Jun 30, 2009

Review on e-Tailing post





After reviewed the posts on the e-commerze blog i found that e-Tailing actually can be used by many industries and its provide convenience for the company and the users. For example, the ecommerce king, Amazon.com had move a step further in their online retailing by launching the text-message shopping (SMS Shopping) on 1st April 2008 which named TextBuyIt. Through this application, customer can buy the things they desired without using the computer. Customer just need to send the name of the product with its description or ID to 262966 using SMS. The confirmation will sent trough text messages and e-mail.






Other than purchasing items online, Opentable.com which dominat service is manage the reservation and improve customer services for over 7000 high-end restaurants which mostly located in New York and San Francisco. With this, reservation become very convenience for customers because it can be conducted on the non business hour beside it was being free. it also provide one click cancellation of the reservation.



The e-Tailing in Malaysia such as the Malayan Banking Berhad (Maybank) was the first local bank in Malaysia that introduce online banking. It has 3.6 million registered users of which 830,000 were active user. It also offered the online stock trading at its Maybank2U internet portal. This online trading portal was launched in 2000 has about 10,000 users. Customer who invest through can save up to 63% on their trading fees which enable them to breakeven their investment faster.




Furthermore, Malaysia's government also encourage the agriculture and handicraft industry to venture into online business to market their products and at the same time helps the industries become more competitive. For example, www.right.sarawak.gov.my/Rightmart which set up by the Sarawak Craft Council for the handicraft player to showcase their products and designs online. beside that, the fisherman in Tanjung Dawai also gone the internet way and auctioning their catches via e-mail. It was open to the bidders from all over the world to place their bids from 3pm to 7pm malaysian time everyday. This system was introduced in April with the help of the Malaysia Fisheries Development Board. This system benefited the fisherman as they could get the best deal through the auction.



Since e-Tailing can provide convenience for us but it also have a weak side on some industries. For example, Dell is famous for selling it PC and Laptop directly to their customer through the direct sales online which proved to be very successful business model. But recently, Dell had opened up their retail store in several countries such as Malaysia, Singapore, Australia and etc. This maybe because of the growth of PC sales had slowed down.
















Credit Card Debt: The Causes and Prevention

What is credit card? Credit card is a card that provides holder with credit to make purchases up top a limit fixed by card issuer( Eg: Visa and Master card).I believe this word or term is very common to all to all of us. Do you have credit card debt? This is something that can very easy get out of hand and credit card reduction should be something that you are always try to accomplish. There are some credit card causes and several suggested ways to prevent you overspend and get your debt under control:


Causes of Credit Card Debt:

1)Poor finance management: This is the most common reason why many people have accumulated credit card debt. This is because people are unaware to conduct a monthly spending plan and do not keep track of their monthly bills. Thus, they will not realize that they overspend snd lead to a rising in debt.

2) Unexpected unemployment and salary deduction: Due to the economy crisis and financial hit that happend around the world, many people are unemployed due to organizational downsizing. Moreover,some of the company have to deduct the employees salary to decrase the organization expenses. Households are forced to use the credit card for groceries, utilities and other expenses purpose to maintain their current lifestyle and some of them can't find the job in short period. Thus, this may cause rise in debt.
3) Gambling: Nowadays, gambling has become an entertainment activites in our daily life. It is hard to stop when it becomes addictive. Thus it will surely lead to a finacial disaster if boorowing money through creditcard for gambling.




4)Habit of purchasing branded goods: Some people are like to purchase the branded goods because they think that the branded goods will represent richness and status. Generally,most of the branded goods are very costly or expensive. Hence, it will lead to overspend.


Ways to Prevent Credit Card Debt:

1) Have a saving plan: This is key to help you to protect yourself from getting into debt. It is important to set a certain amount each month into a saving account. It can just be for general savings or you could set a goal to save up for a big purchase. Saving with a goal in mind motivates many people to stick to their saving plan. Then, at the end you will be able to purchase the desired object without going into debt.


