Tuesday, February 24, 2009

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

Auction is market mechanism which buyers make bids and sellers place the staring offers. It is characterized by the competitive and dynamic nature by which the final price is reached. Auctions can rapidly disposal of items that needs liquidation or a quick sale, they offer trading opportunities for both buyers and sellers that are not available in conventional channels and they ensure cautious execution of contracts.

Types of auctions are traditional auctions, electronic auctions, dynamic pricing, English auctions, Yankee auctions, Dutch auctions, free-fall auctions, sealed-bid first-price auction and sealed-bid second-price auction. The most popular type of auctions is an electronic auction (e-auctions) which means auctions conducted online. The most popular e-auction website in Malaysia are eBay.com.my, Lelong.com.my, and so on.

Things to take note to prevent those e-auction fraud are:
- View carefully the sellers' post selling record by viewing the seller's profile and feedback from his or her post transaction records.

- Know the e-auction website precedure and regulation. Find what obligations you have as a buyer, and what obligations the seller has before you make a bid. Seller will not liable to help you if you do not follow proper prevention measures.

- Do not simple expose your personal data such as user name and password, credit card numbers, bank account numbers and others.

- Strongly request the seller to do self delivery where both parties will be able meet up face to face and complete the transaction. In other words, it can be said Cash On Delivery. If the seller is stay other states, request the seller to give you the tracking numbers of the posted item from postage companies in order to track the status of the item will be sent.

- To protect sellers, a friendly warning for first-time nonpayment. A sterner warning is for second-time offense, with a 30 day suspension for a third offense and an indefinite suspension for a fourth offense.

- Check the item physically for damage and internal failure of some electronic items or collector items.

Friday, February 20, 2009

Review a local e-commerce site

Nowadays, there are many local e-commerce website in Malaysia. Lots of company or organisation starting to use website to do the business and gain revenues through Internet. Examples of local e-commerce websites are http://www.lelong.com.my/ ,

http://www.malaysiaairlines.com/ ,
http://www.neowave.com.my/ ,
http://www.airasia.com.my/ and so on.


Among this website, the http://www.airasia.com.my/ is the websites that i always visit.


http://www.airasia.com/



This website is provided by Airasia Berhad. The purpose of creating the website is to bring convenient to customers. Customer can make online flight booking without enter to the Airasia counter.
In the websites,there are many information provided. For example are the latest promotion of the flight tickets, attraction destination details, hotels details, travel services and so on. Within only a website, customers can catch and grab all the latest information to fulfill their needs.
To visit the website, the customers have to state their current location they situating and the prefferer language in the website.To buy the ticket customers have to become the Airasia before proceed to another steps.
All the instructions is stated to teach customer to make online buying. This will make customer feel more easy when trying to make transaction.Term and condition about carriage also listed to avoid customer become confuse.
The other services that the website provide include:
-- future flight info
-- products & shopping
-- pick a seat service
-- hotel booking, etc.

The design of the website is is nice.The colour use of the page is red which is match with Airasia theme. The arrangement of the icons in website is tidy and will not make customers feel comfortable.This show all the items in the website is well arranged.
Talking about the security to make online ticket buying, the security is quite good and safety. Everyone who want to make booking, he or she have to login. Then choose the desire flight and pay by credit card.While the system use to avoid payment fraud include Address Verification System(AVS) and Card Verification Number (CVN),etc.
After the transaction finish the Airasia will send a mail to inform customer. This such a good local e-commerce website is welcomed by all the users.

Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies

MoBiLe PaYmEnT:
Mobile payment defined as the process of two parties exchanging financial value using a mobile device in return of goods and services.

Nowadays,the mobile payment become rapidly-adopting alternative payment method – especially in Asia and Europe. Instead of paying with cash, check or credit cards, a consumer can use a mobile phone to pay for wide range of services and digital or hard goods.Music, videos, ringtones, online game subscription or items, wallpapers and other digital goods are the examples of the items that can buy through mobile.

The potential for this market is quite big, because it is very convenient to use mobile payment and the users of the mobile users keep on increasing.


The mobile payment providers have a large market share to be grab on. This mobile payment is still new and developing in Malaysia. It has potential to continue to grow as consumer’s confidence on mobile payment increased. Mobile payment providers has most potential for growing

Mobile Money:


Mobile Money is a PIN-based Mobile Payment Solution designed by Mobile Money International Sdn Bhd to address the limitations and bottlenecks created by cash, cheques and credit cards. It unlocks the power of the mobile phone to make payments, allowing registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service). This gives the freedom to shoppers to buy products online and pay the merchant using his/her mobile phone without being physically present at the store.


