Tuesday, February 24, 2009
Things to take note to prevent e-auction fraud when a consumer participating in an e-auction
Types of auctions are traditional auctions, electronic auctions, dynamic pricing, English auctions, Yankee auctions, Dutch auctions, free-fall auctions, sealed-bid first-price auction and sealed-bid second-price auction. The most popular type of auctions is an electronic auction (e-auctions) which means auctions conducted online. The most popular e-auction website in Malaysia are eBay.com.my, Lelong.com.my, and so on.
Things to take note to prevent those e-auction fraud are:
- View carefully the sellers' post selling record by viewing the seller's profile and feedback from his or her post transaction records.
- Know the e-auction website precedure and regulation. Find what obligations you have as a buyer, and what obligations the seller has before you make a bid. Seller will not liable to help you if you do not follow proper prevention measures.
- Do not simple expose your personal data such as user name and password, credit card numbers, bank account numbers and others.
- Strongly request the seller to do self delivery where both parties will be able meet up face to face and complete the transaction. In other words, it can be said Cash On Delivery. If the seller is stay other states, request the seller to give you the tracking numbers of the posted item from postage companies in order to track the status of the item will be sent.
- To protect sellers, a friendly warning for first-time nonpayment. A sterner warning is for second-time offense, with a 30 day suspension for a third offense and an indefinite suspension for a fourth offense.
- Check the item physically for damage and internal failure of some electronic items or collector items.
Friday, February 20, 2009
Review a local e-commerce site
http://www.malaysiaairlines.com/ ,
http://www.neowave.com.my/ ,
http://www.airasia.com.my/ and so on.
Among this website, the http://www.airasia.com.my/ is the websites that i always visit.
http://www.airasia.com/
This website is provided by Airasia Berhad. The purpose of creating the website is to bring convenient to customers. Customer can make online flight booking without enter to the Airasia counter.
In the websites,there are many information provided. For example are the latest promotion of the flight tickets, attraction destination details, hotels details, travel services and so on. Within only a website, customers can catch and grab all the latest information to fulfill their needs.
To visit the website, the customers have to state their current location they situating and the prefferer language in the website.To buy the ticket customers have to become the Airasia before proceed to another steps.
All the instructions is stated to teach customer to make online buying. This will make customer feel more easy when trying to make transaction.Term and condition about carriage also listed to avoid customer become confuse.
The other services that the website provide include:
-- future flight info
-- products & shopping
-- pick a seat service
-- hotel booking, etc.
The design of the website is is nice.The colour use of the page is red which is match with Airasia theme. The arrangement of the icons in website is tidy and will not make customers feel comfortable.This show all the items in the website is well arranged.
Talking about the security to make online ticket buying, the security is quite good and safety. Everyone who want to make booking, he or she have to login. Then choose the desire flight and pay by credit card.While the system use to avoid payment fraud include Address Verification System(AVS) and Card Verification Number (CVN),etc.
After the transaction finish the Airasia will send a mail to inform customer. This such a good local e-commerce website is welcomed by all the users.
Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies
Mobile payment defined as the process of two parties exchanging financial value using a mobile device in return of goods and services.

Mobile Money is a PIN-based Mobile Payment Solution designed by Mobile Money International Sdn Bhd to address the limitations and bottlenecks created by cash, cheques and credit cards. It unlocks the power of the mobile phone to make payments, allowing registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service). This gives the freedom to shoppers to buy products online and pay the merchant using his/her mobile phone without being physically present at the store.
Strategies:
@..Educate consumers about mobile payments, how to use and introduce its functions (e.g. bill payment, mobile purchase), and tell them what is the benefits when using mobile payment.
@..Enchance security and confidence to mobile users. This is to provide more secure and safe services for those who use who use mobele payment.
@..Collaborate with more banks and companies to widen the ability to pay via mobile at the same time it helps to increased customer’s satisfaction and confidence.
@..Try to reach anyone,anytime and anywhere.The merchant can now sell to people across town, across the country and take payment around the clock, which is not possible with current payment systems.
@..Provide multi methods for users to make payment .Users can use an IVR, SMS, Mobile Money Website, or even real time Mobile Money Weblink API weblink to make payment.
related link:
http://en.wikipedia.org/wiki/Mobile_payment
Monday, February 16, 2009
Corporate Blogging: A new marketing communication tool for companies