2) Making a budget: You have to create a clear budget and stick on it that includes monthly bills, foods, clothes, entertainment and miscellaneous expenses will prevent from overspending and fall under deeper debt load.
3) Self control and discipline: One of the best practices is to have a direct set up so that able to pay back the full amount each month and use in emergencies. Hence, self control and discipline to keep these cards in wallet and would not overspend. Prevention is aware of the causes of credit card debt and start to spend less in order to stay with well in financial situation.

Jun 27, 2009

How to safeguard our personal and financial data












The topic we would like to discuss today is how to safeguard our personal and financial data?Nowadays, due to the technology advancement many people like to shopping and purchasing online,doing payment through e-banking and saving personal data in blog and website. They like to doing all the activities through online because it is convenient and time-saving. However, there will be some diadvantages of doing the transaction online such as the important or confidential information will be steal and unauthorized access by the other party. Therefore, we will suggest some ways to safeguard our personal and finacial data.


Ways to Safeguard our Personal and Financial Data:







1.Always using antivirus and antispyware software to protect your computer system-The users can using the antivirus software such as AVG and Avira antivirus software to scan and prevent,detect and remove malware, including Trojan horse,worm and virus

2.Create strong passwords- Do not create passwords that are weak or easy to guess such as your birthday or handphone numbers as passwords. You can create password that contain 12 characters that is hard to guess.


3.Do not disclose or reveal any personal or financial data to anyone- Avoid logging to your financial account in the public place such as Internet Cafe of coffeeshop that offer wireless because maybe the firewall do not strong enough.

4.Encrypt your important and sensitive files- Encryption is a process of scrambling a message or file in a way that difficuly for the unauthorized person to unscramble or read it.

5.Avoid open unknown or mystery files- Never open an attachment or click on a link that sent to us by unknown party. These attachments can contain virus that harmful to your computer system.


Jun 26, 2009

A review on a post on Internet Security from My E-Commerce blog



According to "My E-Commerce" Blog, the post of favourite password used online research done by Information Week on an analysis of 28,000 passwords from a popular website:

  • 16% uses name (yes, your own name, spouse or children)
  • 14% likes "1234" or "12345678" (easy and nice)
  • 4% uses "password" or "password1" (password = password)

Some other common passwords includes:

  • qwerty (English keyboard letters below the numeric keys)
  • hannah, pokemon, matrix, ironman (popular tv show stars)
  • iloveyou, ihateyou


In our opinion, a password is like a key to our home. If someone steals it, there are chances he/she will use it to steal something else. We use passwords everywhere in our life, but the life of an Internet user is absolutely impossible without passwords: e-mail, online discussion groups, e-bank, commercial websites - all of them use password-based authentication.

Create a Strong PASSWORD !
Do's:
  • Combine letters, symbols, and numbers that are easy for you to remember and hard for someone else to guess.
  • Create pronounceable passwords (even if they are not words) that are easier to remember, reducing the temptation to write down your password.

  • Try out using the initial letters of a phrase you love, especially if a number or special character is included.

  • Take two familiar things, and then wrap them around a number or special character. Alternatively, change the spelling to include a special character. In this manner, you get one unfamiliar thing (which makes a good password because it is easy for you and you alone to remember, but hard for anyone else to discover).

Examples:

"Phone + 4 + you" = "Phone4you" or "Fone4y0u"
"cat + * + Mouse" = "cat*Mouse" or "cat*Mou$e"

Don'ts:

  • Don't use personal information such as derivatives of your user ID, names of family members, maiden names, cars, license tags, telephone numbers, pets, birthdays, social security numbers, addresses, or hobbies.
  • Don't use any word in any language spelled forward or backward.

  • Don't tie passwords to the month, for example, don't use "Mayday" in May.

  • Don't create new passwords that are substantially similar to ones you've previously used.








The threat of online security: How safe is our data?

There have two major types of attacks- nontechnical and technical.



Nontechnical attack is an attack that uses chicanery to trick people into revealing sensitive information or performing action that compromise the security of a network. Example of nontechnical attacks are pretexting, social engineering.


Social engineering that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network. For example, they will persuade employee to get passwords to access the company internal information.

At a high level, social engineering attacks are Web 2.o. As more users take adventage of Web 2.0 application like social networking sites, blogs, wikis, and other crinimals are going to exploit them.

