Thursday, July 3, 2008

Ilegal downloading

I am reviewing 1 of the post in http://ecommerze.blogspot.com/search/label/Legal which is the UK to get tough with illegal downloader.

Downloading is no doubt one of the main activities that people use internet. Most people download musics, movies, softwares and etc through the internet legally or illegally. Ilegally means that the users didn't pay to get the dowloaded files which are copyrighted by the original owners. There are many ways how one can download files where one of the more popular way is through p2p file sharing. In p2p, one of the favourite program that currently many people are using is bittorrent and it has many different types of clients where one of the popular one is Bitcomet.


Bitcomet

For more information check this websites:
1)P2P - http://en.wikipedia.org/wiki/P2P
2)bittorrent - http://en.wikipedia.org/wiki/.torrent
3)Bitcomet - http://en.wikipedia.org/wiki/Bitcomet


In Malaysia too, there are many internet users who download alot from the internet and many of them are illegal due to the copyright but it seems that the Malaysia government is not doing much to stop this illegal downloading unlike UK. Given that Malaysia is one of countries where privacy is rampant. These users who download illegally are also a nuisance to other internet users do not download as download use alot of the internet bandwidth allocated by the ISP.


Who doesn't download from the internet? Everyone i believe have done it once before. In Malaysia original items are relatively expensive, some are hard to get and many factors deter us from getting the items legally. So most resort to the best way which the internet, free and easily obtainable. Thus the onus cannot be put on the government alone but also the users as well. But the government have the bigger to play as they are the ones who implement and enforced the laws. Unless any actions are taken, a bad image will be projected to potential investors on Malaysia as it is already a haven for piracy in Malaysia.

One of the steps which Malaysia had taken to counter illegal downloading is to fine those who are caught downloading illegaly. The fine propose is RM250k *jaw drops* but it has yet to be enforced. Huh? See what the Malaysian government is doing nothing but it is not for me to judge them. Here for more information: http://thestar.com.my/news/story.asp?file=/2007/12/4/nation/20071204151805&sec=nation


Here are some response from the organizations that are losing out due to illegal downloading to the government. Check here: http://thestar.com.my/news/story.asp?file=/2007/9/21/nation/18915404&sec=nation


From those users who are downloading illegal here a website which tells how you could avoid illegal downloading. Online Tech Tips : http://www.online-tech-tips.com/computer-tips/how-not-to-get-caught-downloading-illegal-mp3s-and-music/


Overall, Malaysia is not getting tough enough compare to the UK on illegal downloading. I guess it would be awhile before any actions are taken against illegal downloaders. So for now, happy downloading to those who are at it.

Tuesday, July 1, 2008

E-Government in Malaysia: Its implementation and Citizen's Adoption Strategies

E - Government

E-Government is the use of information and communication technologies in public administration. It is combine with organizational change and new skills to improve public services, democratic processes and to strengthen support to public policies. In fact, it is a way for public administration to become more open and transparent, and to reinforce democratic participation; more service-oriented, providing personalized and inclusive services to each citizen.

Citizen Adoption Strategies:

E-Services form an emerging field which is rapidly gaining attention and importance. Citizens expect and demand governmental services with a high degree of quality, quantity, and availability in a 24-hour, seven-days-a-week, and year-round fashion. Governments all over the world are developing information systems and electronic services. Both services have the capacity to meet these emerging service needs and demands of citizens. The success in delivering electronic services depends upon the capability and self-confidence of citizens in performing e-transactions, as well as their trust and confidence in the protection of their personal data within an open and accountable government. However, few studies have explored the core factors that influence citizens’ adoption of e-Services. This is an important issue, because the success and acceptance of e-Government initiatives are dependent on citizens’ willingness to adopt and utilize these services

In addition, E-government provided seven flagship application introduce in Multimedia Super Corridor ( MSC ). These flagship application start to jump and accelerate the growth of MSC as well as enhance national competitiveness. In fact, it is to create high value job and export growth to help reduce digital divide. There are seven main projects identified in the e-government applications and it is list out as follows:



Implementation of E-Government Malaysia:



1) Generic office Environment ( GOE )

The objectives of GOE is to introduce a fully integrated, distributed and scalable office environment that leverages use of multimedia information technology. This will enable efficient communication and allow collaboration among all workers. It leads to right information reaching the right people in a timely manner. Pilot phase is one of the system developed and implemented in Prime Minister's Office, Deputy Prime Minister's Office, Chief Secretary to the Government's Office.



2) Electronic Procurement ( eP ) Project


The eP project reengineer, automate and transform current procurement system. The project would cover central contract, tender and direct purchase. It will increase transparency, saves time and money thus encourages suppliers to go electronic. The project taken off with the introduction of ePerolehan which is government initiative to take its procurement exercises online. All suppliers can get tender documents and submit bids on the internet. They have smartcards to help them make transactions through ePerolehan system. For detail information please log on to http://www.eperolehan.com.my/.



3) Human Resource Management Information System ( HRMIS )


It will provide single interface for government employees to perform human resource efficiently and effectively in a intergrated environment. It help to standardize human resource processes for federal, state, statutory body and local authority services. HRMIS also provide transactional function such as leave application, loan processing, competency management, recruitment and selection of employees.



