Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

Auction is a market mechanism where sellers offer and buyers bid in a competitive and dynamic nature by which the final price is reached. Thus, electronic auctions are auctions conducted online.






(click to link to the webpage)

There are several types of e-auction fraud identified. Among them are:-

Bid shielding i.e. having phantom bidders bid at a very high price at the start of an auction and pull out at the last minute causing a bidder of a much lower price to win.

Shilling is by placing fake bids on auction items. The purpose here is to artificially jack up the bidding price.

Mighty Bids

(this website is currently unavailable)

Besides, e-auction fraud can also appear in a way whereby fake photos are taken and misleading descriptions given, improper grading techniques, selling reproductions as originals, failure to pay the auction house, high shipping costs and handling fees, failure to ship merchandise, loss and damage claims and others.

As such, it is important for users to know how to protect themselves from these frauds.The followings are several steps in protecting yourself against e-auction fraud:-

  1. User identity verification – a voluntary program that encourages users to supply eBay with information for online verification.
  2. Authentication service – a service to determine whether an item is genuine and described appropriately.
  3. Grading services – a service that determines the physical condition of an item.
  4. Feedback forum – a forum that provides users with the ability to comment on their auction experiences with other individuals.
  5. Insurance policy – investing in insurance policy that offers by the auction websites. For example, eBay offers insurance underwritten by Lloyd’s of London at no cost to eBay users.

eBay

(click to link to eBay auction)

Meanwhile, here are a few things buyers should take note of when participating in an e-auction.

Besides, buyers are adviced to check the seller’s reputation before purchase. Many auction sites have a section where every seller’s feedback score is displayed. Some sites even have a community-ranking system designed to every user’s profile so that buyers can always voice out their comments or feedbacks.

In addition to that, many sites provide buyer protection, for example courier delivery. Therefore, in cases where you don’t get what you pay for, you can always get a refund from the website.

On the other hand, buyers must also play their part in taking extra precautions and be smart in their purchase. For example, buyers must constantly bear in mind never to wire money to anyone’s account under any circumstances while paying. Instead, they should use one of the methods authorized by the website, such as paisa pay. Buyers must also read the rules of insurance before fishing out their credits. Most importantly, buyers must never give out their credit card numbers or any personal bank details via email.

Buyers also have to be careful as sometimes some sellers attempt to drive up the price of their own auctions by having several fake accounts. They can have multiple eBay identities that are all controlled by them, bidding on the same auction items you want neck to neck and it works especially when you start to get very involved with the auctions. Thus, buyer gets ego in the process of getting the product and foolhardily fell for the trick, causing him/herself to pay extra. In order to prevent this, buyer can check the seller’s auctions that have already closed and see if the same usernames are continually bidding (but never winning) in this auction.

On the other hand, if a buyer receive an email from a seller shortly after an auction closes stating that the winning bidder has defaulted and he or she is now the winner, chances are the seller is trying to scam not only one but many buyers. This is because; it takes several days for a bid to be defaulted. So if a buyer receives such emails within 3 days since the auction ended, beware!

Here is a link to some best auction websites


weiqi

Monday, June 30, 2008

E-Government in Malaysia: Its implementation so far and citizen's adoption strategies

Electronic government was initiated with the initiation of Multimedia Super Corridor (MSC) by the Malaysian government in 1996.

In 1997, the Malaysian Government launched the Electronic Government initiative, generally known as e-Government. The purpose is to revamp itself to direct the country towards the Information Age. The implementation of e-Government in Malaysia marks the establishment of a new government image by transforming the way it operates, modernising and improving its service delivery.



E-Government seeks to enhance the convenience, accessibility and quality of interactions with the public and businesses at large. It will also improve information flow and processes within the government, its speed and quality of policy development, as well as the coordination and enforcement at the same time. Thus, this would enable the government to be more responsive to the needs of its citizens.


E-Government uses the information and communication technologies in public administration combined with organizational change and new skills to improve public services and democratic processes in order to strengthen support to public policies.



The seven main projects were identified to be the core of the e-government applications. The e-Government projects are Electronic Procurement (eP), Project Monitoring System (PMS), Electronic Services Deliverym (eServices), Human Resource Management Information System (HRMIS), Generic Office Environment (GOE), E-Syariah and Electronic Labour Exchange (ELX).




Other than these seven main projects under e-government flagships, several government agencies has also initiated online services for the public projects, aims to increase the ease and efficiency of public service to the people. Among others were Public Services Portal (myGovernment), e-Tanah, e-Consent, e-Filing, e-Local Government (e-PBT), e-Kehakiman, Custom Information System (SMK), Pensions Online Workflow Environment (POWER), and Training Information System (e-SILA).