Phisihing is a broadly launched social engineering attack in which an electronic identity is misrepresented is an attempt to trick individuals into revealing credentials.


Prevention of social engineering

In order to stop social engineering attacks is depends on the victims. Certain positions within an organisation are clearly vulnerable , such as those has private access and confidential information. The company can provide training that all users should learn how to avoid becoming a victim of manipulation. Other ways to prevent is to develop specific policies and procedures.

  1. Education and training

  2. Policies and procedures

  3. Penetration testing

Technical Attacks- An attack perpetrated using software and sysem knowledge or expertise.


1. Denial of service ( DOS) attacks

--- attacker gains illegal administrative access to as many computer on the internet as possible and uses these multiple computer to send a flood of data packets to the target computer.


2. Virus
-- A piece of software cade that inserts itself into a host, including the operating system, to propagate, it requires that its host program be run to activate it.


3. Worm

--A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.


4. Trojan horse

--A Trojan horse, or trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system.




How computer viruses work


Jun 25, 2009

Phishing: Examples and its prevention methods

What is PHISHING ?


Phishing is act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
One example would be if you received an e-mail that appears to be from your bank requesting you click a hyperlink in the e-mail and verify your online banking information. Usually there will be a repercussion stated in the e-mail for not following the link, such as "your account will be closed or suspended". The goal of the sender is for you to disclose personal and (or) account related information. This type of e-mail scam is also called
Phishing.




How to Spot A PHISHING Scam ?


Phishing e-mails will contain some of these common elements: (view screen capture above from Eudora)

1. The "From Field" appears to be from the legitimate company mentioned in the e-mail. It is important to note, however, that it is very simple to change the "from" information in any e-mail client. While we're not going to tell you how, rest assured it can be done in a matter of seconds!

2. The e-mail will usually contain logos or images that have been taken from the Web site of the company mentioned in the scam e-mail.

3. The e-mail will contain a clickable link with text suggesting you use the inserted link to validate your information. In the image you will see that once the hyperlink is highlighted, the bottom left of the screen shows the real Web site address to which you will go. Note that the hyperlink does NOT point to the legitimate Citibank Web site URL.
In this instance, the text you click is "here", However, this may also state something like "Log-in to Citibank" or "www.citibank.com/secure" to be even more misleading. This clickable area is only text and can be changed to anything the sender wants it to read.

Additionally, you may spot some of these elements that did not appear in this particular scam:
Logos that are not an exact match to the company's logo, spelling errors, percentage signs followed by numbers or @ signs within the hyperlink, random names or e-mail addresses in the body of the text, or even e-mail headers which have nothing to do with the company mentioned in the e-mail.




Example of PHISHING

An example of a phishing e-mail, disguised as an official e-mail from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy. Such mistakes are common in most phishing emails. Also note that although the URL of the bank's webpage appears to be true, it actually links to a phisher's webpage

Prevention of PHISHING

The golden rule to avoid being phished is to never ever click the links within the text of the e-mail. Always delete the e-mail immediately. Once you have deleted the e-mail then empty the trash box in your e-mail client as well. This will prevent "accidental" clicks from happening as well. If, for some really odd reason you have this nagging feeling that this could just possibly be a legitimate e-mail and nothing can convince you otherwise, you still need to adhere to the golden rule and not click the link in the message. For those truly worried that an account may be in jeopardy if you do not verify your information, you need to open your Web browser program of choice and type the URL to the Web site in the address field of your browser and log on to the Web site as you normally would (without going through the e-mail link as a quick route). This will provide you with accurate information about your account and allow you to completely avoid the possibility of landing on a spoof Web site and giving your information to someone you shouldn't.



Video: Identify Theft Phishing

The Application of 3rd Party Certification Programme In Malaysia



MSC Trustgate.com Sdn Bhd is a licensed Certification Authority (CA) operating within the Multimedia Super Corridor. MSC Trustgate was incorporated in1999 and is licensed under the Digital Signature Act 1997 (DSA), to meet the growing need for secure open network communication and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region. Trustgate's core business is to provide complete security solutions and leading trust services such as digital certification services, including digital certificates, cryptographic products, and software development which are needed by individuals, enterprises, government, and e-commerce service providers.

