Sunday, March 15, 2009
Week 6 - A review on a post on Legal from my E-commerce blog
The life is getting advanced nowadays. Kids today are not the same compare to old times. During our times, we play basketball and others outdoor games around our housing areas. These are healthy game only we have on that time. Technology is advanced everyday, even a 10 years old kid can own a handphone today. Too much attractiveness in our life now, many irresponsible businessmen do not care about the society, but their business. Kids are innocent, and their mind still young and not mature. They easily fall into the trap of entertainment business. One of the concerns is cyber café.
Cyber café increasingly become a place hanging out by kids. Cyber café should be a place let people to obtain information from the internet or use computer software. Without a good control on the operation of cyber cafes, these cyber cafes have become a playground for the kids. These kids are playing computer games most of the times in cyber cafes. They are so innocent that they do not know that they are used by these businesses to gain money. Most seriously, kids are easily trapped in the fun of playing game and can not control themselves. Finally, they skip class or do not attend school, but hanging out in the cyber cafes. This will affect the academic result and progress of their study.
Besides, these kids have become the target of crime, they are involved in gambling, selling pirated vcd and others crime. To avoid these happening, their parents and guardians should watch closely to theirs kids. With the tighten of law, society and businesses are advised to work closely with police when discover kids involved in crime.
Saturday, February 21, 2009
Week 6 - Coporate Blogging: A New Marketing Communication Tool For Companies
According to research of NewPR Wiki, there was 58 (11.6%) of the Fortune 500 were blogging as of 17/5/2008. One of the successful blogs is Amazon Web Services Blog by Amazon.com that includes Amazon web services, products, tools and developer information. The results shows that by adopting this new communication tool, it can help to improve the communication and its customer services, attract more people to consume and discuss new products online.
Another benefits that corporate blogging is the convenient of information gathering because all the posts and comments can be reach easily by employees due to centralized hosting and generally structured conversation threads. The information might be the important feedback from customer that is valuable for all the company in term to meet the customer satisfactory. Lastly the cheap cost of corporate blogging is another aspect that a company valued and in return with such benefits.
Thursday, February 19, 2009
Week 6 - e-government in Malaysia: it is implementation so far and citizen’s adoption strategies
Government should take measure of enhancing affordability of ICT components that are needed for absorbing the benefits of egovernment services by poor people. This may include an appropriate policy measure needed to lower the cost of hardware and all online access tools like PCs, laptops, mobile phones and other digital devices associated with e-government applications.
In addition, government should improve the network and provide better electricity in underserved areas. This is critical to achieving e-government goals in rural areas of the country. Government should encourage more commercial expansion to rural areas and corporate responsibility among ICT service providers. However,
Government should be cautioned of grant-making framework brought by many ICT service providers as they would like to expand their markets, with a primary aim of self-serving that is not necessary aligned with community needs.
Week 6 - Things to take note to prevent e-auction fraud when a consumer participating in an e-auction
1. User identity verification such in IC number, driver’s license number or date of birth. For example, verified eBay user, the voluntary program, encourages users to supply eBay with information for online verification. By offering their Social Security number, driver’s license number, and date of birth, users can qualify for the highest level of verification on eBay.
2. Authentication service. It is to determine whether an item is genuine and described appropriately. It difficult to perform because their training and experience, experts can detect counterfeits based on subtle detail.
3. Grading services which is a way to determine the physical condition of an item, such as ‘poor quality’ or ‘mint condition’. Different item have different grading systems. For eg, trading cards are graded from A1 to F1, whereas coins are graded from poor to perfect uncirculated.
4. Feedback forum. It allows buyers and sellers to build up their online trading reputations. It provides user with ability to comment on their experiences with other.
5. Insurance policy. eBay offers insurance underwritten by Lloyd's of London. Users are covered up to $ 200, with a $25 deductible. The program is provided at no cost to eBay users. Supplementary insurance is available from companies such as AuctionInsurance.com. At other auction sites, such as Amazon.com/ auction, some insurance is provided, but extra insurance may be added.
6. Escrow services. Both buyers and sellers in a deal are protected with an independent third party. Buyer mails the payment to escrow services which verifies the payment and alerts the seller when everything checks out. An example of a provider of online escrow services s i-Escrow.
7. Non-payment punishment. To protect sellers, a friendly warning for first-time nonpayment. A sterner warning is for second-time offense, with a 30 day suspension for a third offense and an indefinite suspension for a fourth offense.
