E-Government in Malaysia

Wednesday, February 25, 2009


E-government is the use of information technology in general, and e-commerce in particular, to provide citizens and organizations with more convenience access to government information and services and to provide delivery of public services to citizens, business partners, and those working in the public sector.

Nowadays, there is lot of country, including Malaysia implementing the e-government. The status of e-government implementation in Malaysia is widely discussed as to potential of e-government implementation towards the public and business. Malaysia government starts to implement e-government in 1996 after the introduction of the Multimedia Super Corridor (MSC). The Electronic Government initiative was launched to lead the country into the Information Age. It will improve how the government operates internally, as well as how it delivers services to the people of Malaysia. It seeks to improve the convenience, accessibility and quality of interactions with citizens and businesses. At the same time, it will improve information flows and processes within government to improve the speed and quality of policy development, coordination and enforcement.

The 7 pilot projects of the Electronic Government Flagship Application are as follows;
1. Project Monitoring System (SPP II) – online system that monitors the entire lifecycle of national program
2. Human Resource Management Information System (HRMIS) – an integrated, technology-enabled HRMIS for the Malaysian public service, incorporating Global Best Practices in HR that would enable the Public service to successfully deal with the Challenges of the K-Economy.
3. Generic Office Environment (GOE) – powerful document and office management solution that enables users to effectively and efficiently manage their office environment.
4. Electronic Procurement (EP) – enables suppliers to sell goods and services to government through the internet.
5. Electronic Services (E-Services) – allows citizens of Malaysia to engage in transactions with government and utilities payment such as telephone and electronicity bill, police summons, road and transport department services, etc.
6. Electronic Labour Exchange (ELX) – one stop-centre for labour market information, as supervised by ministry of Human Resource, to enable employers and job seekers to communicate on the same platform.
7. E-Syariah – a case management system that integrates the processes related to management of cases for Syariah Courts.

Citizen’s adoption strategies
The government realizes that they can build on the successful implementation of e-government but there are still gaps in the level of service delivery and the perceived value of that delivery from our most important constituents – the citizens. So the government has conducted a study to take stock of its e-government achievements, and the findings have been used to develop the Malaysian Public Sector ICT Strategic Plan. In line with the plan’s customer focus, the Government will set up a portal through which the public would eventually be able to access all online public services. The portal would also provide access to community sites as well. In short, good strategies must be addressed carefully. Otherwise, it will remain a misleading and cosmetic operation.

reference
http://www.intanbk.intan.my/psimr/articles/Article1%20-%20Full.pdf

Corporate Blogging: A new marketing communication tool for companies.

Sunday, February 22, 2009



Corporate Blog - A Short Definition

Blogs - an abbreviation of 'weblogs' - are published on the web, typically as microsites standing by themselves but today also as parts of traditional web sites. They reflect the interests, thoughts and opinions of the person, sometimes persons, publishing the blog. Blogs are characterized by frequent updates, an informal tone and many links to other blogs and web sites.

A corporate blog is a blog published by or with the support of an organization to reach that organization's goals. In external communications the potential benefits include strengthened relationships with important target groups and the positioning of the publishing organization (or individuals within it) as industry experts. Internally blogs are generally referred to as tools for collaboration and knowledge management.



Types of corporate blogs

1. Company Blog

This is the most common form of the company blog. IMO, the corporate blog is definitely the next stage in the evolution of the corporate website, which (let’s face it) is pretty much static these days.
Examples: There are so many examples to choose from. The best place to start would be the ranking of the Top 15 Corporate Blogs. Top 5 include: Google, Adobe, Flickr, Facebook, and Yahoo! Search.

2. CEO Blog

The most famous example would have to be the blog of Jonathan Schwartz, CEO at Sun Microsystems, and I’m amazed how he ever finds time to blog, but I’m really glad he sets such a stellar example. I’ve recommended CEOs to quit full-time blogging but rather work as active contributors to their company blog, which would of course depend on their busy schedules.

Examples: Sun CEO - Jonathan Schwartz’s blog Boeing VP of Marketing - Randy Tinseth’s blog

3. Industry Blog

This is an interesting type of corporate blog one that we should beware of, because it places some difficult ethical choices for the company at hand. This is definitely not an advisable strategy for every company but should be considered an option if you consider yourself or employees in your organization as thought leaders in your respective field/technology and choose to establish a blog to discuss best practices.
Example: Miller Brewing’s Brew Blog

4. Department or Product Blog

Again, department blog is another common style or kind of blogging, which is very popular and ultimately essential for large organizations (particularly Fortune 500). Cases in point are Microsoft, Sun, or SAP’s developer blogs in any particular space. Google’s extensive array of product blogs across their different product offerings (close to 90 in number) probably is another great example.

