Saturday, February 28, 2009

E-government in Malaysia: Its implementation so far and citizen's adoption strategies

e-government also known as e-gov, digital government, online government or transformational government is a diffused neologism used to refer to the use of information ad communication technology to provide and improve government services, transaction and interaction with citizens, business, and other arms of government

The implementation of electronic government started since the initiation of Multimedia Super Corridor (MSC) by the Malaysia government. The progress and the effectiveness of e-government applications are openly discussed by the IT society in Malaysia.

The pilot projects of the Electronic Governemnt Flagship Application are as following:
1)Electronic Procurement (eP) Project
~eP project is to re-engineer, automate and transform current procurement system. It cover central contract, tender and direct purchase.

2)Project Monitoring System (PMS)
~Project that create mechanism to monitor project implementation throughout government agencies. It provide a platform for exchanging idea and demnstrating best practices models in project implementation.

3)Generic Office Environment (GOE)
~It introduce a fully integrated, distributed and scalable office environment that leverages use of multimedia technology and enable efficient communication , allowing collaboration among all workers, and ensure the right information reaching right people in the right time.

4)Human Resource Management Information System (HRMIS)
~It provide single interface for government employees to perform human resource function and effectively & efficiency.

5)Electronic Labor Exchange (ELX)
~It improve mobilization of human resource optimize work force utilization via systematic matching of job seekers to job vacancies.

6)Electronic Services (E-Services)
~It allow citizen to engage in transaction with government and utilities payment(telephone & electricity bull, summon police, Road & Transpot Department service and etc)

Citizen's adoption strategies
1.Customers satisfaction- citizens show higher levels of satisfaction with the online service provided by the government. A higher level of customer satisfaction will increase the rate of e-Government adoption.

2.Service quality- Online service quality for e-Government could be measured in terms of quality of content provided on the website, the speed of the response to the citizens concerns with problem solving approach, and the availability of names.

3.Website design- By giving visitors a sense of control and participation and could potentially enhance their adoption.

Wednesday, February 25, 2009

Mobile payment systems in Malaysia: its potentials and consumers' adoption strategies


Mobile payment also known as mobile web payments or WAP billing is a collection of money from consumer via a mobile device such as mobile phone, smartphone, personal digital assistant ( PDA) or any other devices. Mobile payment Mobile payment allow consumers a convenient way to making payment. With the Mobile Money state's of the art technology, consumers can pay to anyone, from anywhere, at anytime.

Potential of mobile payment system
Compatibility-It captures the consistency between an innovation and the values, experiences, and needs of potential adopters.


Exploring Consumer Adoption of Mobile Payments - a Qualitative Study

Simplicity-Mobile payments are commonly expected to increase consumer convenience by reducing the need for coins and cash in small transactions and increasing the availability of purchase possibilities


Network externalities and creation of critical mass
-Payment systems exhibit network externalities as the value of a payment system to a single user increases when more users begin to use it

Universality-It provide transactions between one customer to another customer (C2C), or from a business to a customer (B2C) or between businesses (B2B). The coverage includes domestic, regional and global environments.


Costless- Exploring Consumer Adoption of Mobile Payments - a Qualitative StudyLow transaction fees and maintenance fees. A mobile payment is less cost than existing payment mechanisms to the extent possible

Consumers' adoption strategies

i)For payment systems, consumer ability to integrate them into their daily life is an important aspect of compatibility.The compatibility of mobile payments with consumers’ purchase transactions, habits, and preferences correspondingly influences the diffusion progress.

ii)
Consumer decision to adopt a payment system is therefore significantly affected by the amount of other consumers and merchants using it.

iii)The cost of a payment transaction has a direct effect on consumer adoption if the cost is passed on to customers.As shoppers in electronic channels are attentive to price the transaction costs of mobile payments should be low enough to make the total cost of the purchase competitive with physical world prices



Monday, February 23, 2009

Things To Take Note To Prevent E-auction Fraud When A Consumer Participating In An E-auction.

