~The Date~
Sunday, July 12, 2009
Review on a post on Legal from My Ecommerce Blog
Saturday, July 11, 2009
E-Government in Malaysia: Its implementation so far and citizen's adoption strategies.
Most of the e-government implementations of the project are currently in progress. The detailed objectives and status of each of the e-government implementation are:
Generic Office Environment (GOE)
It introduces a fully integrated, distributed and scalable office environment that leverages use of multimedia information technology. This will enable efficient communication, allowing collaboration across all workers, and ensuring right information reaching the right people in a timely manner.
Electronic Procurement (eP) Project
Its aim is to re-engineer, automate, and transform current procurement system. The project would cover central contract, tender, and direct purchase. The electronic procurement project has taken off the introduction of ePerolehan and can be accessed at http://www.eperolehan.com.my/.
Human Resource Management Information System (HRMIS)
This e-government project will provide a single interface for government employees to perform human resource function effectively and efficiently.
Project Monitoring System (PMS)
This system is one of the e-government projects that will create a mechanism to monitor project implementation throughout various government agencies and statutory bodies.
Electronic Services Directory (e Services)
This project is a pilot project that allows citizens of Malaysia to engage in transactions with government and utilities payments such as telephone and electricity bills, police summons, Road and Transport Department (RTD) services and others.
Electronic Labor Exchange (ELX)
It improves the mobilization of human resources and optimize work force utilization through systematic matching of job seekers to job vacancies.
E-Syariah
This project main objective is to improve the quality of service in Syariah courts.
Citizen’s adoption strategies
Government can make the advertisement through different ways in order to get the attention of the public and increase the people’s knowledge of e-government project and the availability of electronic services online. Besides that, the government also need to make sure the information provided to the users is always accurate, relevant and timeliness. The government also needs get the public confidence by securing the confidential information of the public. By increasing the customer satisfaction, the rate of e-government adoption will also increase.
A Discussion on E-learning offered in Malaysian Universities: Prons and Cons from the student perspective
There are more advantages than disadvantages of having E-learning for a student. Lets discuss this matter.
Advantages:
1. Save travelling time and cost
They can save time from travelling to an university to study. Travelling costs might be very costly.
2. Time flexibility
Student can get online resources, communicate with his tutor or class mates, send his query and write term paper at any time he can get access to the Internet.
3. Suite different level of students
Some students can adapt faster while some adapt slower. Students have the option to select learning materials that meets their level of knowledge and interest by using E-learning.
4. More Response
Students in a large classroom seldom response to the lecturer. Therefore, E-learning helps student to interact more with the lecturer.
5. Fewer penalties from non-compliance
For example, students have to sign their attendances and without doing that, they will be bar for taking final exams in UTAR. E-learning helps students that often skip classes from such penalties.
6. Disease
E-learning keeps students away from diseases such as SARS and H1N1. These disease is easily infect from human to human such as by flu or cough. om response to the lecturer. Therefore, E-learning helps student to interact more with the lecturer.
Disadvantages:
1. Low motivation
Students with low motivation often work slow and fall behind others. Besides that, the students also will late for the submitment of the assignment or other work.
2. Easy to get confused
Some students will get lost about course activities and deadlines.
3. Internet connections
Slow Internet connections or older computers may make accessing course materials frustrating
Managing computer files and online learning software can sometimes seem complex for students with beginner-level computer skills
4. May create sense of isolated
During the learning process, the students may feel they are alone with only their computer. This makes some of the students quite uncomfortable.
Sometimes, the managing computer files and online learning software can sometimes seem complex for students with beginner-level computer skills.
6. Required more time
The online environment is text-based. To communicate with the instructor and other students, the students must type messages, post responses, and otherwise communicate through typing. However, typing is slower than speaking. It seems learn more in an online environment, but it need to make a greater effort to accomplish that learning.
Friday, July 10, 2009
Corporate Blogging: A new marketing communication tool for companies
1) Leadership corporate blogs―in which particular person from company is thoroughly chosen for presenting company’s views on various aspects.
~For interacting with existing and potential clients.
Saturday, July 4, 2009
Causes and Prevention: Credit Card Debt
- What is credit card debt?
It’s happened when a credit card user bought items or services by using card system. Debt accumulated by adding some interest rate and penalties when the credit card user did not pay the credit card company for the money that he or she spent.
