Sunteți pe pagina 1din 13

TMA 2

NAME : NARVEENDERPAL SINGH a/l HARPAL SINGH

STUDENT ID : 051160103

Class Code : 5CNS1


Course Code : WUC118/03
CC Name : TAN CHENG PENG
Tutor name : WONG KOK ANN
Question 1

For Fruitcrush’s my proposal is we will be setting up a facebook and twitter (world famous

social media apps) page for this international soft drink company, for the companys knowledge

social media are computer-mediated technologies that facilitate the creation and sharing of

information, ideas, career interests and other forms of expression via virtual communities and

networks. The variety of stand-alone and built-in social media services currently available

introduces challenges of definition; however, there are some common featuresSocial media are

interactive Web 2.0 Internet-based applications. User-generated content, such as text posts or

comments, digital photos or videos, and data generated through all online interactions, is the

lifeblood of social media with these features fruitcrush can always introduce its new upcoming

products . fruit crush also needs to know that Users which is also their target market ,have

create service-specific profiles for the website or app that are designed and maintained by the

social media organization.Social media facilitate the development of online social networks by

connecting a user's profile with those of other individuals or groups.

b)

Pros:

1. Reduced marketing costs

Social media allows organisations and small business owners to spend less on marketing. The

use of in-site advertisementswithin social networking sites such as Facebook offers targeted

advertising for only a fraction of the amount that would need to be paid for conventional

marketing.

2. Increased sales .Social media can also be used to effectively increase the sales of a product

or service. For instance, new promotions can beannounced to an existing social networking
customer base. Additionally, existing customers may also share information about new

promotions with potential customers who are on their own social network.

3. Increased Web traffic and search engine rankings

Social media allows URLs to be shared within social networks. When companies promote their

website via social media, theURL of their website may be shared by their followers with their

own social networks. In cases where posts about a website on social media are publicly visible

and accessible to search engines, they help to increase traffic to the website and increase

its search engine ranking. Search engine ranking optimisation usually takes into consideration

the number of referrals or links from other websites as well as social popularity. Hence, the

more viral a post that links to a website, the bigger its influence on the website’s search engine

ranking.

4. Real-time customer feedback and support .Customers can give real-time feedback to

companies via social media. They can express their satisfaction or dissatisfaction with products

and services. They can also make enquiries. Companies can provide support to their customers

in real time via social media. This eliminates the long delay customers

usually experience in getting a response from companies. In addition, companies can also

attempt to satisfy their customers immediately by offering replacements for faulty products or

guiding them on how to fix the problems they face. Such proactive measures not only get

noticed in the social media space, they can also help companies to attract more customers from

the social networks of existing customers.

5. Opportunity to conduct market research. Some of the features provided by social media and

social networking sites are very useful in conducting market research related to existing and
future customers. For instance, the Facebook Insights feature can be used to identify or gauge

the interest of the market when a company is planning to release a product.

Besides the pros there is also a room for cons .cons of social media and networking is as follows

Spam and fake news

Social media makes it easy for scammers — both bots and real people — to flood you with

unsolicited content or spam. If you have been using any kind of social media, you would

most likely have encountered spam messages (e.g., Twitter spam bots that follow your

account) (Whittaker, 2017 ). Many blog postings receive comments from spam bots that

request a referral link to their blog to increase their search engine ranking! In addition,

advertisements for counterfeit and illegal products may appear on your social media accounts

from time to time. Another problem on social media is unverified or fake news. In trying to

be active users of social media, many users share interesting information with their social

network without verifying that the information is truthful. This can lead to chaotic situations

with dangerous consequences. Imagine a scenario where a fake news story about a war

breaking out goes viral on social media. People will start to panic and try to stock up on food

and water. This can escalate into rioting and looting if no immediate action is taken by the

authorities to deny the story.

Question 2

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text

message by someone posing as a legitimate institution to lure individuals into providing

sensitive data such as personally identifiable information, banking and credit card details, and

passwords. These messages can even have the bank’s name and logo. Written in an urgent
professional style, these emails can request that the bank’s customers provide their banking

data. Alternatively, the emails may direct our customers to a fake bank website. This fake

website may look real and the URL may be masked to appear authentic to unsuspecting

customers. The fake website may ask our customers to provide their confidential data (e.g.,

banking data, passwords, etc.).The information is then used to access important accounts and

can result in identity theft and financial loss.