1) Build rapport with customers
At this time of writing, there are more than 100 million blogs worldwide. If you publish a corporate blog, you’re giving your customers a channel to interact and get to know your brand and organisation in a format that they’re familiar and comfortable with. Plus, you’ll earn extra points from them because you speak their language.
2) Customer Relationships and Feedback
In every instance, the point of a business blog marketing campaign is to establish a two-way channel for communication between a business and its customers. Corporate blogging gives you insights to what people are saying about your products, your brand, your competitors, your marketing from the comfort of your office chair. These insights come in the forms of comments on your blog or commentary and discussions that take place on other blogs.
3) Increased website traffic from higher search engine rankings
Search engines like new content, especially content that comprises of short paragraphs with many rich and relevant keywords. It's also easy to generate and boost link popularity to your corporate blog. Search engines favour websites with fresh content and ranks your blog higher in search results, which in turn results in a greater number of referrals from search engines to your website and blog. The quicker you start the higher your ranking.
4) Corporate blogs are learning tools for companies
Blogs to be successful have to be updated constantly. Always be truthful. Make sure that the information that you post on your corporate blog is accurate. If you don't know something or are unsure, admit it. Being human reinforces your honesty and credibility. Besidea that, campanies can writing blogs to communicate the latest information about products with customers. Blogs allow comment postings from customers. As a result such technical companies are capturing new information from customers at a faster rate.
5) Small hard dollar cost, higher soft dollar costs
Return on investment is why a company should start a corporate blog now. The hard dollar investment is small. Blog are complex content management run websites. However, a simple blogging tool can be rented for $50/year. The soft dollar investment requires regular postings at least 3 times a week.
Sunday, February 15, 2009
The application of pre-paid cash card for consumers
Prepaid cash card is the card which requires you to load funds into the card and use
that money to make purchases and get cash. Once you have money in that card, the card can be used anywhere one would just like a regular credit card. You are not borrowing money from a bank or other financial institution. The best part of the prepaid cash card is that you can charge to your heart's content and you won't be in debt. The money is yours and once it is out of the credit, you can't spend anymore until you make another deposit or top up. The prepaid cash cards look, feel and work like a credit card but are pre-funded “stored-value” cards and there are no bills. It's the same principle as using a debit card linked to a savings or current account.
The concept of these prepaid cash card can help us control our spending. A reloadable cash card allows us to only spend up to the amount that we have pre-deposited into the account. If you tend to overspend or would like to control our spending then a prepaid cash card could be a good card for us.

One of the prepaid cash card that famous is NEXG card by Ambank. It is MasterCard that can be uses in everywhere in the world. It is very easy to get with RM25 starter pack from any 7-Eleven stores. One can simply start using prepaid cash card when money has been loaded on to a prepaid card by cash at a bank, Post Office, at Payzone or PayPoint terminals, bank transfer, through your employer or even by credit card.


Application of prepaid cash card for consumers
- Buying petrol
- Online shopping
- Hotels booking
- Paying bills
- Online ticket booking
- People who travel that refuse to carry too much cash
- Those who cannot get approval of credit cards application
- Person who has poor credit rating or a history of bad debt who cannot get a credit card
- Allows you to set spending limits for you or yo
The Threat of Online Security: How Safe is Our Data?
1) Non-technical attack is an attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network.
a) Phishing is a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing credential. It is also known as THEFT.
2) Technical attack is an attack perpetrated using software and systems knowledge or expertise.
a) Denial-of-Services (DOS) attack
-- An attack on a web site in which an attacker uses specialized software to send a flood of data pockets to the target computer with the aim of overloading its resources.
b) Distributed denial-of-service (DDOS) attack
-- Attacker gain illegal administrative access as many computers on the internet as possible and uses the multiple computers to send a flood of data packets to the target computer.
c) Viruses
-- It is a piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it cannot run independently, it requires that its host program be run to activate it.
d) Worm
-- It is a software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine.
e) Trojan Horse
-- It is a program that appears to have a useful function but that contains a hidden function that presents a security risk.
How safe is our data?
There have a lot of tools that can be used by the users to secure their data. The simplest aspects of network security are access control and authentication. Access control is a mechanism that determines who can legitimately use a network resources and which resources he, she or it can use. Typically, access control lists (ACL) define which users have access to which resources and what the rights they have with respect to those resources.
Once a user has been identified, the users must be authenticated. Authentication is the process of verifying that the user is who he or she claims to be. Verification is usually based on one or more characteristic that distinguishes the individual from others. The distinguishing characteristic can be based on something one knows like password, something one has like token, something one is like fingerprint.
Tokens qualify as something one has. Tokens come in various shapes, forms and sizes. There have two types of tokens such as passive token and active token. A passive token is the storage devices that contain a secret code used in a two-factor authentication system. Meanwhile, a active token is the small, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system. A two-factor authentication is combining something one knows with something one has.
A biometric system is one of the authentication methods that recognize a person by a physical trait. It identifies a person by measurement of a biological characteristic such as fingerprints, iris (eye) pattern, and facial features or voice. It can identify a person from a population of enrolled users by searching through a database for a match based on the person’s biometric trait. Furthermore, biometric system can divide by two types such as physiological biometrics which the measurements derived directly from different parts of the body and behavioral biometrics which the measurements derived from various actions and indirectly from various body parts.
Another tool that can use is public key infrastructure (PKI). It is using in encryption process. It is the process of scrambling (encrypting) a message in such a way that it is difficult, expensive or time consuming for an unauthorized person to unscramble (decrypt) it.
Friday, February 13, 2009
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.

The Electronic Government initiative in Malaysia was launched to lead the country into the Information Age. It has improved both how the government operates internally as well as how it delivers services to the people of Malaysia. It seeks to improve the convenience, accessibility and quality of interactions with citizens and businesses; simultaneously, it will improve information flows and processes within government to improve the speed and quality of policy development, coordination and enforcement.
The vision of Electronic Government is a vision for government, businesses and citizenry working together for the benefit of Malaysia and all of its citizens. The vision focuses on effectively and efficiently delivering services from the government to the people of Malaysia, enabling the government to become more responsive to the need of its citizens.
The seven projects of the Electronic Government Flagship Application are as follows:
1) Project Monitoring System (SPP II)
2) Human Resource Management Information System (HRMIS)
3) Generic Office Environment 9 (GOE)
4) Electronic Procurement (EP)
5) Electronic Services (E-Services)
6) Electronic Labour Exchange (ELX)
7) E-Syariah
The myGovernment Portal (http://www.gov.my/) act as the one-stop source of Malaysian government information and the services for the citizens.

