Monday, March 22, 2010

The Internet And The Cyber World Of Marketing














The Intenet Is So Much Like The Real World

In the real world,
we can go skating, camping, fishing, bowling, sky diving, olympic racing, ball sports competitions, water sporting, bike riding, flying, swimming, poker tournaments, own our own businesses, sculpturing, play a musical instrument in front of a crowd, and dancing. Well, the Internet in a way is similar, except, we cannot do all the things on the Internet that we can do in the real world, but the Internet can be used to order, make reservations, do art, create music, play virtual sports, games, and even communicate with. However, there are threats and threats made by thieves and dishonest people even in the cyber world. The Internet can ruin someone's life. Let's say somebody wants to go fishing. It's very fun thing to do when you go camping and to the lake, but not when you go on the Internet, which is then called "phishing."

2 Places To Go Fishing:

There are 2 places to go fishing, out to a body of water such as a lake or pond, and the other place is at the computer at which one will access the Internet. Well, your question is, "how can anybody go fishing at a computer?" However, the 2ND option conveys a similar meaning, but only with a different spelling, "phishing." The two are similar in that the people who do it know that you must take some bait along with you in order to do it. When you are out to sham people after coming in physical contact with them it's called scam artist, or scheming although the words are also used to describe illegal action initiated by online entities. I was on a program called Yahoo Internet message chat room, and I heard a guy boasting about his knowledge of stealing information and credit cards. I couldn't believe that someone would brag about such knowledge. A common online phishing scam starts with an e-mail message that looks like an official notice from a trusted source, such as a bank, credit card company, or reputable online merchant. In the e-mail message, recipients are directed to a fraudulent website where they are asked to provide personal information, such as an account number or password. This information is then typically used for identity theft. That must have been what he was bragging about. There are 2 types of phishing sites, smart ones, and dumb ones. The smart ones know that advertising a product to a person who has no possible use for it is likely to ditch the pop-up into their "spam" folder, therefore, they will look for other history records or info of past products that you ordered online in order to advertise better services and deals of that product in your odering history, and will afterwards send you a fake message requesting a verification of info on a past order. These are the smart phishers. The dumb phishers will not do any research. They won't know about any of your past purchases, or what you have in your shopping list, or wish list. They don't know much about .XML, RSS feeds, .SHTML
or useful programs for coding.

Before I Pay For Internet Access:

I want to be sure that the person who provides me Internet access has some type of training or knowledge about the functioning of security protection and latest technology used to parry threats to my security. ATT claims to have sufficient security measures, but I'm not too sure about AOL, FireFox, Mozilla, Sprint, Earth Link, MSN.
Who will my service provider be? ATT, Com cast, Southwestern Bell, Yahoo? Family Video (network provider), or other companies via their network? And whoever I pay for Internet service, will they ensure me at least a percentage of security when I access the Internet. Whether you know it or not, Internet Explorer cannot tell if a website owner is trustworthy. Try to use sites you've used previously or that are recommended by trusted friends or family. It doesn't matter whose network you're connected to, it all depends on the sites you visit and links you click, or what you download. Look at it this way. If you are living in somebody's home, and you invite your friend over to come see you, the people whose house you stay in may not know who the person is, and may not even like the person you are inviting over. Think about fake sites and malicious software the same way when you are connected to a network for file sharing.

The business world is changing Rapidly:

The business world is changing rapidly. Everything is done online such as job applications, grocery lists for online shopping, movie tickets for theatre reservation, including restaurant and hotel reservations, online travel tickets, and hundreds more. Not only is the business world changing in the way that business is done, but because of the money that businesses want to save when it comes to infrastructure, downsizing, product enhancement, and affiliation with local/non-local business, the company budget, distribution which can be done a lot faster if services were brought to a minimal decreasing the costs or expenses. All these factors have virtually forced business owners to go via Internet. Therefore, advertisement is done via Internet.

