This website provides downloadable products such as ringtones, animated graphic,color graphic and mobile games. Besides, it also promote Malaysia Handphone, Mobile phone, Prepaid Reload, Prepaid Topup, Logo and so on. The design of this web site is simple and save space, everything arrange needly so user feel comfortable and convenience when serve net. The background of the website is white in colour so it is seem nicer for users. The website advertise latest movie in the right hand site of it. Search engine is available in the website such as Google.com or Yahoo.com and the font is blue in color. The mobile88 support team encourage users to go for face-to-face transactions of the products.
Friday, July 4, 2008
Local E-commerce site
This website provides downloadable products such as ringtones, animated graphic,color graphic and mobile games. Besides, it also promote Malaysia Handphone, Mobile phone, Prepaid Reload, Prepaid Topup, Logo and so on. The design of this web site is simple and save space, everything arrange needly so user feel comfortable and convenience when serve net. The background of the website is white in colour so it is seem nicer for users. The website advertise latest movie in the right hand site of it. Search engine is available in the website such as Google.com or Yahoo.com and the font is blue in color. The mobile88 support team encourage users to go for face-to-face transactions of the products.
Thursday, July 3, 2008
Mobile Payment System in Malaysia
Things to take note to prevent e-auction fraud when a consumer participating in an e-auction
- Escrow services. With an escrow service, both partners in a deal are protected. The buyer mails the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At that point, the seller ships the goods to the buyer. After an agreed-upon inspection period, the buyer notifies the service, which then sends a check to the seller. (An example of a provider of online escrow services is tradenable.com.)
- Feedback Forum. The Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.
- Verification. One way of confirming the identity and evaluating the condition of an item is through verification.With verification, neutral third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purposes.
- Appraisal services. Appraisers use a variety of methods to appraise items, including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months.
Wednesday, July 2, 2008
Coporate blogging
The benefits of corporate blogging are:
1.Build rapport with customers- which is give customers a channel to interact and get to know your brand and organisation in a format that they’re familiar and comfortable with.
2.Free feedback and suggestions from key constituents-gives you insights to what people are saying about your products, your brand, your competitors, your marketing from the comfort of your office chair.
3.Increased website traffic from higher search engine rankings-Search engines favour websites with fresh content and ranks your blog higher in search results, which in turn results in a greater number of referrals from search engines to your website and blog.
There are some example of corporate blogging:
1.Jonathan's blog-The blog of Jonathan Schwartz, CEO of Sun Microsystems. Although John is the CEO of a USD$15 billion company, he blogs just like a regular guy.
2.The official google blog.
3.Blue flavor blog.Blue Flavor is another successful small business that effectively employs a thought leadership strategy in their blog.
http://blueflavor.com/blog/
4.Kit Chan studio blog-A good example of a corporate blog from a Malaysian company.
http://www.kidchanstudio.com/blog/?page_id=102
5.Exabytes Blog-Another Malaysian blog, the Exabytes Blog does a good job of humanising a ‘virtual’ company and notifying readers of special offers.
http://blog.exabytes.com.my/
Besides that corporate also have their disadvantages such as:
1.The workers maybe warned or fired because of wrote something in the blog.
2.Blogs make many organization look like disorganization,with multiple tones and opinions.
3.There will be a risk that ill-judged comment could be seized upon the media or disgruntled investors.
E-Government in Malaysia
E-government is the use of information technology in general, and e-commerce in particular, to provide citizens and organization with more convenient access to government information and services and to provide delivery of public services to citizens, business partners, and those working in the public sector. The implementation of e-government was initiated by the introduction of the Multimedia Super Corridor (MSC) in 1996. In 18 April 2008, Deputy Prime Minister Datuk Seri Najib Razak launched the online renewal service, provided by MY E.G. Services Bhd.
http://thestar.com.my/news/story.asp?file=/2008/4/18/nation/20990393&sec=nation
Common problems encountered by consumers
- Lack of computer literacy : some citizens does not have any computer literacy especially those elderly citizen. They can't renewal road tax and driving licenses online without assistance of others.
- Do not have proper guidance : Without providing proper guidance, they can't complete the renewal process.
- Methods of payment : there are only 2 types of payment available for this service which are credit card and debit card. This is inconvenient for those citizen does not own credit and debit card.
