Electronic Auction is a procurement tool which utilizes web-based technology to enable bidders to participate in dynamic and transparent pricing events. It has various forms such as English Auction, Reverse Auction, and Dutch Auction.
Although online auctions constitute one of the most successful Internet business models, auction fraud has become the largest component of all Internet fraud which are: 1) Failure to deliver, 2) Misrepresentation, 3) Shill bidding, 4) Selling black-market goods.
Here things to be take note to avoid online auction scams and related fraud:
1) Develop a familiarity with the product you want to buy. Search for the product online and verify that the specifications and seller photos are accurate, noting the photo caveats below. Compare the information to the original merchant site if possible.
2) Put the sellers' feedback in perspective and instead look at the big picture. How long has the party had an auction account? Are past purchases of similar value or is this a sudden high-ticket item? Is it a business and where is the seller located? These are some of the questions relevant to avoiding online auction scams and affects how readily you are protected.
3) Many sellers and auction enthusiasts will alert the public on how to avoid online auction scams for a particular product. To minimize the risk of landing a fake, look for an established dealer and/or a certificate of authenticity from a third-party.
4) Deal with sellers that are covered by a Buyer Protection plan such as Square Trade and PayPal, but note the monetary limits and the fine print. These are not failing proof coverages and recovering your money may take weeks to months. For lower cost items it is likely sufficient. For higher ticket items consider an escrow arrangement if you have any doubts.
5) Keep your transaction information. Keep your own record of the transaction when you're buying. You want a record of the seller's identification, the item description, emails sent and received, plus the time, date and price of your bid.
6) Passwords. Never have the same password on your eBay and PayPal accounts or indeed on any other financial or personal site. Change your passwords every 30-60 days on both eBay and PayPal.
To report Internet fraud, you can contact the Federal Trade Commission: (877) FTC-HELP (877-382-4357 or www.ftc.gov). You can also contact Internet Fraud Watch(www.fraud.org).
Wednesday, 2 July 2008
Things to note to prevent E-Auction fraud
Posted by Sasa, Hua, Jun, Ting at 3:47:00 pm 1 comments
Corporate Blogging
Pros of corporate blog:
-> Leaders can communicate directly with customers, suppliers and investors, as well as employees, helping disseminate and explain strategy.
-> People are far more likely to give great feedback if they know someone specific is listening. The power of these feedback loops can generate big benefits.
Cons of corporate blog:
-> It can be tricky to drag public comment out of a company without first routing through the sanitizing filter of a press office.
-> There is a risk that an ill-judged comment could be seized upon by the media or disgruntled investors.for additional information:
Posted by Sasa, Hua, Jun, Ting at 3:44:00 pm 0 comments
Review a local e-commerce site:
Blooming Florist began operations in 1981. Through the years, it has grown from a small retail shop to its present set-up of six retail outlets in Petaling Jaya, Kuala Lumpur and a head office in Kelana Jaya. Today, besides being linked with most reliable florist throughout Malaysia, Blooming is also networked with 75,000 florists worldwide through its membership in Interflora Pacific Unit Limited. Customer around the world can visit to this website http://www.blooming.com.my/ to order and buy their products.
Currently, the website offer products such as flowers (hand bouquet, potted flowers, basket arrangement, artificial flowers arrangement, and dried flowers), gifts, hampers, fruit basket, chocolates, wine, cakes and cookies.
Posted by Sasa, Hua, Jun, Ting at 3:08:00 pm 1 comments
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies
E-government in Malaysia:
E-government describes the use of information and information and communication technology (ICT) to support the operations of government. Egovernment
most often is associated with computer applications and the Internet and the World Wide Web, but also encompasses other ICT applications, such as cellular
telephone, satellite communication and geographical information systems.
E-filling:
According to relevant source, printed tax return forms will not be issued to taxpayers who used the e-Filing system in 2007. LHDN encourages taxpayers to continue using thee-Filling system in 2008 with the ownership of a digital certificate.
Problems encountered:
Low intention to use this e-system among tax payers: There are some of the problems that encountered by consumers. Some tax payers, especially those elderly employees, they might be computer literacy and thus do not know how to use this system.
Little knowledge: Since the implementaion of e-Filling system so far was just few years, therefore it is undeniable that consumers might have little knowledge about it.
