Saturday, February 28, 2009
E-government in Malaysia: Its implementation so far and citizen's adoption strategies
The implementation of electronic government started since the initiation of Multimedia Super Corridor (MSC) by the Malaysia government. The progress and the effectiveness of e-government applications are openly discussed by the IT society in Malaysia.
The pilot projects of the Electronic Governemnt Flagship Application are as following:
1)Electronic Procurement (eP) Project
~eP project is to re-engineer, automate and transform current procurement system. It cover central contract, tender and direct purchase.
2)Project Monitoring System (PMS)
~Project that create mechanism to monitor project implementation throughout government agencies. It provide a platform for exchanging idea and demnstrating best practices models in project implementation.
3)Generic Office Environment (GOE)
~It introduce a fully integrated, distributed and scalable office environment that leverages use of multimedia technology and enable efficient communication , allowing collaboration among all workers, and ensure the right information reaching right people in the right time.
4)Human Resource Management Information System (HRMIS)
~It provide single interface for government employees to perform human resource function and effectively & efficiency.
5)Electronic Labor Exchange (ELX)
~It improve mobilization of human resource optimize work force utilization via systematic matching of job seekers to job vacancies.
6)Electronic Services (E-Services)
~It allow citizen to engage in transaction with government and utilities payment(telephone & electricity bull, summon police, Road & Transpot Department service and etc)
Citizen's adoption strategies
1.Customers satisfaction- citizens show higher levels of satisfaction with the online service provided by the government. A higher level of customer satisfaction will increase the rate of e-Government adoption.
2.Service quality- Online service quality for e-Government could be measured in terms of quality of content provided on the website, the speed of the response to the citizens concerns with problem solving approach, and the availability of names.
3.Website design- By giving visitors a sense of control and participation and could potentially enhance their adoption.
Wednesday, February 25, 2009
Mobile payment systems in Malaysia: its potentials and consumers' adoption strategies
Mobile payment also known as mobile web payments or WAP billing is a collection of money from consumer via a mobile device such as mobile phone, smartphone, personal digital assistant ( PDA) or any other devices. Mobile payment Mobile payment allow consumers a convenient way to making payment. With the Mobile Money state's of the art technology, consumers can pay to anyone, from anywhere, at anytime.
Potential of mobile payment system
Compatibility-It captures the consistency between an innovation and the values, experiences, and needs of potential adopters.
Simplicity-Mobile payments are commonly expected to increase consumer convenience by reducing the need for coins and cash in small transactions and increasing the availability of purchase possibilities
Network externalities and creation of critical mass-Payment systems exhibit network externalities as the value of a payment system to a single user increases when more users begin to use it
Universality-It provide transactions between one customer to another customer (C2C), or from a business to a customer (B2C) or between businesses (B2B). The coverage includes domestic, regional and global environments.
Costless-
Consumers' adoption strategies
i)For payment systems, consumer ability to integrate them into their daily life is an important aspect of compatibility.The compatibility of mobile payments with consumers’ purchase transactions, habits, and preferences correspondingly influences the diffusion progress.
ii)Consumer decision to adopt a payment system is therefore significantly affected by the amount of other consumers and merchants using it.
iii)The cost of a payment transaction has a direct effect on consumer adoption if the cost is passed on to customers.As shoppers in electronic channels are attentive to price the transaction costs of mobile payments should be low enough to make the total cost of the purchase competitive with physical world prices
Monday, February 23, 2009
Things To Take Note To Prevent E-auction Fraud When A Consumer Participating In An E-auction.
How was the auction fraud cases involve slick descriptions?
Internet auction fraud cases involve straightforward scams where consumers allegedly win merchandise by being the highest bidder. All sounds good until they send the payment and never receive the merchandise. Those scammers setup fake escrow services and websites. This way, the scammers can collect merchandise as well as collect payments. The victims never suspect a thing until they have already sent their payment to the fake escrow service or sent their merchandise off to the buyer thinking the payment is safely waiting in escrow.
2. Always save 100% of the transaction information. You’ll be glad you did in the event your case makes it to court.
3. Become familiar with the auction website. Look into the websites protection policies. Never assume you are protected from auction fraud.
4. Ask sellers for a phone number, and then verify it.
5. Check the seller's feedback at the auction site. Be wary of feedback from buyers dated only a few days following a sale — it may be fake. Delivery usually takes at least several days, and most buyers typically use their merchandise for several days before responding with comments to the seller.