In looking at these processes, it is possible to envision a range of integrated and coordinated methods, approaches, and strategies to better incorporate users in the development of E-Government services. These strategies are neither complicated nor difficult to implement. They may, however, result in additional costs and effort in the implementation of E-Government services.
1) Comprehensive Plan for User-centered E-Government Services Design
A comprehensive plan for user-centered E-Government services minimally includes identifying the goals of that service; ways in which the service supports other agency/ government goals; managerial structure for the development of the service; target audience(s) of the service; information needs of users that the service addresses; resources available for the development of that service; and time line describing key tasks and responsibilities for the development, implementation, and evaluation of that service.
Most importantly, the plan describes the specific citizen-centered strategies that will be incorporated in the design and operation of the E-Government service under development. Development of E-Government services without such a plan is likely to result in poor quality services with limited capacity to meet user information needs – though a service may in fact meet agency goals of cost reduction.
2) Conduct User Information Needs Assessments
Before the design and development of an E-Government service, governments need to understand how users seek information on a particular topic or issue (strategy); acquire information on a topic or issue (acquisition); solicit expertise (source); and use of that
information (application). Such knowledge enables governments to know how users find and use information, as well as the sources they use. Equally important is understanding how the information is to be used and what specific types of problems the user intends to address with the information. This helps in not only an overall understanding of users’ information behavior, but also identifies potential community partners to assist in EGovernment service delivery and adoption strategies (more on this
below).
3) Understand User Information and Communication Technology Availability, Expertise, and Preference
Developing a Web-based E-Government service that requires a broadband connection, high-end computer, and advanced technology competencies can immediately exclude a segment, or multiple segments, of the intended service population. For example, the Department of Children and Families in Florida, through its services (food stamps, medicare, cash assistance) gateway application Access Florida
(http://www.myflorida.com/accessflorida/), requires that its clients complete the application online. And yet those who qualify for these services are the least likely to own a computer, have access to the Internet, or be conversant in computing and Internet technologies (Pew Internet and American Life Project, 2007). The tension between system developers and designers and user ability to use high-end computing and telecommunications is critical to resolve. A too complex system may not be used at all; a
system that resides on technologies to which the user does not have access will also guaranty failure. By understanding the technology access and capabilities of the various segments of users, governments can develop systems that better meet the needs of users, but also understand the types of training and support users may need for successful engagement of E-Government.
4) Engage Users
Top-down, systems-oriented E-Government services can result in elegantly designed and technically sophisticated E-Government systems that completely miss the intended users’ needs. The top down approach is often less costly than conducting a range of user-based needs assessments and other strategies as outlined in this paper. The products and services that can result from topdown or systems based design can include, for example, lengthy forms that collect unneeded data; services that defy logic in their use and/or access; complicated instructions that simply cannot be accommodated by online applications; and excessive personal data for which the user has not been reassured of privacy and security concerns (to name but a few). All of these types of problems can be identified and corrected by engaging users in the actual design of the service. There are a range of tools and techniques in which governments can engage to develop successful E-Government services such as focus groups and interviews (with experts and users); usability, functionality, and accessibility testing throughout the design and development process; encouraging real-time comments and suggestions about the services being used; log file and transaction log analysis; providing interactive help screens or 1-800 assistance; and developing and adhering to measures and standards of service quality. There are other strategies and approaches, but the key is to include user feedback during the E-Government services development and design phasen phases as well as while the services is in operation- not as an after thought.
Saturday, February 7, 2009
Credit Card debts: Causes and Prevention

Too often we delay bringing expenses in line with a reduction in income for a host of good reasons and let debts fill the gap. It so happens that the main breadwinner of the household loses his job but monthly expenses are not cut down in line with the reduction in income. This obviously leads to a rise in debt. The family is forced to use their credit cards for groceries, utilities and so forth.
Poor money management is one of the best reasons why so many families accumulate lots of debt. Without a monthly spending plan, you will have no idea where your money is going. You might be spending hundreds of dollars every month towards items that are useless and have no value in your life, yet you do not realize it. While your money is going towards purchasing useless items, you might also be charging your necessary purchases on your credit card, forcing you to pay interest on these purchases every month.
People who experience underemployment may continue to think of it as only temporary or if they are coming off unemployment feel a false sense of relief. But if you are underemployed meaning you are not getting enough working hours at your job, you should also cut down on your lifestyle to match your current income. Forget about driving a BMW if you are working only 30 hours a week at the Home Depot making minimum wage. However, if you are a Financial Controller with a local Corp. then you should think about driving a BMW.
4) Big medical expenses
Nowadays, almost all doctors accept credit cards. If you think it's for convenience, think again. The medical industry wants to get paid at the time service is rendered. They know that if they don't, the chances of their getting paid drops. This means more debt for you, less for them. To be fair, they are not in the lending business, but this only masks a bigger problem. While you need treatment now, you do not have the cash. So what do you do? You will use your credit card because you do not have enough savings in the bank.
Many people put not only their own disposable income on the line when gambling, they also borrow loans to gamble! You see, Casinos would not exist if every one person won money in it. Probably 1 in every 100 people wins money in the casino over the long term. Another huge boom in the gambling industry is the emergence of Party Poker and online gambling websites that are illegal in the USA. Online gambling is so easy that you don't even have to step out of your house, you can do it right in your bedroom with a small PC!