E-Government is a way for public administration to become more open and transparent, and to reinforce democratic participation; more service-oriented, providing personalized and inclusive services to each citizen



Citizens today expect and demand governmental services with a high degree of quality, quantity, and availability in a 24-hour, seven-days-a-week, and year-round fashion. Governments all over the world are developing information systems and electronic services that have the capacity to meet these rising service needs and demands of citizens and other clients

The e-government applications are developed based on best understanding of citizen requirements. These applications will provide a seamless online service and thus improve traditional government services.

Despite the issue of privacy and security, internet security breakdown, the e-Government system will continue to grow due to the demand and the needs of the nation. It is the government’s strategy as the nation emerges towards our very own vision 2020.

Try this website to know more about e-Government services:


weiqi

Mobile payment systems in Malaysia: Its potentials and consumers' adoption strategies

Today, we are in the midst of a payment resolution, with cards and electronic payments taking the place of cash and checks. Mobile Money (MM Wallet) is one of the mobile payment systems that has been introduced in Malaysia few years ago.



Mobile Money is a PIN-based Mobile Payment Solution designed by Mobile Money International Sdn Bhd to address the limitations and bottlenecks created by cash, cheques and credit cards. It allows registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service). This enables shoppers to buy products online and pay the merchant using their mobile phones without even being physically present at the store.

Mobile Money encourages more consumers to shop online. This will definitely be a great boon to the e-commerce industry in Malaysia. It also encourages more merchants to adopt online selling as an extra sales channel which complement perfectly with their offline sales channel to help them sell more of their goods and services.


Currently Mobile Money has teamed up with Hong Leong Bank Bhd and Bumiputra-Commerce Bank to allow consumers to make payments via their bank accounts linked to their mobile phones. It is targeting 1 million Malaysian mobile phone subscribers with the belief that sending cash via SMS will eventually become part of the daily life of the Malaysian community.

For latest information about Mobile Money, visit its website at http://www.mobile-money.com/

Saturday, June 28, 2008

Credit Card Debts: Causes and Prevention


Credit card is a system of payment named after the small plastic card issued to users of the system. In the case of credit cards, the issuer lends money to the consumer (or the user) to be paid later to the merchant. It allows the consumer to 'revolve' their balance, at the cost of having interest charged. However, it can lead to a big amount of debts or bankruptcy for the users or consumers.

The users might just keep on swapping the credit card unlimited because they don't have to pay the money on the spot. They didn't see where the money flows so they won't feel anything as long as they still have cash in their wallet. Some of them may hold 3 or 4 credit cards at the same time too. When there is due date, those users only pay the interest and the minimum amount of principal; they never fully pay for the amount. Finally, the poor money management and their self-attitudes will lead them to the pool of liabilities.




Besides that, the users might have to pay a big amount for medical expenses, deposits for buying cars or houses,thus they have to pay by using credit cards an owe money to the bank. Sometimes, the credit card debts may be caused by the internet threats such as phishing, malicious software, hacking and more. Due to the personal information, credit card number and the password have been stolen; the owners are liable for the bills which have been misused under their account.

The credit card owners should have a well-managed spending plan so that they won’t be wasting too much on unneccesary things and they can save money at the same time. Their attitudes have to be changed and they have to be self-disciplined too. In addition, credit cards should be cut up such as one person can only hold one card and the credit limit should be kept low. The credit card holders can learn the ways to detect the internet threats from security firms and report to them if they are being attacked.

Electronic Currency

Over the years, money as we know it has been evolving. The shape and form of money has changed from precious metals to metal coins and paper money with no intrinsic value and today we are presented with a formless form of money named digital or e-money. The digitization of money appears to be inevitable in the light of the recent developments with regards to the Internet and the various e-commerce opportunities presented by the world wide web. The future of e-commerce depends to a great extent on the appropriate development and diffusion of e-money.


SO what is electronic currency?





Electronic currency is also known as e-money, electronic cash, electronic currency, digital money, digital cash or digital currency. It refers to money or script transfered electronically through computer networks, the internet or digitally stored value systems. Examples of how electronic currency are used are such as Hong Kong's Octopus Card system which started as a way to pay for transit payments but has now progressed to an electronic cash system, Singapore's FeliCa card and Netherlands Chipknip which has the same use as Hong Kongs Octupus Card, and Malaysia's Touch 'n Go card.

How is digital currency used?

Currently, credit card payments accounts for about 90 percent of all Web site purchases, compared to only 25 percent of offline sales. Digital cash may not displace credit cards for large online purchases, but for small purchases it has overwhelming advantages including extremely low transaction costs. There are arrangements that enables registered users to e-mail dollars to each other or transfer amounts via wireless and hand-held devices.
What are the limitations and risks faced by e-money users?

