Documente Academic
Documente Profesional
Documente Cultură
STUDENT ID : 051160103
For Fruitcrush’s my proposal is we will be setting up a facebook and twitter (world famous
social media apps) page for this international soft drink company, for the companys knowledge
social media are computer-mediated technologies that facilitate the creation and sharing of
information, ideas, career interests and other forms of expression via virtual communities and
networks. The variety of stand-alone and built-in social media services currently available
introduces challenges of definition; however, there are some common featuresSocial media are
interactive Web 2.0 Internet-based applications. User-generated content, such as text posts or
comments, digital photos or videos, and data generated through all online interactions, is the
lifeblood of social media with these features fruitcrush can always introduce its new upcoming
products . fruit crush also needs to know that Users which is also their target market ,have
create service-specific profiles for the website or app that are designed and maintained by the
social media organization.Social media facilitate the development of online social networks by
b)
Pros:
Social media allows organisations and small business owners to spend less on marketing. The
use of in-site advertisementswithin social networking sites such as Facebook offers targeted
advertising for only a fraction of the amount that would need to be paid for conventional
marketing.
2. Increased sales .Social media can also be used to effectively increase the sales of a product
or service. For instance, new promotions can beannounced to an existing social networking
customer base. Additionally, existing customers may also share information about new
promotions with potential customers who are on their own social network.
Social media allows URLs to be shared within social networks. When companies promote their
website via social media, theURL of their website may be shared by their followers with their
own social networks. In cases where posts about a website on social media are publicly visible
and accessible to search engines, they help to increase traffic to the website and increase
its search engine ranking. Search engine ranking optimisation usually takes into consideration
the number of referrals or links from other websites as well as social popularity. Hence, the
more viral a post that links to a website, the bigger its influence on the website’s search engine
ranking.
4. Real-time customer feedback and support .Customers can give real-time feedback to
companies via social media. They can express their satisfaction or dissatisfaction with products
and services. They can also make enquiries. Companies can provide support to their customers
in real time via social media. This eliminates the long delay customers
usually experience in getting a response from companies. In addition, companies can also
attempt to satisfy their customers immediately by offering replacements for faulty products or
guiding them on how to fix the problems they face. Such proactive measures not only get
noticed in the social media space, they can also help companies to attract more customers from
5. Opportunity to conduct market research. Some of the features provided by social media and
social networking sites are very useful in conducting market research related to existing and
future customers. For instance, the Facebook Insights feature can be used to identify or gauge
Besides the pros there is also a room for cons .cons of social media and networking is as follows
Social media makes it easy for scammers — both bots and real people — to flood you with
unsolicited content or spam. If you have been using any kind of social media, you would
most likely have encountered spam messages (e.g., Twitter spam bots that follow your
account) (Whittaker, 2017 ). Many blog postings receive comments from spam bots that
request a referral link to their blog to increase their search engine ranking! In addition,
advertisements for counterfeit and illegal products may appear on your social media accounts
from time to time. Another problem on social media is unverified or fake news. In trying to
be active users of social media, many users share interesting information with their social
network without verifying that the information is truthful. This can lead to chaotic situations
with dangerous consequences. Imagine a scenario where a fake news story about a war
breaking out goes viral on social media. People will start to panic and try to stock up on food
and water. This can escalate into rioting and looting if no immediate action is taken by the
Question 2
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text
sensitive data such as personally identifiable information, banking and credit card details, and
passwords. These messages can even have the bank’s name and logo. Written in an urgent
professional style, these emails can request that the bank’s customers provide their banking
data. Alternatively, the emails may direct our customers to a fake bank website. This fake
website may look real and the URL may be masked to appear authentic to unsuspecting
customers. The fake website may ask our customers to provide their confidential data (e.g.,
banking data, passwords, etc.).The information is then used to access important accounts and
Loss of reputation
Security problems directly affect the company’s reputation, and this factor is especially critical
for maybank, cimb and other banks for an example hackers tend to create fake websites of this
Security audits
Security audits are required for all companies that store data classified under LOPD [Organic
Law on Personal Data] with a medium or high level of security. For financial institutions, data
is considered to require a high level of security, so an audit must be carried out every two years.
This is a creates a cost for the company to pay auditors to make this audits happen. This may
A successful phishing attempt is very costly to the people who got cheated by the hackers .
Imagine in a day 100 successful hackers manage to steal money through this phishing technique
in a month the will manage to cheat 3000 online banking customers .lets say 3000 people had
RM 250 each in their respective accounts ,that’s the most minimum .they will manage to affect
RM 75000 LOSS to the financial institution by stealing their customers money. Bare in mind
RM 250 in an account is the most minimum amount selected .and there are records of thousands
Phishing attacks are the biggest threat to online banking thus it is bad for financial institution.