The first thing to preventing credit card debt is to choose your credit card cautiously.The main item to look at is the interest rate; you should try to find the lowest rate available. To do so you can join one of those internet companies that offer reviews on many credit card offers, these sites also offer direct links to the credit cards application so actually you will get all the work done for you.
Create a budget and stick to it. By setting a clear budget that includes all of your monthly bills, food, entertainment and miscellaneous item, you can learn where your money is going and how to save and reduce your expenses. This will help reduce your credit card debt.
If you carry a balance, use your card for as little as possible. When you write checks, use a debit card or fork over cash for each purchase, you will be more conscious of your spending and will end up spending less.
Never pay the minimum unless you have no other choice, and make sure to pay more as soon as you can. If you are constantly making late payments because the bill is due before your paycheck arrives, ask your credit card company if your billing date can be moved. Often times they will be happy to change it to ensure that you pay the bill on time.
The amount of credit card debt has made creditors realize that if they want to get any money back, they have to make deals! If a card charges an annual fee, ask that it be removed. Many cards don't charge a fee, so you can always switch to one of these cards. Most credit cards will remove the fee if you simply ask.
Electronic Currency

Although electronic money has been an interesting challenge for cryptography (see, for example, David Chaum work), the use of digital cash to date has been relatively small scale. One of the few success has been Hong Kong system of Octopus card, which began as a system for payment of transit and became widely used electronic payment system. Another success was the Canadian Interac network, which as of 2000, exceeded the cash payment method to retail in Canada.

Some eCurrency systems sell to the end user directly, such as Paypal, but many systems or to sell through their own exclusive eCurrency market, such as e-Gold and Omnipay or eeeCurrency system and the system eCurrencyExchangers , Or through a market Maker or exchange eCurrency that could cover a range of electronic money. These interchanges can be automated systems such as System eCurrencyExchangers or manually exchangers as the golden age.
In the case of the Octopus Card in Hong Kong, deposits work similar to banks. After Octopus Card Limited receives money for deposit from users, money is deposited in banks, which is similar to a debit card issuing banks redepositing money from central banks. Some currencies, as some LETS systems, working with electronic transactions. Cyclos software allows the creation of the electronic community currencies. Ripple monetary system is a project to develop a distributed system of electronic money independent of the currency.
Benefits and Advantages of eCurrency
Banks now offer many services whereby a customer can transfer funds, purchase stocks, contribute to their pension (as the Canadian RRSP) and offer a variety of other services without having to manage physical cash or checks. Customers do not have to wait in lines, thus providing a lower hassle.Debit cards and paying bills online to allow the immediate transfer of funds from one individual account to a company without any paper money transfer. This offers great convenience to many people and businesses.
Issues and Disadvantages of eCurrency
There is also a pressing issue regarding digital technology in cash. The outages, loss of documents, software and undependable often cause a major setback in the advancement of technology.The largest demographic in society, the baby boomers, have been reluctant to adopt the many advantages of digital cash. This is due to the loss of human interaction that often occurs when digital cash is used to its full potential. Therefore, what has deterred a large segment of global society of technological advantage.
Future Directions
Future developments of networking in terms of digital cash, a company is named Digicash on the creation of an e-cash system that would allow an e-issuer in cash to buy electronic parts at a certain value . When they purchased, they are purchased under its name and stored on their computers or their online identity. When expenses of the fund because it is linked to e-cash society, it provides everything that is bought in terms through the issuer at any time since the company knows your information, and the direct purchase of your home.
Thursday, February 5, 2009
The application of 3rd party certification programme in Malaysia

One of the famous application of 3rd party certification program in Malaysia is MSC Trustgate.com Sdn Bhd. MSC Trustgate.com Sdn Bhd was incorporated in 1999 and is a licensed Certification Authority (CA) under the operation of the Multimedia Super Corridor. Certification Authority is the body given the license to operate as a trusted third party in the issuance of digital certificates. They also offered complete security solutions and leading trust services that are needed by individuals, enterprises, government, and e-commerce service providers using digital certificates, digital signatures, encryption and decryption. Trustgate is licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development.
VeriSign is the leading Secure Sockets Layer (SSL) Certificate Authority under Trust.com which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network.
Digital certificate usually attach to an e-mail message or an embedded program in a web page that verifies that user or website is who they claim to be. The common functions of a digital certificate are user authentication, encryption and digital signatures. User authentication provides other security than using username and password. Its session management is stronger. Encryption can make the data transmission secured by using the information encrypted. The intended recipient of the data is only person to receive the message. Digital signatures are like the hand signature in the digital world. It can ensure the integrity of the data.
By using the digital certificate, the users will be able to make transaction on the internet without fear of having the personal data being stolen, information contaminated by third parties, and the transacting party denying any commercial commitment with the users. Furthermore, the digital certificates can assist the development of greater internet based activities.
With the increasing of phishing on the internet, customers want to make sure that whether they are dealing business with a trusted party. They are afraid of their personal information such as ID number, passwords, credit card numbers and so on, will be sent to those companies which do not exist in this real world. Thus, the certification from 3rd party is needed to ensure their information traveled over the Internet reaches the intended recipients and is safe. Most of the banks in Malaysia will show their verified certificate on their online banking website to avoid phishing.
Lastly, by applying that 3rd party certification, there are more secured for online shopping, so that the customers can shop safely.
Tuesday, February 3, 2009
How to safeguard our personal and financial data

