Sunday, February 22, 2009
I think that legal is a most popular issue to talk about over the internet. Currently more and more illegal material such as mp3, rmvb movie, games and other stuffs. Many industries such as entertainment industry they have spend so much money to get rid of the illegal material in over the internet. For example , currently company like SONY had just come out new playstation portable “PSP” version 3000 where it cannot play illegal games. This is because the previous version “PSP 2000” can play illegal game crack by the hacker. This make the company have spend a lot of money in the research and technician side.
I hope that for Malaysian government will do something about the legal or illegal thing. Or maybe can come out a law to protect our industry.
I have review a local e-commerce cite www.lelong.com.my. It was a malaysia very own e-commerce site. When I click in the site on the first time, I realize that many advertisment and link on the webpage, I wondering how many income generate from those link and advertisment.(= =)
Other than that, I saw many auction items on the web page and sort by category. Sort by buying, selling, superbid, pay, safetrade and other. After this, I try to register as a member of this site. It is free for register as a registered member, you need to give your email address and password and your full name for the first step, the second step need some further information like handphone number , home address and identity card number. To complete the registration, you have to verify your email address and handphone number. For furhter member registration you have to verify your identity card but I did not do so because for further membership have to paid subscription fee.
However, verify member can use a feature payment system of lelong called safetrade,this may be one of the method the site use to build consumer trust. I have check the system about how it's work. Is something like this, when a buyer and a seller agree the term of trade, the buyer give money to lelong account, and lelong admin will inform seller to ship good . After ship good, payment will give to the seller. Lelong act as an intermediate person, for sure this will increase the security of the site.
Other than that, I also check about the charges on posting, there are several types of posting, normal posting is free while rest of it is charge for certain portion. I think this local e-commerce site have a quite sucessful site in Malaysia. I am glad that our country have such a great e-commerce site.
For more information you can log on to www.lelong.com.my
Saturday, February 21, 2009
The blog give the corporate can direct communicate with the consumer wherever there are.
Corporate blog can be:
· Tool that helps the organization fulfill a business goal – the organization can show whatever product to attract more consumer.
· Customization: to customize your blog it’s as easy as uploading a template in some cases. The blogger allows you to change almost the whole template with the exception of keeping the same look. If you know HTML, there is a lot you can do with the customization process. Some more can show the type of product.
· Feed Reader: By having a RSS feed, a lot more people can access your website. They can set-up your website in their FeedDemon account, which people will receive automatic updates on your blog. They can even comment on your posts!
Risks for Corporate Blogs:
· Legal Liabilities. Aside from lawsuits, there is the law itself. Corporations must make sure a blog complies with all applicable local, national and foreign requirements for doing business. Its author must also consider things like consumer protection laws, truth in advertising provisions, and intellectual property laws (such as plagiarism).
· Negative Comments. Companies are often very sensitive to criticism, especially if it appears in a format that is sanctioned by them. Negative comments can be offset somewhat with a consistent and clear comment.
AS a conclusion, I think that having a corporate blogging can bring the organization more benefit in future.
Friday, February 20, 2009
- Try to understand as much as possible about how an online auction works, what are the
buyer's obligations and what are seller's obligations before placing a bid.
- Become familiar with the auction website by looking into the websites protection policies.
You should never assume that you are protected from any auction fraud.
- Beside familiar with the website, you should also learn as much as you can about the seller.
Checking the seller's feedback at the auction site could be a good way. Avoid doing business
with the sellers if you cannot find out anything about them.
- Do not use an escrow service that you have never heard of if you cannot confirm the
legitimacy. If the seller wants you to use an escrow service that you have never heard of,
look into it. Check out the website or call up customer support.
- Use an online escrow service that will hold the payment until you can inspect the
merchandise. Auction sites such as Yahoo, eBay maintain lists of these services.
- Do not give out your personal data such as identity number, drivers license number, credit
card number, or bank account information until you have thoroughly checked out the seller
and the escrow service.