Digital cash systems pose unique risks for both online merchants and consumers, including questions about security, the ability to safeguard users' privacy, susceptibility to counterfeiting, and suitability as a medium for online fraud. All of these generate fears among e-commerce merchants over increased legal liability. While traditional monetary systems combat fraud by using closed networks that block unauthorized access to the system, the open networks along which e-cash payments are transmitted often lack adequate safeguards against fraudulent access. Therefore, they must utilize elaborate encryption methods to code the information in such a way that only authorized parties can read it. New security apparatus and infrastructure must be devised to protect payment instruction transfers. A new public key infrastructure, which can be fairly expensive to implement but is required to diminish fraud risks.

Operational disruptions can generate serious hazards for e-cash systems. Even natural phenomena jeopardize e-cash operations. Since digital cash is networked, difficulties with the Internet's physical networks, associated hardware, or software can compromise the system's efficiency and reliability. Computer viruses, damage to a centralized switching facility, or even software updates can all pose threats.

While digital cash renders online purchases more convenient for users, it poses risks for them as well. Foremost is a lack of anonymity. Unlike regular money, most e-cash systems track users' purchases, thus failing to protect their privacy. Concerns that anonymous e-money could encourage tax evasion and money laundering have led to demands that digital cash be traceable. The issuer's integrity also raises problems. The collapse of a branded network bank could free it of all liability for the e-cash it issued.

Wednesday, June 25, 2008

A review on E-tailing

E-tailing refers to retailing conducted online, over the Internet. E-tailing makes it easier for a manufacturer to sell directly to the customer, cutting out the intermediary. The Amazon.com is an epitome of successful e-tailing business.


Amazon.com started as an on-line bookstore, but soon expanded its offerings to a variety of products and services such as media, electronics, toys, apparel and even groceries. Amazon reported over 1.3 million sellers who sold products through Amazon's worldwide web sites in 2007. Selling on Amazon has become more popular as Amazon expanded into a variety of categories beyond media, and built a variety of features to support volume selling.

The domain amazon.com attracted at least 615 million visitors annually by 2008 according to an Internet audience measurement website, Compete.com survey. In addition to that, Amazon attracts approximately 50 million U.S. consumers to its website on a monthly basis. This has proven how successful Amazon.com is conducting its e-tailing business!


“The logo that smiles from A to Z, revealing the personality of the worlds biggest online retailer.”

Click here to read more about e-tailing.






Tuesday, June 24, 2008

The application of pre-paid cash card for consumers

A prepaid cash card allows consumers to purchase something even when they don’t have the cash to pay for it. It benefits consumers in their everyday life.

Though it works almost the same like a credit card, a prepaid cash card is different because it allows consumers to have a better control over their finance.


smooth operator

“Money shouldn’t slow you down. Life takes easy – with VISA~”

So, how does this work?

First thing first, load the amount of money you want onto the prepaid cash card. That will be your spending limit.

For any purchases transaction, the sum will be subtracted from the card balance. You can always pump in more money when the balance runs low by transferring money from your regular checking or savings account.

The following is a list of benefits you can get being a consumer, for having a prepaid cash card.

Having a prepaid cash card is certainly quick and easy. Transaction can be made just within a minute. All you have to do is hand swap your card on the counter, sign on the receipt and collect your card and a copy of the receipt. Done.

Consumers can plan how much they want to spend in advance. Thus, spending is controlled by how much one has in the account. In a way, prepaid cash cards give consumers a better alternative in keeping record of your spending.

Having a prepaid cash card is surely safer than carrying cash. Prepaid cash card protect consumers from unauthorized transactions even when the card is stolen or lost. Plus, these cards can also be replaced once it is stolen or lost. Unlike cash, once it’s lost, it’s gone. Forever.

Besides, prepaid cash cards are always convenient all the time. It can be used at just anywhere anytime. Consumers can use it at their groceries shopping, petrol filling, utilities payment, movie tickets, airline tickets, download songs online, mobile phone bill, fast food or restaurant and even online shopping or any online payment! Or, they can even use it to withdraw cash from the ATM.

The best thing is, consumers don’t have to worry about extra charges over their card without their knowing. Because the pre-loaded sum of money is the maximum amount that can be charged to the card.

Competition is very high nowadays and banks today are offering all sorts of attractive prizes and rewards to win over consumers’ hearts. For example, the launch of point-collection system as consumers spends using the card. So the more they spend, the more points they collect and the better chance they stand on winning prizes!

The followings are the various types of prepaid cash cards offered by several financial institutions.

Bank Islam
click to link


AmBank NexG

click to link


Tune Money Sdn Bhd

click to link

Maybank VISA


click to link


A lot of people suffer from personal bankruptcy due to credit card debts. But a prepaid cash cards can change it all. The card is great for everyday purchases, special occasions, emergency back ups and etc. In short, it is safe, effective and convenient. Here is how it is…

The more famous Master card for Beijing Olympic 2008




With so many credit cards being offered, consumer must bear in mind to get a card which best suits his/ her needs. Compare the different rates and features of all the offers available before making a decision is a wise thing to do.

weiqi

The Application of 3rd Party Certification Program in Malaysia

Third parties are called certificate authorities (CAs), who issue digital certificate to provide verification that your website does indeed represent your company. One of the certificate authorities is MSC Trustgate.com Sdn Bhd. It is a licensed CA in Malaysia which incorporated in 1999, under the Digital Signature Act 1997 (DSA). It offers complete security solutions for individuals, organizations, government, and e-commerce service providers by digital certificates, encryption and decryption.