8. Appraisal services which use a variety of methods to appraise items. It includes expert assessment of authenticity and condition, and reviewing what comparable items have sold for in the marketplace in recent months.
9. Item verification is a way of confirm he identity and evaluate the condition of an item. Third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purpose. It provides a way of tracking an item if it charges ownership in future 10. Physical inspection. It can eliminate many problems especially for collectors’ item.
Wednesday, February 18, 2009
Week 5 - The application of pre-paid cash card for consumers
These card are pre-paid cash card, the different is their area of application. Touch n Go is normally used during payment for toll on highway and public transportation fares. Commercial Bank issued debit card used in purchasing goods and services online. Lastly, phone reload card only used for reload phone credit.
With the emerging of pre-paid cash card, it brings lot of benefit to users, people no longer afraid of snap by thieves. It directly decreases the number of crimes in country. In the view of businesses, it also reduce the cost of operation because no cash involve during operation, everything is transacted in electronic way.
It is still not common in Malaysia compare to Western countries. This is because of the people still not comfort with online transaction and cashless transaction. Another factor is the businesses and the technologies in country still not advanced and mature enough.
To encourage the usage of pre-paid cash, government should give some form of tax incentive to businesses or improve the online security.
Monday, February 16, 2009
Week 5 - Electronic Currency
The main focuses of digital cash development are 1) being able to use it through a wider range of hardware such as secured credit cards; and 2) linked bank accounts that would generally be used over an internet means, for exchange with a secure micropayment system such as in large corporations (PayPal).
Although digital cash can provide many benefits such as convenience and privacy, increased efficiency of transactions, lower transaction fees, new business opportunities with the expansion of economic activities on the Internet, there are many potential issues with the use of digital cash. The transfer of digital currencies raises local issues such as how to levy taxes or the possible ease of money laundering. There are also potential macroeconomic effects such as exchange rate instabilities and shortage of money supplies (total amount of digital cash versus total amount of real cash available, basically the possibility that digital cash could exceed the real cash available).
Week 5 - Mobile payment system in Malaysia: Its potential and consumers' adoption strategies
The potential in mobile payment first, the customer need not to carry money or credit card to make transaction because the transaction is done by using the mobile phone to purchase the digital goods and ticketing. This kind of mobile service works on any mobile and the most important is that it eliminates the hassle to queue up just to pay bills in the busy lifestyle now. The mobile payment providers have a large market share to be grabbed on. This mobile payment system is still new and developing in Malaysia and for sure it will continue to grow as consumer’s confidence on mobile payment increased.
For consumers’ adoption strategies adopted in Malaysia, most of the company will reward the consumer by giving gift at certain level of purchasing or giving redemption of reward as a step to promote the consumer to utilize mobile payment service. For example, one of the telecommunication organization Maxis will give extra credit to its Hotlink customers. The call and receive duration accumulated will be calculated as point and when the point reach certain level it can be redeem to free air time or free sms.
Thursday, February 12, 2009
Week 5 - Credit Card Debts - Causes and Prevention
Causes of credit card debts:
1. Poor money management - Without money spending plan, you have no idea where your money is going. You may be spending unnecessarily each month.
2. Excessive Medical Expenses – Credit card will probably become one of the sources of funds to pay off the medical expenses if health insurance is not adequate to cover the medical bills if one of your family members suffers serious illness. In United States, almost everyone pays their medical expenses by credit cards to get treatment
3. Financial illiteracy - Many people don't understand how money works and grows, how to save and invest for a rainy day, or even why they should balance their checkbook.
Preventions:
1. Making a budget - People have to create clear budget and stick on it that includes monthly bills, food, clothes, entertainment and miscellaneous expenses will prevent from overspending and fall under deeper debt load.
2. Self control and disipline - One of the best practices is to have a direct set up so that able to pay back the full amount each month and use in emergencies. Thus, self control and discipline to keep these cards in wallet and would not overspend. The main prevention is aware of the causes of credit card debts and starts to spend less in order to stay with well financial situation.
3. Move your debts - This is by moving debt from a card with higher annual interest rate to a lower interest rate. This can eventually allow you to pay the lower amount of interest and buy more.
Tuesday, February 10, 2009
Week 4 - THE THREAT OF ONLINE SECURITY: HOW SAFE IS OUR DATA
People with bad intention will use whatever techniques to break into our computer to steal our valuable data in order to satisfy their thirst. If our data is stolen, we will face a lot of problems in term of financial and law. People will use our data to commit crime and withdraw money from our bank account.