- Always use a credit card for payment. Credit card payment protects the buyer because you
can dispute the charges of the goods are misrepresented or never delivered. If you suspect
fraud, cancel the card immediately.
- Keep a habit to save 100% of the transaction information.
Related Articles: How to prevent e-auction fraud and how to avoid online auction fraud
Sunday, February 15, 2009
Malaysians can now enjoy a secure and convenient way to conduct mobile commerce using a GSM cellular phone. Electronic money, the country's first mobile payment service via multi-channel access for Internet. In Malaysia, mobile payment is recently services developing fast. This service is effective providing customers with admission or money off vouchers which can be unique coded or designed to allow viral spread. The mobile channel can be effectively used as a self-funding and revenue generating medium. This service covers all mobile operators on Malaysia; it’s for prepaid and postpaid service billings. mobile payments available in Malaysia are mobileExec and Mobile Money. Besides MobileExec and Mobile Money, many other companies are also coming up with this concept to cater for their customer’s convenience. For example, Maxis; U mobile, Digi and CELCOM.
Potential of Mobile Payment System
· The wide use of mobile phone made mobile payment much easier to be adopted.
· Consumers are more comfortable with low-value transaction over such non-traditional.
Consumer adoption stractegic.
In Malaysia, most of company will:
Reward the consumers by giving gift at certain level of purchasing or giving redemption of reward.
Certain service or good purchase will accumulated the points to redeem other extra bonus.
Provide information and education for consumers about the mobile payment system, help them build confident among consumers by enhancing its system security.
Collaborate with more banks and companies to widen the ability to pay via mobile.
Electronic currency also allows its holder to buy the goods and services that the vastness of the internet offers. An e-currency system may be fully backed by gold (like e-gold and c-gold), non-gold backed, or both gold and non-gold baked (like e-Bullion and Liberty Reserve).
The main focuses of electronic currency is to development that are being able to use it through a wider range of hardware such as secured credit cards and linked bank accounts that would generally be used over an internet means, for exchange with a secure micropayment system such as in large corporations for example like paypal, it is the most successful e-currency website that give 100% trust to consumer shop in internet.
This electronic currency can bring many negative issue such as doing the money laundering where the illegal money transform into legal money. Next it also there are also a potential macroeconomic effect such as exchange rate in a not stable ways and shortage of money supplies.
Saturday, February 14, 2009
A prepaid card is appealing to those who has a poor credit rating or a history of bad debt who cannot get a credit card. People, who although earning but cannot obtain credit due to having no credit footprint, also can apply a prepaid card. Parents can use it to The uses of a prepaid card includes:
- Buying groceries and petrol
- Internet shopping including eBay
- Withdraw cash from an ATM
- Paying bills
- Topping up your mobile phone
- Transferring money to friends and family either in the UK or overseas
- As a replacement for travellers cheques ot travel cash
Visa prepaid cards such as Visa Gift Card, Visa Buxx, Visa Reloadable Prepaid Card provide easy, convenient and secure ways for users to pay anytime at anywhere. It helps to manage your finance as you can spend only what you load on the card. It is also very convenient for travellers and no need to carry large amount of cash with them because they can use the Visa prepaid card at any of the merchants that accept Visa worldwide Visa Buxx is a useful tool for parent to monitor their teen's spending. It offers teens spending independence and to learn to take financial responsibility.
Touch 'n Go(TnG) smart card is used by Malaysian for electronic payment system at all highways in Malaysia, major public transports in Klang Valley, selected parking sites and theme park. It is expanding its business to retail purchase by starting with fast food industry that enables consumers to buy dough nut, burger or fast-food from 21 outlets such as Burger King, 7-Eleven, Dunkin’ Donut.