Examples: 1. Microsoft Community Blogs 2. SAP IT Blogs or SAP Community Blogs 3. Sun Blogs 4. Google - Product Blogs (see the blog roll on the right sidebar)

5. Customer Service Blog

Finally, the customer service blog or community blog. Given the preponderance of community forums and discussion groups as the de facto kind of communication media that companies chose to use as conversation methods with their users. There are evangelists of companies choosing to talk to/respond/provide customer service with users who choose to ask on social media sites such as Twitter.

Examples: 1. My response to Steve Rubel 2. My colleague Steve Ganz’s (LinkedIn) response to Erica O’Grady (via Twitter) 3. ComcastCares’ response to Arrington and other Comcast users on Twitter



Review a local e-commerce site

Saturday, February 21, 2009


I believe that, when we see this logo we will know what product is selling by this company. Air Asia is the leading low fare airline in the Asia and it has been expanding rapidly since 2001to become an award winning and the largest low cost carrier in Asia. Because of Air Asia company provide low cost airline in the Asia so that many people will go to their website(http://www.airasia.com.my) and book the flight.

Inside the website it allows you to search for flight information, travel service, Hotel information as well as book the flight ticket. The main color in the website is red and white, and layout design in the Air Asia website is simple, and easy to use by customer because the entire thing is systematic showed in main pages such as Booking, Flight Information, travel service, member login, product and shopping, promotion advertisement and update news and so on. This will attract more customer visit to their website.


Besides that, the search engine provide by this website located in the left hand side of main pages that allow us to search the flight, hotel or travelling package. People can easily search for flight or travelling package by clicking on the relevant category for example the step to book the flight ticket shows below:-



If we want to book the flight ticket, first we need to choose two ways or one way, where and when we want to travel and number of guest.



Then, click search it will show the flight information and price to let us choose.


After clicks continue, we will go to the pages which need to fill in the guest information and contact people.



After finish fill up the information we will come to final step that was choose the payment method to make the payment.

Lastly, Air Asia also provides membership. We can go to their website main page and click on sign up on member login to become online member. This link can be found at the bottom left hand corner of the pages. After become online member we can enjoy the following benefit

1) Periodical newsletters of promotion and new destination
2) No need reenter the detail when we want to purchase a flight ticket
Any enquiry or question about the Air Asia can visit to
http://www.airasia.com/site/en/faqSearchMain.jsp?nav=6-2








Electronic Currency

Wednesday, February 18, 2009


E-currency is a sort of online version of "warehouse banks," which similarly converted account holders' deposits into gold or silver bullion stored in the bank. It involves the use of computer networks, internet and digital stored value systems. It may only exist in the cyber world, but that is nothing new about it.


Electronic Fund Transfer (EFT) are one of the example of electronic currency. EFT refers to system that provides for the interbank clearing of electronic payment for participating financial institutions. To open an electronic currency account, people "deposits" money with an online e-currency company that then converts the amount into gold bullion. The account holder can transfer ownership of some or all of that gold into someone else's e-currency account by using the internet. Ownership can be repeatedly transferred.


The main focuses of electronic currency development are it able to use through a wider range of hardware such as secured credit cards; and the user account linked bank accounts that would generally be used over an internet means, for exchange with a secure miropayment system such as in large corporations.


By using this system, it can provide many benefits such as convenience and privacy, increased efficiency of transactions, lower transaction fees, and new business opportunities with the expansion of economic activities on the Internet.


E-currency has been widely used by perpetrators of pyramid scams. Swindlers demand payment in e-currency because it is different with checks or credits cards; the charges clear instantly and cannot be cancelled. Experts estimate that about half of e-currency transactions are related to scams or online games.


The most popular e-currency service is e-gold, operated by Gold & Silver Reserve, a Florida-based company. It claims more than 200,000 accounts and more than $14 million in currency. A January 2002 account reported that its clients made 8,600 transactions daily. There are also other electronic currency website such as payloadz.com, paypal.com, etc.

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

Monday, February 16, 2009



Auction is market mechanism by which buyers make bids and sellers place offers. It is characterized by the competitive and dynamic nature by which the final price is reached. Auctions can rapidly disposal of items that needs liquidation or a quick sale, they offer trading opportunities for both buyers and sellers that are not available in conventional channels and they ensure cautious execution of contracts.

Types of auctions are traditional auctions, electronic auctions, dynamic pricing, English auctions, Yankee auctions, Dutch auctions, free-fall auctions, sealed-bid first-price auction and sealed-bid second-price auction. The most popular type of auctions is an electronic auction (e-auctions) which means auctions conducted online.
The largest Internet auctioneer is eBay which has introduced several measures in an effort to reduce fraud. Following are action to prevent e-auction fraud:

1. User identity verification such in IC number, driver’s license number or date of birth. For example, verified eBay user, the voluntary program, encourages users to supply eBay with information for online verification.