Auction is market mechanism by which buyers make bids and sellers place offers. It is characterized by the competitive and dynamic nature by which the final price is reached. Auctions can rapidly disposal of items that needs liquidation or a quick sale, they offer trading opportunities for both buyers and sellers that are not available in conventional channels and they ensure cautious execution of contracts. An electronic auction (e-auctions) which means auctions conducted online.



How was the auction fraud cases involve slick descriptions?
Internet auction fraud cases involve straightforward scams where consumers allegedly win merchandise by being the highest bidder. All sounds good until they send the payment and never receive the merchandise. Those scammers setup fake escrow services and websites. This way, the scammers can collect merchandise as well as collect payments. The victims never suspect a thing until they have already sent their payment to the fake escrow service or sent their merchandise off to the buyer thinking the payment is safely waiting in escrow.




Here are the way avoid and prevent the risk purchase at the online auction, there are:-




1. Never ever give out your social security number, drivers license number, credit card number, or bank account information until you have thoroughly checked out the seller and the escrow service.

2. Always save 100% of the transaction information. You’ll be glad you did in the event your case makes it to court.

3. Become familiar with the auction website. Look into the websites protection policies. Never assume you are protected from auction fraud.

4. Ask sellers for a phone number, and then verify it.

5. Check the seller's feedback at the auction site. Be wary of feedback from buyers dated only a few days following a sale — it may be fake. Delivery usually takes at least several days, and most buyers typically use their merchandise for several days before responding with comments to the seller.

6. Use a credit card. Credit card payment protects the buyer because you can dispute the charges if the goods are misrepresented or never delivered. Cancel the card immediately if you suspect fraud.

7. Use an online escrow service that will hold the payment until you can inspect the merchandise. Auction sites such as Yahoo maintain lists of these services

8. Before placing a bid, learn as much as you can about the seller. Never buy anything from a seller who asks for payment to be mailed to a P.O. box. doing business with them and never fall for promises.

9. warranty policy if there is any warranty or the exchange policy, if there is a problem on the item purchases. Next, Check whether the shipping and delivery fees are included in the price, so you won't be any surprises when you get the shipping and delivery bills.

10. inspect the item when it delivery to you to ensure the item is physically in good condition.




Things to take note to prevent e-auction fraud when a consumer participating in an e-auction





A warning to auction sites – Pareto is dead

Sunday, February 22, 2009

The Application of Pre-paid Cash Card for Consumer

What is Pre-paid cash card?

A prepaid cash card can be explained as a card issued by a bank or building society enabling customers to pay for goods by inserting it into a computer-controlled device at the place of sale, which is connected through the telephone network to the bank or building society. A prepaid cash card allows consumers to purchase something even when they don't have the cash to pay for it. It benefits consumers in their everyday life.

There are several way that prepaid card can be used for:
1. Use Prepaid Cards For Personal Expenditures
Consumer can be used for all kinds of personal purchases. The features, benefits and fees vary depending on the card you choose.

2. Payroll Programs
is a convenient and cost-effective alternative to traditional paper paychecks. Each payday, payroll is transferred directly to consumer's card. Consumer can then withdraw their pay at an ATM, or shop with the card wherever credit cards are accepted.

3. ATM
eliminate problems with lost or altered checks, and provide an online transaction record for the recipients.

4. Transaction or Transferring Money
A prepaid cash card can let the consumer transfers money to friends or family either in the local or overseas. Some prepaid cash cards are provide the features that can let consumer make transferring between two prepaid cash cards via bank wire transfers.

Here are the benefit of using the prepaid cash card
1. Safety
When you travel, credit cards are safer than a large wad of cash. It can save the day if your other credit cards are stolen during your trip.
If the card are stolen or lost, you still can make a phone call to customer service on your prepaid credit card. Therefore, cancel the service and stop the transferring.

2. Purchase protection
prepaid credit cards over credit cards is that when you use a prepaid card, you avoid racking up costly credit card debt. Not only that, Some of prepaid cash card center is provides the service of informing their consumer how many balance they still having in the account. It will help consumer to budget their accounts.