Do not have proper guidance: When they encounter problem, usually they do not have a correct guidance from those who are in-charged of it. When this occurs, usually consumers will lose their confidence in submitting tax return via e-Filling system.
Ways to improve:
Privacy and security: To encourage more citizens to use the e-government applications and hence adapted to them, Government should concern about the privacy and security issue involved. Usually, e-government appliction such as e-Filling system will require users to fill in their personal details, financial backgrounds and so on. The system should make sure that all the key in information would not be leaked out.
Creating the infrastructure to support e-government: There should be a good infrastructure to support the e-government application. As a conceptual foundation, policy architecture must be developed and set in place, including sets of goals, objectives, guiding principles, models and standards. By then, users would be have more understanding the intention behind each application.
Posted by Sasa, Hua, Jun, Ting at 2:14:00 pm 0 comments
Friday, 27 June 2008
Mobile Payment
Mobile Visa Wave Payment Pilot is the first credit card payment pilot system for the Visa International, in collaboration with Maybank, Maxis Communication Berhad (Maxis) and Nokia. Consumers who are both Maybankkard Visa cardholders and Maxis mobile phone subscribers will have qualify to use this system.
The backbone of the mobile payment system is Visa Wave smart card technology. The technology is equipped with sophisticated radio frequencies that eliminate the need to swipe credit cards into a reader. Mobile Visa Wave Payment can be made across all merchants in Malaysia that have Visa Wave-supported terminals. No change is required to the current acceptance infrastructure.
Although it has favorable market conditions, but it is yet to achieve widespread acceptance. To date, there are only 1.8% of the 25 million mobile phone subscribers in Malaysia. Therefore, certain steps need to be taken to encourage consumers to adopt this payment system.
There are still many people yet to favorable and even don’t know with this payment system. So, the advertising activities for the M-payment system should much more attractive and interesting. The system should also attract more merchants to join this system. When this system is wider use in the whole country, the consumers will be more easily to accept and adapt to this system. However, the security provided by a system is always the main barrier for a consumer to accept those systems. The M-payment system should have great anonymity and privacy to protect consumers’ personal information and purchase records.
For additional information about the mobile payment system available information in Malaysia & other country:
1) http://www.mobile-money.com/
2) http://www.squidoo.com/mobillcash-pay-by-mobile-phone
3) www.mobilepointview.com/mobile_payments/
Posted by Sasa, Hua, Jun, Ting at 12:55:00 pm 0 comments
Thursday, 26 June 2008
Electronic Currency
only electronically. Typically, this involves use of computer networks, the internet and digital stored value systems. One of the web services that provide the use of electronic currency as a transit payment system is PayLoadz.
PayLoadz has launches a new PayLoadz Express Service (http://express.payloadz.com), which is the biggest enhancement to its services since its launch in 2002. The new service provides a simple way for anyone, even inexperienced sellers, to begin selling products without a learning curve. Before the launch of PayLoadz Express service, anytime a person wanted to sell a file would have to register for a service, install complicated scripts or program their own solution. Now, with the new system, a person simply fills out a few fields, uploads his/her file and he/she is instantly selling her goods. The system relies on PayPal for payment processing and the standard PayLoadz service backend to handle the file delivery.
Posted by Sasa, Hua, Jun, Ting at 2:36:00 pm 0 comments
Wednesday, 25 June 2008
Credit card debts
So here goes: Your top 4 causes and preventions of debt!
1. Poor money management:
Most of us didn’t have a monthly spending plan which is essential. Without one we have no idea where our money is going.
Planning is no more difficult than writing down our daily expenses and income and reconciling the two in monthly basis, in order not to exceed the credit limits.
2. Financial illiteracy:
Many people don’t understand how money works and grows, how to save and invest for a rainy day or even why they should balance their checkbook caused them having credit card debts.
Nonetheless, you are responsible for your life and your money. Financial mistakes are increasingly expensive and complicated to resolve. Get educated and get in control!
3. No money communication skills:
This cause mostly refers to couple. Many people didn’t communicate with their spouses or children about financial planning. Some of them even found that their spouses have racked up thousands of dollars in a credit card debt and they had no knowledge about the existence of the card.