Nowadays we are living in a world which moving towards more and more virtual. Through the Internet people can do almost everything they wish such as online shopping, pay bills, online reservation, banking and so on which make our life easier. But there still have many people feel unsecured to sending or receiving sensitive information through online due to the increasing numbers of phishing cases. Thus, Secured Socket Layer(SSL) is the best solution to build user's trust through getting an SSL certificates for the relative website. Verisign is the leading SSL Certificate Authority.
Secure Socket Layer (SSL) is a technology developed by Netscape and adopted by all vendors who are offer the product that are related to web software for the exchanges between client and server. The essential functions of SSL is mutual authentication, data encryption, and data integrity for secure transactions. SSL certificate is an electronic file that enable secure confidential communications and identifies indivviduals and websites on the internet uniquely by serving as sort of a digital passport. It is possible to verify someone's claim that they have the right to use the key in order to prevent other people form using the keys to impersonate others users and ensure the involvement of all parties in a transaction with a complete security solution.

Certification Authority (CA) is a trusted third party. It must take steps to establish the identity of the people or organization to whom they issue the ID. Authentication is ensured when certificate is issued once establish with its organization's public keys and signs with Certification Authority's private key. Verisign SSL Certificates is the public encrypted key that Webmaster sends to CA which is a standard part of most web server and web browser packages when works in conjunction with the SSL technology. Verisign will review the credentials and check through all the background of organization to ensure that the claim of organization before issuing any server certificate. The browser will verify its business purpose through ID automatically when browser connects to a legitimate site with Verisign SSL Certificates. After that, information received by Web visitor is identical to encryption between browser and server and no modification is taken place.


Thus,the certification from 3rd party is needed to ensure the user's information traveled over the internet and reach to their destination safely. It can avoid our sent information being spammed, hacked and attacked by the macilious software such as virus, worms and trojan horse. In addition, the confidentiallity of customers towards the internet activities will be enhanced so that the implementation of 3rd party certification can improve customer's trust.

Jun 19, 2009

The history and evolution of E- Commerce

What is E-commerce?



E-commerce(EC) is the process of buying , selling , transfering , or exchange product, services, information via computer networks, including the internet.



The Evolution of E-Commerce



E-Commerce were first developed in the early 1970s with innovations like:




Electronic funds transfer (EFT) - funds can be routed electronically from one organization to another.

Electronic data interchange (EDI) – used to electronically transfer routine documents, which expanded electronic transfers from financial transactions to other types of transaction processing.

Interorganizational system (IOS) – a system which allows the flow of information to be automated between organizations in order to reach a desired supply-chain management system, which enables the development of competitive organisations.




Evolution event of EC


1984
EDI, or electronic data interchange, was standardized through ASC X12. This guaranteed that companies would be able to complete transactions with one another reliably.

1992
Compuserve offers online retail products to its customers. This gives people the first chance to buy things off their computer.

1994
Netscape arrived. Providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer.

1995
Two of the biggest names in e-commerce are launched: Amazon.com and eBay.com.

1998
DSL, or Digital Subscriber Line, provides fast, always-on Internet service to subscribers across California. This prompts people to spend more time, and money, online.

1999
Retail spending over the Internet reaches $20 billion, according to Business.com.

2000
The U.S government extended the moratorium on Internet taxes until at least 2005.

2004
Web 2.0 was coined by O'Reilly Media to a supposed second generation of Internet based services that let people to collaborate and share information online in perceived new ways- such as social networking, wikis, communication tools and folksonomies.





Video : Evolution of E-commerce

An example of an E-commerce failure













A failure E-commerce Business- kozmo.com

Nowadays, many company and businessmen have conducting businesses through e-commerce. There are many successful company that generate profit and receive recognition through e-commerce such as e-bay,Amazon and Dell Corporation. Although there are many company that success through doing business online, there are some example of failure such as e-toy.com and kozmo.com.


Kozmo.com was a venture-capital driven online company that provide free one hour delivery of anything from DVD rentals to Starbucks coffee in United States. The founders of Kozmo.com were young investment bankers Joseph Park and Yong Kang in New York City.