3. Mobile banking
enables a customer's mobile phone to operate like a virtual bank where customers can activate a new card, view their transaction history, and load money to their account from wherever they are.

4. Online Innovation
Social networks, such as Facebook and MySpace, are another trend that is changing the market for prepaid debit cards. It being interfaced with social networks by offering peer to peer payment capabilities, and offer mobile connectivity for checking account balances or sending gift notifications. The card holder has the freedom to purchase the items he or she really wants or needs.


http://www.bestinc.net/ATM_Card/ATM_Card_1_en_sl.htm

The Threat of Online Security: How Safe Is Our Data?

Nowadays, internet is become common in our life and people often access it for search the information, communication, transfering or manage impotant document or file, store and so on. That is why, users need pay more attention and protecting their data from loss, damage, and misuse. Online secrurity has been online trader’s main concern in protectin g their websites from potential threats, such as phishing, secrurity hacking, information theft, virus, worms and etc.

Internet provides the opportunities for users to share the knowledge wihout flitering the content. It lets everyone can learns kill that may jeoparadize online security via internet and increase the online security risk. How often users access internet, there is highest chance to facing the threats of cybercrime, phishing, internet and network attack such as computer viruses, worms, Trojan horses, spyware, Malware, and back door.

There are few example popular internet threat.

CYBERCRIME – mean that online or internet-based illegal acts. Example hackers, crackers and corporate spies who have advanced computer and network skill access computers and networks illegally with the intent of destroying data, stealing proprietary data and information.

Phishing is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal information and financial information. For example, some phishing e-mail messages ask you to reply with your information, or a pop up window that looks like a website, that collects the information. The damages caused by phishing can be crucial. The following case illustrates potential threat caused by phishing.

Virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Virus attack can damage the operating system, causing the loss of data and other possible losses. A worm is a program that copies itself repeatedly. The repeatedly copied files use up the available space and slow down a computer operating speed. On the other hand, a Trojan horse is a program that hides within or looks like a legitimate program. Although they seem to be harmless, they may however be triggered if certain condition is certified.

A back door is a set of instructions in a program that allow users to bypass security control when accessing a program, computer, or network. Once perpetrators gain access to unsecure computers, they often install a back door or modify an existing program to include a back door, enabling them to continue to access the computers remotely without the user’s knowledge.

There are several ways to prevent threat on online security:
1. Limit connectivity and limit downloads.
2. Always ensure that internet firewall is running.
3. Subscribe to industry standard anti-virus software.
4. Never open an E-mail attachment from someone you don’t know. There is attachment contain a virus.
5. Delete all the cookies in the computor to prevent track on the history/password.
6. Enforce mandatory access controls.
7. Always remember to scan your computer with anti-virus.
8. Use authorized media for loading data and software.


In conclusion, risk exposed by computer users is increasing with the increasing developed technology. Therefore, safeguards developed must be always up to date to enhance the defenses against online security threats. In the same time, users must be educated and informed about the crucial damages and loss caused by imposing online security threats.

http://www.govexec.com/story_page.cfm?articleid=39456
http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history



Phishing:Examples and its prevention method

Phishing is a form of criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication.

Phishing occurs when a consumer receives a deceptively-legitimate looking email from what appears to be a reputable company. The email asks recipients to update their credit card information or their account will be promptly terminated. Or the message offers a service to protect their credit cards from possible fraud.

Often "phishing" spam messages will use legitimate 'From:' email addresses, logos, and links to reputable businesses such as AOL, PayPal, Best Buy, Earthlink and eBay in the message. But the message instructs you to click on a web link that sends you to a fake website where you are asked to provide personal information to the scam artists. Such sites will ask for information such as your name, address, phone number, date of birth, Social Security number (SSN), and bank or credit card account number. Providing this kind of information can leave consumers at risk for identity theft

Example 1 :

It looks legitimate. But the web link included in the message sends the user to a fake eBay site where personal information is captured from the unsuspecting individual.