Nowadays it seems that credit cards are almost a necessity, rather than a luxury, which has caused many people to have a huge problem with credit card debt. Many people now have more than one credit card with a balance and you may even be one of those people. A credit card is exactly what the name implies. It is a card which you are able to use by borrowing on credit. You are borrowing money from the issuer every time you use it. Each time you use your credit card, you are increasing your debt.1. Poor money management
A monthly spending plan is a useful tool for everyone. Without one, you have no idea where your money is going. You may be spending unnecessarily and end up having to charge purchases on which you should have spend that money. This will lead to a rise in your debt.
People who are experiencing under employment may continue to think of it as only temporary or if they are coming off unemployment feel a false sense of relief. They may start to spend on their credit card again. This will eventually increase their card debt.3. Saving too little or not at all
If you have been preparing for unexpected expenditures by saving three to six months of living expenses, you will not have increased your debt caused by a job layoff, illness or divorce.4. No money communication skills
Communicating with your spouse or significant other and your children about finances helps to reduce card debt. Many people find out that their spouse have racked up thousands dollars in credit card debt and they had no idea that the accounts even existed!
5. Financial illiteracy
Many people do not have an understanding how money works and grows, how to save and invest for a rainy day. Schools don't teach it, your parents may not have explained it. But, you are responsible for your life and your money anyway.
It’s time for you to think of a solution to avoid from credit card debts and be responsible to your life and money ^^
1. Setting a budget
Set up a budget and stick to it. You should be realistic about your expenses and your financial needs. You wouldn’t realize how a detailed monthly plan really helps to ease your financial situation.
You may want to contact your credit card company and try to work out a payment plan. They would rater lower your interest or write it off altogether than not get any money from you at all.
3. Self control and discipline
If your spending habits are not controlled, this will cause debt to increase even faster. What started off as a small balance will rapidly becomes a large amount that can seem impossible to pay off. Hence, it is essential that you have self control over your spending.
One should have self-awareness of the causes of credit card debts and spend wisely ^^
Monday, February 9, 2009
Choosing this title give me a hard time to understand the certificate (phew). Finally, I have some understand on what is third party certification program. First, let me explain what is certificate. Certificate always refer to digital identity certificate or public key certificate. Let me tell you how this things work, certificate mostly is refer to 2 keys, public and private key. What those key for? Let me give you an example to make it more clear, when we send a secure message to somebody, we need a key to encrypt the information the key in this area is called a public key, and we need a private key to decrypt this data. However, the other user on the net maybe will develop a similar key that will be a threat of security. Therefore, we need a third party, certification authorization (CA), to secure their information.
How CA do that? CA will keep the public key of the parties who trust him and make a higher level encryption, when a party want to send a message to another party, CA will match the public key to allow the 2 parties having the right encryption that can be decrypt by their own private key.
Sound like very hard to understand right? I also use a lot of times to understand it (= =). The application of third party certification program in
Sunday, February 8, 2009
There are some threats of online security.
1.Computer viruses: A computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
2.Trojan Horse: This is program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike the virus, Trojan horse does not replicate itself to other computer.
3.Unauthorized access and use: unauthorized access is the use of computer or network without permission. It includes a variety of activities, for example an employee tracks down the employee e-mail messages, or gaining access to a bank website to perform an unauthorized transfer.
4.Software Theft: this is another threat to security, software theft occurs when someone steals software media or program. And then they will so some software piracy or illegal copy to market.
Here are some safeguards
1. Firewalls: a firewall is hardware or software that protects a network’s resources from intrusion by users on another network such as the internet. All networked and online computer users should implement a firewall solution.
2. User name and password: is a unique combination of characters that identifies one specific user. It allows access to certain computer resources.
3. Encryption: this is the process of converting readable data info unreadable characters to prevent unauthorized access.
4. antivirus software: this is the software that can scan through out the computer and delete all kind of viruses.
Business and home users must protect, or safeguard, their computer from breaches of online security risk.