4) Project Monitoring System ( PMS )


It is one of the e-government projects that create mechanism to monitor project implementation throughout government agencies. It would provided platform to exchange ideas and demonstrate best practices in information management and communication services. It consists of Application Services, Data Services and Communication Services.



5) Electronic Services Directory ( eServices )


It is a pilot project that allows Malaysian to engage in transaction and utility payment such as telephone and electricity bill, police summons, Road and Transport Department ( RTD ) services. The eService is accessed via multi channel service delivery like the internet and kiosk machines. For example, Rilek services. It allows public members to access general information on outstanding summons via touch sreen infokiosk. Please log on to http://www.rilek.com.my/ for more information. Driver licensing and summons services is one of the deliverably phase for the eServices project.



6) Electronic Labor Exchange ( ELX )


This projects help to improve mobilisation of human resource optimize work force utilisation via syatematic matching of job seekers to job vacancies. So, Ministry of Human Resource is to be a one-stop centre that contains labor market information accessible to the public.



7) E - Syariah


The aim of this project is to improves service quality under Syariah court. It enhance Islamic Affairs Department's effectiveness for better monitoring and coordinating of its agencies, and improve the management of its Syariah courts.

Things to take note to prevent e-auction fraud when a consumer participating in e-auction

An auction is a market mechanism by which buyers make bids and sellers place offers. Auctions, an established method of commerce for generations, deal with products and services for which conventional marketing channels are ineffective or inefficient.


The Internet provides an infrastructure for executing auctions at lower cost with many more sellers and buyers. Auctions conducted online, have been in existence for several years on local area networks and were started on the Internet in 1995. Host sites on the Internet serve as brokers, offering services that enable sellers to post their goods for sale and allow buyers to bid on those items. Although the majority of consumer goods are not suitable for auctions and are best sold through conventional sales techniques (i.e., posted-price retailing), the flexibility offered by online auction trading may offer innovative market processes.


Auction items are in many cases unique, used, or antique. E-auctions have several limitations Because buyers cannot see the item, they may get a defective product. Buyers can also commit fraud. Thus, the fraud rate in e-auctions is very high. For instend, some of the C2C auctions conducted on the Internet are not secure, and some possible participants are scared away by the lack of security. On the other hand, some B2B auctions are conducted on highly secure private lines. There are several types of auctions, each with its own motives and procedures. It is customary to classify dynamic pricing into four major categories depending on how many buyers and sellers are involved


PROTECTING AGAINST E-AUCTION FRAUD


The largest Internet auctioneer, eBay, has introduced several measures in an effort to reduce fraud. Some are free, some are not. The following are some of eBay’s antifraud measures:

User identity verification
E-Bay uses the services of Equifax to verify user identities for a $5 fee. Verified eBay User, a voluntary program, encourages users to supply eBay with information for online verification. By offering their Social Security number, driver’s license number, and date of birth, users can qualify for the highest level of verification on eBay.

Authentication service
Product authentication is a way of determining whether an item is genuine and described appropriately. Authentication is very difficult to perform because it relies on the expertise of the authenticators because of their training and experience, experts can often detect counterfeits based on subtle details. However, two expert authenticators may have different opinions about the authenticity of the same item.

Grading services
Grading is a way of determining the physical condition of an item, such as “poor quality” or “mint condition.” The actual grading system depends on the type of item being graded. Different items have different grading systems—for example, trading cards are graded from A1 to F1, whereas coins are graded from poor to perfect uncirculated.

Feedback Forum
The eBay Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.

Insurance policy
E-Bay offers insurance underwritten by Lloyd’s of London. Users are covered up to $200, with a $25 deductible. The program is provided at no cost to eBay users.

Escrow services
For items valued at more than $200 or when either a buyer or seller feels the need for additional security, eBay recommends escrow services (for a fee). With an easy-to-access link to a third-party escrow service, both partners in a deal are protected. The buyer mails the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At that point, the seller ships the goods to the buyer. After an agreed-upon inspection period, the buyer notifies the service, which then sends a check to the seller. (An example of a provider of online escrow services is tradenable.com.)

Nonpayment punishment
E-Bay implemented a policy against those who do not honor their winning bids. Protection toward seller’s base on a first-time nonpayment results in a friendly warning. A sterner warning is issued for a second-time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.


Appraisal services
Appraisers use a variety of methods to appraise items, including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months. An appraised value is usually accurate at the time of appraisal but may change over time as an item becomes more or less popular in the marketplace.

Verification
One way of confirming the identity and evaluating the condition of an item is through verification. Neutral third parties also will evaluate and identify an item through a variety of means with verification. For example, some collectors have their item “DNA tagged” for identification purposes. This provides a way of tracking an item if it changes ownership in the future.


