzword is smarter government while prime minister of UK and the chancellor of Exchequer put on emphasis of cost reduction of E-Government services more than its quality.
According a recent survey in 2010, south Korea has been able to lead E-Government issues in the world. In this ranking ,UK is placed after Australia,Canada and USA .The other countries which are between top 10 nations which have provided online services for their citizens in terms of E-Government are Netherlands,Norway,Denmark, Spain and France.
Although E-Government can accelerate a great amount of services for government members and people,somebody believes it is not always systematically effective.Micheal Cross in Guardian point outs that E-Government is not a financial cure-all. In addition ,he writes that the current buzzword is smarter government while prime minister of UK and the chancellor of Exchequer put on emphasis of cost reduction of E-Government services more than its quality.
Monday, July 5, 2010
Sunday, July 4, 2010
PRIVACY POLICY IN FACEBOOK
By:Abbas Saghali
Facebook updated its privacy policy in April 22,2010.Last revision has eight sections including introduction, information facebook receives,information members share with third parties,sharing information on facebook,how members use their information,how facebook share information,how members can view,change or remove information,and how this popular social network protect information.
Facebook has announced if anybody has question about their privacy policy can contact with their team through their help page .This page also has been provided for somebody who has complaints about their privacy issues.They have provide the other page by the name of TRUSTe for those members which are not satisfied with their team's responses.
There are some links such as :
statement of rights and responsibilities
facebook site Govenance
privacy settings
requesting deletion for non-user
reporting and blocking third party applications
which are completely helpful in this regard.
Friday, July 2, 2010
WORLDWIDE COMPUTER CRIME
By:Abbas Saghali
According one official report in USA which was published in 2008,among 300 million internet users in all of the globe more than one million were involved with computer crime.These crimes included fraud,vandalism,disposal of stolen goods,and embezzlement.It should be interesting to know that distributed denial of service is the most reported computer crime in the world.As well as digital world has a great deal of global advantages,crimes by internet also cannot be limited geographically.Financial networks are mostly target by internet criminals and control of online fraud sometimes is extremely difficult.Online child pornography is another e-crime that FBI launched its "innocent images" prob to track it down in 1995.This effort by more than 200 convictions resulted in 1999.
According one official report in USA which was published in 2008,among 300 million internet users in all of the globe more than one million were involved with computer crime.These crimes included fraud,vandalism,disposal of stolen goods,and embezzlement.It should be interesting to know that distributed denial of service is the most reported computer crime in the world.As well as digital world has a great deal of global advantages,crimes by internet also cannot be limited geographically.Financial networks are mostly target by internet criminals and control of online fraud sometimes is extremely difficult.Online child pornography is another e-crime that FBI launched its "innocent images" prob to track it down in 1995.This effort by more than 200 convictions resulted in 1999.
Thursday, July 1, 2010
TRADEMARK CONFLICT WITH DOMAIN NAME
BY:Abbas Saghali
We can define a trademark as a name,symbol,motto and design which legally introduces a company and is representative for its products and services.But from the first days that domain name was improved in cyber space,stakeholders of companies had a conflict with it.The Ninth Circuit U.S. Court of Appeals recently ruled that a firm in business must use its domain name to sell products and its services.this is accomplished in order to have a protection on the name.In other words ,just reserving a domain name cannot be sufficient for a company and they should use their trademark in terms of domain name.
Fortunately, it's easy to register your domain name as a trademark:
Conduct a trademark search helps to find any trademarks that conflict with those type of names that you want to use as domain name.At this point,the notorious conflict between trademark and domain name users can be decreased.Although regarding of using famouse trademarks for some individuals and groups, Conduct a trademark search is not full stop for the conflict. ALL BUSINESS
Subscribe to:
Posts (Atom)