Saturday, February 7, 2009
Here are some simple safeguard
1. Use a username and password wisely: While you want to choose something you will remember, you don't want it to be something that a clever thief could figure out just by learning your birth date or IC number. A combination of uppercase and lowercase letters, numbers, and symbols will offer you more security.
2. Use a credit card with a small limit: for mail-order and online purchases. It's all too easy for a dishonest sales clerk to use your credit card information. If the card you use for these purchases has a low credit limit, at least thieves won't be able to rack up many bills before hitting a wall.
3. Review your monthly statements: always always check the credit card statement and make sure that the transaction is use my you and not other.
4. Delete cookies: when ever after you use the computer, you must always delete the cookie, these cookie can track down the username and password.
5. Install antispyware and antivirus software: Symantec, Norton and Avg antivirus are popular software use by computer users. Its clean computer and protect personal information, financial data and etc.
Finally, I hope that all the website user or the staff of the website should have some ethic and morale value.
Hi, it's blogging time again ^^ Are you familiar with the word "Phishing"?? It's not "Fishing", an activity that you sit by the river bank and wait for the fishes to eat your bait. But, it has a similar meaning. It is a technique used to steal your valuable personal data, such as credit card numbers, passwords, account data. using fraudulent e-mail messages that appear to come from legitimate businesses.
Phishing is the biggest and might be the most common threats that an online might have experienced nowadays. Phishing can in form of electronically, commonly through e-mail or instant message, or through voice phone calls, text messages, and other electronic communication methods. Here are some samples of phishing e-mail.
These mails are sent to targeted users under well known or trusted websites such as PayPal, eBay and banks. Some e-mails' contain information that threatening the users that their account would be suspended or terminated if they do not re-enter their information. Some users might started to worry and followed the instructions to re-enter their information. Once users responded to the those e-mails, users' sensitive information such as credit card numbers, bank account data, passwords will be stolen. Users may not only just leak out their personal information but also suffered from financial losses.
As there are lots of phishing e-mails on the internet, preventions should be taken by the internet users to keep track from the scam. Online users should be smart and be suspicious of any e-mail with urgent requests for personal financial information. We should not use the links in an e-mail or instant message if they suspect the message is a phishing scam. Instead of using the link provided if we suspect that the message if we do not know the sender or user, we might log on to the company's website by typing in the web address directly in our browser or directly call up. We should also avoid to fill out forms in e-mail that ask for personal financial information. Regularly check on the bank, credit and debit card statements to make sure there is no suspicious or unrecognized transaction is carried out.
Education may play a role in preventing ourselves to fall into those phishing scams. If we are educated with the knowledge to detect a phishing mail or website and how to securely access website, a lot of phishing attacks will not succeed. There are lots of information online which teach users how to identify phishing mail and site. A lot of companies and anti-phishing organizations also provide security tips and advises on preventing phishing scams. The most common way to prevent a phishing attack is via phishing software.
There are many products in the market and many of them come in or are included in anti virus and anti spam software. The program will filters our incoming emails, searching for any content within the message or in URLs that may be phishing related or carry phishing software.
Monday, February 2, 2009
I am sure you all hear about Amazon.com but how many of you got visit this website and really get use on it, I think not many. Wondering why this websites so successful and earning money? Based on the evidence from this websites, I find out the revenue model of Amazon.com is based on its affiliate fees.
Amazon.com provides a platform for “home consumer” to choose their preferred products on Amazon.com that produce by other producers. This will be good news for those consumers far away from town and doesn’t like travel. However, to have a competitive advantage on this kind of e-business, Amazon.com must have many types of products to satisfy those customers from whole world.
Lastly, come to the websites that appear in “Transformer”, eBay. What is the different between eBay and Amazon.com? The mainly different is eBay is platforms for consumer trade with consumer, unlike Amazon.com eBay just provide a platform let consumer bids consumer products. What did eBay earn? eBay revenue model is based on the transaction make by the consumer. In other word, eBay earning the transaction fees on the transaction makes.