2. Authentication service. It is to determine whether an item is genuine and described appropriately. It difficult to perform because their training and experience, experts can detect counterfeits based on subtle detail.

3. Grading services which is a way to determine the physical condition of an item, such as ‘poor quality’ or ‘mint condition’. Different item have different grading systems. For example, trading cards are graded from A1 to F1, while coins are graded from poor to perfect uncirculated.

4. Feedback forum. It allows buyers and sellers to build up their online trading reputations. It provides user with ability to comment on their experiences with other.

5. Insurance policy. For example, eBay offers insurance underwritten, users are covered up to $200, will with a $25 deductible. The program is provided at no cost to eBay user.
6. Escrow services. Both buyers and sellers in a deal are protected with an independent third party. Buyer mails the payment to escrow services which verifies the payment and alerts the seller when everything checks out. An example of a provider of online escrow services s i-Escrow.

7. Non-payment punishment. To protect sellers, a friendly warning for first-time nonpayment. A sterner warning is for second-time offense, with a 30 day suspension for a third offense and an indefinite suspension for a fourth offense.

8. Appraisal services which use a variety of methods to appraise items. It includes expert assessment of authenticity and condition, and reviewing what comparable items have sold for in the marketplace in recent months.

9. Item verification which is a way of confirm he identity and evaluate the condition of an item. Third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purpose. It provides a way of tracking an item if it charges ownership in future.

10. Physical inspection. It can eliminate many problems especially for collectors’ item.

The application of pre-paid cash card for consumers.

Nowadays, people can limit their spending with their prepaid cash card that load funds onto the card and use the money. Obopay, one of the prepaid cash cards that are similar as debit cards because both are using existing money rather than borrowing. However, personal identification number has to be keyed in for the transaction to be authorized if using prepaid cash cards. It is considered as most secure and safe financial transaction card because can it likes a portable access point to checking account. Nevertheless, it could not use for online shopping and in “quick pay” terminals that have a card reader but no keypad to enter a personal identification number.

Pre-paid Vista Cash Card is issued by Four Oaks Bank & Trust Company that given the opportunity for consumers with poor credit record and young children by not spending
more than the balance on the card. Visa permits travelers access to money at automated teller machines in 65 countries and book the train tickets by offering prepaid cash card such as
Metro Card in New York City.

Touch ‘n Go (TnG) smart card is used by Malaysian for electronic payment system to toll expressway and highway. It is expanding its business to retail purchase by starting with fast food industry that enables consumers to buy dough nut, burger or fast-food from 21 outlets such as Burger King, 7-Eleven, Dunkin’ Donut. It is imitating the success of Hong Kong’s Octopus Card by setting 5 to 10% of the card holders for retail purchase as current target of the company.

Octopus Card was launched in Hong Kong on year 1997, September. It is a rechargeable contactless stored value smart card to transfer electronic payments in online in offline system. It is widely used in payment system for transportation, supermarkets, fast food restaurant, car parks and other pint of sale application such as service station s and vending machines that have achieved good outcomes.

Credit Card debts: Causes and Prevention.

Sunday, February 15, 2009


What is credit card debt?

Credit card debt is an example of unsecured consumer debt, accessed through ISO 7810 plastic credit cards. Debt results when a client of a credit card company purchases an item or service through the card system. Debt accumulates and increases via interest and penalties when the consumer does not pay the company for the money he or she has spent. The results of not paying this debt on time are that the company will charge a late payment penalty and report the late payment to credit rating agencies. Being late on a payment is sometimes referred to as being in "default". The late payment penalty itself increases the amount of debt the consumer has. When a consumer has been late on a payment, it is possible that other creditors, even creditors the consumer was not late in paying, may increase the interest rates the consumer is paying. This practice is called universal default.


Causes of credit card debts (10)

1)Less Income, More Expenses

It so happens that the main breadwinner of the household loses his job but monthly expenses are not cut down in line with the reduction in income. This obviously leads to a rise in debt. The family is forced to use their credit cards for groceries, utilities, etc.

2) Saving little or not at all

You should save for at least 4-6 months of living expenses in case an unfortunate tragedy happens. For example, if you lose your job on June 1st, you shall have enough money to maintain your current lifestyle till December 1st of that year. Until December 1st, you can find yourself new employment or open your own business. You will often hear the phrase "Pay Yourself First." Having enough savings for a rainy day is always a worthwhile investment. Do it and you shall be better off!

3) Divorce

Fees for the divorce attorney, division of assets between you and your spouse, proceeds given to children, etc are an easy way to rack up a huge debt. Filing for a divorce may force you to quit working for sometime which leads to reduction in income.