Saturday, June 28, 2008

Corporate Blogging: A New Marketing Communication Tool for companies

Corporate blogs is a blog can be private, as in most cases, or it can be for business purposes. Blogs, either used internally to enhance the communication and culture in a corporation or externally for marketing, branding or public relations purposes are called corporate blogs. Further explanation please refers to http://en.wikipedia.org/wiki/Corporate_blog

The 5 Types of Corporate Blogs applicable http://mariosundar.wordpress.com/2008/05/19/the-5-types-of-corporate-blogs-with-examples/ar.wordpress.com/2008/05/19/the-5-types-of-corporate-blogs-with-examples/


  1. Company Blog - Top 5 include: Google, Adobe, Flickr, Facebook, and Yahoo! Search.
  2. CEO BlogSun CEO (Jonathan Schwartz’s blog) and top10 CEO Blog
  3. Industry BlogMiller Brewing’s Brew Blog
  4. Department or Product BlogMicrosoft Community Blogs and Google-Product Blogs
  5. Customer Service BlogMy response to Steve Rubel

Five Tips to Succeed Corporate Blogging, which is available at http://blog.planetdomain.com

  1. Plan Ahead and Post Regularly
  2. Be Original and Fresh
  3. Personality Counts
  4. Social Media Means “Social”
  5. Write Well, or Find Someone Who Can

The 6 Top Reasons Marketers Should Blog

  1. Fast Search Engine Spidering and Indexing of Your Site. A popular blogging platform on the planet that is belongs to Google. Blogger at http://www.blogger.com/is used to produce thousands of blogs. Even a complete internet newbie can set up a blog in about 5 minutes at Blogger.
  2. Blogs can Build Your Backlinks Quickly. If you’ve spent time trying to get reciprocal links to your site, you know how frustrating, boring, and time-consuming it can be. By using the corporate blogging this types of problems can be eliminated. A blog can build one-way links to your site fast. If you’ve just started a blog, you should submit it to the large blog and feed directories. Here is a list of the Top 55 in http://www.masternewmedia.org/rss/top55/
  3. A Frequently Updated Blog will Keep the Spiders Visiting Your Site Often. Most of us are aware that the search engines like sites that are updated frequently. If you have your blog set up correctly, every post will update several pages of your site. Then pinging Yahoo and the blog and feed directories at Pingomatic can bring out the spiders in just a few hours. This is a great way to get new pages of your site indexed quickly and frequently.
  4. Your Site is Stickier and More Appealing to Visitors. A blog on your site is an easy way to keep your site updated on a regular basis. The upside is that visitors will come by more often. If they find your blog interesting and informative, they may bookmark your site. That means you have a much greater chance of making sales. And you have a ready-made audience for any new products you launch.
  5. A Blog Is The Fastest And Easiest Way To Build A Brand-New Website Without Training. No HTML knowledge is required. Blogger don’t need to know how to link the pages in your site together. All you have to do is type in your post and click on the “publish” button. And yet you can still set up an attractive, spiderable site in record time.
  6. Keyword competition in RSS feed sites is much less than in the SE’s

Tuesday, June 24, 2008

Pre-paid cash card

What is a pre-paid cash card?

When you open a prepaid credit card account by depositing money into that account, it is the same as how you would make a deposit to open a checking or savings account. Once you have money in your account, you're issued a prepaid credit card that can be used anywhere one would use a regular credit card. The best part of the prepaid credit card is that you can charge to your heart's content and you won't be in debt. The money is yours and once it's gone, you can't spend any more until you make another deposit. There are no bills and no interest charges. It's the same principle as using a debit card linked to a savings or checking account.

More information on pre-paid cash card:
1)Prepaid Credit Card Guide
http://www.prepaidcardguide.com/
2)wisegeek
http://www.wisegeek.com/what-are-prepaid-credit-cards.htm

Cool. But seriously i don't need something like this. Why? Maybe because i rarely spend on anything unless i really need to or have to. Shopping is something i hate, i don't like the idea of spending my time looking around and buying stuffs. I prefer buy the stuffs i want and get as fast as i can back home. That's for me though. For consumers, i think this a very good way for them to manage their spending and its very convenient too.

Here are examples of pre-paid cash that are being in use now.



In Malaysia, there is the touch-n-go card. It is a card where you reload money into it and use for various purpose. Well most people use it to pay toll charges beside that i haven't seen anyone use it for anything. Heh, such as waste using a card with many potential. Well it is announced that the services of the touch-n-go is going to expand to the retail and the fast food industry.

For more information: My E-Commerce http://ecommerze.blogspot.com/2008/04/using-touch-n-go-card-to-buy-fast-food.html


Touch-n-go in my opinion is not a very good product as not many people are using due to the fact that it has limited services and the new services being introduced are old stories compare to other countries in the region. Take a look at Hong Kong and it's octopus card.



Being a pre-paid cash cash as Touch-n-go, it has a faster developement where from just for transportation it expanded to various usage including what touch-n-go is going to implement now. It circulation is around 10million more than the island population itself. Touch-n-go seems inferior to it.
For more information on the octupus card:
1)Hong Kong Travel
http://www.hong-kong-travel.org/Octopus.asp

Mobile Payment Systems in Malaysia.

