Tuesday, July 8, 2008

E-Government in Malaysia:Its implementation so far and citizen's adoption strategics


E-Government is the use of IT and e-commerce to provide access to government information and delivery of public services to citizens and business partners and it's an efficient and effective way of conducting government business transaction with citizens and business and within government themselve.

However, Malaysia government are encourage malaysia citizen apply e-failing, are runnig few year ago. The e-government are provided those services such as payment of road tax online, renews licence and saving money in KWSP by using e-commerce. FIrstly, base on this systematic, this are effectiveness and efficiency of work. How does using e-failing? Malaysia government are encourage citizen to post or return tax form by using e-failing, because it is more easy, save time and save cost. Following is what e-government current application in Malaysia, that is make payment or renews roadtax and renews driving licence by using online services.

Malaysia government are make the improvement on there services, but still facing so much of problem on those services. The problem face by e-government is citizen are not too interested using those services are provided by e-government. Citizen are not comfidence by using services like e-failing because citizen scare those fail ( E-fail) they sent will missing, such like example miss senting or the wedsite provided are can log in or some other problem. Malaysia citizen are not dare to try and did it, and they would like to use the tradisional method to courires and renews driving licence.
Conclusion, to encourage more citizen to use it. Malaysia government can make advertising by media player, such as news papar, magazine and entertainment. And government can did a talk to public or citizen let more citizen know the advantage of using e-government.
Review a local e-commerce site

The local e-commerce website I choose to review is www.blooming.com.my that belongs to Blooming Florist Sdn Bhd. Of course, the Blooming Florist’s main business is selling flowers, however it is now expand to variety of products such as cookies, some hampers , fruit baskets and so on for more information can refers to www.blooming.com.my. It is not only selling flower, it also provide other services, such as hand bouquet,some decoration of gift and flowers.

The speed of the website is fast, and also the downloading speed. At the homepage, we can see that has show the variety of the main product it’s sell through internet and clearly stated with the price. There is the search engine for the Blooming Florist’s product to enable consumers can search for the product they want, this e-commerce website categories their into two ways which are by occasional and by product, however, this website does not categories their product well, it’s just show all the product in the left side of the web, there is no coordination of the list, it is so inconvenient to the consumers to looking at it one by one, however this can cover by the strength of search engine.


The overall font size is relatively small to me compare to other website, it so uncomfortable to user,but the colour is attractive by having the colorful picture-the products. Blooming Florist can accept payment through credit card, e-banking, mobile money and so on.


Conclusion, the Blooming Florist website is good except some of the sire design and layout.

Sunday, July 6, 2008

Corporate blogging : A new marketing communication tool for companies
A corporate blog is published and used by an organization to reach its organizational goals.
There are three types of corporate blogs:
1.Internal blogs: accessed through corporation’s intranet that only employees can view.
2.External blogs: publicly available weblog where employees, teams, spokespersons and others people can share their views. It is often use to announce their new products and services.
3.CEO blogs: the blog between CEOs.

Corporate blogging actually play an important role which helps companies to accomplish business objective. The following are some guidelines that may help the blog to be more success.
1. Companies have to be more concern about the liability, exclusion and limitation that will lead to legal issues.
2. The management has to know what blogs are and how they might affect the business. They can contribute members of the blog and improving the employees’ relation, causes the blog more effective.
3. Blog need to update constantly to keep the readers visits it. Post up the latest news of the products and make it more creative will attract more customers.
Pros and cons of corporate blogs:
Pros:
-Reach more employees with a single message
-Be more accessible
-Create a searchable archive of thoughts and ideas
-Employees’ questions and feedback will be permanently recorded on a blog
Cons:
-Need to master a new style of communicating
-Creates an expectation that you will post regularly
-Puts the CEO “out there” and writing ability and though process will be scrutinized
-The writing can be difficult unless the CEO loves to write.
Examples of corporate blogging:








Wednesday, July 2, 2008

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction..
The internet provides auctions accessible to the general public. Anyone can easily participate in online auctions, either as a seller or a buyer, and the value of items sold ranges from a few dollars to millions. Auction is a market mechanism by which buyers make bids and sellers place offers. It is characterized by the competitive and dynamic nature by which the final price is reached. Auctions can rapidly disposal of items that needs liquidation or a quick sale, they offer trading opportunities for both buyers and sellers that are not available in conventional channels and they ensure cautious execution of contracts.

Methods of prevents e-auction fraud:

(a) Escrow Service. For item valued at more than $200 or when either the buyer or seller feels the need for additional security. eBay recommend escrow service. With an easy –to-access link to third party escrow service, both partners in a deal are protected. The buyers mail the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. At the point, the seller ships the goods to the buyer.

(b) User identity verification such in IC number, driver’s license number or date of birth. For example, verified eBay user, the voluntary program, encourages users to supply eBay with information for online verification.

(c) Authentication service. It is to determine whether an item is genuine and described appropriately. It difficult to perform because their training and experience, experts can detect counterfeits based on subtle detail.