1. Password Protection
Do not choose a password and PINs that is easily guessed, like your telephone number, date of birth, IC number, or other associated data. You should select a robust and unique PINs to make it difficult for anyone to guess. Do not use sequential numbers (e.g. 123456) or the same number
more than twice (776790). Do not share or divulge your password to anyone. Memories your password. Do not write down your password or store it in computer hard-disk, diskette, mobile phone or other insecure means. Do not use your password when someone else can see you keying it in. Change your PINs regularly. Change your password immediately if you suspect it has been exposed to others or the moment you suspect any unauthorized access to your computer.
2. Always log off your online session
Log off your online session whenever you leave your computer, even for a short while. This immediately ends yours iBanking session and prevents further transactions from being when not carried out without a fresh login. You should also shut down your computer, when not in use, to prevent unauthorized access to your computer.
3. Do not disclose your personal data to suspected websites
To prevent your personal information frodisclose your m being captured by bogus websites, you should not disclose your personal, financial or credit card information to little-known or suspected websites. The best way to protect our financial and personal data is by conducting the transaction with trusted, well known online retailers that using the reputable payment processors like Paypal or Google Checkout.
4. Protect your computer from viruses and malicious programs Apart from destroying important data on your computer, viruses or malicious programs such as Trojan Horse may run a password sniffing program in the background to capture your password keystrokes without your knowledge. Being constantly online may increase your risk exposure for your computer. To avoid getting infected, you should:
- Never download any file from sites (e.g. program, game, picture, mp3 song) or people (e.g. email attachments) that you aren't sure about.
- Delete junk or chain emails.
- Never use features in your programs that automatically get or preview files.
- Install firewall and virus detection software to protect against hackers, virus attacks or malicious "Trojan Horse" programs. You should also update your software's virus definition frequently.
5. Check your account and transaction history details regularly Always check your transaction history details and statement regularly to make sure that all details are updated and there are no unauthorized transactions on your accounts.
Phishing: Examples and its Prevention Methods
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that may be used for fraud or identity theft. The e-mail directs the user to visit a Website where they are asked to update personal information such as: passwords, credit/debit card info, Social Security number, and the credit union/bank account numbers that the legitimate organization already has. The Website, however, is a spoof and set up only to steal the user's information.
Examples phishing:
1) Phishing e-mail from TrustedBank:

2) An example of a phishing e-mail targeted at PayPal users: In an example Paypal phish (right), spelling mistakes in the e-mail and the presence of an IP address in the link (visible in the tooltip under the yellow box) are both clues that this is a phishing attempt. Another giveaway is the lack of a personal greeting, although the presence of personal details would not be a guarantee of legitimacy. A legitimate Paypal communication will always greet the user with his or her real name, not just with a generic greeting like, "Dear Accountholder." Other signs that the message is a fraud are misspellings of simple words, bad grammar and the threat of consequences such as account suspension if the recipient fails to comply with the message's requests.
3) An example of a scam email from Citi Bank:

How to avoid falling for a Phishing (fishing) Scam?
Most of the case of phishing are related to your bank account number ,password ,credit card detail information, social security card number and your e-currency account information .Some of the latest phishing are related to you paypal ,yahoo mail ,gmail and other free mail service .Just to keep in mind none of those official company mentioned above will ask you to provide any information via e-mail .If you receive the similar request to ask you to provide the detail or link to the web site in that mail ,it must be internet phishing scam.
Phishing Prevention Methods:
1) Do not reply to or click on a link in an e-mail that warns you, with little notice or prior legitimate expectation that an a account of yours will be shut down unless you confirm your billing information. Instead, contact the company cited in the e-mail using an authenticated telephone number or other form of communication that you sure is genuine.
2) Legitimate companies, especially financial institutions should never ask you to verify your account information. If you get an e-mail that asks for this type of information, delete it and report it to the company being phished.
3) Before submitting financial information through a website, look for the locked padlock on the browser’s status bar or look for http:// at the beginning of the web address in your browser’s address window. The presence of a padlock and the http:// does not guarantee that the website is legitimate or secure. However, the absence of either the padlock or the http:// does indicate that the web site is not secure.
4) Identifying a phishing e-mail may be easier than it appears. Sometimes, the entire e-mal is a graphic which may be a sign. If you cannot highlight words, then you know it’s a graphic, sometimes with a link. Also, if you hover your mouse over graphic or other link, you can usually view the actually link (at the bottom of your screen or a hover line). The link may be something else than it actually says in the e-mail. If you do click on the graphic or link, check the url to make sure it actually is from the domain of your financial institution.
5) Use anti-virus software and make sure you have a firewall in place.
6) Review all financial statements (online or paper) as soon as you can so you can see if any unauthorized
7) Never send e-mail with sensitive personal or financial information. E-mails are not secure. Visit official websites and login securely to send this type of information.
8) Always be aware of attachments in e-mails. Never open an attachment from someone you do no know. This could contain a potential virus.
9) Always make sure your web browser contains the latest patches. Newer browsers will eventually contain anti-phishing features to help you even more.
10) NEVER click on a link in an email in order to enter your log-in information or password. Instead, if you think the email may be legitimate, go directly to the company website using your Internet Explorer or Netscape browser. (Do not copy and paste a url address out of a suspicious email.)Hackers can easily mask a fake link, making it look like it is going to the proper site when it is not. Instead, type the link into your browser window by hand.
11) Learn your financial institution’s security measures. PayPal, for example, will never send you an email that does not begin with your full name. If you receive an email with a salutation like, “Dear PayPal Member” you know it is a fake.
12) Monitor your credit rating closely. Keeping a careful eye on your credit score is the best way to learn if you have fallen victim to an identity scam. An ID Theft protection product from MyIDFix.com can alert you to identity problems immediately so that you can fix them before they get out of hand.
Sunday, February 1, 2009
Example of E-Commerce failure and its causes