6. Use a credit card. Credit card payment protects the buyer because you can dispute the charges if the goods are misrepresented or never delivered. Cancel the card immediately if you suspect fraud.
7. Use an online escrow service that will hold the payment until you can inspect the merchandise. Auction sites such as Yahoo maintain lists of these services
8. Before placing a bid, learn as much as you can about the seller. Never buy anything from a seller who asks for payment to be mailed to a P.O. box. doing business with them and never fall for promises.
9. warranty policy if there is any warranty or the exchange policy, if there is a problem on the item purchases. Next, Check whether the shipping and delivery fees are included in the price, so you won't be any surprises when you get the shipping and delivery bills.
10. inspect the item when it delivery to you to ensure the item is physically in good condition.
How to prevent e-auction fraud
How to avoid online auction fraud
A warning to auction sites – Pareto is dead
Sunday, February 22, 2009
The Application of Pre-paid Cash Card for Consumer
There are several way that prepaid card can be used for:
1. Use Prepaid Cards For Personal Expenditures
Consumer can be used for all kinds of personal purchases. The features, benefits and fees vary depending on the card you choose.
2. Payroll Programs
is a convenient and cost-effective alternative to traditional paper paychecks. Each payday, payroll is transferred directly to consumer's card. Consumer can then withdraw their pay at an ATM, or shop with the card wherever credit cards are accepted.
3. ATM
eliminate problems with lost or altered checks, and provide an online transaction record for the recipients.
4. Transaction or Transferring Money
A prepaid cash card can let the consumer transfers money to friends or family either in the local or overseas. Some prepaid cash cards are provide the features that can let consumer make transferring between two prepaid cash cards via bank wire transfers.
Here are the benefit of using the prepaid cash card
1. Safety
When you travel, credit cards are safer than a large wad of cash. It can save the day if your other credit cards are stolen during your trip.
If the card are stolen or lost, you still can make a phone call to customer service on your prepaid credit card. Therefore, cancel the service and stop the transferring.
2. Purchase protection
prepaid credit cards over credit cards is that when you use a prepaid card, you avoid racking up costly credit card debt. Not only that, Some of prepaid cash card center is provides the service of informing their consumer how many balance they still having in the account. It will help consumer to budget their accounts.
3. Mobile banking
enables a customer's mobile phone to operate like a virtual bank where customers can activate a new card, view their transaction history, and load money to their account from wherever they are.
4. Online Innovation
Social networks, such as Facebook and MySpace, are another trend that is changing the market for prepaid debit cards. It being interfaced with social networks by offering peer to peer payment capabilities, and offer mobile connectivity for checking account balances or sending gift notifications. The card holder has the freedom to purchase the items he or she really wants or needs.
http://www.bestinc.net/ATM_Card/ATM_Card_1_en_sl.htm
The Threat of Online Security: How Safe Is Our Data?
Nowadays, internet is become common in our life and people often access it for search the information, communication, transfering or manage impotant document or file, store and so on. That is why, users need pay more attention and protecting their data from loss, damage, and misuse. Online secrurity has been online trader’s main concern in protectin g their websites from potential threats, such as phishing, secrurity hacking, information theft, virus, worms and etc.
Internet provides the opportunities for users to share the knowledge wihout flitering the content. It lets everyone can learns kill that may jeoparadize online security via internet and increase the online security risk. How often users access internet, there is highest chance to facing the threats of cybercrime, phishing, internet and network attack such as computer viruses, worms, Trojan horses, spyware, Malware, and back door.
There are few example popular internet threat.
CYBERCRIME – mean that online or internet-based illegal acts. Example hackers, crackers and corporate spies who have advanced computer and network skill access computers and networks illegally with the intent of destroying data, stealing proprietary data and information.
Phishing is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal information and financial information. For example, some phishing e-mail messages ask you to reply with your information, or a pop up window that looks like a website, that collects the information. The damages caused by phishing can be crucial. The following case illustrates potential threat caused by phishing.
Virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Virus attack can damage the operating system, causing the loss of data and other possible losses. A worm is a program that copies itself repeatedly. The repeatedly copied files use up the available space and slow down a computer operating speed. On the other hand, a Trojan horse is a program that hides within or looks like a legitimate program. Although they seem to be harmless, they may however be triggered if certain condition is certified.
A back door is a set of instructions in a program that allow users to bypass security control when accessing a program, computer, or network. Once perpetrators gain access to unsecure computers, they often install a back door or modify an existing program to include a back door, enabling them to continue to access the computers remotely without the user’s knowledge.
