7.07.2008

Review a local e-commerce site

Maybank2u.com is a famous website to the consumer. Maybank online e-banking are provide a lot of services to the customer such as online bill payment, online prepare, online cards, online loans, online stocks and others.

Maybank online e-banking let customers save a lot of time and costs. It is because consumer no need to concern to the traffic jam and the parking problem and can spent the time in other more important activities. In additional, Maybank2u.com provide the customers instant online financial service and done the transaction in anytime and anywhere. The services provided by the Maybank2u.com such as online stocks gives the opportunity to view real time information, the latest market updates, access stock research as well as digest stock reports at your leisure.

Furthermore, Maybank2u.com also provides the online bill payment services to the customers. Maybank online bill payment is one of the largest bill payment portals and the number of payee corporations increases every month. This service can help the individual’s customer no need to queue up or ever be late with bill payment. From here, we can see the online e-banking are very helpful and more convenient to the consumer and at the same time can save a lot of expenses to the bank and also can attract the customer how are likely to do the transaction online.


7.03.2008

Thing to take note to prevent e-aution fraud when a consumer participating in an e-auction.

The largest Internet auctioneer, eBay, has introduced several measures in an effort to reduce fraud.
Some are free, some are not.

The following are some of eBay’s antifraud measures:

User identity verification

EBay uses the services of Equifax to verify user identities for a $5 fee. Verified eBay User, a voluntary program, encourages users to supply eBay with information for online verification. By offering their Social Security number, driver’s license number, and date of birth, users can qualify for the highest level of verification on eBay.

Authentication service

Product authentication is a way of determining whether an item is genuine and described appropriately. Authentication is very difficult to perform because it relies on the expertise of the authenticators. Because of their training and experience, experts can (for a fee) often detect counterfeits based on subtle details. However, two expert authenticators may have different opinions about the authenticity of the same item.

Insurance policy

EBay offers insurance underwritten by Lloyd’s of London. Users are covered up to $200, with a $25 deductible. The program is provided at no cost to eBay users.

Escrow services

For items valued at more than $200 or when either a buyer or seller feels the need for additional security, eBay recommends escrow services (for a fee). With an easy-to-access link to a third-party escrow service, both partners in a deal are protected. The buyer mails the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At that point, the seller ships the goods to the buyer. After an agreed-upon inspection period, the buyer notifies the service, which then sends a check to the seller. (An example of a provider of online escrow services is tradenable.com.)

Nonpayment punishment

EBay implemented a policy against those who do not honor their winning bids. To help protect sellers, first-time nonpayment results in a friendly warning. A sterner warning is issued for a second-time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.

Verification

One way of confirming the identity and evaluating the condition of an item is through verification. With verification, neutral third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purposes. This provides a way of tracking an item if it changes ownership in the future.

E-Goverment in Malaysia: Its implementation so far and citizen's adoption strategies

First, as we know E-government is a general term describing the use of technologies to facilitate the operation of government and the expense of government information and service? E-government is an short form of the phrase electronic government.


The government has invested highly in its infrastructure. The MSC contains a high-speed 10Gb/s network connecting MSC to Japan, ASEAN, EU and the US. It supports public administration, education and business applications. Malaysia was ranked 26th in the world for e-Readiness. The telephone penetration rates rose by 7 percent while for the rural sector there was a rise of 6 percent (2000).




In 1996, MSC Malaysia hosts more than 900 multinationals, foreign-owned and home-grown Malaysian companies focused on multimedia and communications products, solutions, and services and; research and development.The Malaysia Government launched the Electronic Government project, generally known as e-Government. E-Government seeks to develop the convenience, accessibility and quality of interaction with the public and business at large.


At the same time, it will improve information flow and processes within the government, improve speed and quality of policy development, and improve coordination and enforcement such as this pilot project launch by Malaysia.Project Monitoring System (SPP II), Human Resource Management Information System (HRMIS), Generic Office Environment (GOE), Electronic Procurement (EP), Electronic Services (E-Services), Electronic Labour Exchange (ELX), E-Syariah.