To prevent such threat, we need to learn about the cyber crime, prevention on it and how to protect your data when you aware of such crime is happening. Cyber crime can fall to 3 general categories which are Accidental Actions, Malicious Attacks and online fraud.
Accidental actions just mean by itself, people careless and unintentional leak its own confidential information by trap. A lot of trap is set up again users online by provided useless statement such as “your personal would not disclose to third party”. How do prove your own personal data is safe or not. There is no rules and regulation online. If there is, how do you go to sue this person who is unknown. If you know this person, how are you going to sue him or her if he is far distant from you. To avoid such unwanted consequences, you have to be careful whenever information need to be disclosed. Because of the paperless environment, you may want to print screen on the process.
Malicious attack is harm which is made by intention. It can be broken down to attack caused by malicious code or intentional misrepresentation. Misrepresentation often regard to online fraud and identity theft. Whereby, malicious code is code which is made to intrude into computer or break down a computer to malfunction. It’s called hacking or cracking in the internet. It included computer viruses, Trojan, spywares, and denial of service (DOS) attack. These malicious codes often enter to our computer through infection of removable drive (pendrive), network, and online cable. Since we are not technician or IT educated, we only can depend on the anti virus provided on the market such as Norton and Pc-cilin. to protect our computer from intrusion. When you discover someone is enter into your computer without authority. What I recommend is pull the internet line immediately to stop the connectivity. Of cause, this is not a good idea for long term, what you have to do is update your software to latest version. If it is severe, you better consult a professional technician.
Saturday, February 7, 2009
Week 4 - How to safeguard the personal and financial data
Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, the origins of an artifact, or assuring that a computer program is a trusted one. One familiar use of authentication and authorization is access control. A computer system supposed to be used only by those authorized must attempt to detect and exclude the unauthorized.
encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
A digital signature or digital signature scheme is a type of asymmetric cryptography. For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten signatures in many respects; properly implemented digital signatures are more difficult to forge than the handwritten type. Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid nonetheless. Digitally signed messages may be anything representable as a bitstring: examples include electronic mail, contracts, or a message sent via some other cryptographic protocol.
Week 4 - Phishing: examples and its prevention method
Some examples of phishing schemes include:
• Fake e-mail messages from what appears to be from a company you do business with warning you that they need to verify your account information or your account will be suspended.
• A combination of auction fraud and fake escrow sites. This occurs when items are put up for sale at a legitimate online auction to lure you into making payments to a fake escrow site.
• Fake online sales transactions, whereby a criminal offers to buy something from you and requests that they pay you an amount well over the price of the item they are buying. In return, they ask you to send them a check for the difference. The payment to you is not sent, but your check is cashed, and the criminal pockets the difference. Additionally, the check that you send has your bank account number, bank routing code, address, and phone number.
• Fake charities asking you for money. Unfortunately, many criminals take advantage of your goodwill.
The best practice to prevent you from online phishing
• Never reply to e-mail messages that request your personal information
• Don't click links in suspicious e-mail
• Use strong passwords and change them often
• Don't send personal information in regular e-mail messages
• Do business only with companies you know and trust
• Make sure the Web site uses encryption
• Monitor your transactions
Friday, February 6, 2009
Week 4 - The application of 3rd party certification programme in Malaysia
Besides that, VeriSign is the leading Secure Sockets Layer (SSL) Certificate Authority which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network.
Why is the 3rd party certification needed? The reason is there are threats of internet security spreading over the net nowadays. For example, with the increase of phishing on the internet; customers want to make sure that whether they are dealing business with a trusted party. They are afraid of their personal information such as ID number, passwords, credit card numbers and so on, will be sent to those companies which do not exist in this real world. Thus, the certification from 3rd party is needed to ensure their information traveled over the Internet reaches the intended recipients and is safe.
Besides that, those parties are needed because they can provide e-mail protection and validation, secure online shopping carts and more services in order to avoid being spammed, hacked and attacked by the macilious software such as virus, trojan horse and worms.
Lastly, by applying 3rd party certification, there are more safeguard for online shopping, which means the customers can shop safely. In addition, the confidentiallity of customers towards the internet will also be enhanced and hence the organizations will be able to earn more profits.