Advertisement:

Is all advertisement considered spam? Well, like anything else, you have your good, and you have your bad. Not all advertising is spam, not all pop-ups are bad, and not all files offer on some sites for downloading are all bugs or viruses. The problem is that we don't know which ones are and which ones are not. It's like buying from off the streets in contrast to buying from the store. Which are you accustomed to doing? Have you ever bought anything off of the streets? Did you regret it? Will you buy a used car? What about somebody Else's dog? If your answer is no, you would not buy a dog from someone because you don't want to have to clean up behind the pet, then your answer should be the same when it comes to buying something that is either used, or sold off the streets. Chances are, you will have to clean up behind someone Else's problems or whatever. That's why smart consumers understand the importance of appearance and location of the marketer. Somebody on the streets isn't a good market for me to do business with. That's why smart consumers understand the importance of network shopping. You get the info on the best deals on a product, where that product is sold, and the time left to go purchase it. Also, you network with other shoppers who know the best times and places to go for the best deals. Borrowing from wikipedia, I've added a little block of highlighted information on the types of advertisement. If you prefer to go to the direct source, you can just click on double-bracketed area, I borrowed from wikipedia as a reference.
the following link: Network And Marketing:

In a world of marketing, we often rely on another party to help us with what we are doing, and often they rely on someone else to help them with services on your behalf. This is the entrepreneurial world. It's called business. It's one thing to have to make sure the mutual business relationship is kept between the 2 interacting parties, but what happens when a 3rd party is involved in the service provision area? The 3rd party is the reason provisions and adjustments are constantly changed in a policy due to the 3rd party's demands. Now the 2 parties have to consent and agree a 2ND, or even a 3rd time. I understand the importance of a typed or written policy when offer services or doing business, but the writer of that policy has the right to make changes at anytime. There should be another provision in the policy that saids that your date of signing or ordering before the policy adjustments does not affect your services since it was done before the policy adjustments.

Technology

Is Technology Reliable?:


Is shopping online safe? Can we really rely on the latest security technology to protect our identity from being exposed to the wrong person who is actually a "fisher," and not a legitimate company? I've watched a report on the media oneday about a man who was selling credit card info and personal information to potential buyers via the Internet. That problem originated with the shopping people did online. Spammers, fishers, Trojans, viruses, were all spread by people who conned and tempted other people to submit person information via false advertisement and counterfeit pages made to look like the legitimate company's pages. And after people submitted their confidential info on these fake forms, then the fishers got all they needed to do whatever they wanted. As far as banking charges on account cards do to fraudulent charges, the provision in the advertiser's policy provides a remedy for such charges.

Fraud:

It is determined that under the Fair Credit Billing Act, your bank cannot hold you liable for more than $50.00 of fraudulent charges. If your bank does hold you liable for any of this $50.00, we will cover the entire liability for you, up to the full $50.00. We will only cover this liability if the unauthorized use of your credit card resulted through no fault of your own from purchases made while using the secure server.

How Could I Have Known - My Child Stole My Credit Card?

Their privacy policy states that they, at all times, reserve the right to disclose any information, including personal identifiable information, to comply with any applicable law, regulation, legal process or governmental request; If you for example sign a printed form or electronic form via Internet, you are giving them your consent to the collection (all whoever will be collecting your money and info), use (all whomever will be using your info and for what purpose), and disclosure (to whomever your personal information will be shared with or whose file records it will be submitted to). There is a section in every policy statement, or should be, a provision stating the possible accidental disclosure of confidentiality due to the impermissible act of a minor. This is a hypothetical, yet potential problem for people with kids who have access to a computer, the Internet, whether in school or at home, and they get an advertisement on the pop-up screen with a dubious offer. They may enter their parent's name, phone number, place of birth, and credit card info if the child goes into his/her mom's purse. In the rare instance that the parent finds out about this, the parent is instructed to contact the company via e-mail. but what happens once the info is received? it's not known who have already gained access to the parent's info after the company received it, and who it is shared with whether intentionally, or unintentionally.

I Can Disable Cookies, But With Results:

Supposedly, the companies who advertise and offer services via the Internet claim to have access to the latest technology known as SSL (secure sockets layer), The function of this technical server is to deliver all web pages encrypted, or "shielded" so that the confidentiality of information entered on page forms on the Internet cannot be read by 3rd parties. In the past, people were skeptical about their browser using cookies to store info about sites they've visited. You can disable cookies, but it is said that cookies do not expose your personal into to anybody. And I can almost accept this statement, because, often times when I fill out electronic forms on web pages, and I accidentally hit the back button, then when I hit the forward button my info that I typed into the form is no longer visible. The question is, did the info on the form get sent to the unencrypted page of the so-called advertiser I was submitting my info to, or did my personal info all together get acc identally deleted? If I disable cookies, then some features of these pages might not work, and then the web uses what is called "gifs. ' Clear gifs are tiny graphics with a unique identifier, similar in function to cookies, and are used to track the online movements of Web users. Clear gifs are not tied to users' personally identifiable information. In view of all this, I have some bad news for you.