(d) Item verification which is a way of confirm he identity and evaluate the condition of an item. Third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purpose. It provides a way of tracking an item if it charges ownership in future.

(e) Feedback Forum. The eBay Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals
The Application of Prepaid Cash Card for consumers


The example of application of prepaid cash card is Touch' n Go. Touch n Go is established at 1997, initially the purpose of Touch n Go is to make the toll fare, but until now, the application of Touch n Go has expanded to different area. Except for paying toll fare, it is also can use in paying the transportation fees especially only for KTM Komuter, LRT and Rapid KL. Among this few years, consumers also can use Touch n Go for paying parking fee-only applicable in Klang Valley .Furthermore, it also can use to pay admission fee of Bukit Merah Lake Town Resort( http://www.bukitmerahresort.com.my). Recently, the Touch n Go has added new function –buy things in A&W, Burger King, Dunkin’ Donut, 7-Eleven, Carrefour hypermarkets, Caltex convenience stores and Cineleisure thru Touch n Go.

The EZ-Link card is the example of application of prepaid cash card in Singapore. EZ-Link is established in 2001. It is used for payments in Singapore especially for paying transportation fess in the MRT, LRT and public bus services. The EZ-Link has expanded with it can make payments in McDonald, food centers, supermarkets and soft drink purchases from vending machines.


The Octopus Card is a rechargeable stored value card used to transfer electronic payments in online or offline systems in Hong Kong. It is launched in September 1997 to make convenience in paying the MRT fares. The Octopus card system has since grown into a widely used payment system for virtually all public transport in Hong Kong also used for payment at convenient stores, supermarkets, fast food restaurants, such as Watsons, 7-eleven, Starbucks, McDonald’s, on-street parking meters, car parks, and other point of sale applications such as services stations and vending machines



Credit card debt: Causes and Prevention


Now a day, many people are holding one or two credit card. Why many people are hold credit card on hand? That is a tends of the new generation.Isn't correct of this opinion? Some more, People are think credit card are make user convenience and easy, but they didn't think about the affect of late payment, interest change for using one time, and etc.
Today let us discuss, what is the cause and how to prevention of the credit card? Firstly, say about the cause of credit card debt, if using credit card user or consumer they would not know end of the month, where the money are use, how much already use. That is a big problem for user, because they can not really know about the money are allocated. When end of the month, they received the receipt of the bank and the interest of credit card, they will be shock. Maybe for some one who are rich, they are not care about this, but is for normal office worker, the salary is fixed. How does there cover the diary expense and interest rate of credit card. However, this is the cause to make people bankruptcy. Would you think about this question before apply credit card and when use the credit card? For who those bad in manage personal financial, customer must think the risk of interest and payment.
So, after know about the cause credit card, what is the good or better solution for prevention to be credit card debt?
Firstly, user must list down or wrote down expense of spend and know how much of the salary u have per month. The salary you have, is cover for expense such as on rental. Not only of the expenses of rental, the monthly expenses can included such like electricity and water, petrol, refreshment. This kind of question ourself must known..After, this kind of expenses, how much balance that you will leave. Isn't enough for cover credit card interest and payment that you make ? This is the simple prevention to be credit card debt, for good on financial skill of management, maybe will not face the problem of financial and bankruptcy.
Lastly, i hope that all of my friend are having good personal financial and don't be credit card debt once a day later. Start on now, improve some knowledge of credit card debt and what is the causes and prevention. Must aware what will happened when be credit card debt.

Monday, June 30, 2008


Mobile payment systems in Malaysia: its potentials and consumers’ adoption strategies

Getting to know mobile payment systems!!!…..

Mobile payment system is considered a collection of money from consumers via mobile device such as mobile phone or smart phone. In addition, adoption of mobile payment systems was seen to be recognized and acceptable by many people, as it is actually convenient and useful for them to trade at any time.

Potentials

Nowadays, worldwide adoption of mobile payment system by Malaysian is increasing well. Using a familiar web payment model is beneficial for consumer since it consist of the benefits such as flow on sales and customer satisfaction is tend to increase as well. The mobile web payment allowed consumers to use web pages displayed on their mobile phone to make any necessary payment. The process is very quickly and less time consuming for any consumer who applied this advanced technology. Thus, every consumer seen to be more secure and convenient without worried for the payment securities.

Customer’s adoption strategies

Worldwide adoption of mobile payment system is served for several purposes. There are certain customer adoption strategies to develop the mobile payment system in Malaysia. A part from this, it must be easy and convenient for consumer to trade smoothly by using a mobile phone. The infrastructure and the process involved for making payment must be straightforward and improved to provide the convenient access to electronic payment. Otherwise, significant added value needs to be provided to the consumer in order to generate demand. Consumer would not to adopt new payment method if without provided of some significant added value such as cost saving. However, advancement of technology tend to lead to higher standard of living with the universal acceptance of mobile payment system in Malaysia.

Electronic commerce


Electronic money (also known as e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) refers to money or scrip which is exchanged only electronically. One of the easiest ways to make money online today is to learn e-currency trading. Many people have spent countless hours looking for the perfect program that will make them a millionaire over night. The truth is, these programs do not exist.