The causes of the e-commerce failure…
The first reason of failure is Timing. Although there were several months of delays prior to launch and problems with the user experience when boo.com first launched as described below, these had been largely cured by the time the company entered receivership. Indeed sales had grown rapidly and were around $500,000 for the fortnight prior to the site being shut down.
The fundamental problem was that the company was following an extremely aggressive growth plan, launching simultaneously in multiple European countries. This plan was founded on the assumption of the ready availability of venture capital money to see the company through the first few years of trading until sales caught up with operating expenses. Such capital ceased to be available for all practical purposes in the second quarter of 2000 following dramatic falls in the NASDAQ presaging the "dot crash" following the Dot-com bubble. Boo would probably have failed for this reason even if the user experience had been excellent and the launch on schedule. Boo were only the first of numerous similar Dot-com company failures over the subsequent two years.
The second reason of failure is problems with the user experience. The boo.com website was widely criticized as poorly designed for its target audience, going against many usability conventions. The site relied heavily on JavaScript and Flash technology to display pseudo-3D views of wares as well as Miss Boo, a sales-assistant-style avatar. The first publicly released version of the site was fairly hefty—the home page alone was several hundred kilobytes which meant that the vast majority of users had to wait minutes for the site to load (as broadband technologies were still not widely available at that time). The site's front page did contain the warning, "this site is designed for 56K modems and above".
The complicated design required the site to be displayed in a fixed size window, which limited the space available to display product information to the customer. Navigation techniques changed as the customer moved around the site, which appealed to those who were visiting to see the website but frustrated those who simply wanted to buy clothes.
Its interface was also complex with a hierarchical system that required the user to answer four or five different questions before revealing that there were no products in stock in a particular sub-section. The same basic questions then had to be answered again until results were found.
Friday, January 23, 2009
Identify and compare the revenue model for Google, Amazon.com and eBay
I) Sales Revenue Model-----Income come from sales of goods, services and merchandise information in the websites.
II) Transaction Fees Revenue Model-----An organisation gets revenue by earned commission for executing a transaction.
III) Advertisement Fees Revenue Model-----An organisation provide spaces in their website to allow others organisation to place their advertisement and collect advertisement fees from the them.
IV) Subscription Fees Revenue Model-----When customer subscribing to the content or services offered by the website,the organisation can collect the subscription fees from the users.
V) Affiliate Fees Revenue Model-----An organisation gets commissions for referring customers to others people websites.
Google earned revenue from multiple revenue models.The major of Google's revenue source is advertising.Google offers targeted advertising solutions and global Internet search solutions.There are Google Adwords,Pay per Click Advertising,Google Adsense,and Froogle.
Google AdWords is a pay per click advertising program of Google designed to allow the advertisers to present advertisements to people at the instant the people are looking for information related to what the advertiser has to offer.
Pay-Per-Click (PPC) is the best way to send immediate, targeted traffic to your website. It is an online advertising payment model in which payment is based onqualifying click-throughs. An advertiser has to pay every time his ad receives a click. The Advertisers decide the keywords relevant to their offer that should display their ad and the maximum amount they are willing to pay per click for that keyword.
AdSense is an ad serving program run by Google Website owners can enroll in this program to enable text, image and, video advertisements on their sites. Revenue is generated on a per-click or per-thousand-ads-displayed basis and the ads are administered by Google. AdSense program includes AdSense for search and AdSense for content.
Froogle is a service from Google that makes it easy to find information about products for sale online. Froogle is a price engine website launched by Google.
AMAZON.com
The Amazon.com is an online selling books company.Amazon.com generates revenue by using sales revenue model, affiliate fees,transaction fees and subscription fees.Amazon.com get commissions from other publishers by referring customer to publisher's' website.
eBAY
eBay is an online auction and shopping website that allow people to buy or sell goods and services around the world.eBay use transaction revenue model to earn money from owning paypal and online paying system.There are three others fees that ebay earned:
Insertion fees: When an item listed on Ebay, this nonrefundable fee is charged.
Promotional fees: Fees that charged for additional listing options that help attract attention for an item, such as highlighted or bold listings.
Final value fees: Commission that charged to the seller at the end of the auction
moreover, eBay also earned money from sales revenue model which brought from its subsidiary company,Half.com which is selling goos website.
Thursday, January 22, 2009
eBay success and its causes