One of the e-Government projects Electronic Procurement (eP) Project, also known as ePerolehan. E-Perolehan is an electronic procurement system provided by the government to enable suppliers to sell their products or services on the internet. Through ePerolehan, suppliers and contractors can receive, manage, and process orders or payment from government agencies through transactions done electronically on the internet.Furthermore, using the e-Government applications can create awareness about the convenience of internet because it brings several benefits such as no traffic jam, save time and cost, and user friendly.

6.26.2008

The application of pre-paid cash card for consumers.


Since is it almost necessary these days to pay for so many things with a credit card, it might make acquiring items and services through the internet or when you are not close to home hard when you do not have one. A debit card can be used similarly and are acknowledged the same places as credit cards, but you will have to have cash in your checking account to pay for the purchases that you make at the moment you scan the debit card.


The
usefulness of a debit card may not be obvious at first, but when you use it to buy car fuel or other items and you realize that the money it cost is not going to come due with interest on your next credit card statement, and then you will experience a new feeling of power, the power of no debt.

It is certainly possible to keep yourself from purchasing things with the interest accumulating credit card and become more comfortable knowing you are getting along
without going into dangerous debt.
Once you discover that it is smarter to pay as you go, and then you might
discover that it is actually easier to save back a portion of the money you have been paying on credit card interest.

Financial advisers may suggest to you that if there is any interest money going someplace, it should be interest you are receiving from your money saved and not interest you pay others because of money you have already spent.

Visa plans to offer customers a prepaid cash card allowing travelers access to money at automated teller machines in 65 countries.

The VIP Visa prepaid cash card can pay the customers bills over the phone, low cost fees and that is online and offline access. Unlike traditional credit cards, the Visa® Prepaid Cash Card does not extend you credit. Instead, accounts are prepaid for a specific amount while still being backed by Visa® for universal acceptance. There is no line of credit and accounts are only good for the balance applied

According to data on online payment methods adopted for online train ticket booking, the share of cash cards has been steadily increasing over the last one year, while the share of credit cards has been slowly declining. From the total 16.27 lakh tickets booked online in September 2007, 22 per cent online payments were made using cash cards, according to Indian Railway Catering and Tourism Corporation (IRCTC) data.

Electronic Currency

In this century, many transactions are though by electronic currency. Electronic currency is most popular in the consumer mind, because electronic currency is easier acceptance by the consumer. Electronic money (also known as e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically.

Typically, this involves use of computer networks, the internet and digital stored value systems. Electronic Funds Transfer and direct deposit are examples of electronic money. Also, it is a collective term for financial cryptography and technologies enabling it.

Technically electronic or digital money is a representation, or a system of debits and credits, used (but not limited to this) to exchange value, within another system, or itself as a standalone system, online or offline. Also sometimes the term electronic money is used to refer to the provider itself.

A private currency may use gold to provide extra security, such as digital gold currency. An e-currency system may be fully backed by gold (like e-gold and c-gold), non-gold backed, or both gold and non-gold backed (like e-Bullion and Liberty Reserve). Also, some private organizations, such as the US military use private currencies such as Eagle Cash.Many systems will sell their electronic currency directly to the end user, such as PayPal and Web Money, but other systems, such as e-gold, sell only through third party digital currency exchangers.

In conclusion, with using electronic currency, it make our life became easy and not need have to keep a lot of money in the purse.

6.25.2008

Credit Card Debts: Cause and Prevention



WHAT IS A CREDIT CARD?
Any card that may be used repeatedly to borrow money or buy products and services on credit. A credit card, such as VISA or MasterCard, allows you to pay for sales or services by borrowing against your line of credit with the credit card company and to make monthly payments on the outstanding balance. A charge card, such as American Express requires payment in full each month of the outstanding balance charged to the account.