There are several ways to prevent threat on online security:
1. Limit connectivity and limit downloads.
2. Always ensure that internet firewall is running.
3. Subscribe to industry standard anti-virus software.
4. Never open an E-mail attachment from someone you don’t know. There is attachment contain a virus.
5. Delete all the cookies in the computor to prevent track on the history/password.
6. Enforce mandatory access controls.
7. Always remember to scan your computer with anti-virus.
8. Use authorized media for loading data and software.
In conclusion, risk exposed by computer users is increasing with the increasing developed technology. Therefore, safeguards developed must be always up to date to enhance the defenses against online security threats. In the same time, users must be educated and informed about the crucial damages and loss caused by imposing online security threats.
http://www.govexec.com/story_page.cfm?articleid=39456
http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
Phishing:Examples and its prevention method
Phishing occurs when a consumer receives a deceptively-legitimate looking email from what appears to be a reputable company. The email asks recipients to update their credit card information or their account will be promptly terminated. Or the message offers a service to protect their credit cards from possible fraud.
Often "phishing" spam messages will use legitimate 'From:' email addresses, logos, and links to reputable businesses such as AOL, PayPal, Best Buy, Earthlink and eBay in the message. But the message instructs you to click on a web link that sends you to a fake website where you are asked to provide personal information to the scam artists. Such sites will ask for information such as your name, address, phone number, date of birth, Social Security number (SSN), and bank or credit card account number. Providing this kind of information can leave consumers at risk for identity theft
Example 1 :
It looks legitimate. But the web link included in the message sends the user to a fake eBay site where personal information is captured from the unsuspecting individual.
Example 2 :This is indeed a nice looking message, it looks like a real email from Paypal and to couple this with a distressing title "Your account will be suspended" that makes it quite deadly. Ever you can spot the scam, the email is addressed to no one and if you move the mouse cursor over the link especially the big link in the center "Click here to activate your account", you'll find that the URLs do not go to the Paypal web site - though the phrase "www.paypal.com" occurs in both links.
Prevention method:
1.Don't trust email headers, which can be forged easily - Creating an email message that looks like it came from a credit card company and even including their logo is not a difficult thing for phisher to do.
2.Avoid filling out forms in email messages - You can't know with certainty where the data will be sent and the information can make several stops on the way to the recipient.
3.Contact the legitimate company named in the email to confirm whether the request is from them - Most companies do not ask customers to confirm personal information by sending an email.
4.Anti-Phishing software - Some Internet security software packages also include anti-phishing software. The vendor that someone already trusts for their anti-virus software will probably carry a product for phishing as well
Review A Local E-Commerce Site
Credit Card Debts : Causes and Prevention
Credit Card
.jpg)
Credit card is a card that to let you spent your future money or borrows money from bank
to buy your goods and services. It is issued by banks, saving and loans, retail stores or other business. Credit card is
very useful when in emergencies or not enough cards to spend. Therefore, using credit wisely is an important tool in establishing your financial independence. Unfortunately, a lot of people use credit cards as a "crutch." If they can't afford something they really want, they charge it. When it comes the time to pay the bill they pay the minimum amount due. This is where credit card debt arises where debt accumulates and increases via interest and penalties.
Causes of using credit card
- · Poor money management - Without money spending plan, you have no idea where your money is going. You may be spending unnecessarily each month.
- · Banking on a windfall - Very often, spending tomorrow's money today is very tempting. It is advisable that don’t spend until you hold an amount of money in hand.
- · Financial illiteracy - Many people don't understand how money works and grows, how to save and invest for a rainy day, or even why they should balance their checkbook.
- · No money communication skills - It is important to communicate with your spouse or significant other and your children about finances. Keep the lines of communication open and discuss financial goals and spending styles.
- · Reduced income/same expenses - Too often we delay bringing expenses in line with a reduction in income for a host of good reasons and let debt fill the gap. The sooner you adjust to your new reality, whether it be temporary or permanent, the better off you'll be.
Prevention for credit card user
- · We should pay off whatever we can as soon as you can do it, so our balance not
grows exponentially as time passes.
- · We have to make sure you are also reading all of that fine-print that comes along with the agreement, because there could be hidden fees that we want to know about ahead of time.
- ·Being aware and being conscientious about our payment schedule are just a few little things that could keep us from adding to a debt we may have already created.
- · Don't ever use credit cards to reward yourself for a good day, or to fulfill a bad day by trying to cheer you up with a purchase.