Strategies:
@..Educate consumers about mobile payments, how to use and introduce its functions (e.g. bill payment, mobile purchase), and tell them what is the benefits when using mobile payment.

@..Enchance security and confidence to mobile users. This is to provide more secure and safe services for those who use who use mobele payment.

@..Collaborate with more banks and companies to widen the ability to pay via mobile at the same time it helps to increased customer’s satisfaction and confidence.


@..Try to reach anyone,anytime and anywhere.The merchant can now sell to people across town, across the country and take payment around the clock, which is not possible with current payment systems.


@..Provide multi methods for users to make payment .Users can use an IVR, SMS, Mobile Money Website, or even real time Mobile Money Weblink API weblink to make payment.


related link:


http://en.wikipedia.org/wiki/Mobile_payment


http://www.neowave.com.my/mobilemoney_overview.asp

Monday, February 16, 2009

Corporate Blogging: A new marketing communication tool for companies

A corporate weblog is published and used by an organization to reach its organizational goals. Corporate blogs are similar to online newspapers, in that they allow companies to tell their audience the latest news on both their industry and company?s products. When properly executed corporate blogs can become the voice of the company, giving you a vehicle with which to establish a direct relationship with your customers and your employees that builds trust and loyalty organically. Currently, all major browsers, including Firefox, Opera, Safari and Internet Explorer 7 support RSS technology, which enables readers to easily read recent posts without actually visiting the blog. There are several reasons why corporate blogging can become a new marketing communication tool for companies:



1) Build rapport with customers
At this time of writing, there are more than 100 million blogs worldwide. If you publish a corporate blog, you’re giving your customers a channel to interact and get to know your brand and organisation in a format that they’re familiar and comfortable with. Plus, you’ll earn extra points from them because you speak their language.

2) Customer Relationships and Feedback
In every instance, the point of a business blog marketing campaign is to establish a two-way channel for communication between a business and its customers. Corporate blogging gives you insights to what people are saying about your products, your brand, your competitors, your marketing from the comfort of your office chair. These insights come in the forms of comments on your blog or commentary and discussions that take place on other blogs.

3) Increased website traffic from higher search engine rankings
Search engines like new content, especially content that comprises of short paragraphs with many rich and relevant keywords. It's also easy to generate and boost link popularity to your corporate blog. Search engines favour websites with fresh content and ranks your blog higher in search results, which in turn results in a greater number of referrals from search engines to your website and blog. The quicker you start the higher your ranking.

4) Corporate blogs are learning tools for companies
Blogs to be successful have to be updated constantly. Always be truthful. Make sure that the information that you post on your corporate blog is accurate. If you don't know something or are unsure, admit it. Being human reinforces your honesty and credibility. Besidea that, campanies can writing blogs to communicate the latest information about products with customers. Blogs allow comment postings from customers. As a result such technical companies are capturing new information from customers at a faster rate.

5) Small hard dollar cost, higher soft dollar costs
Return on investment is why a company should start a corporate blog now. The hard dollar investment is small. Blog are complex content management run websites. However, a simple blogging tool can be rented for $50/year. The soft dollar investment requires regular postings at least 3 times a week.

Sunday, February 15, 2009

The application of pre-paid cash card for consumers

Many people are rejected after filling out a credit card application because of poor credit. The problem with this is that a major credit card is needed to make reservations for hotels, motels, car rentals and airline flights. Credit cards are also necessary when placing orders online or over the phone. Does this mean a person with bad credit can't do any of these things? Not if that person has a prepaid cash card.

Prepaid cash card is the card which requires you to load funds into the card and use
that money to make purchases and get cash. Once you have money in that
card, the card can be used anywhere one would just like a regular credit card. You are not borrowing money from a bank or other financial institution. The best part of the prepaid cash card is that you can charge to your heart's content and you won't be in debt. The money is yours and once it is out of the credit, you can't spend anymore until you make another deposit or top up. The prepaid cash cards look, feel and work like a credit card but are pre-funded “stored-value” cards and there are no bills. It's the same principle as using a debit card linked to a savings or current account.

The concept of these prepaid cash card can help us control our spending. A reloadable cash card allows us t
o only spend up to the amount that we have pre-deposited into the account. If you tend to overspend or would like to control our spending then a prepaid cash card could be a good card for us.