Cause credit card debt
Poor money management : Do we really know where our money is going? Without money spending plan, you have no idea where your money is going. You may be spending unnecessarily each month.

Financial illiteracy - Many people don't understand how money works and grows, how to save and invest for a rainy day, or even why they should balance their checkbook.

Reduced or lost of income: A divorce, death of spouse or unemployment may cause a serious debts. If there is a huge gap between income and expenses, the easiest way to fill in the gap
with credit card debt.

Prevention method
Cut Up Your Cards
The best way to reduce credit card debt is to STOP using credit cards! There is no need to have more than one card, so pick the one with the lowest interest rate and cut up the rest. The one you keep should be deemed an “emergency card”. These are true emergencies, not mere inconveniences

Apply debit cards
Debit cards look like credit cards, but operate like cash or a personal check. While a credit card is a way to "pay later," a debit card is a way to "pay now." When you use a debit card, your money is quickly deducted from your checking or savings account. Therefore, you won get debt because over expense.

Control expense
create a budget and stick to it. A clear budget that includes all of your monthly bills, food, entertainment and miscellaneous expenses will prevent you from spending thoughtlessly and buying without thinking twice.

6.20.2008

Corporate Blogging: A new marketing communication tool for companies

Corporate blog is published and used by an organization to reach its organization goals.

According Wikipedia, there have three types of corporate blogs that is external blog, internal blog and CEO Blog. Internal blog is a weblog that any employee can view, it encourage employee participation, free discussion of issues, direct communication between various layers of organization and is a sense of community.

Examples of Internal Blog Applications

Purpose

Blogger

Tone

Corporate level communication

CEO, CIO, CFO, President

Formal

Project or contract level communication

Group/project leaders, department heads

Formal

Industry news and discussion

Individual employees

Formal or casual

Water cooler content

Individual employees

Informal and casual


External blogs is a publicly available weblog where company employees, teams, or spokesperson share their view, and it often used to announce new products or new services, to explain and clarify policies, or to react on public criticism on certain issue. It is very useful in company marketing communication, the marketer can asking the user for feedback, doing product testing or shows marketing plans to the customer through the blog.


The goals of an organization to start corporate blog are following:

·         Driving Sales - directly promoting products and services - for example announcing new products.

·         Public Relations - management of crisis situations, promoting company vision and developments etc

·         Customer Relations - fostering customer loyalty, building relationships with clients and customers etc

·         Research and Development - garnering feedback and suggestions from clients

·         Information and Education - giving customers information on how to use products

·         Internal Communications - password protected blogs for staff - for training, communications, work-shopping ideas etc

·         Community Development - developing client community around a product.

 

That is the reason of why we say corporate blog is a new marketing communication tool for companies. A successful corporate blog is allow companies to present accurate information without the filter of the media or advertising, provide some marketing information to the customer such as direction of how to use the product or what is the latest product of the company.


Marketing Nirvana has ranked the top 15 corporate blogs. Besides that, Debbieweil also summary the 8 tips for corporate blog in 2008:

1.      Use humor

2.      Write short. Less is more

3.      Post at least once a week

4.      Link to naysayers and competitors

5.      Appoint a blog editor

6.      Build redundancy into your approval process

7.      Consider joining the newly-formed blog council

8.      Just do it

 

But the blogger also need to careful to maintain their corporate blog. The blog will face failure if the executive who is responsible to write the blog isn’t fully committed and passionate. Seomoz.org has summarized the reason why corporate blogging fails:

         Blogs vs. Corporate culture

         Editorial Control Issues

         Unfamiliarity with a Blog’s Structure

         Misunderstanding Your Audience

         Crafting a Corporate Voice, Rather than a Personal One

         Attempting to “Sell” or “Market”

         Domain & URL Issues


Mobile payment system in Malaysia: Its potentials and comsumers' adoption strategies




Mobile Money is a PIN-based Mobile Payment Solution designed to address the limitations and bottlenecks created by cash, cheques and credit cards. It unlocks the power of the mobile phone to make payments, allowing registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service). This gives the freedom to shoppers to buy products online and pay the merchant using his/her mobile phone without being physically present at the store.