- Methods of collection the road tax slip : either can collect it by visit the nearest MyEG or by delivery. If collect by delivery it charges quite high and we still need to wait for few days just can get it. While if we collect the road tax slip by our own, this is troublesome and this is nothing different with we renew the road tax directly through the JPJ.
Ways to encourage more citizen to use E-Government
- Do more promotion : The government can do some promotion to promote the e-government and it will let e-government become more and more popular. For example, government can set up a roadshow to promote e-government and provide demonstration to citizens.
- Security and privacy issues : Government need to make sure that all the information provided by citizen wont be leaked out and it also can increase the confident of citizens to using e-government.
Tuesday, July 1, 2008
The application of pre-paid cash for consumer
Besides that, the most popular prepaid cash card in Malaysia is Touch n Go. The touch n go are mainly for transportation purposes.The touch n go is mainly use in highways tol,LRT, bus and for parking but now a days the touch n go expanding services toward retail purchase and purchase fast food.For example, now with touch n go you can buy burger king. A&W and Dunkin's Dougnut without holding any cash in hand.The only thing that we need to do is just reload the card and make sure there are cash available then can do any transaction.Touch ‘n Go uses contactless smartcard technology. The card looks similar to a credit card. User can continue using the card as long as it is pre-loaded with electronic cash. User can reload the card at toll plazas, train stations, Automated Teller Machines, Cash Deposit Machines, Petrol kiosks and at authorised third party outlets.
http://www.touchngo.com.my/
Other than that, there are pre-paid cash card in others countries such as Hong Kong and London which Hong kong is using octopus card while London is using oyster card.Octopus card readers can be found, not only in most modes of public transport in Hong Kong but in other places such as car parks, shops, cafes, wet markets - which sell livestock and fish - and leisure facilities. They can even be used for access control in schools and apartment blocks.People can travel around the city and pay for items in some shops without the need for cash.
http://www.octopus.com.hk/
Monday, June 30, 2008
Electronic Currency
In 1982, Dr. Chaum founded the International Association for Cryptologic Research (IACR), which currently organizes some of the most important academic conferences in cryptography research. He has contributed to the industry advancement of electronic cash, partially in his role a founder of DigiCash is an electronic cash company, in 1990.
Electronic currency is essentially a system that allows a person to pay for goods or services by transmitting a number from one computer to another. These transactions are carried out electronically, transferring funds from one party to another, by either a debit or credit.These funds are instantly cleared and secured by using strong encryption, thus eliminating the payment risk to the consumer. It is only a matter of time before electronic currency will replace the present monetary systems. Thus, electronic currency is the digital representation of money, or more accurately, the digital representation of currency. Electronic currency provides a secure means of conducting transactions in electronic commerce. Electronic Funds Transfer(EFT) and direct deposit are examples of electronic currency.
In the single-issuer model, the issuer creates and distributes electronic coins to banks. The bank then issues the electronic coins to their customers by loading them onto stored value cards or computer hard drives. Using this model, consumers can also transfer electronic coins between themselves using electronic wallets. In the multiple-issuer model, consumers are able to receive electronic coins from a number of different issuers. A merchant is the party in the electronic transaction that receives coins as payment, deposits them with other issuers and then contacts the system operator.The system operator then consolidates these claims and transmits this information to the issuers
Credit card debts: Causes and prevention
The causes of credit card debts:
- It is very easy to get credit cards, multiple credit cards in fact. Issuers of credit cards make it easy for you, if you have had no debt problems in the past. If they seem to take it lightly, it is understandable that their customers do too.
- Your friends, neighbours and work colleagues will probably all have multiple credit cards, talk about them and flash them around from time to time. That can all influence your own attitude to credit card debt.
- Bank's promotion of credit card is very attractive such as 0% interest, lucky draw to get a new car, etc..
- Poor money management will make you into very big trouble. A monthly spending plan is essential. Without planning, the debts will become more and more as the time passed.
- A credit card should only be used as a convenience to pay if you have no cash on you, knowing that you can pay off the balance before interest charges kick in
- Do not use the debt to pay off debt. You're just shuffling your debt around and incurring more debt each time you do so.
- Planning all your borrowing, write down a monthly budget, and then compare to your total income.
- Do not using any credit card at all. This is the most efficient way to prevent all the credit card debts.
Sunday, June 29, 2008
Comment for John.cow being hacked.