I am surprise how amazing of e-commerce to earn money on such a creative way, I may be a next Google(XD). Please visit my ads---->.
Sunday, February 1, 2009
According to Heather Dougherty, an analyst with e-commerce research firm, Toysmart.com failed to build a unique brand that would keep parents coming back among the competition from other online toy retailers such as Smarterkids.com and zainybrainy.com. Unlike Smarterkids.com which is using customization, Toysmart failed to bring something unique, such as customized shopping. Besides that, Toysmart suffered from increased competition and a slumping market. Toysmart was under the pressure from giants Amazon.com, etoys and toysrus.com, which have wider toy selections.
For the last 30 years, electronic commerce is use to buying product or services in the internet. Businesses were using primitive computer networks to conduct electronic transactions . Using something called Electronic Data Interchange (EDI). But in 1979, the American National Standards Institute (ANSI) came up with something called ASC X12, a universal standard for sharing business documents over electronic networks.
By the early 1980s, individual computer users, still mostly at major research universities, were sending e-mails, participating in newsgroups, and sharing documents over networks.
Perhaps it is introduced from the Telephone Exchange Office, or maybe not. The earliest example of many-to-many electronic commerce in physical goods was the Boston Computer exchange, a marketplace for used computers launched in 1982.
CompuServe was one of the first popular networking services for home PC users, providing tools like e-mail, message boards and chat rooms. In the mid of 1980s, Computer serve added a service called the Electronic Mall. While, the Electronic Mall was not a huge success, it was one of the first examples of e-commerce as we know it today.
In 1990, a researcher named Tim Berners-Lee at the European Organization for Nuclear Research proposed a hypertext-based web of information that a user could navigate using a simple interface called a browser. He called it the "WorldWideWeb” and in 1991, the National Science Foundation lifted a ban on commercial businesses operating over the Internet, paving the way for Web-based e-commerce.
In 1993, Marc Andreesen at the National Center for Supercomputing Applications (NCSA) introduced the first widely distributed Web browser called Mosaic. Netscape 1.0's release in 1994, when Netscape arrived, it providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layer.
In 1994 and 1995, the first third-party services for processing online credit card sales began to appear. First Virtual and CyberCash were two of the most popular. Also in 1995, a company called Verisign began developing digital IDs, or certificates, that verified the identity of online businesses. Soon, Verisign switched its focus to certifying that a Web site's e-commerce servers were properly encrypted and secure.
The Evolution of E-Commercealthough it may seem like it sometimes, the realm of e-commerce did not actually spring up overnight. Many of the things that we now take for granted, conveniences such as shopping carts and one-click ordering, and readily accessible services such as PayPal it evolved a lot through trial and error. In just a little over a decade, online shopping has changed the concept of commerce, for the owners of online stores as well as for the customers.
E-Bay is one of the example of an E-Commerce success. E-bay is a well known online auction site around the world and it was founded in Pierrer Omidyar’s San Jose living room back in September 1995 which has around 14 years of history. It was from the start meant to be a marketplace for the sale of goods and services for individuals.
E-bay attracts hundreds of millions of people everyday to explore new opportunities and innovates together. It uses internet to provide better global commerce, payments and communications.
E-Bay has built an online person-to-person trading community on Internet, using the World Wide Web. Buyers and sellers are brought together in a manner where sellers are permitted to list items for sale and the buyers are allowed to bid on the items which they are interested on. All eBay users can browse through listed items in a fully automated way. The items are arranged by topics, where each type of auction has its own category. They are having both streamlined and globalised traditional person-to-person trading. Their facilities are easy for the buyers to explore and enable the sellers list an item for sale immediately within minutes of registering. The binding contract of the auction is between the winning bidder and the seller only.
According to the interview with the spokesperson of eBay, Kevin Pursglove, he believes that people really enjoy the experience of the shopping bazaar. He also thinks that the buyers are enjoying the hunt and the competition of the bidding process. Everybody likes to get a bargain and they would like to negotiate a little bit over the price. Their auction format allows users to do so.