Nowadays people living in an environment characterised by rising prices. Therefore there is the need to adjust and adapt to these new conditions through the adoption of a more expedient and efficient means of payment to reduce costs. Function and responsibility of the Central Bank is to promote the development of safe and efficient payment systems. Any inability to make payments in an economy would have a far reaching and widespread impact on society.
As the electronic payment channels become more easily accessible. It would thus provide the opportunity to shift the remittance flows from the informal to formal channels. Indeed, electronic payment increases operational efficiency and improves productivity levels through expedient payments and receipts of funds; provide the speed and convenience of making payments from any place or time. Accelerating the country's migration to electronic payments has therefore become a part of Malaysia's larger national agenda to increase the efficiency of the nation's payment systems which would ultimately improve the competitiveness of our economy.
Credit cards, ATM cards, debit cards including the e-purse application embedded in the MyKad are among the card payments possibilities in Malaysia. The increased use of cards is an international trend and is expected to gain significance in Malaysia. Giro transfers, other credit transfers and direct debit are also gaining significance by both individuals and businesses. Finally, Internet banking has also begun to experience stronger growth. However, in 2006, Malaysian consumers on average made only 0.7 transaction via direct debit and credit transfer and 0.2 transaction via debit card transaction as compared to 84.7 and 109.5 transactions. In this regard, the Bank has formulated an Electronic Payments Roadmap aimed at bringing together relevant stakeholders to address the barriers that have impeded the increased adoption of electronic payment in a comprehensive and strategic manner.
  1. Payment infrastructure. The infrastructure for making payments would need to be widened and enhanced to provide the convenient access to electronic payments. In addition, solutions need to be developed to enable users to integrate easily with the payment offerings.
  2. The product range. The range of services would need to be expanded to cater for the different payment needs of consumers and business sectors.
  3. The pricing framework. The formulation of a transparent and cost-effective pricing framework is important to provide the incentive structure that would spur the adoption of electronic means of payments.
  4. Consumer awareness. Programmes need to be implemented to inculcate the behavioral change among consumers. There needs to be trust and confidence in the electronic payment systems.
  5. The standards. The setting of common standards to address the interoperability of systems including standardising the payment messaging format is vital to the wider acceptance of electronic payment.
  6. Ensure the security and integrity of the payment system which requires the supporting regulatory and legal framework to be in place.
Potential of mobile phones to make the transformation
Maxis announced that it is currently trialling a mobile phone multi-payment service incorporating credit card and prepaid transit payments with Maybank, Visa International and Touch 'n Go. Maxis 'touch to pay' employs Near Field Communications ("NFC") technology which leverages on a short-range wireless connectivity standard embedded in mobile phones. This 'touch to pay' trial reflects Maxis' commitment to lead in mobile payment services. This technology, currently available on Nokia 6131 NFC, allow users to touch their handsets against contactless payment readers to make a purchase. Transforming the use of mobile phones into a conduit for swift, cashless payments using the one accessory people are going to carry around with them above others.

Mobile phones become the electronic devices offence catch on hands of most Malaysians. Given the significant pay-offs from the low cost technologies in accelerating the adoption of electronic payment. Mobile phone is identified as one of the delivery channels that should be leveraged on. Indeed, payments via text messaging has the potential to grow in importance. The high percentage of mobile phone subscriber and the high rate of participation of the population in the banking system are important pre-conditions for the significant use of the mobile phone as an ideal platform for personal payments. Indeed, the large mobile subscriber base and the positive transformational effects of mobile banking and payments offer a unique opportunity to open up the financial system to more customers and communities in order to achieve financial inclusion for all segments of our society.

It is important to identify the gaps in the service offerings, and plan the way ahead for Malaysia to make the quantum leap in e-payment adoption. Market participants need to address the mismatch between what consumers expect and what is being offered. Openness and inter-connectivity are also critical in the mobile banking and payment initiatives. Exclusive and proprietary services where the target market is limited to the customer base of individual mobile operators or individual banks will not allow for the potential to be realised. Any lack of interoperability across mobile operators and across banks will not achieve the required critical mass and will also result in high transaction cost for consumers.

Monday, June 23, 2008

Electronic Currency

Electronic currency (E-currency) which is also knows as e-money, electronic cash, electronic money, digital money, digital cash or digital currency. It refers to money which is exchanged only electronically through internet. Example of e-currency is Electronic Funds Transfer (EFT) and direct deposit.

E-currency is widely used in the internet as the medium of internet related commercial actions. The e-currency being used on the internet related commercial applications such as shopping on the internet and doing personal investment via internet. The using of the e-currency services allows people not to use their credit card as the only payment method on the internet since sometime there exists a big risk to provide your credit card information to the merchant you do not know them very well and most of them are far away in the other side of the earth. The e-currency service companies such as e-gold, paypal and EMO can provide both the buyers and merchant the convenient way to send and receive the payment just by clicking the button and the deal is done. None of the payment methods in the world right now can provide this kind of efficiency capability.

One rare success has been Hong Kong's Octopus card system, which started as a transit payment system and has grown into a widely used electronic currency system. Singapore also has an electronic money implementation for its public transportation system such as commuter trains, bus, and so on which is very similar to Hong Kong's Octopus card and based on the same type of card (FeliCa). A very successful implementation of e-currency is in the Netherlands, known as Chipknip.