Phishing uses spam, fake websites, crimeware and other methods to mislead the bank’s online
customers into divulging their sensitive banking data ,this can be costly to financial institution.
Cybercriminals carry out phishing attacks on online banking users in order to defraud users of
their savings. Alternatively, they may sell the information on the online black market (online
The clients of financial institution must follow the listed the advices to avoid being affected
by phishing :
Keep Informed About Phishing Techniques – New phishing scams are being developed all the
time. Without staying on top of these new phishing techniques, you could inadvertently fall
prey to one. Keep your eyes peeled for news about new phishing scams. By finding out about
them as early as possible, you will be at much lower risk of getting snared by one. For IT
administrators, ongoing security awareness training and simulated phishing for all users is
Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on
links that appear in random emails and instant messages, however, isn’t such a smart move.
Hover over links that you are unsure of before clicking on them. Do they lead where they are
supposed to lead? A phishing email may claim to be from a legitimate company and when you
click the link to the website, it may look exactly like the real website. The email may ask you
to fill in the information but the email may not contain your name. Most phishing emails will
start with “Dear Customer” so you should be alert when you come across these emails. When
in doubt, go directly to the source rather than clicking a potentially dangerous link.
Install an Anti-Phishing Toolbar – Most popular Internet browsers can be customized with anti-
phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare
them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will
alert you about it. This is just one more layer of protection against phishing scams, and it is
completely free.
Verify a Site’s Security – It’s natural to be a little wary about supplying sensitive financial
information online. As long as clients are on a secure website, however, clients shouldn’t run
into any trouble. Before submitting any information, make sure the site’s URL begins with
“https” and there should be a closed lock icon near the address bar. Check for the site’s security
certificate as well. If clients get a message stating a certain website may contain malicious files,
do not open the website. Never download files from suspicious emails or websites. Even search
engines may show certain links which may lead users to a phishing webpage which offers low
cost products. If the user makes purchases at such a website, the credit card details will be
accessed by cybercriminals.
website. All too often, though, they are phishing attempts. Many popular browsers allow clients
to block pop-ups; clients can allow them on a case-by-case basis. If one manages to slip through
the cracks, don’t click on the “cancel” button; such buttons often lead to phishing sites. Instead,
Never Give Out Personal Information – As a general rule, clients should never share personal
or financially sensitive information over the Internet. This rule spans all the way back to the
days of America Online, when users had to be warned constantly due to the success of early
phishing scams. When in doubt, go visit the main website of the company in question, get their
number and give them a call. Most of the phishing emails will direct clients to pages where
entries for financial or personal information are required. An Internet user should never make
confidential entries through the links provided in the emails. Never send an email with sensitive
information to anyone. Make it a habit to check the address of the website. A secure website
3a
Intellectual property refers to creations of the mind: inventions; literary and artistic works; and
symbols, names and images used in commerce. Intellectual property is divided into two
categories: Industrial Property includes patents for inventions, trademarks, industrial designs
and geographical indications. Copyright covers literary works (such as novels, poems and
plays), films, music, artistic works (e.g., drawings, paintings, photographs and sculptures) and
architectural design. Rights related to copyright include those of performing artists in their
performances, producers of phonograms in their recordings, and broadcasters in their radio and
television programs.
b) volta can use intellectual patent protection, volta as being the patent holder can take legal
action against anyone who copies the patented invention of the electric engine , design of the
engine, or discovery. Without this legal protection, anyone can use similar designs of the
company, products, and processes without risk. In fact, if volta don't file for patent protection
on your invention within 12 months of releasing it in a public setting, the opportunity to patent
it will be gone.
Trademarks
A trademark is a word, phrase, symbol, or design that distinguishes the source of products
(trademarks) or services (service marks) of one business from its competitors. In order to
qualify for patent protection, the mark of volta must be distinctive. Before registering volta
trademark, conduct a search of federal and state databases to make sure a similar trademark
doesn't already exist. This trademark search can help you reduce the amount of time and money
you could spend on using a mark that is already registered and trademarked.
Copyright law is an additional, but less commonly used, legal protection for automobile
designs. Volta can protect its copy right under this law .The application of copyright law is via
dimensional form. Copyright protection arises when (1) a specific feature of the design is
original - that is, possessing more than a mere quantum of creativity in its design, and (2) that
specific feature exists separate and apart from the feature's functional aspect. Upon
surmounting these requirements, the copyright can exist 95 years from the creation of the work
C)
To qualify for a utility patent which is volta’s clean engine , the invention must be novel,
nonobvious, and have some usefulness. Novel means new and not known by anyone else, while
nonobvious means that it can't be immediately obvious to someone having ordinary skills in
the industry. The patent application process is complicated The Patents Act 1983
(myipo.gov.my, 1983) and the Patents Regulations 1986 govern patent protection in Malaysia.