Tuesday, February 3, 2009
Week 3 - How E-commerce can reduce cycle time, improve employees' empowerment and facilitate customer support
Cycle time is defined as the amount of time needed to complete a transaction which consist of receiving an order from customer preparing invoices or receipts , preparing product, delivering process and transaction. Normally, cycle time is a recurring process. Businesses trying to cycle time to make revenue generated faster. It can be reduce by eliminate the non-value add activities such as product repair, machine set-up, inspection, testing and schedule delays. In e-commerce, paperless environment has speed up the cycle time normally taken for a traditional transaction. By using Electronic Data Interchange (EDI), cycle time could be reduced in the part of reimbursement of stock. When the stock level is low in the retailer’s warehouse, without order of retailer, the supplier able to view stock status of retailer and deliver stock to retailer’s warehouse. A good example will be Finney Automotive Inc. in Cadiz, Ohio. Eric Sheets, the office manager of Finney Automotive said they able to reduce cycle times and better overall efficiency on the shop floor via e-commerce by get connected to their supplier. They get their damaged rental vehicles back on the road and generating revenue. It’s proven that with mean of e-commerce, transaction done faster for an average of one full day.
Employees’ empowerment refers to the authority given to make decision without consulting the manager. With the new way of running business, e-commerce, employees must respond promptly to the inquiry of customers, otherwise, the customers will shift to others competitors. Particular in customer service, resolving complaint is crucial to businesses to retain customer and complete sales. A good example will be Ford Motor Co. It had just been awarded ‘Best internal corporate website ever’ in year 2001. Its intranet support over 175,000 users across 92 countries, which also allow employee to customize their site and view to get information and tools they need for their job.
Lastly, how exactly e-commerce facilitate customer support? With the features of websites, businesses can operate 24 hours 7 days non-stop throughout the year. Customers can reach a seller whenever wherever they are via internet. Without the human facilitation, businesses can list frequently asked questions by customers together with the appropriate answers. This can save time as similar questions won’t be answered over and over. When customer service personnel not around, email support is useful whenever customers have problems. If the site is very large and complicated, putting an internal search engine will able to assist customers to find what they want without having to navigate their way through the site. For example, Ebay and Amazon.
Monday, February 2, 2009
Week 3 - An example of an E-Commerce failure and its causes
DrKoop.com was launched in July 1998 by Donald W. Hackett and John F. Zaccaro with $6 million from Superior Consultant Company Inc., a healthcare IT firm in Bloomfield, Michigan. Drkoop.com was a leading global healthcare Network providing measurable value to individuals worldwide. Its mission was to empower consumers with the information and resources they need to become active participants in the management of their own health. He is unlike most dot-com celebrities of the era; Koop owned a famous face before co-founding an Internet company and, indeed, before the Web even existed. As President Ronald Reagan’s surgeon general from 1981 to 1989, Koop and his iconic beard led a well-known anti-smoking campaign.
During the 1998 which in the operating revenues, It notched just $43,000, but that didn’t keep the company from going public in June 1999 and achieving, briefly, a peak market with capitalization of $1 billion. Subsequently, DrKoop.com’s business plan rested on advertising, and in 1999 there weren’t enough healthcare advertisers to support it and the many other healthcare dot-coms trolling for ad buyers.
However, the DrKoop.com fail to achieve complete success and are not able to face the challenges in market via Internet. Due to their unimpressive and non-persuaded marketing capacity as well as other weaknesses, they became bankrupt and failed to achieve success. Later, DrKoop.com, the medical information Web site that was once valued at over $1 billion, was sold to a Florida company for $186,000 in cash.
Moreover, their shares, sold to the public in June 1999, rose as high as $45.75 three years ago, before falling with the collapse of the Internet stock bubble. Andrew Zipern (NYT)
There are several points that DrKoop.com fail:
· E-commerce has perceived by the management as important to achieve the goals of the company. However, the DrKoop.com stills an unrealized goal of the health-care industry.
· The Company sank into a cash crisis for the trademark, website and others.
· It is difficult to build the trust and brand value associated with his name to the consumer via internet. Moreover, it is related the health, so the consumer need more approval and confidence.
· Drkoop.com also is the target of several class-action lawsuits.
· The DrKoop.com project has to be building around an important competence of the company.
Sunday, February 1, 2009
Week 3 - History and Evolution of E-commerce
Electronic commerce or more known as E-commerce or eCommerce bring the meaning as selling and buying products or services through electronic systems such as internet or other computer network. The definition of e-commerce is different compare its first introduce and now. At the beginning of the introduction, the definition of e-commerce meant the process of execution of commercial transactions electronically with the help of leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT). These two technologies were introduced in the late of 1970s, which allow businesses to send commercial documents like purchase orders or invoice electronically. In 1980s, the introduction of credit cards, automated teller machine (ATM), and telephone banking are a form of e-commerce. Another form of e-commerce was the airline reservation system introduced by Sabre in USA and Travicom in UK.