Besides that, VeriSign is the leading Secure Sockets Layer (SSL) Certificate Authority which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network.

Why is the 3rd party certification needed? The reason is there are threats of internet security spreading over the net nowadays. For example, with the increase of phishing on the internet; customers want to make sure that whether they are dealing business with a trusted party. They are afraid of their personal information such as ID number, passwords, credit card numbers and so on, will be sent to those companies which do not exist in this real world. Thus, the certification from 3rd party is needed to ensure their information traveled over the Internet reaches the intended recipients and is safe.

Besides that, those parties are needed because they can provide e-mail protection and validation, secure online shopping carts and more services in order to avoid being spammed, hacked and attacked by the macilious software such as virus, trojan horse and worms.

Lastly, by applying 3rd party certification, there are more safeguard for online shopping, which means the customers can shop safely. In addition, the confidentiallity of customers towards the internet will also be enhanced and hence the organizations will be able to earn more profits.

Sunday, June 22, 2008

How to safeguard our personal and financial data?


Today, most people rely on computers especially the Internet to create, store and manage critical information. Information transmitted over the Internet is more vulnerable and has a higher degree of security risk than internal networks because they are open to anyone.Therefore, it is important that users take measure to protect their data from loss, damage and misuse.

Safeguards against unauthorized access and use

Usernames and passwords are used to ensure security. Longer passwords provide greater security than shorter ones. Once you select a password, change it frequently. Do not disclose it to anyone.You should also be careful about where you save your password on your computer. Some dialog boxes, such as those for remote access and other telephone connections, present an option to save or remember your password. Do not select that option.


Biometric device is also an access control to safeguard our personal and financial data. Biometric devices grant access to programs, computers, or rooms using computer analysis of some biometric identifier. Examples of biometric devices and systems include fingerprint scanners, hand geometry systems, face recognition systems, voice verification systems, signature verification systems and iris recognition systems. Biometric devices are gaining popularity as a security precaution because they are a virtually foolproof method of identification and authentication.


Other measures that safeguard against unauthorized access and use include firewalls and intrusion detection software. Users can use firewalls to protect their computers and data from unauthorized intrusions. Personal firewall utilities constantly monitor all transmissions to and from the computer and inform the users of any attempted intrusion.

Safeguards against information theft

To protect information on the Internet and networks, individuals may use a variety of encryption techniques to keep data secure and private. Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.










































































EXAMPLE OF ECOMMERCE SUCCESS AND ITS CAUSES

10 years after Amazon.com Inc. first made its appearance, Jeff Bezos is now accustomed to being hailed the king of Internet commerce. He runs a business that reached about $7 billion in sales last year and deals in everything from cases to books.

As more organizations began to start their own online operations the company that helped get it all started was in danger of seeing its market share eroded by the competitors it helped created. Amazon has nearly 49 million active customers. Last year itself, they bought more electronics holiday related items than books, a first for the company.

With $6.92 billion in sales in 2004, Amazon ranked at the top of Internet Retailer's annual top 400 list, well ahead of computer maker Dell Inc., which posted $3.25 billion in online business-to-consumer sales. Office Depot Inc., which has a partnership with Amazon, wasn't far behind with $3.1 billion.

The reason why Amazon is so successful is because they had slowly built up their market brand and trust in their products. This tactic keeps the customers coming back for more an it attracts new clients to come. Other than that, they force their technological developers to focus on value delivered to the customer instead of building technology first and then figuring how to use it.

Amazon also takes it granted stuff you cant win everything, that’s reality, embrace it. For example, go more with a fast reboot and fast recover approach. With a decent spread of data and services you might get close to 100%. So what do they do? They create self-healing, self-organizing lights out operations.

Embrace innovation. In front of the whole company, Jeff Bezos would give an old Nike shoe as a “Just do it” award to those who innovated.

Amazon also believes that the only way to manage as large distributed system like theirs is to keep things as simple as possible. Keep things simple by making sure there are no hidden requirements and hidden dependencies in the design. Cut technology to the minimum needed and only those that are needed to you need to solve the problem you have. It doesn’t help them to create artificial and unneeded layers of complexity.

Besides, Amazon.com also stresses on the importance of innovation.
Amazon.com believes that everyone must be able to experiment, learn, and iterate. Position, obedience, and tradition should hold no power or innovation will never boom.

Wednesday, June 18, 2008

Phishing: Examples and its prevention methods.