One of the prepaid cash card that famous is NEXG card by Ambank. It is MasterCard that can be uses in everywhere in the world. It is very easy to get with RM25 starter pack from any 7-Eleven stores. One can simply start using prepaid cash card when money has been loaded on to a prepaid card by cash at a bank, Post Office, at Payzone or PayPoint terminals, bank transfer, through your employer or even by credit card.


This concept is also applied to another bank which is Maybank. Maybank offers debit card which is similar with prepaid cash card but it is directly deduct the money from your saving or current account. Other bank like Public bank also provided this type of debit card.



Application of prepaid cash card for consumers

- Buying petrol

- Online shopping
- Hotels booking
- Paying bills
- Online ticket booking
- People who travel that refuse to carry too much cash
- Those who cannot get approval of credit cards application
- Person who has poor credit rating or a history of bad debt who cannot get a credit card
- Allows you to set spending limits for you or yo

The Threat of Online Security: How Safe is Our Data?

As the technology advancement has become more complex, the opportunities for the attacker to do attack are increasing. Many online businesses, company website no matter private or public, government agencies and others are facing the crisis being attack. There have two types of threats and attacks around the online society. There are non-technical and technical attacks.
1) Non-technical attack is an attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network.
a) Phishing is a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing credential. It is also known as THEFT.
2) Technical attack is an attack perpetrated using software and systems knowledge or expertise.
a) Denial-of-Services (DOS) attack
-- An attack on a web site in which an attacker uses specialized software to send a flood of data pockets to the target computer with the aim of overloading its resources.
b) Distributed denial-of-service (DDOS) attack
-- Attacker gain illegal administrative access as many computers on the internet as possible and uses the multiple computers to send a flood of data packets to the target computer.
c) Viruses
-- It is a piece of software code that inserts itself into a host, including the operating systems, in order to propagate; it cannot run independently, it requires that its host program be run to activate it.
d) Worm
-- It is a software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine.
e) Trojan Horse
-- It is a program that appears to have a useful function but that contains a hidden function that presents a security risk.

How safe is our data?
There have a lot of tools that can be used by the users to secure their data. The simplest aspects of network security are access control and authentication. Access control is a mechanism that determines who can legitimately use a network resources and which resources he, she or it can use. Typically, access control lists (ACL) define which users have access to which resources and what the rights they have with respect to those resources.
Once a user has been identified, the users must be authenticated. Authentication is the process of verifying that the user is who he or she claims to be. Verification is usually based on one or more characteristic that distinguishes the individual from others. The distinguishing characteristic can be based on something one knows like password, something one has like token, something one is like fingerprint.
Tokens qualify as something one has. Tokens come in various shapes, forms and sizes. There have two types of tokens such as passive token and active token. A passive token is the storage devices that contain a secret code used in a two-factor authentication system. Meanwhile, a active token is the small, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system. A two-factor authentication is combining something one knows with something one has.
A biometric system is one of the authentication methods that recognize a person by a physical trait. It identifies a person by measurement of a biological characteristic such as fingerprints, iris (eye) pattern, and facial features or voice. It can identify a person from a population of enrolled users by searching through a database for a match based on the person’s biometric trait. Furthermore, biometric system can divide by two types such as physiological biometrics which the measurements derived directly from different parts of the body and behavioral biometrics which the measurements derived from various actions and indirectly from various body parts.
Another tool that can use is public key infrastructure (PKI). It is using in encryption process. It is the process of scrambling (encrypting) a message in such a way that it is difficult, expensive or time consuming for an unauthorized person to unscramble (decrypt) it.

Friday, February 13, 2009

E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.

E-government

The Electronic Government initiative in Malaysia was launched to lead the country into the Information Age. It has improved both how the government operates internally as well as how it delivers services to the people of Malaysia. It seeks to improve the convenience, accessibility and quality of interactions with citizens and businesses; simultaneously, it will improve information flows and processes within government to improve the speed and quality of policy development, coordination and enforcement.

The vision of Electronic Government is a vision for government, businesses and citizenry working together for the benefit of Malaysia and all of its citizens. The vision focuses on effectively and efficiently delivering services from the government to the people of Malaysia, enabling the government to become more responsive to the need of its citizens.

The seven projects of the Electronic Government Flagship Application are as follows:

1) Project Monitoring System (SPP II)
2) Human Resource Management Information System (HRMIS)
3) Generic Office Environment 9 (GOE)
4) Electronic Procurement (EP)
5) Electronic Services (E-Services)
6) Electronic Labour Exchange (ELX)
7) E-Syariah


The myGovernment Portal (http://www.gov.my/) act as the one-stop source of Malaysian government information and the services for the citizens.