Causes of credit cards debt - Promotion: Every month, the credit card company will make promotion event to attract more people to subscript a new card. The most popular incentive is zero interest rate. Most of this incentive is only for the first month subscription. Once the special rate end, the interest rates shoot up. So, this made a small debt grow rapidly and becomes a huge debt.
- Spending: BIG SALES, MEGA SALES, STOCK CLEARING and DISCOUNT are common phrases that attract people to spend more. Although the consumer is not affordable to buy the product, the consumer will just can’t miss the promotion. At the end, they will just swap the card and buy that product.
- Missing payment: Most of the consumer did not plan their money usage. Firstly, they will use their cash to buy items. When they run out of cash, they will use their card without thinking are they able to pay? At the end of the month, the bills arrived at their home. They will have no more cash to pay it. They will just let debt accumulated and pay it next month PLUS some interest and penalties.
Prevention of credit card debt
- Only use cash to buy items or services. Stop spending when you are run out of cash.
- Budget your expenditure. List down all the necessary that you want to buy.
- Think before you buy. Buy it if you are able to pay the bill.
- Only use credit card for emergency.
- Clear all the outstanding debt and cancel the card that you are no longer use.
- Hold only one card. This can reduce risk card being stole.
Friday, July 3, 2009
Mobile payments systems in Malaysia: Its potentials and consumers' adoption strategies
There is a new and rapidly-adopting alternative payment method, which called mobile payment. With this method, a consumer can use a mobile phone to pay their payment without paying with cash, check or credit cards. Furthermore mobile payment also called as M-payment. Mobile Payment is paying for goods, services or makes transaction with a mobile device such as mobile phone, Smartphone, Personal Digital Assistant (PDA), or other such device.
Potentials
In Malaysia, the mobile payment system has been launched since November 2001. Thus, by using the M-payment, it can eliminate the hassle to queue up for the bills payments, pay the payments when urgently or lack of other payment instruments, support refund and reversal functions, and no minimum monthly transaction like credit cards and no merchant account required. Because of nowadays there are many mobile users in Malaysia; it will be an advantage for the system to be used.
Consumers’ adoption strategies
To promote the mobile payment system to the public, the system itself should be easy to be used. Make sure there is no too complicated function which can make the users confused. In order to maintain customer loyalty, the systems also need to have powerful security to secure the customer transaction information and give confidence to them.
The mobile payment system has provided convenient to public. Therefore, with the mobile payments system, the mobile users can save their time and costs when they want to pay their payments.
Thursday, July 2, 2009
The Application of pre-paid cash for consumers
Touch'n Go is a card that uses contactless smartcard technology. Users able to use it as long as it is pre-loaded with electronic cash. There are few places to reload the card which includes toll plazas, train stations, ATMs, Cash Deposit Machines with zero charges and Petrol kiosks , authorised third party outlets with RM0.50 charging fees.
Money is more valuable now than future.
Tuesday, June 30, 2009
Electronic Currency
Electronic currency means the money you use over the internet. Electronic currency trading means buying and selling of this internet money, allows its holder to buy the goods and the services that offered over the internet.
There are some of the electronic currency trading experts has stronglly suggested that beginners should start with only a few dollars so that they can first learn about electronic currency.
Electronic currency trading is versatility and convenience to the persons involved. Electronic currency trading market that best suit for your needs for anytime of day. The electronic currency trading business does not sleep at the night or day, the world is merely at your fingertips.
Thursday, June 25, 2009
The review on post on Internet Security from My E-Commerce blog
I experienced before that my email have been hacked.
Many of my friends actually experienced before. When we are offline, the hacker will use our account to spread viruses to other user stated that this website is exciting and good. Once the other user press on the website, the same thing will happen to them too.
1. Think some thing that other people don’t know such as when you bought your car.
For example: 123 kFc 659
Warning: Numerical like mobile phone number and birthday taken as password can be easily can be guess by third party. Password that is too long are easily being forgotton. So, choose your password carefully and wisely.
Phishing: Examples and its prevention methods
"Phishing = fishing + phreaking"
Phishing is a new type of network attack where the attacker creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) in order to attract user's attention to update and submit their personal secret information such as financial status, password data and so on to their service provides’ Web site.
The word ‘Phishing’ is initially emerged in 1990s. The earlyhackers have used ‘ph’ to replace ‘f’ to produce a new words in the hacker’s community. Phishing is a new word produced from ‘fishing’, it refers to the act that the attacker attract users to visit a faked website by sending them faked e-mails or instant messages, and steal the victim’s personal information such as user name,password, and national security ID, and etc.