Loss of reputation

Security problems directly affect the company’s reputation, and this factor is especially critical

for maybank, cimb and other banks for an example hackers tend to create fake websites of this

famous banks online in directly it affects the reputation of the banks.

Security audits

Security audits are required for all companies that store data classified under LOPD [Organic

Law on Personal Data] with a medium or high level of security. For financial institutions, data

is considered to require a high level of security, so an audit must be carried out every two years.

This is a creates a cost for the company to pay auditors to make this audits happen. This may

affect the financial instuation by costly audits.

Loss of money for the institution

A successful phishing attempt is very costly to the people who got cheated by the hackers .

Imagine in a day 100 successful hackers manage to steal money through this phishing technique

in a month the will manage to cheat 3000 online banking customers .lets say 3000 people had

RM 250 each in their respective accounts ,that’s the most minimum .they will manage to affect

RM 75000 LOSS to the financial institution by stealing their customers money. Bare in mind
RM 250 in an account is the most minimum amount selected .and there are records of thousands

of ringgit in a single account gone to these phishing hackers.

Phishing attacks are the biggest threat to online banking thus it is bad for financial institution.

Phishing uses spam, fake websites, crimeware and other methods to mislead the bank’s online

customers into divulging their sensitive banking data ,this can be costly to financial institution.

Cybercriminals carry out phishing attacks on online banking users in order to defraud users of

their savings. Alternatively, they may sell the information on the online black market (online

identity theft)it can be a loss for financial institution.

The clients of financial institution must follow the listed the advices to avoid being affected

by phishing :

Keep Informed About Phishing Techniques – New phishing scams are being developed all the

time. Without staying on top of these new phishing techniques, you could inadvertently fall

prey to one. Keep your eyes peeled for news about new phishing scams. By finding out about

them as early as possible, you will be at much lower risk of getting snared by one. For IT

administrators, ongoing security awareness training and simulated phishing for all users is

highly recommended in keeping security top of mind throughout the organization.

Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on

links that appear in random emails and instant messages, however, isn’t such a smart move.

Hover over links that you are unsure of before clicking on them. Do they lead where they are

supposed to lead? A phishing email may claim to be from a legitimate company and when you

click the link to the website, it may look exactly like the real website. The email may ask you

to fill in the information but the email may not contain your name. Most phishing emails will

start with “Dear Customer” so you should be alert when you come across these emails. When

in doubt, go directly to the source rather than clicking a potentially dangerous link.
Install an Anti-Phishing Toolbar – Most popular Internet browsers can be customized with anti-

phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare

them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will

alert you about it. This is just one more layer of protection against phishing scams, and it is

completely free.

Verify a Site’s Security – It’s natural to be a little wary about supplying sensitive financial

information online. As long as clients are on a secure website, however, clients shouldn’t run

into any trouble. Before submitting any information, make sure the site’s URL begins with

“https” and there should be a closed lock icon near the address bar. Check for the site’s security

certificate as well. If clients get a message stating a certain website may contain malicious files,

do not open the website. Never download files from suspicious emails or websites. Even search

engines may show certain links which may lead users to a phishing webpage which offers low

cost products. If the user makes purchases at such a website, the credit card details will be

accessed by cybercriminals.

Be Wary of Pop-Ups – Pop-up windows often masquerade as legitimate components of a

website. All too often, though, they are phishing attempts. Many popular browsers allow clients

to block pop-ups; clients can allow them on a case-by-case basis. If one manages to slip through

the cracks, don’t click on the “cancel” button; such buttons often lead to phishing sites. Instead,

click the small “x” in the upper corner of the window.

Never Give Out Personal Information – As a general rule, clients should never share personal

or financially sensitive information over the Internet. This rule spans all the way back to the

days of America Online, when users had to be warned constantly due to the success of early

phishing scams. When in doubt, go visit the main website of the company in question, get their
number and give them a call. Most of the phishing emails will direct clients to pages where

entries for financial or personal information are required. An Internet user should never make

confidential entries through the links provided in the emails. Never send an email with sensitive

information to anyone. Make it a habit to check the address of the website. A secure website

always starts with “https”.