Monday, June 23, 2008
The threat of online security: How safe is our data?
Symantec Internet Security Threat Report: Trends for July-07
The Symantec Internet Security Threat Report provides a six-month update of worldwide internet threat activity. It includes analysis of network-based attacks, a review of known vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007
Protecting Agency Data from Loss or Theft- Vendor Podcast
In recent years, the US federal government has suffered a slew number of high-profile security breaches that have exposed the flaws in traditional data protection strategies. To help agencies safeguard proprietary information, the federal government has issued various requirements, including DCID 6/3 and OMB 06-16. But enforcing compliance with these and other policies requires the right tools and processes.
Tangled Web: Uncover Threats, Invisible Enemies
Long gone are the "good old bad old days" when threats generally had an instant and obvious effect - when many businesses simply warned employees not to click on dubious looking email attachments in case their computers became infected with a virus or some other unwelcome visitor. Today we are seeing a rising tide of dangers that are more cunning, harder to pin down and much more difficult to defend against.
Examining recent developments in the threat landscape, this white paper focuses on the emergence of the web and covert information-gathering as key battlegrounds in the ongoing war against malware propagators and the criminal gangs increasingly active in this field.
As we can see the cases above, i encourage the users of the media electronic production should always put more protections such as antivirus software, firewall system, password and much more to avoid hacker enter into your program.
How to safeguard our personal data and financial data.
To ensure that you don't fall prey to cyber fraud, there are few ways to follow:
1. Install a firewall. A firewall is a software program designed to allow good people in and keep bad people out.
2.Install and update antispyware and antivirus programs. Microsoft and numerous application vendors offer users regular updates to existing antispyware programs, so be on the lookout. As for antivirus protection, Symantec and Norton antivirus are popular choices.
3.Avoid accessing financial information in public. Resist logging on to check your bank balance when working from a coffee shop that offers wireless access. These systems are convenient, but also unknown. Casual users have no way of assessing how sturdy their firewalls are.
4.Update your browser. Updating your browser on a regular basis can help plug up security holes.
5.Look for "locks." which is look for small lock icon in the lower-right corner of the browser window.
6.Don't open mystery attachments. Never open an attachment or click on a link sent to you by an unknown party. Attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information.
Besides that, to comply with safeguarding confidential financial records and related personal information all the related party need to :
1.Designate one or more employees to coordinate the safeguards.
2.Being informed on the data that is being processed.
3.Informed of the entities or categories of entity to whom or which the personal data
may be communicated.
4.Being informed that updating, rectification or, where interested therein, integration of the data has been obtained.
Sunday, June 22, 2008
Phishing: Examples and its prevention methods
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user's account was about to be suspended unless he clicked on the provided link and updates the credit card information that the genuine eBay already had. Beacause it is relatively simple to make a Web site look like a legitimate organization site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay's site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.
In order to prevent phishing, be suspicious of all unsolicited or unexpected emails you receive, even if they appear to originate from a reliable source. More over, legitimate companies generally address the customers by their user name and do not divulge personal information through an email nor do they request some confidential data through mail. If the mail starts with "Dear Customer" or something like that, it is most likely a Phishing mail, aimed to rob you.
Some toolbars enable the customer to see the main domain name of the site, and hence help them in recognizing legitimate site. Another very popular method of prevent phishing is by maintaining a list of known Phishing sites and blocking them. This feature is available in Internet Explorer 7, Mozilla Firefox and Opera 9.1.
Another method to prevent online Phishing is by asking the users to enter password only if they display the correct personal image. Email spam filters provided by many mail clients also have filters against Phishing sites. Any victim of Phishing can help prevention of Phishing by reporting his experience to the financial institution. They can pursue and can even lead to recovery of your losses.
Saturday, June 21, 2008
How E-commerce can reduce cycle time, improve employees' empowerment and faciliate customer support??
With E-commerce, the cycle time can be reduction. It shortening the time it takes for a business to complete a productive activity from its beginning to end. Customers can directly access to the services through the extranet instead of physically appearing to the stores. It is more efficient, more convenience, and even saving the cost and time for the consumers as well as seller.
Beside that, giving employees the authority to act and make decision on their own is a strategy used by many arganization as part of productivity improvement program. Management delegates the authority to individuals or team who can execute the work faster and within fewer days. Empowered salespeople and customer service employees are given the authority to make customers happy and do it quickly, helping to increase customer loyalty too.
