Monday, July 7, 2008
A review on post on Legal from My E-Commerce blog
Even thought we all know that illegally downloading will make a lot of losses for the original producers, and it is unethical action, there is an argument about the original sources are much more expensive. Well, that is one of many excuses from downloaders.
Today, we don’t have a law specifically against the downloaders as there is less or even no downloading before. Yet, law been built is to be fairness, and protect human being. There is no free lunch in reality; we must pay before we get anything. Internet is the virtual world that we can perform many things, but not everything is right.
Does the new law bring effect to the world? We may not know. It may reduce number of downloaders, less illegal downloading, less pirated material. Who are willing to take risk in producing those materials if nobody needs pirated material? Even the new law works, there still have the problem. It may not be eliminated as there are many ways to cover up the crime.
Well, if there is your favourite movie or favourite song, are you willing to pay for original producers to let them earn more and produce more? Or you rather to pay for pirate providers, let them earn your money but they just copy from producers?
Saturday, July 5, 2008
E-Government in Malaysia: Its implementation so far and citizen’s adoption strategies.
The Electronic Government initiative in Malaysia was launched to lead the country into the Information Age. It has improved both how the government operates internally as well as how it delivers services to the people of Malaysia. It seeks to improve the convenience, accessibility and quality of interactions with citizens and businesses; simultaneously, it will improve information flows and processes within government to improve the speed and quality of policy development, coordination and enforcement.
Current applications of e-Government in Malaysia such as
1. e-Filling- Renewing Road Tax
2. Driving License online,
3. KWSP’s i-Akaun
4 .E-Perolehan
Common problems encountered by consumers
1. Security and privacy – consumer maybe worry about their private personal data and the tax return can see by others.
2. Credibility – how accuracy of the e filing system and how to ensure that the system will not make the mistake?
3.Technological knowledge – some of the people maybe don’t have the technological knowledge. So they maybe don’t how to use the e government application via internet.
Suggest ways to encourage more citizens to use the e-government applications
1. Improve the security and privacy application - make sure the data will not hack by the hacker.
2. Organize some activities to introduce the e government application and teach the citizen how to use the e government application.
Friday, July 4, 2008
Corporate Blogging: A new marketing communication tool for companies.
Blog also has its disadvantages too. Blog is easy to start but it is difficult to maintain. The company must always update their blogs, updating the blogs may sometimes need more time. Whether external or internal blogs, some of the employers will worry about the security which may cause the loss of the company confidentiality.
Thursday, July 3, 2008
A review on post on e-tailing from My E-Commerce blog
When you are traveling on the highway, and take rest at the comfort stop. Do you hope to have a meal at there? There are some fast food restaurants, like KFC, Burger King, A&W, and so on. No need to carry too much cash along the trip, what you only need is your Touch n Go card – as long as there is enough balance in your card. Some more, there are some promotion when you use Touch n Go card to consume in the restaurants above mentioned.
Besides, Dunkin’ Donut, 7-eleven, Carrefour hypermarkets, Caltex convenience stores also accept payment made by Touch n Go card. The card can be reloaded through bank, retail shop, 7-eleven, and so on. It will not be troublesome for cardholder to reload the card.
Well, additional functions of Touch n Go card bring more benefits and convenience to consumers. It is improvement of e-tailing in our country, by using prepaid card – which known as “electronic purse”. Will it success to be used for retail purchasing? Appropriate promotions must be done to let public know the usefulness of this card, and then it will hit the target.
Wednesday, July 2, 2008
Review a local e-commerce site
Blooming Florist is establish since year 1995.The Company is provide online shopping services which name http://www.blooming.com.my/. Besides that, it has open a branch at mid valley recently.
Blooming Florist has selling many types of product such as:
1.Dolls
2.Flowers
3.Cookies
4.Fruits basket
5.Wines
6.Belgium Chocolate
7.Selwin Pewter Clock
8.Home Decoration
9.Hampers
10.Disney Toys
The website also presents the layout of the product and the prices of each category of the products. You can select which product you want to buy and then click the buy button then the website will transfer the product to the shopping cart.