Example 2 :

This is indeed a nice looking message, it looks like a real email from Paypal and to couple this with a distressing title "Your account will be suspended" that makes it quite deadly. Ever you can spot the scam, the email is addressed to no one and if you move the mouse cursor over the link especially the big link in the center "Click here to activate your account", you'll find that the URLs do not go to the Paypal web site - though the phrase "www.paypal.com" occurs in both links.


Prevention method:

1.Don't trust email headers, which can be forged easily - Creating an email message that looks like it came from a credit card company and even including their logo is not a difficult thing for phisher to do.

2.Avoid filling out forms in email messages - You can't know with certainty where the data will be sent and the information can make several stops on the way to the recipient.

3.Contact the legitimate company named in the email to confirm whether the request is from them - Most companies do not ask customers to confirm personal information by sending an email.

4.Anti-Phishing software - Some Internet security software packages also include anti-phishing software. The vendor that someone already trusts for their anti-virus software will probably carry a product for phishing as well


Review A Local E-Commerce Site



In Malaysia, ther are many local site are doing e-commerce. Some of them are non-profit organisationa and other then that is doing business in the internet. So, we choose a famous and well know website to you. This will let you more understand about the local e-commerce and how is it work inside the internet. The web name is Queens.

The following is the print preview of the Queens website. To open the web please click here


Queens



I would like to intro this web as " Queens Heaven". Why, just follow the meaning of the words. This web is selling anything goods and service to female. They can buy anything from this web such as  women accessories, clothes, shoes, comestic, rings and secret of women. This web not like Ebay, Amazon.com or Lelong.com. This web is forum, you not only can find your product needs and also can listen and learn the information from each others women. You can learn anythings about women. 

Being a women wedsite, you can intro to all your friends. Especially for famale. This will let them to know more about themself and buy their equip. Sometimes, they can take a break in this web. The Queens web got a lot of entertaiment, movie sharing, music, mini games, news and psychometry. Girls like psychometry very much. So, besides selling and buying goods, psychometry also a part of famous topic inside the forum. Queens Psychometry is a  famous content for female, they sure like it anyway.

So, Girl... what are you waiting for... open the Queens and look inside the forum now...



p.s : Boys are not allow enter Women worlds.
















Credit Card Debts : Causes and Prevention

Credit Card

Credit card is a card that to let you spent your future money or borrows money from bank

 to buy your goods and services. It is issued by banks, saving and loans, retail stores or other business. Credit card is 

very useful when in emergencies or not enough cards to spend. Therefore, using credit wisely is an important tool in establishing your financial independence. Unfortunately, a lot of people use credit cards as a "crutch." If they can't afford something they really want, they charge it. When it comes the time to pay the bill they pay the minimum amount due. This is where credit card debt arises where debt accumulates and increases via interest and penalties. 


Causes of using credit card 


  • ·   Poor money management - Without money spending plan, you have no idea where your money is going. You may be spending unnecessarily each month. 
  • ·   Banking on a windfall - Very often, spending tomorrow's money today is very tempting. It is advisable that don’t spend until you hold an amount of money in hand. 
  • ·   Financial illiteracy - Many people don't understand how money works and grows, how to save and invest for a rainy day, or even why they should balance their checkbook. 
  • ·   No money communication skills - It is important to communicate with your spouse or significant other and your children about finances. Keep the lines of communication open and discuss financial goals and spending styles. 
  •  ·  Reduced income/same expenses - Too often we delay bringing expenses in line with a reduction in income for a host of good reasons and let debt fill the gap. The sooner you adjust to your new reality, whether it be temporary or permanent, the better off you'll be.