Besides that, customers benefit from its website with simple design and navigation which easier for them to get the information, and it always flexible for anyone do their transaction at anytime and anywhere. Other than that, it also provide online security such implementing privacy protection systems to reduce the risk of explore of privacy of personal detailed information.
The great majority of people who are selling on eBay are really warm, decent, trustworthy and honest people. Therefore, a lot of people would like to do transactions at eBay. Other than that, eBay might be the first example where a commerce site has actually been built around a society where people exchanging information and also goods, services and merchandise.
Saturday, January 17, 2009
Not really that long ago, there was a girl who was born in the mid of April, which eventually made her a typical self-confident Aries^^ though being seen as pretty cool a girl at times, she doesn’t really care what others think… yeah, u may say that she is arrogant, but she is just who and what she is~~
On the other hand, to people who know her well, she isn’t that cool after all~~her sense of humour could bring you to the top of
The one thing she couldn’t resist and you can see it all over her, is TIGER!!! She just can’t help but love tigers like her own kids~~and do you want to know why??? Well, I ain’t gonna tell you~~discover it yourself!!!
Wednesday is her favourite day because...it's MOVIE DAY!! FYI, cinema is the place where she hangs out the most. Other than that, her all time favourite shall be music!!! She enjoys listening to music as much as sleeping.
She is very nice and loyal to her friends^^ Yet the one thing she hates the most, is being awaken from her sweet dreams!!! Trust me, u won’t like her at that time, at all!!! Usually she can be the cute and sweet angel, but if anyone disrupts her date with the Goddess of Dreams, well, she can really turn into an evil devil and you can feel the extremely eerie aura even miles away!!!
After all, who’s this angelic devil/devilish angel anyway??? Just so you know, she’s none other than Jing Yin, which is…ME^^
The websites Jing Yin visited the most are as followed:
My favourite search engine. It helps me to search any information for my studies, assignments, pictures and other information.
This is where I login to check my email everyday.
An useful website where I can check on the latest and upcoming movies.
This website is where I get to contact with my friends.
A free file sharing site where a lot of music, music videos, movies and others can be found.
And, the top 5 internet activities:
1. download songs and videos
2. chatting with friends
3. check and send email
4. checking for latest movie's trailers
5. search information
Friday, January 16, 2009
- know more people, built a strong network
- increasing the relationship between relative, friends and family, to keep in touch with each others.
- updating myself with the latest news that happen around the world.
- updating myself with the latest business news.
- exchange idea
- find new things
1. chatting with friends by using instant messenger software
2. check mails
3. download songs, dramas, video clips, movies....
4. check latest football result..
5. play online games
Wednesday, January 14, 2009
Let me introduce myself first, I am Kok Cheng, usually they call me Cheng, a skinny boy with a average height and most of the time very talkative in class except when I am sleepy(haha), but sometimes maybe a cool and speechless guy that you will not expected. That what I am, a double character hiding deep inside of me with a same face(sound like very scary= =). I think I have a lot of hobbies but recently the most obvious is gaming, because I enjoyed the feel when I win,it also a way to release my stress. I also interested in investment and basketball(long time ago= =). I love to playing around in class but the sad things is, boy is an endangered species in our class(only six of us).
Live life to fullfill without regret, I'm enjoying my UTAR life because what I realize is I cant get so much freedom when come to work. So you may also enjoy your life without regret, smile always.
Have a nice day.^^
The top 5 websites I visit the most
To communicate with my friends and playing some online game with my friends.
For me to view my friends picture that stay far away from me and keep in touch with them.
Is a online comic websites, obviously for me to read comic.:)
For me to update my knowledge and information that happen around me.
Forward mail and check mail. Some mails are funny.XD
5 activities I always do
1 Check mail and send mail
2 Read online comic
3 Read newspaper
4 Play online game
5 Chatting with friends