Consequently, it is important to communicate or discuss with your spouses and children about the financial goals and spending styles. Sometimes, you also may want to map out a strategy for you both to get what you want. Know what credit accounts you each have and promise each other to be honest about what each other spends.
4. Saving too little or not at all:
People in modern life have less saving especially for the users of credit card. They have no preparation for unexpected expenditures for instance: a job layoff or divorce which will cause immediate financial strain and increase debt.
To avoid unwanted debts, having saving for three to six months of living expenses is essential. No one has ever regretted having a savings pattern.
Look before you leap!! Good Luck!!
Posted by Sasa, Hua, Jun, Ting at 2:31:00 pm 0 comments
The application for pre-paid cash card for consumers
2. load Globe/Touch Mobile prepaid mobile phones. Your mobile phone number has to be linked/enrolled with your BPI Express Cash card.
3. inquire account balance, withdrawing cash, and for getting a mini statement .
Posted by Sasa, Hua, Jun, Ting at 1:55:00 pm 0 comments
Friday, 20 June 2008
How safe is our data?
Nowadays, we as internet users used to online everyday and expose more of our personal information on social networking Web sites and office workers upload more sensitive data to online software programs. However, there are vast cyber attacks which fall under several general categories: accidental actions and malicious attacks-computer viruses, denial of service attacks and distributed denial of service attacks. A third area of cyber vulnerability, online fraud, comprises issues such as identity theft and data theft.
Computer hackers are employing increasingly sophisticated methods to pry that information loose. In many cases, they're devising small attacks that can fly under the radar of traditional security software, while exploiting the trust users place in popular business and consumer Web sites.
A case from Florida: In January 2001, the entire municipality of Largo lost e-mail service for over a week when an unknown company based in Spain compromised its identity. The company hacked into the city’s e-mail relay system to steal the Largo.com identity. Soon enough, e-mail spam from Largo.com addresses flooded the net, and many Internet Service Providers blacklisted all incoming and outgoing electronic messages from the city.
Social networking sites (MySpace and Facebook) are favorite targets, as a successful compromise gives attackers access to a large number of people who are likely to trust the sites. These sites often expose confidential user information that can then be used in attempts to conduct identity theft or online fraud. Moreover, our newest technical fascinations—iPhones, Internet calling systems, and smart phones—all might present tempting targets in 2008.
So ladies and gentlemem, please be careful yo~
Table 1. Site-specific Vulnerabilities. Source: Symantec Corporation
During the last six months of 2007, 11,253 site-specific cross-site scripting vulnerabilities were documented, compared to 6,961 between February and June in the first half of the year.
Posted by Sasa, Hua, Jun, Ting at 12:27:00 pm 0 comments
Thursday, 19 June 2008
The application of 3rd party certification
There are various types of SSL Certificate Authority that are available in Malaysia. VeriSign is one of them which enable security of e-commerce, communications, and interactions for Web sites, intranets, and extranets.
Secure Sockets Layer (SSL) is the leading security protocol on the Internet. It is a protocol developed by Netscape for transmitting private documents via the internet. SSL is widely used to validate the identity of a Web site and to create an encrypted connection for sending credit card and other personal data.
Customers merely want to protect themselves. But how can they rely on SSL for assurance that they are doing business with valid organization and not an un-trusted third party?
To solve their problem, VeriSign have some sub-system program (Asset Layer Protected) to support the overall system work.
Customer Protection
A trusted provider provides an Easy-to-use authentication and transparent fraud detection to protect online transactions without slowing down the transactions.
Brand Protection
Domain names, Web sites, and digital logos present the company’s brand. Early detection and fast response to misuse preserves brand equity and helps stop counterfeiting.
Web Site Security
It gives consumers the confidence to transact online by displaying the green address bar in the latest high-security browser with Extended Validation SSL on the Web site.
Network Security
An authentication solution for the enterprise, Web applications, and e-mail combined with comprehensive network protection that helps reducing risk while meeting compliance requirements.
Expert Assistance and Intelligence
Security consulting and advanced intelligence reporting that help consumers assess analysis and update a layered approach to secure business assets.
Supply Chain Visibility
Provides convenience to large retailers and suppliers when they need to open networks to partners, affiliates, and customers to enhance services and speed operations while keeping confidential data secured.