There are types of e-currency in the world, which the major different is based on backed base.

  1. backed by precious metal such as e-gold, which is a digital gold currency operated by Gold & Silver Reserve Inc., is backed by gold.

  1. backed by hard currency like Paypal, which It serves as an electronic alternative to traditional paper methods such as cheques and money orders.
  2. backed by non-gold backed, or both gold and non-gold backed like e-Bullion and Liberty Reserve.


E-currency can help people make a lot of money with small amount of time that it practically runs on autopilot. And here are some simple steps to Electronic Currency Success, which available at www.dxingold.com


  1. Open up an E-Currency account on the global network and set up your portfolio.
  2. Fund your E-Currency portfolio.
  3. Choose the correct currencies to trade from the global E-Currency network.
  4. Set your portfolio to pay the premiums from your E-Currency selections to ensure continuous operation. (When set properly, it is impossible to lose money.)
  5. Re-Invest or withdraw the gains from your portfolio.
  6. Qualify for your Merchant Console.
  7. Operate your Console to process exchanges. (Bring in even more revenue into your account)
  8. Continue to grow your portfolio by accumulating global E-Currency symbols within your account. (These pay out daily dividends)

Credit Card debts: Causes and Prevention

Visa - Master Credit card





I have came across several types of credit card such as gold-master, visa(titanum, classic, gold). Some people might used credit card for immediate installment such as car loan and housing loan. There are few causes and prevention of credit card debts in our daily life.

Causes of Credit Card Debts:

a) Decrease in income - Some groups of people would be bought expensive items when their income reduce. They are leading the debts accumulated until payment has been paid. They are encourage to adjust the debts quickly and get it better.

b) Poor Money Management - Planning your budget is very important as you might not knew where your money spent. It happened mostly for women who like bought expensive things such as branded cosmetics. They might not realised thousand of ringgit had been spent monthly. When monthly statement delivered they only discover that they are over spent and it is too late. The sum that accumulated month by month due to payment due and interest has been charged. There must be a proper spending plan to avoid over budget and money gone.

c) No saving cushion - An easy way to avoid unwanted debts is to prepare for unexpected expenditure by saving living expenses as much as possible. In case one day you are divorce, job layoff, illness and you have money to cover your expenses. It might not caused you financial strain as the debts is increasing by spending too much. Everyone should be saving money and you might need to used it in any emergency matters.



Many people put on emergency bills such as car installment, housing loan and so on. It is because human beings would be faced with a rising cost which is trap them. There are few prevention on credit card debts.


Prevention of Credit Card Debts:

a) Photocopy Bank Offer include Interest and Terms - You might want to write a letter to a credit card company stated you would like swtich competition. As that financial institutions offer a reasonable interest rate and you prefer to be their valued customer. They do not want to lose their business and approved you to get a credit card at once. In fact, they would matched your need and even offer you a lower interest rate.


b) Double Minimum Payment - People would paid extra amount due when they are afford to do so. The balance you paid more the debts is no longer so much that needed to be paid in longer time. You should be noticed that interest charged when longer time taken to make payment. It would be end up with the principal plus an interest charged and you might get panic when deal with huge amount outstanding.


c) Cut Up Credit Card - Many people have been close their credit card account when they are awared that they are unable to pay anymore. They are just stick to one credit card rather than 2 or 3 credit cards. The reason is they do not want to be debtors that owing money to the financial institutions.

Saturday, June 21, 2008

threat of online security


Thumbsucking is a huge threat that the companies face due to the proliferation of portable storage devices. As people increasingly use media players, and external hard drives for personal and business needs, each device becomes both a friend and foe to the modern-day corporation. In fact, a 2008 Applied Research-West survey found that workers born after 1980 are 200 percent more likely to have corporate data on their storage devices. This threat becomes even more prominent when devices are not company-owned or issued, but can still be used to store and transport sensitive corporate data, leaving no audit trail or trace of what's been taken. Without control, portable storage devices present four major threats to the enterprise:



  • It allows users to bypass the perimeter and introduce malware into the enterprise.
  • They allow internal users to remove confidential information such as financial files, health records, and other intellectual property from the organization.
  • Employees can bring unwanted or unauthorized programs onto the company’s network.

The biggest threat to personal data, according to Symantec, comes from the loss of laptops, hard drives, and USB drives, which accounted for 57 percent of the data loss outlined in the company's latest Internet Security Threat Report, released today. In addition, 70 percent of the malicious code unleashed in the last six months of 2007 was meant to steal confidential information. Finally, the creation of malicious software is now outpacing the creation of "good" programs. As such, all this stolen information ends up in an underground marketplace that works just like a legitimate economy.