4) Poor Money Management

Poor money management is one of the best reasons why so many families accumulate lots of debt. Not having a monthly spending plan and not keeping track of your monthly bills makes you unaware of where your money is going. You might be spending hundreds of dollars every month towards items that are useless and have no value in your life, yet you do not realize it.

While your money is going towards purchasing useless items, you might also be charging your necessary purchases on your credit card, forcing you to pay interest on these purchases every month.

5) Hoping to win the lottery

Most people hope to win the lottery but the chances of that happening are 0%. Do not spend tomorrow's saved money today just because you expect a promotion in your job or are expecting an inheritance from a deceased grandfather. We all know life is unfair and things can go wrong more easily than going right.

6) Underemployment

If you are underemployed meaning you are not getting enough working hours at your job, you should also cut down on your lifestyle to match your current income. Forget about driving a BMW if you are working only 30 hours a week at the Home Depot making minimum wage.

7) Big medical expenses

While you need treatment now, you do not have the cash. So what do you do? You use your credit card because you do not have enough savings in the bank. In the end, it became a burden if you cannot pay off the bill that increases every month.

8) Financial Ignorance

Important topics such as saving and investing your personal finances are not taught in school. It's on you to learn to save for a rainy day, as well as manage your money so you can own a house over the longer term.

9) Non Financial Communication

Communicate your current financial health with your spouse and your children and make them aware that if you cannot afford a certain item, they should not ask for it. For example, if your 18 year old son wants a new nice hot sports car, communicate to him that you cannot afford it. Instead, he should go for a smaller car that gets him from Point A to B. You and your spouse should promise to each other that you will not hide your spending habits. One of the most common reasons why so many couples undergo divorce is because they rack up huge credit card debts without the other spouse's knowledge. This then leads to divorce which can help in racking up even more debt

10) Gambling

Many people put not only their own disposable income on the line when gambling, they also borrow loans to gamble! You see, Casinos would not exist if every one person won money in it. Probably 1 in every 100 people wins money in the casino over the long term. Another huge boom in the gambling industry is the emergence of Party Poker and online gambling websites that are illegal in the USA. Online gambling is so easy that you don't even have to step out of your house, you can do it right in your bedroom with a small PC!


Prevention to getting more credit card debts (5)


1)Try and make a little more than the minimum payments


The minimum payments required by
credit card companies have steadily fallen over the years. Where once it was typical to have to repay a minimum of 5% of your balance every month, it's now common to only have to pay 2.5% or 3%. With repayments this small in proportion to your debt, a large chunk of each payment gets swallowed up in interest charges. Depending on the APR rate of your card, up to 75% of each payment could be 'lost' in this way, meaning that it takes a very long time for your balance to reduce to any great extent.

By trying to repay more than the minimum, even if only by a little, you can speed this process up, and in the long term you'll end up paying much less in interest charges.

2)Prioritize your card debts

If you have more than one card with different rates of interest, it makes sense concentrate on the one with the highest interest charges. This means not just the one with the highest interest rate, but the one which actually charges you most each month, which could have a lower rate but a higher balance.

Check your statements to see which card is costing you most in interest each month, and try to focus on repaying this card first by putting any spare cash you have into extra payments while keeping to the minimums on your other cards.

3)Change your card

The credit card market is very competitive, and rates have fallen over the last few years. You may be stuck with an old card charging an old rate that is much higher than newer cards. If you can get a new card with a lower rate and transfer your account balance on to it, you could save a lot in interest charges, helping you to bring down your debt. If you can get a card with an introductory rate on balance transfers then all the better - you'll get a few months of interest free credit which you can use to really drive down your balance as 100% of each repayment will be helping to clear your debt.

4)Debt consolidation

If getting a cheaper card isn't an option or isn't something you feel happy about, then maybe a consolidation loan would be worth considering. If you take out a loan and use the money to pay off all your card debts, you could benefit from a lower rate as loans are normally quite a bit cheaper than credit cards.

The downside to these loans is that the repayment period might be quite long, and so even though your monthly repayments will hopefully be lower, you'll stay in debt for longer and so end up paying more in interest. Done carefully, however, consolidation can be a sound move if there's little chance of clearing your debt in any other way.

5)Watch your spending

All the above strategies for getting your debt under control will only work if you stop getting deeper into debt - and this means stopping spending on your cards. Ideally, you'd cut them up so that you can't use them again, but this might not be realistic as you may need to keep them as a credit option in an emergency. In any case, cutting your spending to an absolute minimum will keeping your repayments as high as possible is the only sure strategy to clearing your debt in the long term.

References:

The Top 10 Causes of debt - debt consolidation

Get in Control of Your credit card debt - unarchived articles

Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies

Saturday, February 14, 2009

http://www.mobile-money.com/

Mobile payment system is the service allowing registered user not only makes payment but also allowing user to pay for food and service at anytime anywhere with using their mobile phone. This system function like a credit card and provide very convenient service for consumer with no need bring many cash and card because they only need to use their mobile phone to make their transaction.