VeriSign believes that by increasing trust, transaction can be increased. Thus, its mission is “Providing trust for the Internet and Electronic Commerce through our Digital Authentication services and products”
VeriSign security experts help balance risk, cost and users’ experiences to apply the most effective security approach to users’ unique business. By this, it can increase the consumers’ trusts. It secures over 750,000 Web servers worldwide, including 93% of the Fortune 500 and the world’s 40 largest banks.
Posted by Sasa, Hua, Jun, Ting at 9:44:00 pm 0 comments
Phishing - example and prevention methods
Phishing is an attempt to acquire sensitive information (such as usernames, passwords and credit card details) criminally and fraudulently, by masquerading as a trustworthy entity in an electronic communication. It is typically carried out by e-mail or instant messaging, and often directs users to enter details at a website, although phone contact has also been used.
What is the example?
One of the examples is identity theft which is becoming more popular, because of the readiness with which unsuspecting people often divulge personal information to phishers, including credit card numbers, social security numbers, and mothers' maiden names. Once this information is acquired, the phishers may use a person's details to create fake accounts in a victim's name. They can then ruin the victims' credit, or even deny the victims access to their own accounts.
What are the prevention methods?
There are several different techniques to combat phishing, in social as well as technology aspect.
Social aspect
Train people to recognize phishing attempts, and to deal with them. People can take steps to avoid phishing attempts by slightly modifying their browsing habits.
Technical aspect
Helping to identify legitimate sites
Some anti-phishing toolbars might display the domain name for the visited website. For example, some websites let users to type in their own labels for the particular websites, so that they can later recognize when they returned to the site. If the site is suspect, then the software may either warn the user or block the site outright.
Augmenting password logins
A method to prevent simple phishing of transaction numbers (TANs) is to associate each TAN with a "lock number". The bank's server sends the lock number as a challenge, and the user provides the corresponding TAN as the response. The server selects the key-lock pair randomly from the list to prevent acquiring two consecutive TANs. Lock numbers are not sequential, so that phishers can only guess correct lock numbers.
Eliminating phishing mail
Specialized spam filters can reduce the number of phishing e-mails that reach their addressees' inboxes. These approaches rely on machine learning and natural language processing approaches to classify phishing e-mails.
Monitoring and takedown
Several companies offer banks and other organizations likely to suffer from phishing scams round-the-clock services to monitor, analyze and assist in shutting down phishing websites. Individuals can contribute by reporting phishing to both volunteer and industry groups, such as PhishTalk.
1)http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916037,00.html
2)http://www.symantec.com/norton/security_response/phishing.jsp
Posted by Sasa, Hua, Jun, Ting at 9:34:00 pm 0 comments
How to safeguard our personal and financial data
Nowadays, online shopping has become a popular way to purchase goods which offers a convenience that is not available from any other shopping outlet. We can search for goods from various vendors, compare prices with a few simple mouse clicks and make purchases without waiting in line. However, the internet is also convenient for attackers to access the personal and financial information of unsuspecting shoppers. This information enables the attackers to commit numerous forms of fraud such as transfer all the money available in the victim’s account to their account, using the victim’s financial account to apply for loan, make purchase using victim’s financial account or even selling the information to someone else.
Therefore, as an intelligent online shopper, it is important to take steps to protect ourselves when shopping online. The following are some of the ways to keep us being protected against attacker:
Use and maintain anti-virus software, a firewall, and anti-spyware software
Install anti-virus software, firewall, and anti-spyware software in our computer to protect us against viruses and Trojan horses that may steal or modify the data on our computer. Use also legitimate anti-spyware program to scan computer and remove spyware or adware hidden in software program which may give attackers access to our data and make sure to keep our virus definitions up to date frequently.
Keep software, particularly web browser, up to date
Keep our web browser up to date on a regular basis. Many operating systems offer automatic updates. If this option is available, we should enable it.
Shop with companies that we know
Try not to make any transaction with those merchants that you are not familiar because some attackers may try to trick you by creating malicious web sites that appear to be legitimate. If you have to do so, you must make sure you are interacting with a reputable vendor, ask for a paper catalog or brochure to get a better idea of their merchandise and services, and determine the company’s refund and return policies before you place your order.
Check privacy policies
Before providing personal or financial information, check the websites privacy policy. Make sure you understand how your information will be stored and used.