Phishing is somewhat like fishing. The way you do it is almost the same but the tools you use are different. Phishing is an e-mail scam. The phishers puts the bait to fool and lure innocent prey and steal their identity before they know it. Victims will receive justifiable-looking emails which look as if they are from valid company websites.


These emails will take them to a phony scam site and requires them to login to their account and key in some private details of their own like bank PIN number, credit card number, passwords, account data, other personal information and etc. Or, it can also be a pop-up window which looks exactly like the official website.

With the information, the perpetrator will then conduct bank and credit card fraud. This is the most outraging daylight robbery of identity of the new century. Websites that is often spoofed or mocked by phishers are eBay, MSN, Yahoo, America Online (AOL) and PayPal.

The following are the examples of phishing scams.

eBay E-mail

According to the email (as shown above), a slight billing error have occurred due to the reasons given. As such, the victim was told to login and verify the transactions. The logo of eBay used here is a real one. However, this is easy because such logos can be obtained from the real site without any hassles. It is also one of the ordinary approached employed to lure the victim.

Citibank Scam

The warning letter instructed the customer to renew his records by keying in some sensitive financial data so that the company could secure and protect the safety and the integrity of the customer. Little did the customer know if he or she ever adheres to such instructions, it will be the end of the safety and the integrity of his/ her account as mentioned.

As a result, if you ever come across such situation where you happen to be a victim, you should notify your financial institution immediately. You can also report phishing scams by emailing a copy to abuse@DOMAIN.com where DOMAIN.com is the company which you are directing the email to. For example, you receive a phishing email and you want to send it to Citibank. The address is abuse@citibank.com. Remember, this is “for example” only. Too bad, I don’t have an account in Citibank so I don’t really know the address. Another option is, open the yellow pages and start screening for “Citibank – Customer Service Hotline”. In other words, contact them by phone.

Here is how and what you should do in preventing yourself getting phished.

1. Recognize the attacker’s game.

There was this Chinese saying that goes like: if you know yourself and your enemy well, you are sure to win the game.

Phishers normally wants their victims to react on the double; otherwise, their tricks will fail. So, they will include some exciting or warning signs to spark your alarm. For example, they can deceptively claim that there is some error in processing some transactions in your account or some unusual withdrawals have been made, thus you are required to logon to a scam site in order to verify it. They can also make a deceptive claim saying that you were chosen to be the winner of a lottery ticket and thus you have to enter some personal information before you can receive your mysterious gift.

If this is so, users should check and report the incident to the actual financial institution or company that is supposed to have sent you the mail. Confirm the incident with them before submitting yourself to the scam. This could help the banks and companies to take actions against preventing fraud too.

2. Be wary of impersonal emails.

Most of the time, perpetrators attack millions through spam mails; which means to say, a phish mail is by large, impersonal and general. This is in contradictory to true emails from financial institutions as they are mostly personal in nature.

3. Never give away your personal financial information by filling up forms that comes in emails.

A predictable phishing scam normally requires victims to enter their personal information like usernames, passwords, credit card numbers, bank account PIN number , Identity Card number (for the Malaysian context) via an online form. This is quite the opposite of a true valid financial institution. Because a bank would normally have good control over customers’ account and will not ask for such information. Otherwise, my advice to you is better transferring your money to another safer and more responsible bank.

Log on to http://www.anti-phishing.info/avoid-phishing.html for more tips in preventing getting phished.

So, the moral of the story is: be extra careful in giving away your personal information. Report such scams if you ever come across one. You never know, you could make an impact in someone else’s life! =)

weiqi

The threat of online security: How safe is our data?



I am back again readers! Today I'm here to impart some very valuable knowledge to help you in your web surfing and hopefully make you aware of all the threats to your data security nowdays.

There are 3 categories of cyber attacks:
(1) accidental actions,

(2) malicious attacks, and

(3) cyber vunerability.

Accidental actions encompasses problems arising from lack of knowledge about online security concepts. It also includes issues such as poor password choices, accidental or erroneous business transactions, accidental disclosure, and erroneous or outdated software. Education and prudence should be considered key defenses in limiting the frequency and extent of such events, since this form of cyber vulnerability is largely self-inflicted and avoidable.



Malicious attacks are attacks that specifically aimed to doing harm are known as premeditated or malicious attacks. It can be further broken down into attacks caused by malicious code
and those caused by intentional misrepresentation. Misrepresentation is most often leds to online fraud and identity theft. Malicious code, on the other hand, is at the root of so-called "crackings" and "hackings" are the most notable examples of which include computer viruses, data theft, and Denial of Service (DOS) attacks.