In relation to the overall mobile operator ecosystem, the following diagram shows the main data flows and relationship between the SMS Payment Suite implemented within the mobile operator environment and the other components:


When it comes to online selling, selecting a payment gateway is one of the major obstacles faced by the merchants in Malaysia. Mobile Money will encourage more consumers to shop online. This will definitely be a great boon to the e-commerce industry in Malaysia. It will encourage the merchants in Malaysia to adopt more online business and get the extra sales channel.

There are many benefits to the merchants and attract them to adopt this system:

          Low transaction and maintenance costs

          Low startup or sign-up fees

          No minimum monthly transactions, No Rental Fees

          No merchants account required

          Selling to anyone, anywhere & anytime

          Gets paid fast and faster turnover in T+2 Days

          Flexible methods to Request for Payment

          Good audit trail and secure ticketing

          Marketing & points system opportunities using the Mobile Money SMS

 

6.19.2008

The threat of online sercurity: how safe is our data?

In this century, e-commerce are very popular in the consumer behavior. From the Internet, we can learnt how to do the e-transaction and purchase from the net. However, the online security for the e-commerce we need to care about it.
The threat we will face in the Internet are, nontechnical attack, that is an attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network. In additional, the social engineering also a type of nontechnical attack that uses social pressures to trick computer users into compromising computer networks to which those individuals have access.
The solution for us how to protects our data for the online security, we need to uses the security issues to help us to protect our data, such as Authentication, Authorization, Nonrepudiation, Confidentiality, Integrity, and Availability
From the authentication, we can see the process to verify the real identity of an individual, computer, computer program, or EC website. Therefore, the authorization are process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform and for the nonrepudiation are assurance that online customers or trading partners cannot falsely deny their purchase or transaction. In additional, the major issues of confidentiality also to assurance of the data privacy and accuracy. Keeping Private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Integrity also are assurance that stored data has not been modified without authorization and a message that was sent is the same message that was received and Availability also assurance that access to data, the Web site, or other EC data service is timely, available, reliable, and restricted to authorized users.
Finally, by using the security issues, that can help us to efficiency to protect our data during the online period and can help us to minimize the risk.

6.17.2008

How to safeguard our personal and financial data?

Internet users are frequently required to provide personal data online. If you start up a yahoo or hotmail account, register for an online banking service or buy your groceries online, you will be asked to provide personal information about yourself. Whenever you buy goods or services online, you also have to provide highly sensitive information. We cannot escape the fact that we need to give information to access online services.


The most fundamental guideline for protecting our own personal data is to only disclose personal information whenever it is absolutely required and where organizations or corporations offer clear guidelines to protect data privacy.


We should be extremely careful not to disclose personal information online in situations where there are no privacy protection guidelines (for example, posting personal information in a chat room or newsgroup). Avoid disclosing our own or others’ personal information such as email addresses, home addresses, job and company details in a public forum. Also, take care not to pass on others’ email addresses or details without their permission. Simply forwarding an email with others’ email addresses on it can compromise the data privacy of others and result in privacy intrusions such as unwanted messages or spam.


Consumer and privacy advocates are calling for legislation that authorizes any individual whose data was compromised to place a seven year fraud alert on our credit report. A fraud alert requires creditors to contact the consumer before issuing credit in our names. Currently a seven year alert is available only for consumers who are already identity theft victims. This is like getting a flu shot after we have contracted the flu. A longer than 90 day period for an early fraud alert would help to prevent identity theft.