They usually will attract users to visit their website to conform or modify your account number and password through the hyperlink provided in the e-mail.
Then, you will be linked to a faked website after clicking those links. The style, the functions performed, sometimes even the URL of these faked websites are similar to the real website. It is very difficult for you to know that you are actually visiting a faked website. If you insert the account number and password, the attackers then will successfully collect the information at the server side. This will enable them to access into user account and perform the next ation with those information.
Methods To Prevent Phishing Attack (such as Maybank and Public Bank cases mentioned above)
1) Never disclose any private information via internet even if you have received those emails from the bank.
2) Never respond to any phone call/ sms requesting your bank account details.
3) Never disclose your bank account details or Internet banking username and password to anyone
4) NEVER follow instructions from unknown parties to do banking transactions or make changes to your bank account details
In conclusion, users should take those methods to prevent phishing attack. It is because "PREVENTION IS BETTER THAN CURING"
Police alert!
Don't be a victim of phishing scams! Protect yourself from identity theft today..........
Wednesday, June 24, 2009
The threat of online security: How safe is our data?
Cases such as Phishing e-mail targets local Internet banking users, Edison Chen Photo Scandal, Company Laptop been Stolen and School Employees' Personal Data Stolen. These cases reflects that data could be stolen by different ways such as data theft, phishing and laptop stolen.
There are types of threats and attacks that are harmful to our data.
Beware of these threats and attacks as they are harmful to your data!
How to safeguard our personal and financial data
By using the user name and password, which is the most common ways that people use to protect their data. Nevertheless, the password used must be longer because it provides greater security than the shorter one. Not only that, we also should change our password frequently in order to avoid others stolen our password.
To protect against some virus that are very harmful to our computer, we have to install the powerful antivirus software which can be bought from the shop. We also can download the antivirus software from the Internet which is free of charge. Usually the antivirus software has the automatic update feature which provides the better protection from the new virus that popping up from the Internet.
The antispyware and firewall are both safeguard which are very important for us to protect our data. The antispyware can prevent the unauthorised users access into our personal date in our computer. Besides that, the firewall can prevent the hackers from hacking our data.
So, these are some of the safeguard that can protect our data from being misusing.
Thursday, June 18, 2009
The history and evolution of e-commerce
1990: Tim Berners-Lee writes the first web browser, WorldWideWeb, using a NeXT computer.
- 1991: commercial enterprise on the Internet was strictly prohibited. Although the Internet became popular worldwide around 1994, it took about five years to introduce security protocols and DSL allowing continual connection to the Internet.
- 1992: J.H. Snider and Terra Ziporyn publish Future Shop: How New Technologies Will Change the Way We Shop and What We Buy. St. Martin's Press. ISBN 0312063598.
- 1994: Netscape releases the Navigator browser in October under the code name Mozilla. Pizza Hut offers pizza ordering on its Web page. The first online bank opens. Attempts to offer flower delivery and magazine subscriptions online. Adult materials also becomes commercially available, as well as cars and bikes. Netscape 1.0 is introduced in late 1994 SSL encryption that made transactions secure.
- 1995: Jeff Bezos launches Amazon.com and the first commercial-free 24 hour, internet-only radio stations, Radio HK and NetRadio start broadcasting. Dell and Cisco begin to aggressively use Internet for commercial transactions. eBay is founded by computer programmer Pierre Omidyar as AuctionWeb.
- 1998: Electronic postal stamps can be purchased and downloaded for printing from the Web.
- 1999: Business.com sold for US $7.5 million to eCompanies, which was purchased in 1997 for US $149,000. The peer-to-peer filesharing software Napster launches. ATG Stores launches to sell decorative items for the home online.
- 2000: The dot-com bust. A lot of European and American business companies offered their services through the World Wide Web. Since then people began to associate a word "ecommerce" with the ability of purchasing various goods through the Internet using secure protocols and electronic payment services.
- 2002: eBay acquires PayPal for $1.5 billion. Niche retail companies CSN Stores and NetShops are founded with the concept of selling products through several targeted domains, rather than a central portal.
- 2003: Amazon.com posts first yearly profit.
- 2007: Business.com acquired by R.H. Donnelley for $345 million.
- 2008: US eCommerce and Online Retail sales projected to reach $204 billion, an increase of 17 percent over 2007.