- · Keeps our credit card spending to amounts that we know we can pay off, don't go over-board with unnecessary purchases, and budget how we plan on paying back our charges?
Friday, February 20, 2009
Corporate blogging: A new marketing communication tool for companies
Advantages of Corporate Blogging :
An effective way to hear what employees and customers have to say about the corporation. Organization can build its relationship with its customers and promote their products at the same time. Customer satisfaction can increase if the blogs are taken into account.Encourage communication and allow businesses more easily reach their customers, develop stronger relationships and brand loyalty with its customers Employee turnover may decrease if managers read what employees like and dislike. Even the quiet employees who never speak out will be heard.Allow employees to display their expertise on a particular topic, become an excellent way of sharing knowledge and showcasing the organization as having talent and expertise
Allow a positive way of getting feedback, and better understanding towards customers’ needs, as they react to certain pieces, suggest ideas, comments and etc
As compare to other communication strategies, blogging is relatively much more cheaper.
Disadvantages of Corporate Blogging :
Difficult to keep track of all the opinions.Managers will have a difficult time following up on all the opinions and comments.Corporate blogging is that blogs are usually not updated frequently, which does not build a good reputation for the corporation in the long run.People may use blogs to write negatively about the company which can lead to bad publicity.If a blog failed to comply with all applicable local, national and foreign requirements for doing business, it will lead to legal liabilities.
References:
http://en.wikipedia.org/wiki/Corporate_blog
http://360class.wikispaces.com/message/view/The+Essay/547110
Electronic Currency
The money screamed across the wires, its provenance fading in a maze of electronic transfers, which shifted it, hid it, broke it up into manageable wads which would be withdrawn and redeposited elsewhere, obliterating the trail. Nest of Vipers, a banking thriller by Linda Davies.
Reference:
http://projects.exeter.ac.uk/RDavies/arian/emoney.html
http://en.wikipedia.org/wiki/Electronic_currency
How to safeguard our personal and financial data?
- Do not leave any personal information or particularly passwords to anyone : After using any of the Financial Data Center, member services or in cyber cafe, must remember to log out properly before leaving.
- Complexity of password : any password to log in any personal information or financial data should as longer as possible and also make it more complex.
- Avoidance of password : password don't even use date of birth, pet name, nickname, and others that people easily know that related with you one.
- Software : install antispyware and antivirus software. For example, Kaspersky, Norton, Bit defender and 360 safe are mostly used by users nowadays.
Reference:
Monday, February 16, 2009
The application of 3rd party certification programme in Malaysia

By the coming of e-century, we know that internet is a part in our life. using internet is very common in this coming year. Certificate authorities is a digital certificate that provide verification to your website indeed represent your company. we know that one of the certificate authories is MSC Trustgate.com Sdn Bhd. It is a licensed CA in Malaysia which incorporated in 1999, under the Digital Signature Act 1997 (DSA). It offers complete security solutions for individuals, organizations, government, and e-commerce service providers by digital certificates, encryption and decryption.
MSC Trustgate was incorporated in 1999, the company need to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce. Both locally and across the ASEAN region. Besides, MSC Trustgate has 12 million i n paid up capital. Trustgate is licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development.
The MSC company commeitted to provide the fines Public Kep Infrastrutuew (PKI) to assist all assist all types of companies and institutions conducting their business over the Internet. The state of the art back-end infrastructure that costs RM 14 million is one of the best in the region.
TrustGate Vision
Security is the primary concern of entering into the new Internet economy. The ever-changing paradigm of e-commerce requires a well-mandated security infrastructure.
http://www.msctrustgate.com/
Monday, February 9, 2009
An Example Of An E-Commerce Failure And Its Causes

Sunday, February 8, 2009
Discuss how E-Commerce can reduce cycle time, improve employees’ empowerment and facilitate customer support
E-commerce is a type of business model than enable a firm or individual to conduct the business over global network, such as internet. It is widely used by individual and companies to expand and retain the attention of consumers due to the internet to perform business response efficiency with paperless and less costly.
E-commerce improves employees’ empowerment by giving authority to employees in dealing with process of capturing, researching and leveraging business information. Employees are able to access to more useful information through internet, intranet, and EDI. The employees even can work at home and can provide a quick response or feedback to the customers through the internet. 
Identify and compare the revenue model for Google, Amazon.com and eBay.