E-commerce can allow the customers to access to their services to get the relevant information and customers support in anytime. Other than that, customers also can send an e-mail to the customer service address to obtain the necessary information or making any complaint.
Through the powerful e-commerce, everybody can get, can sell, can buy anythings at anytime anyplace..
Sunday, June 15, 2008
An example of an E-commerce failure and its causes
Boo.com’s founders spent £125 million in just six months, to market itself as a global company but then had to deal with different languages, pricing and tax structures in countries it performed. The company's sales was not up to their expectation, especially when there were a high numbers of returned products by their customers (the company mysteriously decided to pay postage on returns).
Saturday, June 14, 2008
The history and evolution of E-commerce.
E-commerce are first develop in early 1970s.Before E-commerce application is being use,the first aplication found is Electronic funds transfer(EFT) but the use of these application was limited to large corporations, financial institution and few other daring business.Therefore electronic data interchange(EDI) came in.EDI allows many types of business such as manufacturers,retailers,services compare to EFT and such system were called interorganizational system.
In 1990s because of the internet became commercializad,the e-commerce application was expanded and almost all mediun-and larged-sized organization in the world has their web site which can run business through online direct sales.In 1999,E-commerce shifted from B2C toB2B,and B2B to B2E but B2C E- commerce may be the most recognizable.
The example of early company which use E-commerce are Pizza Hut ,Amazon.com and e.bay.
The E-commerce is for customer advantage,it is a world which we are building together brick by brick, laying a secure foundation for the future generations.As the expert predicts that almost all internet user will shops online in future,E-commerce growth not only from B2C but also from B2B and newer application such as e-government, e-learning,B2E.The growth of field will continue in foresseable future and everyone can shop online in future.
Thursday, June 12, 2008
An example of an E-Commerce success and its causes
Michael S. Dell
Michael Dell, born in February 1965, is the chairman of the Board of Directors and chief executive officer of Dell. In 1992, Mr. Dell became the youngest CEO ever to earn a ranking on the Fortune 500. Mr. Dell is the author of Direct From Dell: Strategies That Revolutionized an Industry, his story of the rise of the company and the strategies he has refined that apply to all businesses.
- Direct Relationship-- Dell believe in being direct in all they do. They are committed to behaving ethically, responding to customer needs in a timely and reasonable manner, fostering open communications and building effective relationships with customers, partners, suppliers and each other; and operating without inefficient hierarchy and bureaucracy.
- Customers-- Dell believe in creating loyal customers by providing a superior experience at a great value. With a simple concept which is selling computer system directly to customers, Dell could best understand customer's need & efficiently provides the most effective computing solutions to meet those needs.
- The Dell Team-- Dell continued success lies in the teamwork and they committed to being a meritocracy, and to developing, retaining and attracting the best people to their worldwide marketplace.
Sunday, June 8, 2008
about jiun mein
Hello everyone~!!!
About the top 5 websites that i visited most are friendster, hotmail, utar, gougou and facebook. friendster and the facebook websites are use to know new friends and through those websites i can more understand all of my friends, and most of them will upload photo to friendster and facebook so i will know how are them recently. Hotmail website of course is use to check my e-mail and i also will use it to pass my assignment to my others group members in order to complete our assignment as soon as possible. Utar website is use to check my result(normally in the semester break) and i will always check the calendar in Utar website so that i can know when will have holidays. Last one is gougou website, this is the website that use to download drama, movie, cartoon, etc... So sometimes i will download some drama or movie as my entertainment when i cant back my hometown.
The most common internet activities are chit chat with my friends through MSN or SKYPE, download the drama, play some online games, find the information to do my assignment or just viewing others people blogs or photo album...
Saturday, June 7, 2008
About Me..
Although I m staying in Sg long but i will go back hometown every weekend no matter having any activities such as friends gathering ,this is because for me nothing is important than my family.I m a very simple person. For me "happy go lucky" but since study in UTAR my life change to bcom stress. Finally i hope that i can manage all the subject well without stress anymore.I will try to enjoy my study life.
The website that normally i will log in are friendster, hotmail (chit chiat , check e-mail),haoting .com(listen music),google( for assignment purpose) and finally is UTAR website ( check result and do lecturer and tutor survey).