Keep your password private
When you establish a password, try to be creative such as using a combination of letters, numbers and even symbols. Avoid using a telephone number, identity card number, birth date or numbers that someone could easily guess.
Make sure your information is being encrypted
Indications that your information will be encrypted include a URL that begins with “https:” instead of “http:” and a lock in the bottom right corner of the window.
Be wary of emails requesting information
Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information. Legitimate business will not send this type of information through email.
Posted by Sasa, Hua, Jun, Ting at 3:18:00 pm 0 comments
Friday, 13 June 2008
Discuss how E-commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support.
Cycle time is the time period from the beginning to the end of the business process, as defined by the seller and the buyer. Traditionally, producer will sell their goods through intermediaries such as wholesaler and retailer before the goods were transferred to the customer. This process will specifically increase the cost of the goods when arriving in the customer’s hand. With the introduction of E-Commerce, customer can directly purchase goods from the manufacturer by just one click on the mouse. It is more efficient, convenient, reduce cost and time for both the buyer and seller.
Besides that, with the presence of intranet, employees are able to access to company’s database and able to alert whatever information about upcoming events or company’s certain decision that had been made. Employees may also deal directly with the complaints that had been made by customers, answering customers’ request and take action to solve their problems. Employees’ empowerment can be improved by giving more flexibility to the employees to access to the information and make decision.
Furthermore, E-commerce may allow customers to get relevant and detailed information that they needed about certain product in seconds. E-Commerce enables customers to shop or do other transaction 24 hours a day, all year round and from almost any location they are.
Posted by Sasa, Hua, Jun, Ting at 10:18:00 am 0 comments
Kozmo.com
An example of an E-commerce failure and its causes~
“You could order anything from snacks to movies at any time and have them delivered direct to your door within 1 hour with no delivery charge!”
This was a great idea that founded by young investment bankers, Joseph Part and Yong Kang in March 1998 in New York City. Kozmo.com was a venture-capital-driven online company that promised free one-hour delivery of anything from DVD rentals to Starbucks Coffee in the United States.
Kozmo promoted an incredible business model; it promised to deliver small good free of charge, typically by using bicycle messengers. The idea was great but ultimately a little too good to be true. One of the basic problems with its business model was offering a costly home-delivery service for free, even on very small orders on which it was impossible to turn a profit.
Moreover, Kozmo’s greatest error with their customers occurred when they stopped catering to their main client base of middle class college-students. This was done so that they could target more upscale client who would order expensive products. This was a misguided decision making because the college student customer is made up 76% of its business.
A simple idea turns into a multi-million dollar company in a few years. Kozmo.com’s aura helped it raises more than $250 million, but the company was unable to generate enough revenue to cover costs. In 1999, it had $3.5million in revenue, compared $26.4 million in net losses.
Not surprisingly, the company failed soon after the collapse of the dot-com bubble, laying off its staff of 1,100 employee and shutting down in April 2001.
Posted by Sasa, Hua, Jun, Ting at 12:37:00 am 0 comments
AMaZon.com
An example of an E-commerce success and its causes~
Amazon.com Inc is recognized as one of the most popular and successful e-commerce company.
The keys success are lowering price, offering convenience, expanding selection, increasing availability and its strong focus on customer experience which is infused throughout all levels of the company and includes all aspect of the buying process. It is famous among online shoppers with its good-quality search function, understands customer profiling without invading customer privacy, and remembers your shopping cart even you left for several months compare with other online retailers.
It also gives you options that most online retailers can only dream of, such as the ability to group your items into as few shipments as possible. Amazon.com has grown its business in many ways to increase its revenue such as it has managed to build a retail business with a negative operating cash flow cycle which enable the working capital effectively become a source of investment cash for the company, the Marketplace of third party sellers created by Amazon enable Amazon receives a commission on products sold, new product categories, and other businesses.
Unlike eBay/Paypal, Amazon sellers do not have to maintain separate payment accounts - all payments and payment security are handled by Amazon itself. Customers are more confidence and trust them. According to a Compete.com survey, Amazon attracts approximately 50 million U.S. consumers to its website on a monthly basis.