Strategies for Citizen-Centered EGovernment

In looking at these processes, it is possible to envision a range of integrated and coordinated methods, approaches, and strategies to better incorporate users in the development of E-Government services. These strategies are neither complicated nor difficult to implement. They may, however, result in additional costs and effort in the implementation of E-Government services.

1) Comprehensive Plan for User-centered E-Government Services Design
A comprehensive plan for user-centered E-Government services minimally includes identifying the goals of that service; ways in which the service supports other agency/ government goals; managerial structure for the development of the service; target audience(s) of the service; information needs of users that the service addresses; resources available for the development of that service; and time line describing key tasks and responsibilities for the development, implementation, and evaluation of that service.
Most importantly, the plan describes the specific citizen-centered strategies that will be incorporated in the design and operation of the E-Government service under development. Development of E-Government services without such a plan is likely to result in poor quality services with limited capacity to meet user information needs – though a service may in fact meet agency goals of cost reduction.

2) Conduct User Information Needs Assessments
Before the design and development of an E-Government service, governments need to understand how users seek information on a particular topic or issue (strategy); acquire information on a topic or issue (acquisition); solicit expertise (source); and use of that
information (application). Such knowledge enables governments to know how users find and use information, as well as the sources they use. Equally important is understanding how the information is to be used and what specific types of problems the user intends to address with the information. This helps in not only an overall understanding of users’ information behavior, but also identifies potential community partners to assist in EGovernment service delivery and adoption strategies (more on this
below).

3) Understand User Information and Communication Technology Availability, Expertise, and Preference
Developing a Web-based E-Government service that requires a broadband connection, high-end computer, and advanced technology competencies can immediately exclude a segment, or multiple segments, of the intended service population. For example, the Department of Children and Families in Florida, through its services (food stamps, medicare, cash assistance) gateway application Access Florida
(http://www.myflorida.com/accessflorida/), requires that its clients complete the application online. And yet those who qualify for these services are the least likely to own a computer, have access to the Internet, or be conversant in computing and Internet technologies (Pew Internet and American Life Project, 2007). The tension between system developers and designers and user ability to use high-end computing and telecommunications is critical to resolve. A too complex system may not be used at all; a
system that resides on technologies to which the user does not have access will also guaranty failure. By understanding the technology access and capabilities of the various segments of users, governments can develop systems that better meet the needs of users, but also understand the types of training and support users may need for successful engagement of E-Government.

4) Engage Users
Top-down, systems-oriented E-Government services can result in elegantly designed and technically sophisticated E-Government systems that completely miss the intended users’ needs. The top down approach is often less costly than conducting a range of user-based needs assessments and other strategies as outlined in this paper. The products and services that can result from topdown or systems based design can include, for example, lengthy forms that collect unneeded data; services that defy logic in their use and/or access; complicated instructions that simply cannot be accommodated by online applications; and excessive personal data for which the user has not been reassured of privacy and security concerns (to name but a few). All of these types of problems can be identified and corrected by engaging users in the actual design of the service. There are a range of tools and techniques in which governments can engage to develop successful E-Government services such as focus groups and interviews (with experts and users); usability, functionality, and accessibility testing throughout the design and development process; encouraging real-time comments and suggestions about the services being used; log file and transaction log analysis; providing interactive help screens or 1-800 assistance; and developing and adhering to measures and standards of service quality. There are other strategies and approaches, but the key is to include user feedback during the E-Government services development and design phasen phases as well as while the services is in operation- not as an after thought.

Saturday, February 7, 2009

Credit Card debts: Causes and Prevention

Credit cards can be very convenient when we purchase things from the grocery, from the bookstore, at the auto shop, or online stores. With one swipe or a few clicks, the transaction is done. Collectively, these swipes of convenience annually amount to $8 Trillion for Americans. Balances for credits can go spiral and debt accumulates faster more than we can imagine. If you are just starting out and thinking about applying for a credit card or loan or already have a credit history, it is important to understand what causes credit card debts.

1) Less income, more expenses
Too often we delay bringing expenses in line with a reduction in income for a host of good reasons and let debts fill the gap. It so happens that the main breadwinner of the household loses his job but monthly expenses are not cut down in line with the reduction in income. This obviously leads to a rise in debt. The family is forced to use their credit cards for groceries, utilities and so forth.