Online fraud, which is a form of cyber vunerability, is a common term which covers Internet transactions that involve falsified information. Some of the most common forms of online fraud are the sale via Internet of counterfeit documents, such as fake IDs, diplomas, and recommendation letters sold as credentials; offers of easy money, such as work-at-home offers that claim to earn individuals thousands of dollars for trivial tasks; prank calls, in which dial-up connections lead to expensive long distance charges; and charity facades, where donations are solicited for phony causes.

So what can you go to help protect yourself against these threats?
(1) Buy and install a good anti-virus application on your PC. This software protects against viruses and malicious code that arrive through email and other methods. The most critical element in using anti-virus software is to make sure the program is regularly updated with the most recent virus definitions. These are patches that allow the software to identify and tackle the newest viruses. Good anti-virus software will automatically update itself on a regular basis.


(2) To protect against intruders, computer users can also install a personal firewall, which blocks unauthorized attempts to gain access to a computer, and even makes a computer "invisible" to hackers scanning the Internet for potential targets.

(3) Choose your computer passwords wisely

(4) Disable file and printer sharing on your computer

(5) Keep security and system patches up to date

For more information you can visit this site:


http://www.entrepreneur.com/technology/techtrendscolumnistpeteralexander/article78616.html

A Review on Internet Security

Internet has been developed for at least ten years and it definitely provides a lot of benefits to users such as, saving time and costs especially in E-commerce areas. Nevertheless, every thing in this world has both sides of good and bad. It can bring you happiness but also the worries and suffers.

There are some deficiencies by using Internet. The possibility of its risk exposure is high and it will cause a lot of problems to all fields of users especially those who are dealing business by Internet. What are those deficiencies or issues of the internet that are so important to make people be so alert? What are the effects of lacking of Internet security? Will the effect cause a big amount of losses to users?

People are concerning about the internet security problem and this is the main issue that the whole world should focus on. Malicious software programs are increased with a high rate as compared to previous time. Computer viruses, worms, and Trojan horse are the threats of malware. They could destroy the programs and data as well as disrupt or even halt your computer networks operation. You can imagine that if your Pc has been disrupted, your whole entire files and data like those assignments could have been destroyed. You will be crazy definitely. So, what about those big companies and organizations? How much of losses that they could bear if that happen to them?

Besides that, spyware will install itself to your computer secretly and monitoring your web surfing activities, and even offering outsiders the possibility of stealing your personal identity and information. Due to this reason, there are people always report that their credit card numbers have been stolen and this makes them used to pay for the bills that are not consuming by them but under their account. If this happen to those who are doing online businesses, you can imagine that how broke they would be. Thus, there are still some people do not perform online transactions such as buying from net, because they are afraid of their privacy would be invading.

Definitely, the problem is dealing with the unsecured data. Some organizations are found that they are not doing enough to secure their data and it is dangerous of losing of sensitive data. When we register or sign up for email, forum, blog and others, there are personal information required such as name, date of birth, and password. We do not know that whether our private information are secured or they would be sold for others by the organizations.

Even though you have conducted plenty of preventions such as install anti-virus software, avoid using one password for all accounts that you create, and other security packages, we are still exposed to the risks because those cyber criminal groups keep on creating new tactics to hack in your computer system, spam your email as well as tapping Wi-Fi from the neighbourhood. @_@

Fortunately, International Multinational Partnership Against Cyber Terrorism (IMPACT) which has the best brains and facilities, being set up to help fight the cyber security threats. In addition, the corporation such as Symantec Corporation, TrendMicro and F-Secure will also be the partner of IMPACT to assist us how to defense against the cyber criminal. Although the internet security problems are increasing, we still have to access Internet because it is an important tool in our life. There are the responsibilities of all users to protect the data and information. All users should provide enough to secure and protect themselves regardless small companies, large organizations or personnel.

In a nutshell, I hope that internet security can be more improved and provide more integrity for users so that they can access it safely, trustily, and happily. Computers, software, programs, virus etc, all are created by human, all are human being. In this world, if a human could come out with one thing, another would also be able to contrast it. If the cyber criminal groups come out with new tactics, there would be someone can fight against it. ^^

Tuesday, June 17, 2008

An example of an E-Commerce failure and its causes

Webvan was one of the most epic fails in the dotcom bubble fiasco. The online grocer was founded in 1999 by Louis Borders and was headquartered in Foster City, California, USA. Webvan delivered products to customers' homes within a 30-minute window of their choosing. It served customers in ten US markets: Chicago, Los Angeles, San Francisco Bay Area, Orange County, San Diego, Seattle, Portland, Dallas, Atlanta and Sacramento.

While Webvan was popular, the money spent on infrastructure far exceeded sales growth, and the company eventually ran out of money. Within 18 months, it had spent $1 billion on building its futuristic warehouses which worth $30 million each, buying a fleet of trucks, computer hardwares and upgrading its infrastructure. It raised $375 million in its initial public offering and even bought one of its largest rivals, HomeGrocer. Webvan had $178.5 million in sales in 2000, but that revenue was swamped by $525.4 million in expenses. Yet, the company had planned to expand to 26 markets and turn a profit in 2002.