The Bad News:

Just because the website has a valid certificate, that does not ensure the confidentiality of your info, nor does it ensure that the site itself is safe. Then, what in the world do I need to do now? You mean to tell me that a valid certificate isn't good enough? That makes me want to avoid shopping online for anything again. I'll just do everything the old fashioned way. The secure (encrypted) connection is not a guarantee that it is safe to use. A secure connection only assures you of the identity of the website, based on the information provided by the certifying organization. You should only consider giving personal information to a website that you know and trust the site.

The World Is Not Safe, But It's Safer With Measures Taken:
Have you ever been scammed, been a victim of false advertisement, cheated (short-changed), or was sold a lemon? All these things and more come in a different form on the Internet. Those things still exist, but only throughout scam artists, phishing sites, and malicious software. I don't know how well the Microsoft Windows Malicious Software Removal Tool from the Microsoft website, which checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for malicious software infections works, but this along with the security tools that came with your Windows or Macintosh system can be used to combat the latest online threats. There is a problem with toolbars. Toolbars are installed on a browser only after a person agrees to the policy statement to download the toolbar, and then once downloaded, the toolbar is activated by active x controls through which a 3rd party may be able to access your computer's info. This info may lead to the info required for access in order to control your computer remotely. "Signed" active x controls are an agreement between the software provider company or person, and the Internet protective entity that the active x will not be used to illegally harm or use personal info obtained from its users. The problem even with signed active x controls is that they become outdated, and can also malfunction if not updated properly.

Justice:
How will justice be served? Is there an end for crooks, schemers, and false entities who are out to steal? Have you heard of Dante's Inferno? There is a place for all the liars, politicians, schemers, and so forth. Check out the video series below:

The reshaping of the entrepreneurial world is the next subject I recommend that you do research on and study. For outside sources, please consult the video and book references below.
Videos & Podcasts

Internet Marketing:

The Value of Pay Per Click Advertising Interview with Lee Odden, AllBusiness.com's Internet marketing advisor.
What Are the Advantages of Backing a Company That Spins Off Other Companies? David Ahlers, a former Cornell University professor of entrepreneurship, discusses the advantages of backing a company that spins off other companies.
Biotech Venture Capital Funding Bryan Pearce, a principal in the technology and life sciences practice at Ernest & Young, gives an overview of venture capital funding within biotechnology.

The Entrepreneurial Imperative:

How America's Economic Miracle ... The Entrepreneurial Imperative: How America's Economic Miracle Will Reshape the World (and Change Your Life)
http://www.heritage.org/press/events/ev112706a.cfm - 33k - Similar pages
Flipkart.com: The Entrepreneurial Imperative: Carl J. Schramm ... Details of Book: The Entrepreneurial Imperative: How America's Economic Miracle
Oxford University Press: The Entrepreneurial Society: David B ... "The Entrepreneurial Society is a guided tour of economic opportunity by a ...
again, if we fail to recognize the world is reshaping itself to compete on
How philanthrocapitalists are reshaping the world of charity - By ...
Nov 30, 2009 ... How philanthrocapitalists are reshaping the world of charity.
Audio Clip
Technology management for reshaping the world Management of Engineering and Technology, 2003. PICMET '03. Technology Management for Reshaping the World. Portland International Conference on

For comments or questions, please contact me in any of the 3 methods:
If you have yahoo messenger, my alliance is songwriterforartists
e-mail: songwriterforartists@yahoo.com
e-mail: gotcleanbody@yahoo.com

The Internet Is The Real World




The Intenet Is So Much Like The Real World

In the real world, we can go skating, camping, fishing, bowling, sky diving, olympic racing, ball sports competitions, water sporting, bike riding, flying, swimming, poker tournaments, own our own businesses, sculpturing, play a musical instrument in front of a crowd, and dancing. Well, the internet in a way is similar, except, we cannot do all the things on the internet that we can do in the real world, but the internet can be used to order, make reservations, do art, create music, play virtual sports, games, and even communicate with. However, there are threats and threats made by thieves and dishonest people even in the cyber world. The internet can ruin someone's life. Let's say somebody wants to go fishing. It's very fun thing to do when you go camping and to the lake, but not when you go on the internet, which is then called "phishing."