Prevention for credit card user 

  • · We should pay off whatever we can as soon as you can do it, so our balance not grows exponentially as time passes. 
  • · We have to make sure you are also reading all of that fine-print that comes along with the agreement, because there could be hidden fees that we want to know about ahead of time. 
  • ·Being aware and being conscientious about our payment schedule are just a few little things that could keep us from adding to a debt we may have already created. 
  • · Don't ever use credit cards to reward yourself for a good day, or to fulfill a bad day by trying to cheer you up with a purchase. 
  • · Keeps our credit card spending to amounts that we know we can pay off, don't go over-board with unnecessary purchases, and budget how we plan on paying back our charges?
 
 

 

 

http://en.wikipedia.org/wiki/Credit_card

http://www.bankrate.com/brm/news/debt/debt_manage_2004/top-10-causes.asp

Friday, February 20, 2009

Corporate blogging: A new marketing communication tool for companies

A corporate blog is published and used by an organization to reach its organizational goals. The advantage of blogs is that posts and comments are easy to reach and follow due to centralized hosting and generally structured conversation threads.

Advantages of Corporate Blogging :
An effective way to hear what employees and customers have to say about the corporation. Organization can build its relationship with its customers and promote their products at the same time. Customer satisfaction can increase if the blogs are taken into account.Encourage communication and allow businesses more easily reach their customers, develop stronger relationships and brand loyalty with its customers Employee turnover may decrease if managers read what employees like and dislike. Even the quiet employees who never speak out will be heard.Allow employees to display their expertise on a particular topic, become an excellent way of sharing knowledge and showcasing the organization as having talent and expertise
Allow a positive way of getting feedback, and better understanding towards customers’ needs, as they react to certain pieces, suggest ideas, comments and etc
As compare to other communication strategies, blogging is relatively much more cheaper.
Disadvantages of Corporate Blogging :
Difficult to keep track of all the opinions.Managers will have a difficult time following up on all the opinions and comments.Corporate blogging is that blogs are usually not updated frequently, which does not build a good reputation for the corporation in the long run.People may use blogs to write negatively about the company which can lead to bad publicity.If a blog failed to comply with all applicable local, national and foreign requirements for doing business, it will lead to legal liabilities.

References:
http://en.wikipedia.org/wiki/Corporate_blog
http://360class.wikispaces.com/message/view/The+Essay/547110

Electronic Currency

Electronic Currency known as electronic money (also known as e-money, electronic cash, digital money, digital cash or digital currency) refers to money or scrip which is exchanged onlyel ectronically. Typically, this involves use of computer networks, the internet and digital stored value systems. Electronic Funds Transfer (EFT) and direct deposit are examples of electronic money. Also, it is a collective term for financial cryptography and technologies enabling it.

The money screamed across the wires, its provenance fading in a maze of electronic transfers, which shifted it, hid it, broke it up into manageable wads which would be withdrawn and redeposited elsewhere, obliterating the trail. Nest of Vipers, a banking thriller by Linda Davies.

Reference:
http://projects.exeter.ac.uk/RDavies/arian/emoney.html
http://en.wikipedia.org/wiki/Electronic_currency

How to safeguard our personal and financial data?

The notion that Internet use has grown exponentially in just a couple of years leads us to believe that Internet commerce is expected to boom as well in the near future. However, we can not be entirely sure about how much of an impact Internet commerce will have in the near future. So, how to safeguard our personal and financial data?

  • Do not leave any personal information or particularly passwords to anyone : After using any of the Financial Data Center, member services or in cyber cafe, must remember to log out properly before leaving.
  • Complexity of password : any password to log in any personal information or financial data should as longer as possible and also make it more complex.
  • Avoidance of password : password don't even use date of birth, pet name, nickname, and others that people easily know that related with you one.
  • Software : install antispyware and antivirus software. For example, Kaspersky, Norton, Bit defender and 360 safe are mostly used by users nowadays.

Reference:

Monday, February 16, 2009

The application of 3rd party certification programme in Malaysia



By the coming of e-century, we know that internet is a part in our life. using internet is very common in this coming year. Certificate authorities is a digital certificate that provide verification to your website indeed represent your company. we know that one of the certificate authories is MSC Trustgate.com Sdn Bhd. It is a licensed CA in Malaysia which incorporated in 1999, under the Digital Signature Act 1997 (DSA). It offers complete security solutions for individuals, organizations, government, and e-commerce service providers by digital certificates, encryption and decryption.