Once worth $1.2 billion and touting an ambitious 26-city plan, Webvan announced its bankruptcy in 2001. Its stock plummeted from its all-time high of $30 to just six cents within a few months. As part of its shutdown process, all perishable food was donated to local food banks while non-perishable items including some frozen and packaged food were returned to the vendors or sold as part of the company's liquidation. The company began closing operations and 2000 workers were being laid off.

Many analysts have said Webvan spread itself to too many locations too quickly. The enormous infrastructure that Webvan thought to establish in multiple geographic areas has proved to be too great a cost. Besides that, Webvan faced a number of challenges in its short existence, including a sharp economic downturn, sluggish consumer spending and investor indifference.


One of the hallmarks of the dot-com crush has been the presumption that you needed to get big fast. It has been proven in Webvan's case which made the company a relic of the dot-com flops. A core lesson from the dot-com boom is that even if you have a good idea, it's best not to grow too fast too soon. (see cnet.com)


This site exists now as merely a traditional link farm.

Saturday, June 14, 2008

The history and evolution of E-Commerce

Do you guys still remember that we lined up for at least half an hour, to buy the stupid movie ticket in previous time? It’s irritating, isn’t it? But nowadays, internet has changed the way that we buy and sell goods or services. Most of us make business transactions online on such a regular basis such as online-booking for the movie ticket and airline ticket as well. Therefore, this activity or action of buying or selling of goods and services over the internet is called “E-Commerce”.

So, how did E-Commerce get started? Well, let me explain to all of you here. In 1960s, those companies and businesses were using ancient computer networks to carry out the electronic transactions. Electronic Data Interchange (EDI) had been introduced to help the companies for interfacing and trading without human conduct such as sharing business documents invoices, order forms and shipping confirmation with another company's computer.

Until 1979, the American National Standards Institutes (ANSI) had come out with ASC X12, which is a universal standard for sharing business documents over the electronic networks. It is adopted to standardize the EDI to assist the businesses would be able to complete the electronic transactions with one another reliably. After 15 years, the Mosaic web-browser or Netscape was made, people had their first time to buy things off their computer. Mosaic browser was quickly adapted into a downloadable browser, and for Netscape, it is allowed easier access to e-commerce.

In 1998, people came out with Digital Subscriber Line (DSL) and cable connections, which provide fast, always-on Internet service to subscribers. It allows a computer to stay connected all the time and prompts people to spend more time, and money to online. Thus, E-commerce becomes more popular. The largest bookstore, Amazon.com and the electronic paying field which is eBay are the two companies that transformed e-commerce in 1990s.













Unfortunately, at the turn of the twenty first century, the dot-com bust happened and many of these businesses went broke because of many people still didn’t have high speed Internet in their homes and many small businesses were lacking of funds to create the web sites. However, it does not stop people from using e-commerce.

In 2000s, those booming trading online, travelling with tickets purchased at discounts over the Internet have lead to e-commerce accounting for 1/3 of the total economic growth of its. Today, those average persons have the high speed Internet connection that lets them move easily between web pages. This makes it easy to do comparison-shopping online. More importantly, it has increased the ability of people to work from home to set up e-commerce sites also.


In conclusion, E-Commerce is still one of the leading forces of economic growth today. People are now familiar to buying tickets over the Internet and shopping for gifts. It can bring a lot of benefits to users, suppliers and customers such as saving time and costs. It may also have some technological limitations or nontechnological limitations such as security and privacy, lack of trust and etc. But, with the Internet still in its infancy, the future of e-commerce has the ability to change and again revolutionize the way people think about shopping

Tuesday, June 10, 2008

Discuss how E-Commerce can reduce cycle time, improve employee empowerment and facilitate customer support.

Cycle time is the period of time required to complete a process, function or operation from start to finish. Business-to-business (B2B) E-Commerce helps company to increase their efficiencies and effectiveness by reducing the transaction costs. For example, a customer from Malaysia would like to purchase a book which is only available in the U.S. With B2B, the Malaysian customer can easily order the book and make the payment online and then receive the book within a few days’ time. This has certainly saved up a lot of cost and time for the company. It has also cut short the cycle time of the entire process and thus enhances customer’s satisfaction towards the efficiency of the company.