Kozmo.com had a business model that promised to deliver small goods free of charge, typically by using bicycle messengers. Its headquarters were located in New York City. The company raised about $250million, including $60 million from Amazon.com and $28 million from a group of investors which included Flatiron Partners, Oak Investment Partners and Chase Capital Partners.



Factors of Failure:

Kozmo.com had raised more than $250million, but the company was unable to generate enough revenue to cover its costs. In 1999, the company had $3.5million revenue, compare to $26.4 million losses. The problem occurred when its business model included offering a costly delivery home delivery service for free. This offer covered a very small order such as DVD and pack of gum which it was impossible to turn a profit. As a result, it made the customer satisfied and excited, but it drew losses to the company. Although Kozmo.com was profitable in four cities, there were seven more cities that made losses.




















Real world case: Google is changing everything







Google has created services and tools for the general public and business environment alike; including Web applications, advertising networks and solutions for businesses.Google is known primarily for its search engine and its related targeted advertising tools. In my opinion, Google had make our life and work become more easier and we can accomplish our tasks in more effective and efficient ways. Nowadays, Google had organize the world's information and make it universally accessible and useful to the users.



Google had offered several free Web-based application that enable people to organize their own information and make it more easily accessible to others via the Web. Users can sort data and take advantage from those applications. Google also had entered the enterprise market by providing search technology to larger organizations. An enterprise search software had launched to enables the enterprise specific content across the enterprise to be indexed, searched, and displayed to authorized users. This technologies had solved the crucial problems of many large enterprise which is wish to improve their filling system and contact with their business partners.


In my opinion, Google still can work hardly and try to expand their services more widely in order to fulfill the needs of different levels of target markets. By keep on being innovative and creative can make Google become a more well known and successful




Jun 18, 2009

An example of an E-Commerce success and its causes








Jeffrey Preston Bezos (born January 12, 1964) - the American founder, president, chief executive officer and chairman of the board of Amazon.com




Amazon.com has a leading edge in the e-commerce world. It has a strong customer base, name recognition, quality assurance, and immense inventory. The ease of use over the Internet has been an important facet Amazon has focused on; more specifically their "1-Click" feature of their web-design allows quick and easy use of their services.


What are the critical success factors of Amazon.com?

Differentiation

Amazon.com is more than just a bookstore. It delivers author interviews,
customer book reviews, pre-release information and out-of-print books by special order. Back office systems and cookies deliver personalized book recommendations to shoppers who have purchased books from Amazon.com. A book recommendation agent tells the prospective buyer "Customers who bought this book also bought:". In all these cases information about the customer and information technology are being used to enhance the customer experience.


Price Differentiation

Amazon differentiates itself mainly on the basis of price and by making sure that it offers the same quality products as any other company with a noticeably lower price. In addition, sellers do not pay any fees for product listing and it cost nothing until the product is sold.


Personalizing Website

Amazon greets customers personally when they open the sites and gives them a choice of products that matches their personal preferences.






















Video : Amazon.com 's Warehouse

Identify and compare the revenue model for Google, Amazon.com and ebay

Google revenue model mainly is based on advertising. For year 2006, google generated US$ 10,492 billions in advertising and US$112 millions in licensing and others. One of the google revenue model is from Google AdWords.

Google AdWords is a pay per click advertising program of Google designed to allow the advertisers to present advertisements to people at the instant the people are looking for information related to what the advertiser has to offer.

For example:




Amazon.com also is one of the most successful e-commerce providers in which its revenue model are mostly generated from transaction fees, affiliate fees and subscription fees. Amazon started as an online bookstore, but soon diversified its product lines from DVD to food.
They also have to rate the product on a rating scale from one to five stars. Moreover, the users are allows to comment on reviews. The key successful of Amazon.com is online shopping. This is the example of Amazon.com homepage.







For eBay, is an online auction and shopping Web site in which people and businesses buy and sell goods and services worldwide. Ebay allow people to bid any time any where, this convenience has increase the number of bidders. It also owns PayPal, Skype, StubHub, and other business. Thus, it has various types of revenue models included advertising fees, affiliate fees and other revenue sources but it main revenue model is from online auction and online shopping.







Refences :
E- commerce site : Revenue model of Google, Amazon and eBay