Internet became popular in 1994 but it takes about four years to develop security protocol (for example, HTTP) and DSL which allow rapid access and persistent connection to the internet. In the year 2000, many organizations in the United States and Western Europe put their business on the internet. At this time, the meaning of e-commerce was changed to the definition we know today. Although there are company that collapse but there are some companies that recognize the advantage of e-commerce and continue invest on the application transferring traditional selling method to virtue selling method. For example two supermarket chains, Albertsons and Safeway, used e-commerce to enable their customer to buy groceries online. At the end of 2001, it is stated that the largest form of e-commerce transaction, Business-to-business (B2B) model had around $700 billion in transactions. E-commerce sales continue to grow and many creative and innovative ways of doing business had been developed till nowadays.
Week3 - sucessful e-commerce and its causes
Friday, January 23, 2009
Week 2 - chia tze khin
like most of the others, my childhood life was just peaceful. Nothing more than eat, sleep and play during that time. Until i started secondary school, my life just turned upside down. most of my time is filled with homework and assignment. i began to join societies like red cross, sport club. It help me to build my personality and skills in socialization. of couse it also bring a lot of challenges to me.
sometimes, when i feel tired. i will do some reading, exercising and playing games. i love to read biography of successful businessman and some of the philosophy. it inspires me and drive me to success.
Normally, i begin with www.thestar.com.my when first start internet explorer. it give me information about what happening surrounding everyday. Of course, viewing email in www.hotmail.com is a must. it's important to me to get in touch with people. To me, forum such as forum.lowyat.net is a good platform to voice out our opinion or discuss about something in various subjects. if you wish to shopping, www.lelong.com.my is a good site. It often offer lower price than retailer. Be careful, before you deal with someone, you have to check his ratings to see if he trustwothy. www.youtube.com give you lots of visual enjoyment such as movie, tv series and mtv.
this is all about me. wish you have a good day
Wednesday, January 21, 2009
Week 2 - tee tiong huat
I am tee tiong huat, I am from perak sitiawan, I live in small village changkat kruing, it is a very beautiful village near the river. My hobbies are playing basketball, watching movie, playing guitar and so on.
Five website I most likely to visit are http://www.frienster.com/, http://www.google.com/, http://www.xunlei.com/, http://www.espnstar.com/, and http://www.yahoo.com/. I visit the Friendster because I can meet a lot of friends there and read a lot of picture and the message to know their currently situation. Visit google for find useful information. XunLei is a Chinese web page, it can use for download any songs and the movies. ESPNSTAR is a website that about the latest sport news. Lastly, yahoo was use for sending and receiving the message.
Normally, I will use the internet to chatting with friends, such as using MSN and ICQ, because it can save a lot of money than using the other sources. Secondly, I like to use the internet to find songs and the movies, sometime I may download the movies and songs, and it just for my personally use only. Besides that, I was settled a lot of financial matter by using the e-banking. I was also sent and received the message and letter online, such as using Yahoo or Hotmail. Lastly, I like to use the internet for looking the information that needed.
Tuesday, January 20, 2009
Week 2 - yong yar li
The top five favorite web sites I usually visited are www.google.com and www.yahoo.com. That is the most user friendly search engines that I ever seen.
www.hotmail.com is the web sites that I will log in everyday to check emails.
I will also post up my recent photo to www.facebook.com to share with my friends that my experience. My friends can ever comments on my photo. I'm also using www.youtube.com to watch Taiwan and Hong Kong movies. Those of web sites let me can keep in touch with my ex-classmates and ex-colleague although we are staying at different state. My hobby is listening music.
The top 5 internet activities I done by internet are check mail, listening music, watching online movie, get information and online chatting.
week 2 - wong syd yee
My name is Wong Syd Yee. Currently 22 years old and I’m from Pahang. I have a lot of hobbies such as singing, watching movie, shopping and hanging on the internet. I like to stay in window live messenger or more have known as msn messenger chatting with my friend.
The top two favorite search engines I usually visit are www.google.com.my and www.yahoo.com because they are user friendly and the search result is match with the thing I search. In additional, I also visit to www.friendster.com and www.facebook.com. From there I can keep I touch with my friends and play games. My hobby is listening to the music; www.haoting.com provides various type of music include English, Malay and Chinese songs. Another website I use to visit is www.utar.edu.my where I get my information about my academic.
The top 5 internet activities I done by internet are check mail, watch online movie, online chat, play online games and get information.