2) Poor money management
Poor money management is one of the best reasons why so many families accumulate lots of debt. Without a monthly spending plan, you will have no idea where your money is going. You might be spending hundreds of dollars every month towards items that are useless and have no value in your life, yet you do not realize it. While your money is going towards purchasing useless items, you might also be charging your necessary purchases on your credit card, forcing you to pay interest on these purchases every month.

3) Underemployment
People who experience underemployment may continue to think of it as only temporary or if they are coming off unemployment feel a false sense of relief. But if you are underemployed meaning you are not getting enough working hours at your job, you should also cut down on your lifestyle to match your current income. Forget about driving a BMW if you are working only 30 hours a week at the Home Depot making minimum wage. However, if you are a Financial Controller with a local Corp. then you should think about driving a BMW.

4) Big medical expenses
Nowadays, almost all doctors accept credit cards. If you think it's for convenience, think again. The medical industry wants to get paid at the time service is rendered. They know that if they don't, the chances of their getting paid drops. This means more debt for you, less for them. To be fair, they are not in the lending business, but this only masks a bigger problem. While you need treatment now, you do not have the cash. So what do you do? You will use your credit card because you do not have enough savings in the bank.

5) Gambling
Many people put not only their own disposable income on the line when gambling, they also borrow loans to gamble! You see, Casinos would not exist if every one person won money in it. Probably 1 in every 100 people wins money in the casino over the long term. Another huge boom in the gambling industry is the emergence of Party Poker and online gambling websites that are illegal in the USA. Online gambling is so easy that you don't even have to step out of your house, you can do it right in your bedroom with a small PC!


Credit card debt is the main contributor to personal debt and cause for many financial problems. Once your credit card debt starts growing it becomes more and more difficult to eliminate it and become debt free. Everyday you get credit card offers, by mail, on the internet, etc. But you need to act consciously and opt out if you are not sure you will be able to afford it or if you do not trust yourself with it. If you know you overspend and have no control on your expenses, it is wise to start modifying such behaviors and avoiding getting extra credit cards would be a wise start.The following are some suggestion to prevent credit card debts.

1) Choose your credit card wisely
The first thing to preventing credit card debt is to choose your credit card cautiously.The main item to look at is the interest rate; you should try to find the lowest rate available. To do so you can join one of those internet companies that offer reviews on many credit card offers, these sites also offer direct links to the credit cards application so actually you will get all the work done for you.

2) Setting a budget
Create a budget and stick to it. By setting a clear budget that includes all of your monthly bills, food, entertainment and miscellaneous item, you can learn where your money is going and how to save and reduce your expenses. This will help reduce your credit card debt.

3) When you can, use cash, not credit
If you carry a balance, use your card for as little as possible. When you write checks, use a debit card or fork over cash for each purchase, you will be more conscious of your spending and will end up spending less.

4) Pay more than the minimum payment each month and pay on time
Never pay the minimum unless you have no other choice, and make sure to pay more as soon as you can. If you are constantly making late payments because the bill is due before your paycheck arrives, ask your credit card company if your billing date can be moved. Often times they will be happy to change it to ensure that you pay the bill on time.

5) Negotiate with the credit card companies
The amount of credit card debt has made creditors realize that if they want to get any money back, they have to make deals! If a card charges an annual fee, ask that it be removed. Many cards don't charge a fee, so you can always switch to one of these cards. Most credit cards will remove the fee if you simply ask.

Electronic Currency


eCurrency

Electronic money (digital money or eCurrency) refers to species and operations implemented by electronic means. Typically, this involves the use of computer networks (such as the Internet) and digital stored value systems. Electronic Funds Transfer (EFT) is an example of electronic money. It is also a collective term for technologies of cryptography and enable it.
Although electronic money has been an interesting challenge for cryptography (see, for example, David Chaum work), the use of digital cash to date has been relatively small scale. One of the few success has been Hong Kong system of Octopus card, which began as a system for payment of transit and became widely used electronic payment system. Another success was the Canadian Interac network, which as of 2000, exceeded the cash payment method to retail in Canada.


Electronic Money and Currency
Technically, electronic or digital money, also known as eCurrency, is a system of representation or debits and credits used, but not limited to the exchange value in another system or a single system itself, online or offline. eCurrency or electronic money is also sometimes used to refer to electronic money Society itself. Electronics can be an independent Fort Gold as the currency e-gold or not backed by gold as eeeCurrency or just before the euro as legal tender the Euro was introduced in 2002.