Typical approaches to improving computer security from the threat will include the following:

  • Physically limit access to computers to only those who will not compromise security.
  • Hardware mechanisms that impose rules on computer programs, thus avoiding depending on computer programs for computer security.
  • Operating system mechanisms that impose rules on programs to avoid trusting computer programs.
  • Programming strategies to make computer programs dependable and resist subversion

In order to secure a company system, some secure systems are importance to be used like:

  1. Firewalls are systems which help protect computers and computer networks from attack and subsequent intrusion by restricting the network traffic which can pass through them, based on a set of system administrator defined rules.
  2. Anti-virus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware).
  3. Social engineering awareness keeps employees aware of the dangers of social engineering and/or having a policy in place to prevent social engineering can reduce successful breaches of the network and servers.
  4. Honey pots are computers that are either intentionally or unintentionally left vulnerable to attack by crackers. They can be used to catch crackers or fix vulnerabilities.

Friday, June 20, 2008

The application of 3th party certification program in Malaysia




Online shoppers as the third party are concern about credit card fraud, become victiom of identity theft, aware of sharing personal information on the web, and about spyware because fraud and identity theft have created a chilling effect on e-commerce. Online consumers are causing shoppers to limit spending . Most of them shop only at sites they know and trust. They have also abandoned a shopping cart because they did not “trust” the transaction.
Forrester Research found that 24% of online consumers stopped purchasing online during the 2005 holiday season due to security concerns. The growth in online commerce brings with it a significant increase in the variety of fraudulent web activities. Phishing and other scams involving fraudulent use of consumers identities online are on the rise.The reality of such figures has caused online shoppers to be wary of how they use theirpersonal information to transact business. Gaining the trust of online customers is vital for the success of e-commerce. It is necessory to increasing customer confidence at transaction time on web site to earns full potential.

Displayes of trust marks in completing online transactions become concern of online shoppers, online businesses should be sure to choose the trust mark that offers the most value. The VeriSign Secured Seal is the most trusted symbol of secure transactions on the web for this recent year and affect online shoppers decision and preference to do business with or make a purchase from a site. It's a trust mark communicate online transaction security to customers. As a result, this help to reduce the number of terminated transactions on the website.

The VeriSign Secured Seal program also delivers additional features consumers demand. One such feature is our verification functionality. When a consumer clicks on the seal, information about the VeriSign services contributing to the site's security is displayed. Much of the online shopper are interested in knowing what technology and services are behind a trust mark. Beside this, VeriSign Secured Seal is the only choice for businesses that are serious about alleviating the security concerns of online consumers. The seal is available exclusively to sites that purchase and implement VeriSign’s market-leading security solutions. Sales opportunities will also be maximize.









Tuesday, June 17, 2008

Safeguard Personal and Financial Data

Firewall Hardware
Nowadays, there is many unauthorized people attack our computer. Most common are hacker, cracker that attack a person's computer. How are we going to prevent those viruses in order to protect ourself? I would like to introuce some ways that may safeguard our personal informations and financial data.

It is so common that everyone need a software to protect own data. As a result, an individual should maintain an antivirus sofware and firewall to protect personal and financial data. How an antivirus work in order to protect our personal and financial data? It helps to prevent any unauthorized person steal a private and confidential information. For instance: name, address, bank account number.

Firewall hardware can protects an outside hackers access to a personal computer. Firewall hardware is firewall network used by many people to protect unauthorized access. Firewall hardware set up between a computer and DSL modem which protects a single and multiple computer. An individual should regularly scan their own computer to prevent spyware. It may affect a perfomance of one person's computer which hackers access your personal data. An individual should used password and encrypting files to protect themselves. This ensure that unauthorized people access and view your data. Full disc encrypting which prevents thief from turn on other's person computer without passphrase.


AVG Anti-spyware protection package


I have came across one policy on safeguarding personal informations and financial data. The policy named "University Confidentiality" which stores private informations and financial data. All the universiti students and staffs safeguarded under this policy such as loan paid to students. Students private and confidential informations are to be safeguarded to prevent any unauthorized access. Some other people may view your financial data like steal your bank password or credit card number for illegal purposes. For instance, get credit card numbers to apply loan. As a result, we need the policy in order to protect ourselves get cheated.

Well, what are the steps taken by Florida State University to safeguard personal data of students and staffs? The University policy will designate more employees coordinate safeguarding. All the staffs must be coordinate to safeguard their private informations and financial data. It will evaluate the effectiveness of the safeguarding to make sure that it in line with its clients protection. "Confidentiality Policy" recognized the importance of protecting unauthorized access, miuse, loss information resources. All printed material containing confidential, personal information related to financial transactions, including name, birth date, address, telephone number, social security number, personal photograph, amounts paid or account number, are to be safeguarded. There is only authorized employees may view a document stored in University information system. The sytem which directly linked to a specific account that just authorized person may review, scan, print and store paper document and correspondence electronic files directly on computer system for immediate backup and retrival.
These are all the safeguard that I have had came across through internet. Anyone who is interested kindly log on to http://www.fsu.edu.com/ for detail informations.

Phishing: Examples and Safeguards

So want to earn some easy money? Fishing is the way to go or it is phishing. With millions of people using the internet to do online transactions, many are unawared that some unscrupulous people had taken the advantage to conned this people for their financial gains.

In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is an example of social engineering techniques used to fool users.