Electronic currency exchange allows people to make a long-term investment that can yield substantial profits in years to come. Many users make their payments electronically rather than in person. Hundreds of electronic payment systems have been developed to provide secure Internet transaction. Some examples of electronic micropayment system that involved in electronic currency such as BitPass (shut down in Jan 2007), Firstgate's Click & Buy, Payloadz, Paystone Technologies, Peppercoin, etc.

One of the examples which are Peppercoins system must also be bulletproof to electronic problems. Take transaction speed, for instance. Peppercoin is working with one Web site that delivers 1,000 digital maps per second. For Peppercoin to handle that many purchases, and for buyers to get their content without waiting, the behind-the-scenes computations must happen in milliseconds.

In conclusion, electronic currency has made it convenient for the consumer to purchase goods and services using currency such as credit card without bringing any cash. This is not only lessen the possibility of being rob but also loss of cash. The implementation of electronic currency has not been fully accepted by the consumer due to internet breakdown, lack of skill and confidence and so on. However, once the electronic currency industry is able to ensure consumers that these transactions are secure and trustworthy, it will change the way we conduct our daily lives.

Wednesday, June 25, 2008

A review on a post on Internet Security from My E-Commerce blog.

http://ecommerze.blogspot.com/search/label/InternetSecurity,title-Identity theft: Cases on stolen laptops, hacking and lost CD that shows many cases in United States in 2006 and 2007.

From the seven cases, I found out that most of the thefts are targeting on hospital, school and university and sometimes some organization as well. They are more interested on the personal information such as their names, phone number, address and sometimes some more private and confidential information, in order to abuse these kinds of personal information. From the economy prospective-high demand lead to high supply, the thefts always targeted this kind o information, which means that this information are valuable to some party. They need this information to benefit them.

The causes of these cases most likely incur by human diligence and mistake, which means that people are not so aware and not very concern about internet security and information security as well. The hackers always hack into the system when there is a weakness in their internet security for instance cases in Hospital Ohio and University Of California.

Laptop also is the target since it is portable, enable the thefts easy to stole and carry. Another reason is more and more people using laptop to store information including personal information. However, the security on the information does not get attention from the users to protect their data while the laptop is being stolen.

As a conclusion, there is still have more space to improve the internet security and also information, however it’s still need the cooperation from the users to make it better.


The threat of online security: How safe is our data?

Now a day, many attack during online, What should we do??And how safe is our data?Two type of threat and attack of online security. That is nontechnical attack and technical attack.
What is nontechnical attack? An attack that uses chicanery to trick people into revealing sensitive information or performing actions that compromise the security of a network. Under nontechnical attack have social engineering. Social Engineering is a type of nontechnical attack that uses social pressures to trick computer users into compromising computer networks to which those individual have access.
How about technical attack? Technical attack is an attack perpetrated using software and system knowledge or expertise. The vulnerability is a mistake in software that can be directly used by a hacker to gain access to a system or network.Therefore, the exposure is a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network. The common ( security) vulnerabilities and exposures (CVEs) is publicly known computer security risks, which are collected, listed, and shared by a board of security- related organization.
Let more detail to know about the technical attack. Firstly, Denial-of-services ( DOS) attack, an attack on website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources. Distributed denial-of-service (DDos) attack, a denial-of service attack in which he attacker gains illegal administrative access to as many computer on the internet as possible and uses these multiple computer to send a flood of data packets to the target computer. Malware is a generic term for malicious software. The severity of the viruses increased substantially, required much more time and money to recover.
There are so malicious software are under MALWARE. First, Virus is a piece of software code that inserts itself into a host, including the operating systems, to propagate, it requires that its host program be run to activate it. Next, Worm a software program that runs independently, consuming the resources of its host in order to maintain itself and is capable of propagating a complete working version of itself onto another machine. Following, Macro virus or macro worm as a virus or worm that is executed when the application object that contains the macro is opened or a particular procedure is executed, example a file is saved. MAcro worm is such as MAlissa and I loVE YOU. Lastly,Trojan Horse a program that appears to have a useful function but that contains a hidden function that presents a security risk.
After know about the nontechnical and technical attack, what will we do and what action to take to protect our data? How safe of our data?
TO prevent social engineering and phishing, we can did on education and training. All staff need to be educated about the risks associated with social engineering, the social engineering techniques used by hackers and ways to combat these attack. Hence, we can prevent in policies and procedures, there is need to be developed for securing confidential information,guiding employee employee behavior with respect to confidential information and taking steps to rspond to and report and social engineering breach. On the other hand, we also can did on penetration testing. That is policies, procedures and responses of individual staff need to be tested on a regular basis by outside experts playing a role as a hacker.
Although that, we also can apply or use some software to protect our data, such suggestion like Sarbanes-Oxley Act. This protection are most suitable for small and middler size company, because the cost is effective, subscription-based data protection services.
The above is the some protection and example for prevent nontechnical and technical attack.If you have more suggestion about it, can post it on comment..