@@ GOOGLE was co-founded by Larry Page and Sergey Brin. They form as privately held company on 4 September 1998. They hypothesized that search engine that analyzed the relationships between websites would produce better ranking of result than existing techniques, which ranked results according to the number of times the search term appeared on a page and the system checked backlinks to estimate the importance of a site.
$$$ GOOGLE earning revenue from advertising related to its Internet search, e-mail, online mapping, office productivity, social networking, and video sharing services as well as selling advertising-free version of the same-technologies.
@@ AMAZON was founded in 1994 by Jeff Bezos and launched it on-line in 1995. the company began as an on-line bookstores named “CADABRA.COM” and it began largest “brick-and -mortar” bookstores and “mail-order-catalogs” for books might offer 200,000 titles, an on-line bookstores could offer more. Since 2000 Jeff Bezos renamed the company “Amazon”. Amazon logotype is an arrow leading from A to Z, representing customer satisfaction (as it forms a smile) and the goal to have every product in the alphabet.
$$$ AMAZON as a largest on-line retailer in the America. With nearly times the Internet sales revenue. Bookstores diversified to product lines of VHS, DVD, music CDs and MP3s, Computer Software, Video Games, Electronics, Apparel, Furniture, Food, Toys, etc. In 1999, Time magazine named Bezos person of the year, recognizing the company's success in popularizing on-line shopping. Now, Amazon.com Marketplace's main rival is eBay's half service and it began selling product under its own private label. In 2008 Amazon expanded into Film production and is currently funding the film The Stolen Child with 20th Century Fox.
@@ EBAY is an American Internet company that provide an on-line auction and shopping website in which people and businesses buy and sell goods and services worldwide. In 3 September 1995, the on-line auction websites was founded as AuctionWeb. The company officially changed the name of its service from AuctionWeb to eBay in September 1997. In November 1996, eBay entered into its first third-party licensing deal, with a company called Electronic Travel Auction to use SmartMarket Technology to sell plane tickets and other travel products. Now eBay has established localized websites in thirty other countries.
$$$ EBAY making revenue through the 3 Auction types. There are:-
Auction-style listings allow the seller to offer one or more items for sale for a specified number of days. Seller can establish a reserve price.
Fixed Price format allows the seller to offer one or more items for sale at a Buy It Now price. Buyers who agree to pay that price win the auction immediately without submitting a bid.
Dutch Auctions allow the seller to offer two or more identical items in the same auction. Bidders can bid for any number from one item up to the total number offered.
Monday, February 2, 2009
An Example Of An E-Commerce Success And Its Causes

Its causes of success are they know people like to get a bargain and they would like to negotiate a little bit over the price. And they also know people enjoying the hunt and the competition of the bidding process. Their auction format allows users to do so.
Beside of that, the great majority of people who are selling on eBay are really warm, decent, trustworthy and honest people. Therefore, a lot of people would like to do transactions at eBay.
And the last, eBay is the first example where a commerce site has actually been built around a society where people exchanging information and also goods, services and merchandise.
Reference:
ebay history - http://www.cs.brandeis.edu/~magnus/ief248a/eBay/history.html
The History And Evolution Of Ecommerce
There have been several key steps in the history of e-commerce.
- The first step came from the development of the Electronic Data Interchange (EDI). EDI is a set of standards developed in the 1960’s to exchange business information and do electronic transactions.
- The next major step occurred in 1992 when the Mosaic web-browser was made available, it was the first ‘point and click’ browser.
- The development of DSL was another key moment in the development to of e-commerce because DSL allowed quicker access and a persistent connection to the Internet.
- And then Christmas of 1998 was another major step in the development of e-commerce because that season AOL had sales of 1.2 billion over the 10 week holiday season from online sales.
- Following is the development of Red Hat Linux. Linux gave users another choice in a platform other then Windows that was reliable and open-source. So this force Microsoft to invest more such as electronice commerce to compete with Linux.
- Then is the Napster, Napster was an online application used to share music files for free. It make more people use ecommerce.
- In February of 2000, some major players of e-commerce such as Yahoo, eBay and Amazon were attacked by the hackers. The attacks represent the need to improve the security in the development of e-commerce.
So, ecommerce today is a remarkable experience. It has transformed traditional shopping beyond recognition. It is so much better than any other way of shopping that it has already attracted a great many of ecommerce-lovers.
Reference:
History of E-commerce- http://www.ecommerce-land.com/history_ecommerce.html
History of E-commerce- http://www.flysyk02.netfirms.com/Ecommerce/History.htm