Current mobile payment systems that are available in Malaysia are Mobile Money Wallet (MM Wallet). This service recently developing very fast and Malaysian now can enjoy a secure and convenient way to conduct mobile commerce by using a GSM cellular phone. This also gives freedom for consumer to buy product online and pay the merchant using the mobile phone without physically present at the store. Normally, when make the transaction or payment mobile phone will coupled with 6 digit security PIN through SMS.

Besides that, this system also provides benefit for merchant because, in online selling, selecting a payment gateway is the major problem face by the merchant in Malaysia; but this problem has been address by MM Wallet which was it allow merchants to take online order without the need for online shopper to disclose their credit card information. Moreover, merchants can enjoy super low transaction fee at 1.5% if compare with credit card at 2.5% to 3%. With Mobile Money, merchants also do not have to concern of cash, cheque, and credit card handling problem and fraud because MM Wallet will confirm to the stringent requirement set by Bank Negara Malaysia and participating Bank.

Lastly, the way to encourage consumer to adopt this payment method are:-

i) Through advertisement to attract more people using this payment method this will help
to increase the usability.
ii) It must be safe and secure to enhance consumer confidence toward the security and reliability
of this payment system
iii) No hidden cost, no annual fee or monthly fee, no minimum monthly transaction to encourage

consumer adopt to this payment system.
iv) To attract more people using this payment system it must be simple and easy for consumer

and merchants to make payment and receive payment using mobile phone. The process
should be straight forward as using the credit or debit card.
v) Educate consumer through seminar about the function and the usage of mobile payment

system. This will help to increase the confidence of consumer to using the mobile payment
instead of credit card or debit card.

How to safeguard our personal and financial data?

Saturday, February 7, 2009




First and foremost, why we need to safeguard our personal and financial data?
I believe many people the use internet don't know why they need to.

The reason why is because if we do not protect ourselves while we surf net, we might fall into identity theft. So, what is identity theft? To make it simple, identity theft it is a crime in which a person steals personal data and uses it to get either credit or service that only the real owner is entitled to through internet.

This is especially a serious concern for all computer users. Personal data needs to be guarded jealously by both businesses and private individuals using the internet for any service or utility.
There is currently a battle between hackers and companies attempting to keep their information safe.

However, protection from internet identity theft primarily falls on your hands, as there are a few things you can do to help keep yourself safe.


HOW???



There are many ways to safeguard our personal and financial data from the hackers. The most basic and effective ways are to us use of secure website and having up to date computer security.


Use of Secure Websites

Secure websites

  • One of the most basic ways of ensuring protection of sensitive data is using a website that is secure. Many websites are now protected by the data sent between your computer and the site being encrypted. Such websites are difficult for hackers to attack.


Insecure websites

  • On the other hand, there are websites that are easy targets for hackers, those websites that are not secure and do not guard the data of its users. Secure websites encrypt your personal and credit data so that there is no way of gaining access to them even by the greatest of hackers.
  • If the site is of questionable content, such as adult websites, music sharing sites and casino sites, then the higher the risk is. Many of these sites attempt to install programs that track your personal data, then sells the information to those who look to do you harm.


Having Up to Date Computer Security

  • Having the latest computer security program is another measure that can ensure protection against fraudulent use of personal data or ensuring identity theft protection.
  • Programs like spyware and viruses seize private data and allow it to be accessed by hackers so computer security is a necessity that guarantees protection against this sort of misuse.
  • Crooks and felons can use this sensitive data for a range of misdeeds, they can open accounts, get goods and services in your name and use up all your money.
  • Thus, identity theft protection software becomes a necessity in modern day life because it encodes all data stored in the computer so that others cannot retrieve and use it.



Internet identity theft protection should be one of your top concerns when using the internet. There is a much great risk of someone stealing your private data than someone breaking into your house.


Related information:
CRUCIAL PARADIGM - Business solution hacking prevention

Greater Manchester Police - Internet help and guidance (Hacking prevention)
Definition of a hacker

Additional information:
The only way to truly keep your information safe is to enroll in an identity insurance These services are designed to do whatever it takes to protect your identity, and are backed by a $1,000,000 guarantee.