It is an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

Phishing is also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

An image showing how phishing works

Most phishing cases that i stumbled across while searching are normally financial institutions are being targetted where many fake e-mails had been sent to their customers to trick them into entering their personal information to gain access to their bank accounts. Here are some e-mails which found to be fake taken from the original website of the banks in Malaysia telling their customers to be more cautious.

1)Maybank:

http://www.maybank2u.com.my/online_security_watch/phishing_web_site.shtml#

2)PublicBank:

http://www.pbebank.com/en/en_content/info/phishing.html

For the past 20 years of my life, i have never been trick into submitting my personal details to fake e-mails because i do not really use the internet for any business transactions or anything that involves money. I am also skeptical about online transactions because of cases like phishing and other online threats, i do not feel safe using the internet for now maybe until i feel that there are adequate protection to prevent phishing.


The methods and safeguards that can be use to avoid be a victim to phishing would be:


1)If you get an email or pop-up message that asks for personal or financial information, do not reply. Legitimate companies don’t ask for this information via email.


2)Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.

Above are just a few methods to prevent phishing. Below are some websites which tell us how to avoid be a victim to phishing:

Chuang Computer Tips:

Tips on how to improve your computer performance, problems, security and many more.

1)http://www.chuangcomputer.com/blog/2007/08/secret-tips-to-prevent-phishing-attack.html

Internet Fraud Tips from the National Consumers League's Internet Fraud Watch

2)http://www.fraud.org/tips/internet/phishing.htm

Well there more to phishing but i am going to stop here. Last words, just be extra cautious and alert.

Thursday, June 12, 2008

Revenue Model for Google, Amazon, and eBay

Revenue model description of how the company or an e-commerce project will earn revenue. The major revenue models are sales, transaction fees, subscription fees, advertising fees, affiliate fees, and other revenue sources.


Google, is an American public corporation, earning revenue from advertising related to its Internet search, web-based e-mail, online mapping, office productivity, social networking, and video sharing as well as selling advertising-free versions of the same technologies.

Google.com usually generate most of the revenue from Google Adwards(pay per click advertising), Google Publication Ads, AdSense (ad serving program), and per-click or per-thousand-advertisement.

Google, a new revenue model, is currently testing a new advertising program that pays site owners based on a Cost-Per-Click model. The program, called Cost-Per-Action, was revealed via an invitation e-mail from the Google AdSense team to Web site owners.

For the 2006 fiscal year, the company reported US$10.492 billion in total advertising revenues and only US$112 million in licensing and other revenues. Google AdWords allows Web advertisers to display advertisements in Google's search results and the Google Content Network, through either a cost-per-click or cost-per-view scheme. Google AdSense website owners can also display adverts on their own site, and earn money every time ads are clicked.


Amazon.com was one of the major online shop to sell goods through internet. Amazon primary product lines is come from VHS, DVD, music CDs, MP3 format, computer software, video games, electronics, apparel, furniture, food, toys, etc. it would helping amazon.com to earn money everydays. Besides selling product, they also provide web services such as Amazon Simple Storage Services, Amazon Elastic Compute Cloud, and etc.

Ebay most common revenues come from online auction and shopping website in which people and businesses buy and sell goods and services worldwide.
Another interesting aspect of eBay's revenue model is that it is somewhat evenly spread out among a number of categories, with one glaring standout. Among the categories delivering more than $1 billion in gross market value are:

  • Clothing and accessories -- $3.3 billion
  • Consumer electronics -- $3.2 billion
  • Computers -- $2.9 billion
  • Home and garden -- $2.5 billion
  • Books/Movies/Music -- $2.4 billion
  • Sports -- $2.1 billion
  • Collectibles -- $2.0 million
  • Toys -- $1.6 billion
  • Jewelry and watches -- $1.5 billion
  • Business and industrial -- $1.5 billion
  • Cameras and photos -- $1.3 billion

eBay offers several types of auctions like auction-style listings, fixed price format, and dutch auctions.
eBay generates revenue from a number of fees. The eBay fee system is quite complex, and different across the country. The eBay’s fees may include insertion fees, promotional fees and final value fees. Insertion fees are charged for any item that is listed on eBay, the fees is nonrefundable, promotional fees are charged for extra listed options that attract attention for an item, while for final value fees are a commission at the end of the auction that is charged to seller.

These three companies, Google, Amazon, and eBay, are few of the most successful e-commerce nowadays that adopting different kinds of revenue model. As we can see that google has charge advertising fee towards their advertiser, eBay has apply transaction fee for those products listed on their website as well as comission on the any complete auction transaction. As for amazon’s revenue has come from sales of product lines throughout their website and charged an affiliate fee for referring customers.

The success of eBay





Most of the people will have a mindset saying that “E-commerce, online shopping? Can it be successful in the real world?” Actually in the competitive world nowadays some potential and successful e-commerce websites still exist. One of it is eBay which is at http://www.ebay.com/.