2 Places To Go Fishing:

There are 2 places to go fishing, out to a body of water such as a lake or pond, and the other place is at the computer at which one will access the internet. Well, your question is, "how can anybody go fishing at a computer?" However, the 2nd option conveys a similar meaning, but only with a different spelling, "phishing." The two are similar in that the people who do it know that you must take some bait along with you in order to do it. When you are out to sham people after coming in physical contact with them it's called scam artist, or scheming although the words are also used to describe illegal action initiated by online entities. I was on a program called Yahoo internet message chat room, and I heard a guy boasting about his knowledge of stealing information and credit cards. I couldn't believe that someone would brag about such knowledge. A common online phishing scam starts with an e-mail message that looks like an official notice from a trusted source, such as a bank, credit card company, or reputable online merchant. In the e-mail message, recipients are directed to a fraudulent website where they are asked to provide personal information, such as an account number or password. This information is then typically used for identity theft. That must have been what he was bragging about. There are 2 types of phishing sites, smart ones, and dumb ones. The smart ones know that advertising a product to a person who has no possible use for it is likely to ditch the pop-up into their "spam" folder, therefore, they will look for other history records or info of past products that you ordered online in order to advertise better services and deals of that product in your odering history, and will afterwards send you a fake message requesting a verification of info on a past oder. These are the smart phishers. The dumb phishers will not do any research. They won't know about any of your past purchases, or what you have in your shopping list, or wish list. They don't know much about .XML, RSS feeds, .SHTML
or useful programs for coding.

Before I Pay For Internet Access:

I want to be sure that the person who provides me internet access has some type of training or knowledge about the functioning of security protection and latest technology used to parry threats to my security. ATT claims to have sufficient security measures, but I'm not too sure about AOL, Firefox, mozilla, Sprint, EarthLink, MSN.
Who will my service provider be? ATT, Comcast, Southwestern Bell, Yahoo? Family Video (network provider), or other companies via their network? And whoever I pay for internet service, will they ensure me at least a percentage of secuirty when I access the internet. Whether you know it or not, Internet Explorer cannot tell if a website owner is trustworthy. Try to use sites you've used previously or that are recommended by trusted friends or family. It doesn't matter whose network you're connected to, it all depends on the sites you visit and llinks you click, or what you download. Look at it this way. If you are living in somebody's home, and you invite your friend over to come see you, the people whose house you stay in may not know who the person is, and may not even like the person you are iviting over. Think about fake sites and malicious software the same way when you are connected to a network for file sharing.
The business world is changing Rapidly:
The business world is changing rapidly. Everything is done online such as job applications, grocery lists for online shopping, movie tickets for theatre reservation, including restaurant and hotel reservations, online travel tickets, and hundreds more. Not only is the business world changing in the way that business is done, but because of the money that businesses want to save when it comes to infastructure, down-sizing, product enhancement, and affiliation with local/non-local business, the company budget, distribution which can be done a lot faster if services were brought to a minimul decreasing the costs or expenses. All these factors have virtually forced business owners to go via internet. Therefore, advertisement is done via internet.

Advertisement:

Is all advertisement considered spam? Well, like anything else, you have your good, and you have your bad. Not all advertising is spam, not all pop-ups are bad, and not all files offer on some sites for downloading are all bugs or viruses. The problem is that we don't know which ones are and which ones are not. It's like buying from off the streets in contrast to buying from the store. Which are you accustomed to doing? Have you ever bought anything off of the streets? Did you regret it? Will you buy a used car? What about somebody else's dog? If your answer is no, you would not buy a dog from someone because you don't want to have to clean up behind the pet, then your answer should be the same when it comes to buying something that is either used, or sold off the streets. Chances are, you will have to clean up behind someone else's problems or whatever. That's why smart consumers understand the importance of appearance and location of the marketer. Somebody on the streets isn't a good market for me to do business with. That's why smart consumers understand the importance of network shopping. You get the info on the best deals on a product, where that product is sold, and the time left to go purchase it. Also, you network with other shoppers who know the best times and places to go for the best deals. Borrowing from wikipedia, I've added a little block of highlighted information on the types of advertisement. If you prefer to go to the direct source, you can just click on the following link: http://en.wikipedia.org/wiki/Advertisers
[[Types of advertising
A DBAG Class 101 with UNICEF ads at Ingolstadt main railway station
Virtually any medium can be used for advertising. Commercial advertising media can include wall paintings, billboards, street furniture components, printed flyers and rack cards, radio, cinema and television adverts, web banners, mobile telephone screens, shopping carts, web popups, skywriting, bus stop benches, human billboards, magazines, newspapers, town criers, sides of buses, banners attached to or sides of airplanes ("logojets"), in-flight advertisements on seatback tray tables or overhead storage bins, taxicab doors, roof mounts and passenger screens, musical stage shows, subway platforms and trains, elastic bands on disposable diapers,doors of bathroom stalls,stickers on apples in supermarkets, shopping cart handles (grabertising), the opening section of streaming audio and video, posters, and the backs of event tickets and supermarket receipts. Any place an "identified" sponsor pays to deliver their message through a medium is advertising.]] What you see between the double-bracketed area, I borrowed from wikipedia as a reference.

Network And Marketing:

In a world of marketing, we often rely on another party to help us with what we are doing, and often they rely on someone else to help them with services on your behalf. This is the entreprenuerial world. It's called business. It's one thing to have to make sure the mutual business relationship is kept between the 2 interacting parties, but what happens when a 3rd party is involved in the service provision area? The 3rd party is the reason provisions and adjustments are constantly changed in a policy due to the 3rd party's demands. Now the 2 parties have to consent and agree a 2nd, or even a 3rd time. I understand the importance of a typed or written policy when offer services or doing business, but they writer of that policy has the right to make chages at anytime. There should be another provision in the policy that saids that your date of signing or ordering before the policy adjustments does not affect your services since it was done before the policy adjustments.

Technology

Is Technology Reliable?:

Is shopping online safe? Can we really rely on the latest security technology to protect our identity from being exposed to the wrong person who is actually a "fisher," and not a legitimate company? I've watched a report on the media oneday about a man who was selling credit card info and personal information to potential buyers via the internet. That problem originated with the shopping people did online. Spammers, fishers, trojans, viruses, were all spread by people who cunned and tempted other people to submit person information via false advertisement and counterfeit pages made to look like the legitimate company's pages. And after people submitted their confidential info on these fake forms, then the fishers got all they needed to do whatever they wanted. As far as banking charges on account cards do to fraudulent charges, the provision in the advertiser's policy provides a remedy for such charges.
Fraud:
It is determined that under the Fair Credit Billing Act, your bank cannot hold you liable for more than $50.00 of fraudulent charges. If your bank does hold you liable for any of this $50.00, we will cover the entire liability for you, up to the full $50.00. We will only cover this liability if the unauthorized use of your credit card resulted through no fault of your own from purchases made while using the secure server.
How Could I Have Known - My Child Stole My Credit Card?
Their prvacy policy states that they, at all times, reserve the right to disclose any information, including personally identifiable information, to comply with any applicable law, regulation, legal process or governmental request; If you for example sign a printed form or electronic form via internet, you are giving them your consent to the collection (alll whoever will be collecting your money and info), use (all whomever will be using your info and for what purpose), and disclosure (to whomever your personal information will be shared with or whose file records it will be submitted to). There is a section in every policy statement, or should be, a provision stating the possible accidental disclosure of confidentiality due to the unpermissable act of a minor. This is a hypothetical, yet potential problem for people with kids who have access to a computer, the internet, whether in school or at home, and they get an advertisement on the pop-up screen with a dubious offer. They may enter their parent's name, phone number, place of birth, and credit card info if the child goes into his/her mom's purse. In the rare instance that the parent finds out about this, the parent is instructed to contact the company via e-mail. but what happens once the info is received? it's not known who have already gained access to the parent's info after the company received it, and who it is shared with whether intentionally, or unintentionally.
I Can Disable Cookies, But With Results:
Supposedly, the companies who advertise and offer services via the internet claim to have access to the latest technology known as SSL (secure sockets layer), The funtion of this technical server is to delliver all webpages encrypted, or "shielded" so that the confidentiality of information entered on page forms on the internet cannot be read by 3rd parties. In the past, people were skepticle about their browser using cookies to store info about sites they've visted. You can disable cookies, but it is said that cookies do not expose your personal into to anybody. And I can almost accept this statement, because, often times when I fill out electronic forms on webpages, and I accidentally hit the back button, then when I hit the forward button my info that I typed into the form is no longer visible. The question is, did the info on the form get sent to the unencrypted page of the so-called advertiser I was submitting my info to, or did my personal info all together get acc identally deleted? If I disable cookies, then some features of these pages might not work, and then the web uses what is called "gifs. ' Clear gifs are tiny graphics with a unique identifier, similar in function to cookies, and are used to track the online movements of Web users. Clear gifs are not tied to users' personally identifiable information. In view of all this, I have some bad news for you.
The Bad News:
Just because the website has a valid certificate, that does not ensure the confidentiality of your info, nor does it ensure that the site itself is safe. Then, what in the world do I need to do now? You mean to tell me that a valid certificate isn't good enough? That makes me want to avoid shoppiing online for anything again. I'll just do everything the oldfashioned way. The secure (encrypted) connection is not a guarantee that it is safe to use. A secure connection only assures you of the identity of the website, based on the information provided by the certifying organization. You should only consider giving personal information to a website that you know and trust the site.
The World Is Not Safe, But It's Safer With Measures Taken:
Have you ever been scammed, been a victim of false advertisement, cheated (short-changed), or was sold a lemon? All these things and more come in a different form on the internet. Those things still exist, but only throught scam artists, phishing sites, and maicious software. I don't know how well the Microsoft Windows Malicious Software Removal Tool from the Microsoft website, which checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for malicious software infections works, but this along with the security tools that came with your Windows or Macintosh system can be used to combat the latest online threats. There is a problem with toolbars. Toolbars are installed on a browser only after a person agrees to the policy statement to download the toolbar, and then once downloaded, the toolbar is activated by active x controls through which a 3rd party may be able to access your computer's info. This info may lead to the info required for access in order to control your computer remotely. "Signed" active x controls are an agreement between the software provider company or person, and the internet protective entity that the active x will not be used to illegally harm or use personal info obtained from its users. The problem even with signed active x controls is that they become outdated, and can also malfuntion if not updated properly.

Justice:
How will justice be served? Is there an end for crooks, schemers, and false entities who are out to steal? Have you heard of Dante's Inferno? There is a place for all the liars, politicians, schemers, and soforth. Check out the video series below:

The reshaping of the entrepreneurial world is the next subject I recommend that you do research on and study. For outside sources, please consult the video and book references below.
Videos & Podcasts
Internet Marketing: The Value of Pay Per Click Advertising Interview with Lee Odden, AllBusiness.com's Internet marketing advisor.
What Are the Advantages of Backing a Company That Spins Off Other Companies? David Ahlers, a former Cornell University professor of entrepreneurship, discusses the advantages of backing a company that spins off other companies.
Biotech Venture Capital Funding Bryan Pearce, a principal in the technology and life sciences practice at Ernest & Young, gives an overview of venture capital funding within biotechnology.

The Entrepreneurial Imperative: How America's Economic Miracle ... The Entrepreneurial Imperative: How America's Economic Miracle Will Reshape the World (and Change Your Life)
http://www.heritage.org/press/events/ev112706a.cfm - 33k - Similar pages
Flipkart.com: The Entrepreneurial Imperative: Carl J. Schramm ... Details of Book: The Entrepreneurial Imperative: How America's Economic Miracle
Oxford University Press: The Entrepreneurial Society: David B ... "The Entrepreneurial Society is a guided tour of economic opportunity by a ...
again, if we fail to recognize the world is reshaping itself to compete on
How philanthrocapitalists are reshaping the world of charity - By ...
Nov 30, 2009 ... How philanthrocapitalists are reshaping the world of charity.
Audio Clip
Technology management for reshaping the world Management of Engineering and Technology, 2003. PICMET '03. Technology Management for Reshaping the World. Portland International Conference on
For comments or questions, please contact me in any of the 3 methods:
If you have yahoo messenger, my alliance is songwriterforartists
e-mail: songwriterforartists@yahoo.com
e-mail: gotcleanbody@yahoo.com