Some eCurrency systems sell to the end user directly, such as Paypal, but many systems or to sell through their own exclusive eCurrency market, such as e-Gold and Omnipay or eeeCurrency system and the system eCurrencyExchangers , Or through a market Maker or exchange eCurrency that could cover a range of electronic money. These interchanges can be automated systems such as System eCurrencyExchangers or manually exchangers as the golden age.
In the case of the Octopus Card in Hong Kong, deposits work similar to banks. After Octopus Card Limited receives money for deposit from users, money is deposited in banks, which is similar to a debit card issuing banks redepositing money from central banks. Some currencies, as some LETS systems, working with electronic transactions. Cyclos software allows the creation of the electronic community currencies. Ripple monetary system is a project to develop a distributed system of electronic money independent of the currency.

Benefits and Advantages of eCurrency

More money in the world today is electronic, and species concrete starts to become less frequent. With the introduction of the Internet / online banking, debit cards, bill payments online, and Internet companies, paper money is becoming a thing of the past.
Banks now offer many services whereby a customer can transfer funds, purchase stocks, contribute to their pension (as the Canadian RRSP) and offer a variety of other services without having to manage physical cash or checks. Customers do not have to wait in lines, thus providing a lower hassle.Debit cards and paying bills online to allow the immediate transfer of funds from one individual account to a company without any paper money transfer. This offers great convenience to many people and businesses.


Issues and Disadvantages of eCurrency

Although there are many advantages to digital cash, there are also many disadvantages. They include fraud, failure of technology, and loss of human interaction. Digital cash fraud has been a pressing issue in recent years. Hacking bank accounts and illegal extraction of bank led to a widespread invasion of privacy, and encouraged identity theft.
There is also a pressing issue regarding digital technology in cash. The outages, loss of documents, software and undependable often cause a major setback in the advancement of technology.The largest demographic in society, the baby boomers, have been reluctant to adopt the many advantages of digital cash. This is due to the loss of human interaction that often occurs when digital cash is used to its full potential. Therefore, what has deterred a large segment of global society of technological advantage.



Future Directions
The main objective of digital cash is able to spend through various means such as secured credit cards, bank accounts linked to be used on the Internet a medium of exchange to a system of micro payment as in large companies (PayPal).

Future developments of networking in terms of digital cash, a company is named Digicash on the creation of an e-cash system that would allow an e-issuer in cash to buy electronic parts at a certain value . When they purchased, they are purchased under its name and stored on their computers or their online identity. When expenses of the fund because it is linked to e-cash society, it provides everything that is bought in terms through the issuer at any time since the company knows your information, and the direct purchase of your home.

Thursday, February 5, 2009

The application of 3rd party certification programme in Malaysia


One of the famous application of 3rd party certification program in Malaysia is MSC Trustgate.com Sdn Bhd. MSC Trustgate.com Sdn Bhd was incorporated in 1999 and is a licensed Certification Authority (CA) under the operation of the Multimedia Super Corridor. Certification Authority is the body given the license to operate as a trusted third party in the issuance of digital certificates. They also offered complete security solutions and leading trust services that are needed by individuals, enterprises, government, and e-commerce service providers using digital certificates, digital signatures, encryption and decryption. Trustgate is licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development.

VeriSign is the leading Secure Sockets Layer (SSL) Certificate Authority under Trust.com which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network.

Digital certificate usually attach to an e-mail message or an embedded program in a web page that verifies that user or website is who they claim to be. The common functions of a digital certificate are user authentication, encryption and digital signatures. User authentication provides other security than using username and password. Its session management is stronger. Encryption can make the data transmission secured by using the information encrypted. The intended recipient of the data is only person to receive the message. Digital signatures are like the hand signature in the digital world. It can ensure the integrity of the data.

By using the digital certificate, the users will be able to make transaction on the internet without fear of having the personal data being stolen, information contaminated by third parties, and the transacting party denying any commercial commitment with the users. Furthermore, the digital certificates can assist the development of greater internet based activities.




With the increasing of phishing on the internet, customers want to make sure that whether they are dealing business with a trusted party. They are afraid of their personal information such as ID number, passwords, credit card numbers and so on, will be sent to those companies which do not exist in this real world. Thus, the certification from 3rd party is needed to ensure their information traveled over the Internet reaches the intended recipients and is safe. Most of the banks in Malaysia will show their verified certificate on their online banking website to avoid phishing.

Lastly, by applying that 3rd party certification, there are more secured for online shopping, so that the customers can shop safely.