After that, when you already finish shopping, you can switch to the shopping cart and check out the products that you are selected. Before you make payment, you should fill in some details.
1.Delivery Period: Select the date of delivery
2.Gift card message: Writing some wishes or message in the card message
3.Recipient: Fill in the personal particular form
4.Billing information: Fill in the delivery information
5.Order review: Check the price of the products and confirm it
6.Payment Option: Select type of payment
Finally, you can collect a receipt which will send to your e-mail and this is the evidence to prove that you are paid for the items.
Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies
Bank Negara Malaysia sees tremendous promise in mobile telecommunication networks as an electronic payment channel since mobile phones are already in the hands of most Malaysians, with 88% of the Malaysian population subscribing to mobile phone services.
Adoption of mobile and electronic payments systems:
1.Relative advantages of mobile payment systems:Mobile payments provide consumers with everywhere purchase possibilities, timely access to financial assets and an alternative to cash payments.
2. Compatibility: Compatibility captures the consistency between an innovation and the values, experiences, and needs of potential adopters.
3. Complexity: Complexity and problems with usability have contributed to the low adoption of a variety of payment systems, including smart cards and mobile banking.
4. Network externalities and creation of critical mass: Payment systems exhibit network externalities as the value of a payment system to a single user increases when more users begin to use it.
5. Costs: There is a direct effect on consumer adoption if the cost of a payment transaction is on to customers. In order to gain a competitive advantage, a shoppers in electronic channels should attentive to price the transaction costs of mobile payments to be low enough to make the total cost of purchase competitive with the physical world prices.
6. Payment system security and trust in payment systems providers: In a mobile environment, lack of consumer perceived security and trust in vendors and payment systems is one of the main barriers to electronic and mobile commerce transactions.
Monday, June 30, 2008
Electronic Currency - E-Micropayment systems: Bitpass
E-Micropayments are small online payments, typically under US $10.
The following are companies with e-micropayment products:
1. Bit Pass (bitpass.com)
2. Pay stone (paystone.com)
3. Pay Loadz (payloadz.com)
4. Peppercoin (peppercoin.com)
Bitpass was one of the online payment system for digital content and services. It was founded in December, 2002 and the co-founder was Kurt Huang. Besides, it also partnered with major technology and financial services companies such as Microsoft, PayPal, the Royal Bank of Scotland and First Data.
Bit Pass system works similarly to a pre-paid telephone card: you sign up for the service and put money into your account using a credit card or PayPal, which gives you credit towards the purchase of content.
On January 19th, 2007 Bitpass announced that they were shutting down due to "circumstances beyond our control," CEO Matthew Graves wrote in an e-mail to customers., and operations officially closed on January 26th, 2007.
Sunday, June 29, 2008
Credit Card Debt: Causes and Prevention
By using credit card, there will always have the financial problem which is credit card debt that face by the cardholder due to the poor money management. Without paying the cash directly, the cardholder will have no idea where the money is going. The statement will not be delivered to the cardholder every time when he use the credit card, thus, the cardholder may overspend the money easily without taking attention. Furthermore, making the late payment also will increase the debts because the credit card companies will charge for the interest.
There are some steps to avoid the credit card debt. Always determining the monthly income and needed expenses and keep away from buying things that are unnecessary, saving may help to avoid the debt. It is important to keeping control of credit cards and always makes sure that there is enough money to pay for the debts. Besides, some credit card companies will charge more interest when the payment is made lately, thus always pay the bill on time. Use the credit card like cash and pay the balance in full every month.
Tuesday, June 24, 2008
A review on a post on Internet Security from My E-Commerce blog
When we type “Ryan Pitylak” in any search engine, there are many results about Anti-spam activists, affiliate marketing services, viral marketing, anti-spam services, and so on. Well, his name is blacklisted previously as he is known as “spam king” at year 2004.