MSC Trustgate was incorporated in 1999, the company need to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce. Both locally and across the ASEAN region. Besides, MSC Trustgate has 12 million i n paid up capital. Trustgate is licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development.
The MSC company commeitted to provide the fines Public Kep Infrastrutuew (PKI) to assist all assist all types of companies and institutions conducting their business over the Internet. The state of the art back-end infrastructure that costs RM 14 million is one of the best in the region.

TrustGate Vision

Security is the primary concern of entering into the new Internet economy. The ever-changing paradigm of e-commerce requires a well-mandated security infrastructure. 







http://www.msctrustgate.com/

Monday, February 9, 2009

An Example Of An E-Commerce Failure And Its Causes


One of an example of an e-commerce failure is Webvan. Webvan was an online grocery retailer. In the quest to become the number one online grocer, Webvan managed their way through a tangled web of operational changes. Webvan is an interesting failure, it was started in 1999 by Louis Borders, founding partner of Borders Books. The company spent an extraordinary amount of money during its short tenure as the largest and most promising pure play e-grocer.


The reasons for failure of Webvan are because Webvan invested in technology and an infrastructure that was too expensive for low margin products. Webvan’s founder, Louis Borders, had experience with larger margin products, where profits are not solely dependent on volume. Webvan expected a high adoption rate to their e-grocer business, however, people were skeptical about the lack of control over the quality of the product. Thus, the lack of volume in grocery sales was the prime contributor to the lack of debt repayment. With regard to technology, Webvan did not rely on the experience of others. Neither did they have any experience in the grocery market.


Besides, the poor to connect with their customers also may cause their business failed. They want to satisfy the customer so they tried to deliver the groceries in 30 minutes. Although it is a good service but some of the customers would like their groceries to be delivered at night because they were working at day time. Moreover, the deliveries will sometimes be late and the customer was not at home when the van was there.Thus, on 9 July 2001, Webvan went bankrupt and began its liquidation.
Reference:

Sunday, February 8, 2009

Discuss how E-Commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support

E-commerce is a type of business model than enable a firm or individual to conduct the business over global network, such as internet. It is widely used by individual and companies to expand and retain the attention of consumers due to the internet to perform business response efficiency with paperless and less costly.


E-commerce reduce cycle time of transaction by eliminating overall process steps in the business transaction process. By using e-commerce, suppliers can send the goods or services to the customer directly without involving retailer or middle man such as Dell. This can reduce the cycle time after placing an order till receive the good or service.

E-commerce improves employees’ empowerment by giving authority to employees in dealing with process of capturing, researching and leveraging business information. Employees are able to access to more useful information through internet, intranet, and EDI. The employees even can work at home and can provide a quick response or feedback to the customers through the internet.

E-commerce can facilitate customer support by satisfying customers’ needs. Customers can to get the detailed information for the product or service, asking question (FAQ), and posting feedback through internet. With Customer relationship management, customers can collaborate with company better.

Identify and compare the revenue model for Google, Amazon.com and eBay.




@@ GOOGLE was co-founded by Larry Page and Sergey Brin. They form as privately held company on 4 September 1998. They hypothesized that search engine that analyzed the relationships between websites would produce better ranking of result than existing techniques, which ranked results according to the number of times the search term appeared on a page and the system checked backlinks to estimate the importance of a site.
$$$ GOOGLE earning revenue from advertising related to its Internet search, e-mail, online mapping, office productivity, social networking, and video sharing services as well as selling advertising-free version of the same-technologies.