Tuesday, February 3, 2009

How to safeguard our personal and financial data

Nowadays, most people rely on computers especially the Internet to create, store and manage critical information. But the Internet is no longer a safe place. Information transmitted over the Internet is more vulnerable and has a higher degree of security risk than internal networks because they are open to anyone. Hackers have ability to intercept and use that information, such as credit card numbers and expiry dates, to falsely do transactions. Therefore, protecting yourself from predators and theft on the Internet is very important to prevent our privacy information from exposure. The following are some suggestion to safeguard our personal and financial data.


1. Password Protection
Do not choose a password and PINs that is easily guessed, like your telephone number, date of birth, IC number, or other associated data. You should select a robust and unique PINs to make it difficult for anyone to guess. Do not use sequential numbers (e.g. 123456) or the same number
more than twice (776790). Do not share or divulge your password to anyone. Memories your password. Do not write down your password or store it in computer hard-disk, diskette, mobile phone or other insecure means. Do not use your password when someone else can see you keying it in. Change your PINs regularly. Change your password immediately if you suspect it has been exposed to others or the moment you suspect any unauthorized access to your computer.

2. Always log off your online session
Log off your online session whenever you leave your computer, even for a short while. This immediately ends yours iBanking session and prevents further transactions from being when not carried out without a fresh login. You should also shut down your computer, when not in use, to prevent unauthorized access to your computer.

3. Do not disclose your personal data to suspected websites
To prevent your personal information frodisclose your m being captured by bogus websites, you should not disclose your personal, financial or credit card information to little-known or suspected websites. The best way to protect our financial and personal data is by conducting the transaction with trusted, well known online retailers that using the reputable payment processors like Paypal or Google Checkout.

4. Protect your computer from viruses and malicious programs Apart from destroying important data on your computer, viruses or malicious programs such as Trojan Horse may run a password sniffing program in the background to capture your password keystrokes without your knowledge. Being constantly online may increase your risk exposure for your computer. To avoid getting infected, you should:

  • Never download any file from sites (e.g. program, game, picture, mp3 song) or people (e.g. email attachments) that you aren't sure about.
  • Delete junk or chain emails.
  • Never use features in your programs that automatically get or preview files.
  • Install firewall and virus detection software to protect against hackers, virus attacks or malicious "Trojan Horse" programs. You should also update your software's virus definition frequently.

5. Check your account and transaction history details regularly Always check your transaction history details and statement regularly to make sure that all details are updated and there are no unauthorized transactions on your accounts.

Phishing: Examples and its Prevention Methods

Phishing is ...

The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that may be used for fraud or identity theft. The e-mail directs the user to visit a Website where they are asked to update personal information such as: passwords, credit/debit card info, Social Security number, and the credit union/bank account numbers that the legitimate organization already has. The Website, however, is a spoof and set up only to steal the user's information.

Examples phishing:


1) Phishing e-mail from TrustedBank:

An example of a phishing e-mail, disguised as an official e-mail from a (fictional) bank. The sender is attempting to trick the recipient into revealing secure information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy. Such mistakes are common in most phishing emails.


2) An example of a phishing e-mail targeted at PayPal users:

In an example Paypal phish (right), spelling mistakes in the e-mail and the presence of an IP address in the link (visible in the tooltip under the yellow box) are both clues that this is a phishing attempt. Another giveaway is the lack of a personal greeting, although the presence of personal details would not be a guarantee of legitimacy. A legitimate Paypal communication will always greet the user with his or her real name, not just with a generic greeting like, "Dear Accountholder." Other signs that the message is a fraud are misspellings of simple words, bad grammar and the threat of consequences such as account suspension if the recipient fails to comply with the message's requests.


3) An example of a scam email from Citi Bank:


4) Phishing e-mail from Citizens Bank:

ISPs, banks, etc. do not ask for passwords and the like to be entered by email. Be suspicious of any email message that asks for personal information. Don't ever follow a link in an email that asks you to update or verify sensitive information. If you want to contact a company, go to their Web site by using a link from your records or telephone them.


How to avoid falling for a Phishing (fishing) Scam?
Most of the case of phishing are related to your bank account number ,password ,credit card detail information, social security card number and your e-currency account information .Some of the latest phishing are related to you paypal ,yahoo mail ,gmail and other free mail service .Just to keep in mind none of those official company mentioned above will ask you to provide any information via e-mail .If you receive the similar request to ask you to provide the detail or link to the web site in that mail ,it must be internet phishing scam.

Phishing Prevention Methods:

1) Do not reply to or click on a link in an e-mail that warns you, with little notice or prior legitimate expectation that an a account of yours will be shut down unless you confirm your billing information. Instead, contact the company cited in the e-mail using an authenticated telephone number or other form of communication that you sure is genuine.