If you want to protect yourself and your family from financial and personal ruin, click here for guaranteed - Identity Theft Protection

The application of 3rd party certification programme in Malaysia

Thursday, February 5, 2009

Digital certificate usually attach to an e-mail message or an embedded program in a web page that verifies that user or website is who they claim to be. The common functions of a digital certificate are user authentication, encryption and digital signatures. User authentication provides other security than using username and password. Its session management is stronger. Encryption can make the data transmission secured by using the information encrypted. The intended recipient of the data is only person to receive the message. Digital signatures are like the hand signature in the digital world. It can ensure the integrity of the data.
By using the digital certificate, the users will be able to make transaction on the internet without fear of having the personal data being stolen, information contaminated by third parties, and the transacting party denying any commercial commitment with the users. Furthermore, the digital certificates can assist the development of greater internet based activities.
The most famous application of 3rd party certification program in Malaysia is provided by the MSC Trustgate.com Sdn Bhd. MSC Trustgate.com Sdn Bhd was incorporated in 1999 and is a licensed Certification Authority (CA) under the operation of the Multimedia Super Corridor. Certification Authority is the body given the license to operate as a trusted third party in the issuance of digital certificates.

The objective of MSC Trustgate is to secure the open network communications from both locally and across the ASEAN region. Trustgate provide digital certification services such as digital certificates, cryptographic products and software development. The products and services of Trustgate are SSL Certificate, Managed PKI, Personal ID, MyTRUST, MyKAD ID, SSL VPN, Managed Security Services, VeriSign Certified Training and Application Development. The vision of Trustgate is to enable organizations to conduct their business securely over the internet, as much as what they have been enjoying in the physical world.

The Website of MSC Trustgate:http://www.msctrustgate.com/

Phishing: Examples and its prevention methods.

Wednesday, February 4, 2009


Based on the wikipedia.org, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication such as email or attractive advertisment or web site.

For example, There were some CIMB bank customer receive an email indicate that their account has been notify that recently suffered a DDos-Attack on one of their Internet Banking server. So the customer must complete the steps had mention in the email to verify the integrity of their online banking account. If they fail to complete the verification their account will be suspended. The fraudsters are try to cheating the user ID and the password that allow them to log in to the victim's account and use the money to buying things or etc.

There were some methods that help to prevent phishing happen

1. Do not respond to e-mails requesting for your personal information. Legitimate companies do not ask their customers for confidential information, such as passwords and account numbers, though e -mail, as the customer will receive the letter from the bank if their account really have any problem. If really worry about that just call to the bank and comfirm it.

2. Do not click on links provided in e-mails. If you are not sure about the website address that appears in an e-mail, go to your browser and find the legitimate address manually because the fraudsters can use the links to point recipients to another site that using an address similar to a real bank's URL.

3.Do using the antivirus software to secure the computer such as the anti-spyware and firewall program that is popular and well supported by the vendor. Ensure the programs are always up-to-date and frequently updated.

4. Read and understand the privacy and policy information of that website clearly, before conducting any transaction.

The method mention above are really can to prevent the phishing happen, but the internet user also have to use internet smarter.

The threat of online security: How safe is our data?

Nowadays, internet is become common in our life because many people use it to search the information, chatting, transferring the file, read the news and so on. Internet is a global system of interconnected computer network that interchange data by using the standard Internet Protocol(IP).
With the advancement of technology today, the web-based service including Facebook and MySpace are becoming prime target for hacker to seeking your personal information. This is the reason why in the market occur many type of online security system and software but there also a numerous of online threat attack our computer or data. Below is few type of internet threat that appears in the internet:-


i) Malware
It is a software design to damage a computer system. This software also can describe it as a head of all type of malicious software which is include worm, Trojan horse, spyware, computer virus and unwanted software. For example we can see that numerous of computer in 2000 attack by “I LOVE YOU” virus. This particular malware only simple subject “I LOVE YOU” and an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs.” causing widespread outrage, making it the most damaging virus ever.


ii) Worm& Trojan horse
A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to a computer system's hosted data, functional performance, or networking throughput, when executed. These will caused computer becoming slow even the computer is high performance. That is why our computer needs a internet security system such as antivirus software to protect our computer. Without this software Trojan or warm will track into the computer and steal the important data or personal information such as password of your email account.


iii) Spyware
Spyware is software that install to the computer to take partial control over the user interaction with the computer without user inform consent. Generally, it used for programs that covertly monitor your activity on your computer, gathering personal information, such as usernames, passwords, account numbers, files, and even driver’s license or social security numbers. Spyware is installed in many ways such as most often spyware is installed unknowingly with some other software that you intentionally install. For example, if you install a "free" music or file sharing service or download a screensaver, it may also install spyware. Some Web pages will attempt to install spyware when you visit their page. As a result, all the computer setting is change, slow connecting speed, different home page, automatic pop up website and loss functionality of other program.

how E-Commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support.

Monday, February 2, 2009

Electronic commerce, commonly known as e-commerce, consists of buying and selling products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily since the spread of the Internet. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.


Cycle time means the amount of time taken to complete a process. For example a process of purchase order, delivery goods and reach customer. Digitize enable the supply chain save time from internal to external needed process to the transaction such as traditional of book keeping are upgraded to digitize. Every transaction proceeds under a standard and consistency form of transaction process.