Meanwhile, empowerment aims at granting employees the authority and the responsibility so as to act in response to customer requests within a short time. Nowadays, no one can survive in the business world without having any IT knowledge. People now look forward to complete their tasks using the shortest time possible and with E-Commerce, such objective can be achieved at anytime. For example, employees now can work from home and cut down on traveling because traveling not only takes up a lot of time, but is also costly as well. Besides, in some companies, customer complaints are handled online. Feedbacks from the customers are recognized as to be important to the company’s growth and development. Therefore, some companies actually collect and respond to customer complaints online as it saves time and is very convenient now. I remembered last Christmas; I was shopping with my sister at Giordano, Mid Valley. I wanted a shirt very much but my size ran out of stock at that time. One of the sales girls, not wanting to disappoint me, offered to help to ask if other branches have my size. It just so happen that the Giordano at One Utama has the stock and the sales girl booked aside for me so that I could collect it from Giordano at One Utama later. The point here is, the Giordano branches are all linked together. They share effort in pleasing their customers by empowering their staffs to do so.

E-Commerce facilitates customer support by reducing inventory and overhead costs. With that, the “pull-type” supply chain management is implemented which integrates also the just-in-time (JIT) system. The “pull-type” processing system is a competitive advantage to the companies as customer gets to tailor their products and services according to their preferences. This is widely practice in Dell Computer Corporation.

Besides, shopping today is made easy with E-Commerce. Shoppers online are provided with more choices than ever. With E-Commerce, shoppers can get information they need in seconds and compare prices before purchasing. In a way, E-Commerce assists in providing competitions between suppliers. Transactions are also made easy as it enables customers to trade at any hour of the day. But then again, there are disadvantages for shopping online too. You see, there was this once when my friend and I bought some bags online. It was a Taiwanese website which I have lost the URL. The stocks came later than as promised and it turned out that some of the bags are dirty.

E-Commerce has made life easy somehow; it has its own disadvantages at the same time.

weiqi

Revenue Models for Google, Amazon.com & eBay

Hello there again readers. Did you miss me much? Today, i am going to talk about the various revenue growth models for the 3 most famous online sites which are Google, Amazon.com and eBay. I will try my absolutely best to make it as entertaining and as enlightening as possible.

Google's revenue model aims at increasing the visibility and traffic of its small business partners, streamlining their marketing costs, qualifying their leads and helping track returns on investment. Google's revenue model includes Google AdWords, Pay per Click Advertising, Google AdSense, Froogle, GoogleAnswers and their latest advertising program which is Cost per Click model. It earns most of its revenue by allowing other website owners to advertise on their search result pages or by placing these same text ads (AdSense) on other sites based on relevance.

90% of Google's revenue is generated by Google AdWords. Google AdWords is a pay per click advertising program that is designed to allow the advertisers to present advertisements to people at the instant the people are looking for information related to what the advertiser has to offer. As such, the role of AdWords in Google’s growth is very important.

Pay per Click Advertising (PPC) is the best way to send immediate, targeted traffic to your website. It is an online advertising payment model in which payment is based on qualifying click-throughs. An advertiser has to pay every time his ad receives a click. The Advertisers decide the keywords relevant to their offer that should display their ad and the maximum amount they are willing to pay per click for that keyword. This function is a very useful function and will continue to bring about an increase in income especially if the number of people clicking on these ads increase. However, Google should take care that this function is not misused. there might be and increase in click frauds when manipulation of search results are not dealt with properly.

AdSense is an ad serving program run by Google. Website owners can enroll in this program to enable text, image and, video advertisements on their sites. Revenue is generated on a per-click or per-thousand-ads-displayed basis and the ads are administered by Google. AdSense program includes AdSense for search and AdSense for content. Google advertisers are required to pay Google a fee each time a user clicks on one of their ads displayed on Google Network members’ web sites. Here is a picture of AdSense screenshots

Froogle is a service from Google that makes it easy to find information about products for sale online. Froogle is a price engine website launched by Google Inc. It differs from most normal price engines in the sense that it neither charges any fees for listings, accepts payment for products to show up first nor make any commission on sales. Any company can submit product information (via a “data feed”) to be included in the Froogle engine. Advertising space is available for purchase to be displayed in Froogle in the form of an AdWords ad.

Amazon.com provides a wide range of advertising channels to reach the most demographic availability.

EBay's revenue increases with seller surplus. It's liquidity promotes a lock in, which is keeps current customers happy and acquires new customers. It also have a diversified market. It reaches out to people of all ages and walks of life providing nearly everything that can be sold. Their main sources of revenue is from fees charged to list items up, picture service fees, listing upgrade fees, final value fees and reservation fees. They charge fees to list an item. For example, for listing of regular items, eBay charges a fee which serves as a starting price. EBay also obtains it's revenue by charging a picture service fee. The first picture uploaded in its site is free but te subsequent pictures incurs fees. Other than that, eBay obtains its revenue from listing and updating fees. It provides various services to help its users to enhance their advertising or promotion of products but for a fee of course. They also charge final value fees. It is charged when there is a closing bid. Reservation fees is only charged if the item listed is not sold.

Here are links to several links to other sites which I think provides interesting facts about E-Commerce, check it out!
1) eBay vs Amazon.com
2) Amazon Finally Clicks

Monday, June 9, 2008

Free Cursors