eBay was founded in September 3, 1995 by French computer programmer Pierre Omidyar. He started it for his wife so she could have a place to sell her collectibles. He originally named his auction website AuctionWeb. It remained that way for 2 years until 1997 when he renamed it eBay.
eBay is short for Echo Bay, which was the name of Omidyar’s consulting firm at the time. He had attempted to register the domain “EchoBay.com”, but found that it was taken, so he shortened the name to eBay.
In 1996, eBay hired Jeff Skoll, a Stanford MBA. He became eBay’s second employee and first president. He wrote the business plan that brought eBay from a startup to a great success. Ebay went public in 1998 as a auction website where people could post items for sell and buyers could bid on them in auction style in the same manner auctions are held offline. This would give people the opportunity to conveniently post items for sell that would otherwise be laying around serving no purpose. The very first item sold on eBay was a broken laser pointer.
When eBay went public it caught on like wildfire. Everyone was selling their old junk on eBay. Pierre Omidyar became a instant billionaire. Ebay ended the year with an average of close to 2 million daily auctions. The growth did not stop there though. Ever since eBay has been growing at record rates in terms of company expansion and financial growth.
The history of eBay leads up to the fact that eBay is the fastest growing company of all time. It is estimated that over 3000 new users find their way to eBay on a daily basis. Over 700,000 Americans report eBay as their primary or secondary source of income. There are now over 200 million registered users worldwide. People spend more time on eBay than on any other online site.
Wednesday, January 21, 2009
The history and evolution of E-commerce
E-commerce is any business related transactions partially or totally carried out by electronic medium especially on internet using Open networks or Closed network.The most important feature accountable for the success of internet is electronic commerce that allows people to buy or sell anything they want at anytime of the day or night (24/7).The process of advancement in Information Technology to evolve into a business transaction is the e-commerce history.
During prehistoric period before invention of electricity, transactions of all the business were done face to face or via letters. Later on this was substituted by telegraph, telephones and in mid 1980’s by fax machines. As large companies invested vastly in researching in order to develop more reliable electronic means of transaction, old technology was replaced by new technologies that were more consistent and spread much faster than the previous technology.
To interchange data and to carry out business deals electronically in 1960’s Electronic Data Interchange (EDI) was formulated. Initially e-commerce was facilitating business transactions electronically mostly using technology such as EDI (electronic data interchange) and EFT (electronic funds transfer) to send business documents such as purchase orders or invoices. Previously in 1970’s and 1980’s it also involved data analysis.
There have been several key steps in the history of e-commerce. The first step came from the development of the Electronic Data Interchange (EDI). EDI is a set of standards developed in the 1960’s to exchange business information and do electronic transactions. At first there was several different EDI formats that business could use, so companies still might not be able to interact with each other. However, in 1984 the ASC X12 standard became stable and reliable in transferring large amounts of transactions.
The next major step occurred in 1992 when the Mosaic web-browser was made available, it was the first ‘point and click’ browser. The Mosaic browser was quickly adapted into a downloadable browser, Netscape, which allowed easier access to electronic commerce. The development of DSL was another key moment in the development to of e-commerce. DSL allowed quicker access and a persistent connection to the Internet. Christmas of 1998 was another major step in the development of e-commerce. AOL had sales of 1.2 billion over the 10 week holiday season from online sales. The development of Red Hat Linux was also another major step in electronic commerce growth. Linux gave users another choice in a platform other then Windows that was reliable and open-source. Microsoft faced with this competition needed to invest more in many things including electronic commerce.
Napster was an online application used to share music files for free. This application was yet another major step in e-commerce. Many consumers used the site and were dictating what they wanted from the industry. A major merger, in early 2000, between AOL and Time Warner was another major push for electronic commerce. The merger, worth $350 million, brought together a major online company with a traditional company. In February 2000 hackers attacked some major players of e-commerce, including Yahoo, ebay and Amazon. In light of these attacks the need for improved security came to the forefront in the development of electronic commerce.
It is predicted that that revenues, up until 2006, will grow 40% to 50% yearly. Expectations of higher prices as well as larger profits for e-commerce business are also present. Also, we will see a larger presence by experienced traditional companies, such as Wal-Mart, on the Internet. It is believed companies in general will take this mixed strategy of having stores online and offline in order to be successful. It can be seen that there will be a large growth in Business-to-Consumer (B2C) e-commerce, which is online businesses selling to individuals. However, even though B2C electronic commerce may be the most recognizable there are different varieties.
Today the largest electronic commerce is Business-to-Business (B2B). Businesses involved in B2B sell their goods to other businesses. In 2001, this form of e-commerce had around $700 billion in transactions. Other varieties growing today include Consumer-to-Consumer (C2C) where consumers sell to each other, for example through auction sites. Peer-to-Peer (P2P) is another form of e-commerce that allows users to share resources and files directly.
Evolution of E-Commerce
E-Commerce was birth out of the World-Wide-Web (WWW). Although many people use the terms WWW and Internet interchangeably, the WWW is just one of the many services available on the Internet. The aspect of the WWW actually is a relatively new aspect of the Internet. While the Internet was developed in the late 1960s, the WWW came into existence more than a decade ago - in the early 1990s. Since then, however, it has grown phenomenally to become the most widely used service on the Internet.
Although the Web has made online shopping possible for many businesses and individuals, in a broader sense, e-commerce has existed for many years. For decades, banks have been using electronic funds transfer (EFT, also called wire transfer), which are electronic transmissions of account exchange information over private communication networks.
Businesses also have been engaging in a form of electronic commerce, known as electronic data interchange, for many years. Electronic Date Interchange (EDI) occurs when business transmits computer-readable data in a standard format to another business. In the 1960s, businesses realized that many of the documents they exchange related to the shipping of goods - such as invoices, purchase orders, and bills of lading - and included the same set of information for almost every transaction. They also realized that they were spending a good deal of time and money entering these data into their computers, printing paper forms, and then re-entering the data on the other side of the transaction. Although the purchase order, invoice, and bill of lading for each transaction contained much of the same information such as item numbers, descriptions, prices and quantities - each paper form had its own unique format for presenting that information. By creating a set of standard formats for transmitting that information electronically, businesses were able to reduce errors, avoid printing and mailing costs, and eliminate the need to re-enter the data.
ELEMENTS OF TRADITIONAL COMMERCE (seller side)
1. Conduct market research to identify customer needs.
2. Create product or service that will meet customer's needs.
3. Advertise and promote product or service.
4. Negotiate a sale transaction, including:
- Delivery logistics
- Inspection, testing and acceptance
5. Ship goods and Invoice customer
6. Receive and process customer payments
7. Provide after-sales support, maintenance and warranty service.
There are more activities than business processes in the traditional procedure. There are also more incompatible systems which the EDI does not communicate well with different Operating systems.
Electronic Commerce has brought the solution to this problem and drastically altered the structure and process for business transactions across networks.
Monday, January 19, 2009
About Kevin Ng