@@ AMAZON was founded in 1994 by Jeff Bezos and launched it on-line in 1995. the company began as an on-line bookstores named “CADABRA.COM” and it began largest “brick-and -mortar” bookstores and “mail-order-catalogs” for books might offer 200,000 titles, an on-line bookstores could offer more. Since 2000 Jeff Bezos renamed the company “Amazon”. Amazon logotype is an arrow leading from A to Z, representing customer satisfaction (as it forms a smile) and the goal to have every product in the alphabet.
$$$ AMAZON as a largest on-line retailer in the America. With nearly times the Internet sales revenue. Bookstores diversified to product lines of VHS, DVD, music CDs and MP3s, Computer Software, Video Games, Electronics, Apparel, Furniture, Food, Toys, etc. In 1999, Time magazine named Bezos person of the year, recognizing the company's success in popularizing on-line shopping. Now, Amazon.com Marketplace's main rival is eBay's half service and it began selling product under its own private label. In 2008 Amazon expanded into Film production and is currently funding the film The Stolen Child with 20th Century Fox.

@@ EBAY is an American Internet company that provide an on-line auction and shopping website in which people and businesses buy and sell goods and services worldwide. In 3 September 1995, the on-line auction websites was founded as AuctionWeb. The company officially changed the name of its service from AuctionWeb to eBay in September 1997. In November 1996, eBay entered into its first third-party licensing deal, with a company called Electronic Travel Auction to use SmartMarket Technology to sell plane tickets and other travel products. Now eBay has established localized websites in thirty other countries.
$$$ EBAY making revenue through the 3 Auction types. There are:-
Auction-style listings allow the seller to offer one or more items for sale for a specified number of days. Seller can establish a reserve price.
Fixed Price format allows the seller to offer one or more items for sale at a Buy It Now price. Buyers who agree to pay that price win the auction immediately without submitting a bid.
Dutch Auctions allow the seller to offer two or more identical items in the same auction. Bidders can bid for any number from one item up to the total number offered.

Monday, February 2, 2009

An Example Of An E-Commerce Success And Its Causes


An E-commerce Success is eBay. It has around 13 years of history.
Its causes of success are they know people like to get a bargain and they would like to negotiate a little bit over the price. And they also know people enjoying the hunt and the competition of the bidding process. Their auction format allows users to do so.
Beside of that, the great majority of people who are selling on eBay are really warm, decent, trustworthy and honest people. Therefore, a lot of people would like to do transactions at eBay.
And the last, eBay is the first example where a commerce site has actually been built around a society where people exchanging information and also goods, services and merchandise.

Reference:
ebay history - http://www.cs.brandeis.edu/~magnus/ief248a/eBay/history.html

The History And Evolution Of Ecommerce

Ecommerce is a process of buying, selling, transferring or exchanging the products, services and information over the electronic system like internet or other networks.Ecommerce became possible in 1991 when the Internet was opened to commercial use.
There have been several key steps in the history of e-commerce.
- The first step came from the development of the Electronic Data Interchange (EDI). EDI is a set of standards developed in the 1960’s to exchange business information and do electronic transactions.
- The next major step occurred in 1992 when the Mosaic web-browser was made available, it was the first ‘point and click’ browser.
- The development of DSL was another key moment in the development to of e-commerce because DSL allowed quicker access and a persistent connection to the Internet.
- And then Christmas of 1998 was another major step in the development of e-commerce because that season AOL had sales of 1.2 billion over the 10 week holiday season from online sales.
- Following is the development of Red Hat Linux. Linux gave users another choice in a platform other then Windows that was reliable and open-source. So this force Microsoft to invest more such as electronice commerce to compete with Linux.
- Then is the Napster, Napster was an online application used to share music files for free. It make more people use ecommerce.
- In February of 2000, some major players of e-commerce such as Yahoo, eBay and Amazon were attacked by the hackers. The attacks represent the need to improve the security in the development of e-commerce.
So, ecommerce today is a remarkable experience. It has transformed traditional shopping beyond recognition. It is so much better than any other way of shopping that it has already attracted a great many of ecommerce-lovers.



Reference:
History of E-commerce- http://www.ecommerce-land.com/history_ecommerce.html
History of E-commerce- http://www.flysyk02.netfirms.com/Ecommerce/History.htm