The man who was tricking people by sending 25 million spam-mails a day, now is turning a new leaf. I had viewed his blog: http://ryanpitylak.blogspot.com and it showed that “Ryan Pitylak” is one of anti-spam community. He provides services in stopping spam from spammers. He also provides other services as I mentioned above.
Graham Cluley of Sophos (1 of IT Security Company) said, "Spammers like Pitylak have shown themselves to be prepared to break the law in their eagerness to pump out unwanted marketing messages. Some companies may feel uncomfortable about working with someone who has shown a history of behaving unethically, without caring about the consequences for other internet users."
I think that we should give opportunity to wrong-maker because everyone would make mistake. People may change to be better. Besides, his previous experience is worth to the organization who hires him as he can provide more efficient way to fight against spam.
Now, he set up his own company, Pitylak Security. I believe that the person who can learn from mistakes and correct those mistakes will be successful.
Friday, June 20, 2008
Phishing: Examples and its prevention
Phishing is pronounced like “fishing”, is a term used to describe a malicious individual or group of individuals scamming users by sending e-mails or creating web pages that are designed to acquire sensitive information, such as usernames, passwords and credit card details. Normally, PayPal, eBay and online banks are common targets.
These types of e-mails normally are sent out to thousands of different e-mail addresses. Actually, the person sending these e-mails has no idea who you are. If you have no affiliation with the company the company the e-mail address is supposedly coming from, it's fake. For example: the e-mail is coming from Citibank but you bank at a different bank.
b) Checking spelling and grammar
Improper spelling and grammar is almost always an obvious error.
c) No mention of account information
If the company really was sending you information regarding errors to your account, they would mention your account or username in the e-mail. In the eBay example, the e-mail just says "eBay customer", didn’t mention you username and account number, if this really was eBay they would mention your username.
d) Deadlines
E-mail requests an immediate response or a specific deadline.
For example: the requirement to log in and change your account information within 24 hours.
e) LinksMany phishing e-mails will hide the true URL. Normally, the URL list in the email is not related to the company URL. For eBay example: http://fakeaddress.com/ebay is not an eBay URL, just a URL with an eBay section. If you're unfamiliar with how a URL is structured.
a) Keep antivirus up to date and use anti-spyware software
Most antivirus vendors have signatures that protect against some common technology exploits.
This can prevent things such as a Trojan. Besides, installing an active spyware solution such as Microsoft Antispyware.
b) Do not click on hyperlinks in e-mails
Do not click any hyperlinks in an e-mail, especially from unknown sources.
c) Take advantage of anti-spam software
Anti-spam software can help keep phishing attacks at a minimum. A lot of attacks come in the form of spam. You can reduce many types of phishing attacks by using anti-spam software such a Qurb.
d) Firewall
Use a desktop (software) and network (hardware) firewall. It can prevent some malicious code from entering your computer and hijacking your browser.
Thursday, June 19, 2008
The Threat of Online Security: How Safe is Our Data?
Security can divided to three concept.First is confidentiality.Confidentially allows only authorized parties to read protected information.Second is integrity.Integrity make sure that the data remains as is from the sender to the receiver.Third is availability which can ensures you have access and are authorized to resources.
There are many threats to e-commerce that may come from sources within an organization or individual. The followings are some of the potential security threats that can be found:
1. Tracking the shopper - It is one of the easiest and most profitable attacks, another name is social engineering techniques. These attacks involve observation of the shopper’s behavior, gathering information to use against the shopper.
2. Inquiring the shopper’s computer - Most of the users are no understand about the system that they are using. Additionally, software and hardware vendors, they want to ensure that their products are easy to install, then they will ship products with security features disabled. The confused user does not attempt to enable the security features.
3. Sniffing the network - Here, the attacker monitors the data between the shopper’s computer and the server. He collects data about the shopper or steals personal information, such as credit card numbers.