2) Legitimate companies, especially financial institutions should never ask you to verify your account information. If you get an e-mail that asks for this type of information, delete it and report it to the company being phished.

3) Before submitting financial information through a website, look for the locked padlock on the browser’s status bar or look for http:// at the beginning of the web address in your browser’s address window. The presence of a padlock and the http:// does not guarantee that the website is legitimate or secure. However, the absence of either the padlock or the http:// does indicate that the web site is not secure.

4) Identifying a phishing e-mail may be easier than it appears. Sometimes, the entire e-mal is a graphic which may be a sign. If you cannot highlight words, then you know it’s a graphic, sometimes with a link. Also, if you hover your mouse over graphic or other link, you can usually view the actually link (at the bottom of your screen or a hover line). The link may be something else than it actually says in the e-mail. If you do click on the graphic or link, check the url to make sure it actually is from the domain of your financial institution.

5) Use anti-virus software and make sure you have a firewall in place.

6) Review all financial statements (online or paper) as soon as you can so you can see if any unauthorized
charges are present. Log into FMFCU’s e- Banking for an even more up-to-date transaction history.

7) Never send e-mail with sensitive personal or financial information. E-mails are not secure. Visit official websites and login securely to send this type of information.

8) Always be aware of attachments in e-mails. Never open an attachment from someone you do no know. This could contain a potential virus.

9) Always make sure your web browser contains the latest patches. Newer browsers will eventually contain anti-phishing features to help you even more.

10) NEVER click on a link in an email in order to enter your log-in information or password. Instead, if you think the email may be legitimate, go directly to the company website using your Internet Explorer or Netscape browser. (Do not copy and paste a url address out of a suspicious email.)Hackers can easily mask a fake link, making it look like it is going to the proper site when it is not. Instead, type the link into your browser window by hand.

11) Learn your financial institution’s security measures. PayPal, for example, will never send you an email that does not begin with your full name. If you receive an email with a salutation like, “Dear PayPal Member” you know it is a fake.

12) Monitor your credit rating closely. Keeping a careful eye on your credit score is the best way to learn if you have fallen victim to an identity scam. An ID Theft protection product from MyIDFix.com can alert you to identity problems immediately so that you can fix them before they get out of hand.

Sunday, February 1, 2009

Example of E-Commerce failure and its causes

An example of the e-commerce failure is Boo.com. Boo.com was a British Internet company founded by Swedes Ernst Malmsten, Kajsa Leander and Patrik Hedelin that famously went bust following the dot-com boom of the late 1990s. After several highly publicized delays, Boo.com launched in the Autumn of 1999 selling branded fashion apparel over the Internet. However, after spending $135 million of venture capital in just 18 months, it was placed into receivership on 18 May 2000 and liquidated.







The causes of the e-commerce failure…

The first reason of failure is Timing. Although there were several months of delays prior to launch and problems with the user experience when boo.com first launched as described below, these had been largely cured by the time the company entered receivership. Indeed sales had grown rapidly and were around $500,000 for the fortnight prior to the site being shut down.
The fundamental problem was that the company was following an extremely aggressive growth plan, launching simultaneously in multiple European countries. This plan was founded on the assumption of the ready availability of venture capital money to see the company through the first few years of trading until sales caught up with operating expenses. Such capital ceased to be available for all practical purposes in the second quarter of 2000 following dramatic falls in the NASDAQ presaging the "dot crash" following the Dot-com bubble. Boo would probably have failed for this reason even if the user experience had been excellent and the launch on schedule. Boo were only the first of numerous similar Dot-com company failures over the subsequent two years.

The second reason of failure is problems with the user experience. The boo.com website was widely criticized as poorly designed for its target audience, going against many usability conventions. The site relied heavily on JavaScript and Flash technology to display pseudo-3D views of wares as well as Miss Boo, a sales-assistant-style avatar. The first publicly released version of the site was fairly hefty—the home page alone was several hundred kilobytes which meant that the vast majority of users had to wait minutes for the site to load (as broadband technologies were still not widely available at that time). The site's front page did contain the warning, "this site is designed for 56K modems and above".
The complicated design required the site to be displayed in a fixed size window, which limited the space available to display product information to the customer. Navigation techniques changed as the customer moved around the site, which appealed to those who were visiting to see the website but frustrated those who simply wanted to buy clothes.
Its interface was also complex with a hierarchical system that required the user to answer four or five different questions before revealing that there were no products in stock in a particular sub-section. The same basic questions then had to be answered again until results were found.