Reducing time-cycle:

E-commerce can reduce cycle time by eliminating the time taken to process in between supplier, intermediaries and customers. Through e-commerce, the customer can directly order the material needed no matter in what time zone and wherever they are with an access to the internet, because the e-commerce website is operate 7-24-365, hence the customer no need to wait until the shop is operate. E-commerce reduces time taken from shipping, inventory level, it also shortens the time taken to verify registration, account entry and transaction authorization.

Furthermore, e-commerce fully utilizes the internet to facilitate the communication with strategy suppliers and internal customer. Enhance the interaction between firm and customer to enhance the understanding between the two parties. E-commerce reduces the traditional phone calling and snail mailing that used to be ways to process transaction. However it is lack efficient and slow in progress and take time. Electronic data exchange through online allow the company to communicate with their customer even in public holidays. Eventually, it affects the whole transaction process and increase the efficiency.

Improve employees’ empowerment:
Employee empowerment can be described as giving employees’ responsibility and authority to make decisions about their work without supervisory approval. Good managers are expected to help employees refine their job achievements by encouraging, instructing, guiding and giving them advice. Employee empowerment can increase employees’ motivation, job satisfaction and loyalty to their companies. The power that managers should shared with employees is through trust, assurance, motivation, and support.

Electronic-Data-Interchange (EDI) enables the employees to have freedom and authority to access in transaction system, transparency barrier between employee and customer is clear cut. Employees in charge can have more understanding of the business and the transaction and providing relevance feedback to customer. Employees can do their job independently without supervision. On the other perspective, employees who work under these circumstances are more productivity rather than those who work under tight supervise. Nowadays, work stress is a significance issues that should be taken into consideration when dealing with employee condition. In other ways, employee can work from anywhere at any time whenever they like. Because through accessing the internet they can do everything online. It is more flexibility to employee. Productivity eventually increases in these circumstances.


Facilitate customer support:

Customer demands are more demanding nowadays. Traditional ways of doing business seem cannot be applicable for the current situation. They required more sophisticate and efficient ways of dealing with their daily demand. E-commerce is a place where the firm can fulfill every customer with different requirement. Quality of services is much more emphasize nowadays compare with the physical product. Ordinary customer required more than what the web page provide. They required immediate response for their request. Share database in between the employee is crucial for further follow up process where they can obtain customer profile and information in order to solve their problem.

Customization is an issues where the firm should highly emphasizing and concentrating, neglect this issues will cause a huge impact and change the whole picture of the business nature. Firms are encouraged to provide Graphic-user-interface (GUI) which enables the user to view and order product. Furthermore, firms can also provide some information and brief summary of their product through picture or video to clarify customers about the product. Firms might need to yearn for a better prospect therefore it is a must for firm to recognize the customer changing trends and demands. Hence, a well define feedback of the services and products are essential for the company long term improvement. They also can provide their company information to enable the customer to contact them and prepare a forum to customer to left their comment.

The causes of Alibaba.com Success

Saturday, January 31, 2009



Alibaba.com is an e-commerce or e-auction company which is specializing in global trading. It was founded in 1999 by Ma Yun(Jack Ma). In 2008, alibaba.com has attracted at least 23 million visitors of which 65 percent were from China.
The alibaba.com is specializes in Business to business trades, especially for international buyers that trying to contact with sellers. It is an e-commerce ecosystem that allows consumers and businesses to do all aspects of business online. Manufacturer can publish their company profile at the Alibaba.com for free, so it can attract lot of low-cost manufacturer joining to their website and company who looking to partner with a low-cost manufacturer can easily search from Alibaba.com to find the suppliers of everything they need. It can help the new business to save some advertisement cost and easier for them to run their business.

Actually, Alibaba.com is just one unit of Ma's growing empire. Alibaba Group is made up of five sub-companies. His Alibaba Group also includes Taobao, which is an online auction web site for consumers like eBay or lelong.com; Alipay, an online payment system similar to PayPal, processing mainly payments within China; Alisoft, it provide the web services to the Chinese small and medium sized enterprise marketplace and the last sub-company is Alimama, which allows web publishers and advertisers to trade online advertising inventory.

So what cause Alibaba.com Success?
Jack Ma mention that one of the factor cause his company success is because of the company name- ALIBABA. When asked the people about alibaba, they all will answer that Alibaba--open sesame. The word 'Alibaba' is easy to spell, and globally known. So it can attract more people to search for the website as it is a simple word and easy to remember. In Jack Ma's mind Alibaba also can said as the opens sesame for small- to medium-sized companies.
Furthermore, Alibaba.com have their own online payment system. It is more convenience for the seller and buyer. The buyer can directly paid to the seller directly through the Alipay.com which is more secure to both the seller and buyer as the Alibaba.com and the Alipay.com are connected so it can reduce the fraud case happen. For example, once the fraud case had comfirm, the Alipay.com will block the transaction and return the money to the buyer.
By the way, another factor that cause Alibaba success is Jack Ma want his employees to belieave that Alibaba is a small company. So no matter how big the company get , they still need to continue innovate and grow. It only the reason that allow Alibaba to compete with other competitor like ebay, amazon.com and etc. So Alibaba will carfully seek for their employees, and each or them must with strong professional skill and good characteristic.