3a

Intellectual property refers to creations of the mind: inventions; literary and artistic works; and

symbols, names and images used in commerce. Intellectual property is divided into two

categories: Industrial Property includes patents for inventions, trademarks, industrial designs

and geographical indications. Copyright covers literary works (such as novels, poems and

plays), films, music, artistic works (e.g., drawings, paintings, photographs and sculptures) and

architectural design. Rights related to copyright include those of performing artists in their

performances, producers of phonograms in their recordings, and broadcasters in their radio and

television programs.

b) volta can use intellectual patent protection, volta as being the patent holder can take legal

action against anyone who copies the patented invention of the electric engine , design of the

engine, or discovery. Without this legal protection, anyone can use similar designs of the

company, products, and processes without risk. In fact, if volta don't file for patent protection

on your invention within 12 months of releasing it in a public setting, the opportunity to patent

it will be gone.

Trademarks

A trademark is a word, phrase, symbol, or design that distinguishes the source of products

(trademarks) or services (service marks) of one business from its competitors. In order to

qualify for patent protection, the mark of volta must be distinctive. Before registering volta
trademark, conduct a search of federal and state databases to make sure a similar trademark

doesn't already exist. This trademark search can help you reduce the amount of time and money

you could spend on using a mark that is already registered and trademarked.

Copyright law is an additional, but less commonly used, legal protection for automobile

designs. Volta can protect its copy right under this law .The application of copyright law is via

a specific category of sculptural works, recognized as being protected in their three-

dimensional form. Copyright protection arises when (1) a specific feature of the design is

original - that is, possessing more than a mere quantum of creativity in its design, and (2) that

specific feature exists separate and apart from the feature's functional aspect. Upon

surmounting these requirements, the copyright can exist 95 years from the creation of the work

if the work was a work made for hire.

C)

To qualify for a utility patent which is volta’s clean engine , the invention must be novel,

nonobvious, and have some usefulness. Novel means new and not known by anyone else, while

nonobvious means that it can't be immediately obvious to someone having ordinary skills in

the industry. The patent application process is complicated The Patents Act 1983

(myipo.gov.my, 1983) and the Patents Regulations 1986 govern patent protection in Malaysia.

Before filing for a patent, volta should determine who will own the idea. Some companies file

for patents on their protected inventions, but if an employee of volta came up with the idea of

the engine, the individual may be granted holder of the patent. If volta business owns the patent,

volta must protect the patent with the company by having employees involved in the invention

process sign an agreement stating that the idea belongs to the company An applicant(volta)

may file a patent application directly if he is domicile or resident in Malaysia. A foreign

application can only be filed through a registered patent agent in Malaysia acting on behalf of
the applicant. Similar to legislations in other countries, an invention is patentable if it is new,

involves an inventive step and is industrially applicable. In accordance with TRIPS (wikipedia,

2006), the Patents Act stipulates a protection period of 20 years from the date of filing of an

application. Under the Act, the utility innovation certificate provides for an initial duration of

ten years protection from the date of filing of the application and renewable for further two

consecutive terms of five years each subject to use. The owner of a patent has the right to

exploit the patented invention, to assign or transmit the patent, and to conclude a licensed

contract.

In accordance with TRIPS, under the scope of compulsory licence, the Act allows for

importation of patented products that are already in the other countries' market (parallel

import).The Government can prohibit commercial exploitation of patents for reasons of public

order or morality. The Act was amended to include provision for Patent Cooperation Treaty

(PCT) and to allow importation under the scope of compulsory license.

Malaysia has acceded to the PCT in the year 2006 and effective from 16 August 2006, the PCT

International Application can be made at the Intellectual Property Corporation of Malaysia

(MyIPO) (htt)

Q4

A) cyberia is focusing The Internet of Things (IoT) .basiclly what is (IoT)? . Its actually

the network of physical devices, vehicles, home appliances and other items embedded

with electronics, software, sensors, actuators, and connectivity which enables these

objects to connect and exchange data. Each thing is uniquely identifiable through its

embedded computing system but is able to inter-operate within the existing Internet

infrastructure. For example citizens of cyberia may use their mobile phone to switch on
their air conditioning of their home even if they are not there yet. This is only possible

if their air conditioning supports IOT.