4. Using known server bugs - The attacker analyzes the site to find what types of software are used on the site. Then, the attacker proceeds to find what patches were issued for the software. In addition, he searches on how to utilize a system without the patch. He proceeds to try each of the exploits.Finally, the attacker finds a weakness in a similar type of software, and tries to use that to exploit the system. This is a simple, but effective attack.
How to safeguard our personal and financial data??
The first step is setting up the username and password for logging into computer. After done, it will only access to the network. This can help us to keep away the unauthorized people from entering. But we must avoid using the password that can be easily figure out by others such as birth date and never use the automatic login that saves the password. The important thing is never write the information down, that means always keep the information in our mind. We are also encouraged to change the password frequently.
Generally, credit card information is needed for purchasing online when making the payment. It is essential for us to use the password protected to safeguard our credit card information. Sometimes, we will require entering the credit card verification codes rather than only entering the card numbers, holder’s name. These codes can be found on the back of the credit card. It used to make sure that the card is used only by the card’s holder.
Sometimes, we will receive the unsolicited e-mails from unknown senders. It is best to type in the web address and never clicks directly on the links. Moreover, never respond to the mails appearing from bank or other entity that request our personal information.
To protect our personal data from being stolen, anti-virus software, anti-spyware and firewalls can be used to safeguard the data. But we have to make sure the anti-virus software and anti-spyware are always up-to-date. Firewalls are installed especially for those who are always connected to the internet.
It is important for us to protect our personal and financial data before it has been stolen.
Tuesday, June 17, 2008
How E-commerce can reduce cycle time, improve emloyees' empowerment, and facilitate customer support?
Reduce cycle time: “Cycle time” here means the time from receiving customers’ orders until delivering goods and services to customers, and receiving payment from customers. E-commerce can eliminate few steps in business processing, such as withdrawing money from bank, making payment at counter (waste more time if you need to queue up). It not only benefits customers, but also benefits sellers as time saving is economic saving for the organization. Besides, digital products save more cost as those products can be delivered through Internet.
Improve employees’ empowerment: Employees have more authority and power to make decision through E-commerce. It provides more information to employees as there is greater access to the information needed. Empowerment can motivate employees to perform better in their job, more efficient to achieve the organizational goals.
Facilitate customer support: We can view and shop online 24 hours a day, all year round. Most websites will update new products, but they also will keep information of their previous products. This information makes customers more understand about those products. Besides, E-commerce also allows customers to interact with sellers, as well as interact with other customers. They can share opinion and experiences through the website, such as forum and feedback. Another interested facility of E-commerce is self-customized products. Nike lets customers personalize their sports shoes through the website. Customers will be happier and more enjoyable online shopping. Other examples of self-customization are Dell, Jaguar, and etc.
An example of an E-Commerce success and its causes – e bay
Thursday, June 12, 2008
AN EXAMPLE OF AN E-COMMERCE FAILURE AND ITS CAUSES
Webvan failed is because of the poor management decisions. The company was expanded too fast with too little of money. Its money is used to build up the expensive infrastructure and expand rapidly across the country when it was popular. The company was run out of money. A net loss of $217 million and accumulated deficit of $830 million forced Webvan have to close up their business.
Besides, the inability to connect with their customers also may cause the e-commerce failed. Webvan tried to delivery the groceries in 30 minutes to fulfill the customer satisfaction. It is quite a good service but some of the customers would like their groceries to be delivered at night since they are working at day time. Moreover, the deliveries will sometimes be late and the customer was not at home when the van was there. Although the customer could reschedule the time, if the customer would need the groceries at the same day then they have to get the things from the supermarket which may cause inconvenience for them.
The company is unable to raise more cash to avoid the bankruptcy. Finally, on 9 July 2001, Webvan filed for bankruptcy and began its liquidation.
History and Evolution of E-Commerce
When year 1984, the term ecommerce meant the process of execution of commercial transactions electronically with the help of the leading technologies such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) which gave an opportunity for users to exchange business information and do electronic transactions.