An example of an E-Commerce failure and its causes - Boo.com

Thursday, January 29, 2009

Boo.com’s history (Nov 1999 - May 18th 2000)


Boo was beaten by technology and the fickle fingers of those who shop for clothes on the web. From the day it launched technology was a problem for the online clothes retailer. Originally it was supposed to launch in May 1999 but technical hitches delayed the unveiling. When Boo.com finally went live last November its ambitious technology was there for all to see - if they could be bothered to wait for it to download. The graphics-heavy site took a notoriously long time to load.


The company stated that ‘their business idea is to become the world-leading Internet-based retailer of prestigious brand leisure and sportswear names’. However, after less than a year it launched, boo.com faced a critical moment. “Unless we raise $20 million by midnight, boo.com is dead”. The CEO of the boo.com Ernst Malmsten said, on May 18th 2000. Half the investment was raised, but this was too little, too late, and at midnight, less than a year after its launch, Boo.com closed because investor funds could not be raised to meet the spiraling marketing, technology and wage bills.


The headlines in the Financial Times, the next day read: “Boo.com collapses as Investors refuse funds. Online Sports retailer becomes Europe’s first big Internet casualty”. Although it happen 9 years ago, the boo.com case still remains as a valuable case study for all types of businesses, since it doesn’t only illustrate the challenges of managing E-commerce for a clothes retailer, but rather highlights failings in E-commerce strategy and management that can be made in any type or organization.



The causes of the e-commerce failure


There are several causes that makes Boo.com fall. Firstly, Boo.com full of technologies that cannot be view by all the internet users by that time. It could not be seen by people who use Macintosh computers which are heavily used by graphics, design and media companies. These companies surely are one of the key markets for a hip online retailer like Boo. Next, it used lots of graphics, pop-up windows and 3-D images that only those with a 56k modem could see it without waiting minutes for it to load. Getting the most out of the site required a high bandwidth internet connection. But according to Therese Torris, technology analyst from Forrester Research, only 1% of home surfers in Europe and 2% in the US have such high-speed connections by that time.


Although Boo.com looked great, anyone visiting it in November 1999 was confronted with a formidable array of windows. In one was Miss Boo, an animated helper who commented on the clothes people were buying. At the same time four other windows were open showing:

- The range of clothes a buyer was choosing from

- A detailed image of one item that could be spun around or magnified

- A Boo bag holding what was being bought

- A mannequin dressed in the clothes a shopper was buying

To do all this Boo used a technology called Flash made by US software company Macromedia that lets web page designers add animations and graphics to sites. But unfortunately at the time Boo launched, few people had installed the software program, called a plug-in, that let them see the funky graphics. Now Flash software is much more widely used.


According to Jim McNiven, chief executive officer of award winning web design company Kerb, he said that many companies stop workers from downloading plug-ins because of potential security risks. He said it was much better to use technologies that need no extra software and that everyone can see. Besides that, he says that Kerb always ensures that at least the last two full versions of browsers can see all parts of webpages designed for clients.

Furthermore, the site was very difficult to navigate around. Shoppers could get lost and find no way back to their starting point. In the web design industry, there is a “three-click rule” for site design, which simply means that the users should not need to click more than three times to find the information they seek. Customers prefer pleasurable, simple and quick browsing experience rather then complicated and full of animation that confusing and wasting their time.


In order to gain customer acceptance, Boo redesigned its website in January to make it easier to navigate and added a version devoid of pop-up windows and graphics. The changes gagged Miss Boo and a paper catalogue was printed for those who want to buy offline. However, the early bad experience scared off many online shoppers who did not go back to Boo.com, preferring to do their buying on the high street or on websites that were easier to use. Online shoppers are notoriously fickle and surveys have shown they are easy to irritate and hard to impress. Irritated shoppers tend to decamp for websites offering better service.


Additional information:

But some of the blame for Boo's demise can be put down to the fact that the e-commerce is in its infancy. Boo launched simultaneously in 18 countries and had to create an international infrastructure that could handle all the different currencies, consolidate orders and deliver clothes and shows across the world.

 
E-COMMERCE - Wordpress Themes is powered by WordPress. Theme designed by Web Hosting Geeks and Top WordPress Themes.
por Templates Novo Blogger