Hi there, I'm Ng Jen Wei. You can call me Kevin as well. I'm 23 years old and I'm from Alor Star, Kedah. I'm currently staying in Semenyih.
Firstly, let me explain what is the meaning of our group name 'E-Noll'. Well, the word 'E' comes from E-commerce. 'NOLL' stands for the first name of our group's members which are Ng, Ong and 2 Lim's :)
Talk about my hobbies, I like internet surfing, car modification, watching movies, swimming and music listening. I like internet surfing but don't like gaming. I surf internet everyday.
Top 5 websites I visited the most are:
http://forum.lowyat.net
www.zerotohundred.com
http://chinese.cari.com.my
http://auctions.yahoo.co.jp
www.e-kereta.com
The reason I visit the above websites the most is because I can do online business and earn some money. I also can get to know more friends that is similar interest with me then we can exchange knowledge about car modification.
Top 5 activities are:
- Online business
- Foruming
- Knowing friends
- Chatting
- Online movies
I think that's all for my part. If you wish to know more about me, you can add me to your MSN njenwei@hotmail.com
Thanks for viewing.
About Suat Leng

Hello everybody, my name is Lim Suat Leng. I grew up in a small village called Chuah which is located at Negeri Sembilan. I am currently a final year student for Bachelor of Business Administration (Hons) Entrepreneurial in University Tunku Abdul Rahman (UTAR), branch of Sungai Long. Actually, this is my first time to write my blog. My hobby is reading, watching movie, mailing and so forth. In spare times, I like listening to the music, reading a book or a magazine to keep myself well-informed. Well, I also enjoy shopping and traveling with my friends and family as well.
The following are the websites I usually visited:
www.yahoo.com
www.google.com
www.hotmail.com
www.youtube.com
www.friendster.com
www.sinchew.com.my
Normally, I would like to check my latest messages and reply or sending mail to my friends via Yahoo and Hotmail website. Google or Yahoo are the famous search engines that i often use for searching information that are useful for me. That useful information helps me a lot in doing my assignment. Besides that, I also visit You Tube website to watching the latest Hong Kong drama movie and search for any movie that i like. I like log on to Friendster website which allows me to keep in touch with friends and getting to know about their updates. Sin Chew Daily is a Chinese online newspaper site that enables me to know about current news, nation and worldwide.
There are my favourite internet activity that i usually do during my leisure time:
- chatting and share information with my friends
- check and reply or send e-mail to my friends
- searching information
- watching movie
- downloading videos and songs
I hope through this self-introduction that you have learned a little about me and who I am. Thanks for viewing my self- introduction.
Number of Visitors
Group members
- Ng Jen Wei
- Ong De Jia
- Lim Suat Leng
- Lim Sing Fei
Followers
Blog Archive
-
▼
2009
(20)
-
▼
February
(13)
- Things to take note to prevent e-auction fraud whe...
- Review a local e-commerce site
- Mobile payment systems in Malaysia: Its potentials...
- Corporate Blogging: A new marketing communication ...
- The application of pre-paid cash card for consumers
- The Threat of Online Security: How Safe is Our Data?
- E-Government in Malaysia: Its implementation so fa...
- Credit Card debts: Causes and Prevention
- Electronic Currency
- The application of 3rd party certification program...
- How to safeguard our personal and financial data
- Phishing: Examples and its Prevention Methods
- Example of E-Commerce failure and its causes
-
▼
February
(13)