Before filing for a patent, volta should determine who will own the idea. Some companies file
for patents on their protected inventions, but if an employee of volta came up with the idea of
the engine, the individual may be granted holder of the patent. If volta business owns the patent,
volta must protect the patent with the company by having employees involved in the invention
process sign an agreement stating that the idea belongs to the company An applicant(volta)
application can only be filed through a registered patent agent in Malaysia acting on behalf of
the applicant. Similar to legislations in other countries, an invention is patentable if it is new,
involves an inventive step and is industrially applicable. In accordance with TRIPS (wikipedia,
2006), the Patents Act stipulates a protection period of 20 years from the date of filing of an
application. Under the Act, the utility innovation certificate provides for an initial duration of
ten years protection from the date of filing of the application and renewable for further two
consecutive terms of five years each subject to use. The owner of a patent has the right to
exploit the patented invention, to assign or transmit the patent, and to conclude a licensed
contract.
In accordance with TRIPS, under the scope of compulsory licence, the Act allows for
importation of patented products that are already in the other countries' market (parallel
import).The Government can prohibit commercial exploitation of patents for reasons of public
order or morality. The Act was amended to include provision for Patent Cooperation Treaty
Malaysia has acceded to the PCT in the year 2006 and effective from 16 August 2006, the PCT
(MyIPO) (htt)
Q4
A) cyberia is focusing The Internet of Things (IoT) .basiclly what is (IoT)? . Its actually
the network of physical devices, vehicles, home appliances and other items embedded
with electronics, software, sensors, actuators, and connectivity which enables these
objects to connect and exchange data. Each thing is uniquely identifiable through its
embedded computing system but is able to inter-operate within the existing Internet
infrastructure. For example citizens of cyberia may use their mobile phone to switch on
their air conditioning of their home even if they are not there yet. This is only possible
Complexity:As with all complex systems, there are more opportunities of failure. With cyberia
applying Internet of Things, failures could sky rocket. For instance, let’s say in cyberia a couple
that both each get a message saying that your milk has expired, and both of couple will stop at
a store on thir way home, and both couple purchase milk. As a result, the guy and his spouse
have purchased twice the amount that they both need. Or maybe a bug in the software ends up
automatically ordering a new ink cartridge for their printer each and every hour for a few days,
or at least after each power failure, when they only need a single replacement. This will
eventually lead to wasteage of money and resources running their home sweet home
Privacy/Security:With all of this IoT data being transmitted, cyberia’s citizens would have to
face the risk of losing privacy increases. For instance, how well encrypted will the data be kept
and transmitted with? And for cyberians Do they want their neighbors or employers to know
what medications that they are taking or how good is their financial situation because hospitals
Safety:Imagine if a notorious hacker changes cyberians that are sick by dealing with their
they are allergic to, or a flavor that of something that they do not like, or a product that is
already expired because machines cant really know expiry . As a result, safety is ultimately in
the hands of the consumer which is also citizens of cyberia to verify any and all automation.
As all the household appliances of cyberia, industrial machinery of cyberia, public sector
services like water supply and transport of cyberia, and many other devices all are connected
to the Internet, a lot of information is available on it. This information is prone to attack by
hackers. It would be very disastrous for cyberia country if private and confidential information
Compatibility
tagging and monitoring crops up. Although this disadvantage may drop off if all the
manufacturers agree to a common standard, even after that, technical issues will persist. Today,
we have Bluetooth-enabled devices and compatibility problems exist even in this technology!
As for cyberians compatibility issues may result in people buying appliances from a certain
Complexity
The IoT is a diverse and complex network. In the case of cyberia any failure or bugs in the
software or hardware will have serious consequences. Even power failure can cause a lot of
inconvenience.
The unskilled workers and helpers may end up losing their jobs in the effect of automation of
daily activities. This can lead to unemployment issues in the society of cyberia’s country. This
is a problem with the advent of any technology and can be overcome with education.With daily
activities getting automated, naturally, there will be fewer requirements of human resources,
primarily, workers and less educated staff. This may create Unemployment issue for cyberia
country.
The younger generation of todays world is already addicted to technology (CASSIDY, 2014)
for every little thing. they have to decide how much of our daily lives are we willing to
Bibliography
(n.d.). Retrieved from http://www.myipo.gov.my/ms/myipo/
CASSIDY, S. (2014, may 8). independent.uk.com. Retrieved from teens addicted to internet:
https://www.independent.co.uk/life-style/gadgets-and-tech/news/the-online-generation-
four-in-10-children-are-addicted-to-the-internet-9341159.htmlSARAH CASSIDY
Whittaker, Z. ( 2017 , april 23). Twitter has a spam bot problem — and it's getting worse. Retrieved
from zero day website: https://www.zdnet.com/article/twitter-spam-bot-problem-on-the-
rise/