Besides, we should have the right to place a free security freeze on our credit report. A security freeze would allow us to control the release of confidential data, and would allow us to lift the freeze on a selective basis, for example, when applying for a mortgage. Any individual who receives a notice of an unauthorized release of confidential data should be entitled to a security freeze at no cost. We should be able to establish a security freeze for preventive purposes at no cost.

Phishing: Examples and its prevention methods

What is ‘Phishing’?
Phishing is a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individual into revealing credentials. Phishing also is THEFT. Phishing is typically carried out by e-mail or instant messaging and often directs users to enter details at a website, although phone contact has also been used.
Phishing is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate business. Therefore, these authentic-looking messages are designed to fool recipients into divulging personal data such as account number and passwords, credit card numbers.
PayPal phishing example




8 way prevention method
1) Only do the business with companies you know & trust.
2) Don replies the e-mail messages that request your personal information.
3) Use the strong password for each of your accounts.
4) Always change password to protect account.
5) Don’t click the thing links in suspicious e-mail, the link might dangerous and not be trustworthy.6) Frequently keep your PC updated & use latest antivirus software.
7) Monitor your transaction; using just one credit card for online purchases makes it easier to track your transactions.
8) Use credit cards for transactions on the internet instead of debit cards to avoid the big credit limit from your bank account

6.15.2008

A Review on a post on Internet Security from My E-Commerce blog



While the latest technology is available and the use of internet is popular now, the security of the internet has become an important issue that how to prevent the virus, worm and the hacker who try to access the data or the information from us. The threat of internet has given an impact on our freedom to use the internet, savetheinternet.com has provide an article about how does these threat to internet freedom affect us and who will be affected.

This is an E-commerce blog from e-commerce.blogspot that talking about same interesting topic on internet security: 

 

One of these blog is talking about the report of internet security and threat. According the latest Internet Security Threat Report (ISTR), volume XIII (ISTR XIII), released on 8 April 2008, Kuala Lumpur had the most bot-infections in the APJ region in the last half of 2007, a significant rise from seventh rank in the first half of the year. (APJ Internet Security Threat Report):


The other finding of the report is following: 

    In 2007, Symantec detected 711,912 new threats compared to 125,243 in 2006 – a increase of 468 percent; this brings the total number of malicious code threats detected by Symantec to 1,122,311 as of the end of 2007.

   Symantec measured the release of both legitimate and malicious software during a portion of the reporting period and found that 65 percent of the 54,609 unique applications released to the public were categorized as malicious. This is the first time Symantec observed malicious software outpacing legitimate applications.

   Theft or loss of a computer or other device made up 57 percent of all data breaches during the last half of 2007 and accounted for 46 percent of all reported breaches in the previous reporting period.

   Government was the top industry sector for identities exposed, accounting for 60 percent of the total, an increase from 12 percent in the previous reporting period.

   A full identity can be purchased in the underground economy for as little as $1.

Adopted from PUTERA.com


Another interesting post I found in this blog is the case of JohnCow which is joke of Self-hacking own blog to get the message across about how important it is to get your blog backed up. 

It is necessary for us to prevent our data been hacked. This blog also provide some website talking about how to prevent our blog being hacked such as Blogging mixseolog.comJonlee.ca

Beside these website that the blog has mention, I also found the others useful website that provide some information about the internet threat and security:

Security Manor: This website has post some latest issue about internet security such as the 6 most common internet security issues, how to preventing identity theft, how to protecting your privacy and security on the internet and how to keeping children safe on the internet.

support.Microsoft.comHow to recover from a computer virus infection and how to prevent future infections from computer viruses in Windows operating systems

wordsandpeople.com: What is spam and how to prevent it

Internet World Stats: How to prevent the online invasion of spyware and adware

Actually, if you type "how to prevent virus of internet" in google website, it will appear many website that provide the knowledge about it. Prevent is better than cure, but the most troublesome I think is the maker of these internet threat such as hacker or virus maker, why they so evil to lead our internet activities so unsafety??