In year 1992,one of a America website name Compuserve has offers online retail products to its customers. This gives people the first chance to buy things off their computer.
After that, Nestcape arrived in year 1994. Nestcape has providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer.
After a year which mean year 1995,amazon.com and ebay.com is created and this two website is the biggest names in e-commerce.This two websites become more popular from one year to another year.This is because seller can post their product details and photos in the website and easy for the buyer to lauched it.
In year 1998,DSL or Digital Subscriber Line is created.It provides fast, always-on Internet service to subscribers across California. This prompts people to spend more time, and money, online.
According to Business.com,retail spending over the Internet reaches $20 billion in year 1999.More people using internet to done business.
Today, the largest electronic commerce is Business-to-Business (B2B). Businesses involved in B2B sell their goods to other businesses. In 2001, this form of e-commerce had around $700 billion in transactions.
Monday, June 9, 2008
Woo Shi Yuin~~
Well, this is the first time I created a blog and this is the first post, hope you all like this blog. We will do our best to tell you about E-commerce. If you have any comment or suggestion, please feel free to tell us.
The top 5 websites that I visited the most:
1.) http://www.utar.edu.my/ - The useful website for all UTAR students to check out information about our course, activities, and all events in our university.
2.) http://www.google.com/ - The common website for us to search information about our assignment, course work, also if we search for any games, songs, and etc.
3.) http://www.sudokukingdom.com/ - This website provides daily online sudoku to solve. I like to play sudoku as I like Mathemathics. It can help to develop your mind and your logic thinking.
4.) http://www.youtube.com/ - I visit this website to watch drama and also the video clip posted by friends, or other people around the world. However, I didn't post any video clip on this website.
5.) http://www.friendster.com/ - Usually I visit this website to view my friends' photos, upload my own photos... Actually I am still finding out other features in this website such as playing online games, decorating my own page, and etc.
So, hope that this introduction can help you to know more about me. ; )
Saturday, June 7, 2008
Self-introduction
The top 5 website that i always visit are:
1. http://www.hotmail.com/ - I visit this website is only for checking the mail from my family and friends.
2. http://www.yahoo.com/ - I use this website to find the information that i need.
3. http://www.baidu.com/ - When i need the dictionary, i will visit this website. Besides, i will search the music through this website too.
4. http://www.utar.edu.my/ - I'm sure that every UTAR student will visit this website. Through this website, we can check our examination results, timetable and others.
5. http://www.airasia.com/ - I'm from Sarawak, so this website is important for me to buy the ticket, check the time of the flight, price and other.
Friday, June 6, 2008
Kiew Teck Fatt
So that, my top 5 favourite websites i visit are:
1.www.livescore.com .
I like to check the football result in this website.
2.uk.premiership.fantasysports.yahoo.com
This website is an EPL football website.I can act as a manager of a football club.
3.www.google.com.my
I search my assignment details in the website.
4.www.mail.yahoo.com
I check the yahoo mail everyday
5.www.hotmail.com
I open this website when i log in my msn.
Thats all my introduce about myself.Happy reading.
Myself - Kor Shi Yin
Top 5 website i always visit are:
1) http://www.google.com/ - it can let me find out many information when i needed. Besides, i also have using iGoogle, you can create a google home page by yourself. You also can add some stuff eg: youtube search, dictionary, flash game and etc.
2)http://www.yahoo.com/- many purpose i visit this website only for checking mail.
3)http://www.jbtalks.cc/ - it is a forum contain many kind of information. It also provide a trading center. eg: you can sell your second hand clothes, shoes, handphone, computer and etc.
4)http://www.haoting.com/ - i always go to this website for listening music and see latest album. You also can create a music box in this website and add in which song you prefer.So, you can use music box to listen music.
5)http://www.youtube.com/- many purpose of this website of course is watching drama and some video.