Posted by Sasa, Hua, Jun, Ting at 12:29:00 am 0 comments
Thursday, 12 June 2008
History and Evolution of E-commerce
Posted by Sasa, Hua, Jun, Ting at 11:22:00 pm 0 comments
Tuesday, 3 June 2008
~Self-descriptions~
Ai Ting
Let me introduce myself. My name is Ai Ting, an undergraduate accounting student of University Tunku Abdul Rahman (UTAR) FAM, year 3 semester 1, and I am from group 4. This is my first time posting a blog entry just because this is an assignment, strangely enough for me. Since the life is short, everything must get a try.
I believe nowadays everyone knows about what is internet, so am I. The top 5 websites and internet activities that I frequently visited are:
Google – I always use the Google search engine to search for information for my assignment.
Friendster – I can get know new friends.
Xunlei – this is the website which has the latest movie, drama, and song for users to download. This is also my favourite website because one of my hobbies is watching movie, especially animation type.
Yahoo and Hotmail – I can check and forward mail through this website.
SinChew daily – this website lets me get to know all the news in our country without going through physical newspaper.
Despite having internet activities, I enjoy my hobbies during leisure time too. I like reading novel, watching movie especially animation type and listening to music. Oh ya, I enjoy watching movie at cinema too..since the atmosphere and sound equipment at cinema are quite good.
Here ends my short description. Want to know more about me? Let’s read through our blog!
I am Hui Jun, a simple yet an ordinary girl. Since “Jun” means the 6th month in our calendar year, therefore many think that I am born in June, but in fact I am born in September, the month which I prefer most. (^0^)
I like cooking, sewing, reading travelling, and sleeping. Cooking improves my creativity when preparing meals, while sewing and reading are the hobbies that I used to do especially during long break of our studies. Travelling enables me to experience amorous feelings of different nations. Lastly, sleeping is “unavoidable” since everyone should take a good rest before continue to a long life journey. Don’t you agree?
I always stay online all the day, although sometimes I might be away. It can help me staying connect with someone I love despite physical distance during weekdays. I like chit chatting via skype and msn, listening music, reading some meaningful articles, downloading dramas and the most importantly, I can update my Friendster blogs.
Therefore, from my preferences, the top 5 websites that I visited the most are:
www.friendster.com , where I can update my blogs
www.yahoo.com , where I can search for some useful information for assignments
www.gougou.com , where I can download some dramas
www.readnovel.com , where I can read some novels
www.chinapress.com , where I get to updated about local as well as global news
Pek Hua
I was born in KK, not Kota Kinabalu but is Kuala Kangsar(Perak). However, I was shifted and staying in KL now, so don't date me in KK ya. =P. Few days later I will become an adult. Although going to be getting metal key, but still behave like a small kid and with a childish mind (sometime when necessary) =P. There’s always an urge, telling me to change, unnecessary a change physically but a change mentally. Can’t always stay in comfort zone, right?
I like watching TV, reading whodunit and science fiction during sem break, sleeping and traveling but unfortunately at this moment I might not be able to travel a lot because of financial problem.
I seldom online but still have some favourite websites to surf, such as:
http://www.yahoo.com/ as it can help me find information and check mails.
http://www.friendster.com/ broaden my sociality
http://www.baidu.com/ enable me download my favourite songs
http://www.google.com/ as search engine which helps me finds information that I needed to do assignments, DIY presents and etc.
chinese.cari.com.my where I can read some forums.Moreover, I also like chatting with friends, listening music, checking mails, downloading music, reading novels and other’s blogs, and playing online games through internet.
That’s me. I am Pek Hua.
Melissa
I’m Melissa, an independent girl coming far away from KK, Sabah. Sometimes, my friends will ask me that whether Sabahan is still staying up on the tree. It sounds really weird and ridiculous. So, please come to visit Sabah and you will know that whether we are still staying up on the tree or not..haha :p
When I’m free, I like to watch TV (especially Hong Kong TVB drama), listening to music, chit chatting with friends, shopping…etc
The top 5 websites that I used to visit the most are:
http://www.friendster.com/ - where I can stay connect with my new friends and old classmates.
http://www.hotmail.com/ - where I can check my mail box.
http://www.sogou.com/ - where I can download latest music.
http://www.google.com/ – where I can find information for assignments.
http://www.airasia.com/ – where I can check cheap air tickets to back to my hometown.
Posted by Sasa, Hua, Jun, Ting at 9:55:00 pm 0 comments