B) The challenges and issue cyberia could face is as follows

Complexity:As with all complex systems, there are more opportunities of failure. With cyberia

applying Internet of Things, failures could sky rocket. For instance, let’s say in cyberia a couple

that both each get a message saying that your milk has expired, and both of couple will stop at

a store on thir way home, and both couple purchase milk. As a result, the guy and his spouse

have purchased twice the amount that they both need. Or maybe a bug in the software ends up

automatically ordering a new ink cartridge for their printer each and every hour for a few days,

or at least after each power failure, when they only need a single replacement. This will

eventually lead to wasteage of money and resources running their home sweet home

Privacy/Security:With all of this IoT data being transmitted, cyberia’s citizens would have to

face the risk of losing privacy increases. For instance, how well encrypted will the data be kept

and transmitted with? And for cyberians Do they want their neighbors or employers to know

what medications that they are taking or how good is their financial situation because hospitals

and banks would have been “IOT-tised” ?

Safety:Imagine if a notorious hacker changes cyberians that are sick by dealing with their

prescription to be healed . Or if a store automatically ships cyberians an equivalent product that

they are allergic to, or a flavor that of something that they do not like, or a product that is

already expired because machines cant really know expiry . As a result, safety is ultimately in

the hands of the consumer which is also citizens of cyberia to verify any and all automation.

As all the household appliances of cyberia, industrial machinery of cyberia, public sector

services like water supply and transport of cyberia, and many other devices all are connected
to the Internet, a lot of information is available on it. This information is prone to attack by

hackers. It would be very disastrous for cyberia country if private and confidential information

is accessed by unauthorized intruders.

Compatibility

As devices from different manufacturers will be interconnected, the issue of compatibility in

tagging and monitoring crops up. Although this disadvantage may drop off if all the

manufacturers agree to a common standard, even after that, technical issues will persist. Today,

we have Bluetooth-enabled devices and compatibility problems exist even in this technology!

As for cyberians compatibility issues may result in people buying appliances from a certain

manufacturer, leading to its monopoly in the market.

Complexity

The IoT is a diverse and complex network. In the case of cyberia any failure or bugs in the

software or hardware will have serious consequences. Even power failure can cause a lot of

inconvenience.

Lesser Employment of Menial Staff for the country of cyberia

The unskilled workers and helpers may end up losing their jobs in the effect of automation of

daily activities. This can lead to unemployment issues in the society of cyberia’s country. This

is a problem with the advent of any technology and can be overcome with education.With daily

activities getting automated, naturally, there will be fewer requirements of human resources,

primarily, workers and less educated staff. This may create Unemployment issue for cyberia

country.

Technology Takes Control of Life


Cyberians lives will be increasingly controlled by technology, and will be dependent on it.

The younger generation of todays world is already addicted to technology (CASSIDY, 2014)

for every little thing. they have to decide how much of our daily lives are we willing to

mechanize and be controlled by technology.

Bibliography
(n.d.). Retrieved from http://www.myipo.gov.my/ms/myipo/

CASSIDY, S. (2014, may 8). independent.uk.com. Retrieved from teens addicted to internet:
https://www.independent.co.uk/life-style/gadgets-and-tech/news/the-online-generation-
four-in-10-children-are-addicted-to-the-internet-9341159.htmlSARAH CASSIDY

myipo.gov.my. (1983). Laws of Malaysia. Retrieved from http://www.myipo.gov.my/:


http://www.myipo.gov.my/wp-content/uploads/2016/09/PATENT-ACT-1983-ACT-291.pdf

Whittaker, Z. ( 2017 , april 23). Twitter has a spam bot problem — and it's getting worse. Retrieved
from zero day website: https://www.zdnet.com/article/twitter-spam-bot-problem-on-the-
rise/

wikipedia. (2006). Retrieved from TRIPS Agreement: https://en.wikipedia.org/wiki/TRIPS_Agreement

S-ar putea să vă placă și