Mr. Omidyar
started eBay, which the first name eBay used was called Echo Bay Technology in 1995. When the company tried to register the domain name echobay.com, they found that it was already in use. They shortened the name to eBay.com and the website was born.

eBay began by Pierre Omidyar is 1995, (pure play) virtual organization, which they conduct their business activities solely online with no physical shop. This company began as something like an online garage sale in 1995 and has enjoyed steady growth over the years. Items on eBay are listed by categories and if you have an eBay account you can bid on the item on eBay. eBay include items like antiques, art, book, cars, coin or paper money, CDs, clothing, real estate, and many things else.








In the competitive world today, to build a successful e-commerce is not an easy thing. eBay provide us as a guide to become successful. The early emphasis on eBay was the customers. The very nature of online auctions required that strangers trust each other. First and foremost, eBay have done is to offer a quality product and be willing to stand behind it. Not only that eBay runs on feedback and it is far better to satisfy a customer than for negative feedback to be left. Positive feedback is one of the main things that attributed to the success on eBay. Next eBay focuses on providing excellent customer service. Give the customer MORE than expected. It is always more difficult to sell to a customer the first time. Therefore, once someone buys from eBay, their goal is KEEPING them as long term customer.

In order for the business to grow further, eBay started buying over some websites, which would help to boost up eBay’s. The Website Half.com was bought over by eBay in 2000 and fully integrated into eBay's web community in 2001. Half.com allows users to buy and sell items at lower rates much like eBay transactions but without the auction feature. The following year, eBay acquired Paypal Inc. which help eBay auctions to make payment. Paypal allows a person to send or receive money via an email address. Money in a Paypal account can be spent on the Internet, sent by check to the account owner, or deposited into a bank account. Paypal also offers credit cards, debit cards, and a bill paying function.


eBay is only for auction-style listings, which also auction for odd items that help eBay to earn a higher profit. The first item sold on eBay was a broken laser pointer, for $14.83. Omidyar was experimenting with how equal access to information and opportunities affects the efficiency of marketplaces. As a test he posted a listing for a broken laser pointer, which to his astonishment sold. Omidyar contacted the winning bidder to ensure he realized the item was broken. The buyer answered, "I'm a collector of broken laser pointers." At that moment, Omidyar knew he was on to something very big.

From day one, Omidyar built eBay around what remain the company's core values; a belief that people are basically good, everyone has something to contribute, an open environment brings out the best in people. The success of eBay underscores the truth of these values, and is at the heart of eBay's continuing success.

Tuesday, June 10, 2008

Advantages of using E-commerce


I am sure everyone know that what is e-commerce. Actually how it helps to reduce cycle time, improve employees' empowerment and facilitate customer support??



OCBC bank is the first which join bolero.net globally recognized Electronic World Trade System(EWTS). Actually EWTS is global and legal infrastruture helps business to business e-commerce function. The system enables faster turnaround time for trade processing. It saves a lot of time instead of using traditonal manual work. The system help to reduce paper work such as payments, letters of credit issuance and transaction confirmations. EWTS is available on http://www.bolero.net/ where OCBC bank used the system.It is an open system where customers easily exchange trade document via internet. Customers have a secure communication network like security code. EWTS secure delivery and receipt of an information to prevent unauthorised access. An e-solution such as product and services solve the customers need. Whenever customer encounter problems they would access via internet. E-solution provides web-based cash management to corporate clients. Whereby customers deal with cash transactions through e-solution.


The system provides such a conveniences to corporate customers. It is a connected open system where customers can develop their own interface. There are few security features that protect customers for their safety. For instance, off-line check. Security department make off-line check before customers can directly used the system. In fact, Private key is needed when customers access to the web-services and mailboxes. They are ensured each encrypt message digitallly signed by users after the messages being sent. Each original message must be validated and verified to prevent third party make any changes.


The manager of an organization gives the power to an employees in order to make decision. The important company decisions are based on well planned empowerment program. An individual felt happy as they are like a representative of a business. They became motivated by doing their task effectively and efficiently. An employees think of self-worth and dedication as the top management gives them control over company decisions. Top management would be provided suggestion box for all employees. The objective of the suggestion box is to ensure employee opinions are addressed and discussed. These may showed their potential of cooperation and work efficiently. The management is to get a competitive labour work force and increase company's standard.





Nowadays, everybody own a mobile handphone in globalization world. Who do not have handphone?? OCBC bank is developed a high technology system Microsoft®.NET. The IT development helps to improve employees empowerment.


The Microsoft IT development motivated people to get ready for a business. The image on the left hand side show how people look forward to do a business. Since it is a mobile internet banking system that enables employees work more effectively.


Most of the employees just touch on keypad then can deal with customers. This IT system can easily helps to get in connect between employees and customers. In fact, employees need not met face to face with their customers so it is easy and convenience. It save a lots of time of customers to queue up and wait for banking transactions. Those businessman who have a lots of work may not have time walk in to the bank. As a result, it is better way use of the mobile banking system. Any latest informations would be upgraded by employees into mobile phone. The high technology support employees to achieve goals of an organizations. It is very efficient and employees get to know vision of the company. They are well prepared and became innovative in a competitive world. On the other hands, Microsoft technology is a tool that enables an employees achieves their vision.