Monday, July 14, 2008

Corporate blogging: A new marketing communication tool for companies.

Corporate blogging is quickly coming into its own. The Internet is an awesome medium because it’s so good at putting people directly in touch with one another. Solid corporate blogging strategy takes advantage of this ability, but if not executed well, the results can be disappointing at best, and disastrous at worst.

Corporate blogging is just one part of a broader strategy to find, understand and serve consumers who visit the corporate Web site, or use the corporation’s products. It’s value in soliciting and collecting feedback is inestimable. If used correctly, corporate blogging can propel a company to the forefront, and position it well ahead of the competition, simply by delivering the content and the connection that consumers want.

Some corporate blogs are written by a single person, or are put together by the corporate media group. Other companies put their executives out on the front line to connect with and field feedback from the consumer public. Each approach has its advantages and disadvantages, but consistency in terms of message, value in terms of content, and the ability to include your consumers in the conversation will enable your corporate blogging strategy to deliver its highest potential..

The advantages of corporate blogging are:
1. The technology allows businesses to expand their audience without having to rely on traditional, and often inefficient, means of communicating with their customers. Setting up a simple blog requires a minimum of effort or involvement from the IT Department, and can be done for a modest cost. Once set up, blogs can be very effective in promoting products and services, which can help to reduce advertising and marketing costs.
2. Blogs help an organization better understand the needs and wants of their customers, obtain feedback on products and services immediately, and in effect have customized and personalized market research.
3. Blogs also provide organizations an opportunity to respond to criticism from the media and others who might be posting negative comments on other blogs.
4. Blogging allows for greater Web visibility and can gain search engine prominence, helping to direct Web traffic to the company Web site. Often times blogs are ranked higher by search engines because the information is updated more frequently.

The disadvantages of corporate blogging are:
1. Even if senior managers trust staff not to give away the company's commercial secrets - and many don't - there are still enough worries about libel and (for publicly listed companies) stock market disclosure rules to have the legal department waking in sweats for months to come.
2. There is a risk that an ill-judged comment could be seized upon by the media or disgruntled investors.
3. Like practically everything else on the Web, blogs are easy to start and hard to maintain. Writing coherently is one of the most difficult and time-consuming tasks for a human being to undertake. So, far from blogs being a cheap strategy, they are a very expensive one, in that they eat up time. As a result, many blogs are not updated, thus damaging rather than enhancing the reputation of the organization.
4. Organizations also need to be aware of their legal liabilities for unmoderated content presented on a blog. Blogs may put a company’s assets, reputation and future at risk. Without strategic blog-related policies, rules and procedures, organizations face the potential for workplace lawsuits
5. If the blog is to be an official record of the organization, then the organization must provide workable access, indexing tools, preservation, scheduling, storage and access for as long as needed for administrative, legal, research and other purposes. Businesses need to be able to separate hype from reality in order to maintain some credibility with customers. People will not continue to read a blog if they determine it to be light on facts and heavy on marketing and advertising.

Monday, July 7, 2008

Review a local e-commerce site


The local e-commerce site that I choose to review is http://www.ebay.com/.
eBay Inc. is an American Internet company that manages eBay.com, an online auction and shopping Web site in which people and businesses buy and sell goods and services worldwide. In addition to its original U.S. Web site, eBay has established localized Web sites in thirty other countries. eBay Inc. also owns PayPal, Skype, StubHub, and other businesses.
Millions of collectibles, decor, appliances, computers, furniture, equipment, vehicles, and other miscellaneous items are listed, bought, and sold daily. In 2005, eBay launched its Business & Industrial category, breaking into the industrial surplus business. Some items are rare and valuable, while many others are dusty gizmos that would have been discarded if not for the thousands of eager bidders worldwide. Anything can be sold as long as it is not illegal and does not violate the eBay Prohibited and Restricted Items policy. Services and intangibles can be sold, too. Large international companies, such as IBM, sell their newest products and offer services on eBay using competitive auctions and fixed-priced storefronts. Regional searches of the database make shipping slightly faster and cheaper.
In June 2006, eBay added an eBay Community Wiki and eBay Blogs to its Community Content which also includes the Discussion Boards, Groups, Answer Center, Chat Rooms, and Reviews & Guides. eBay has a robust mobile offering, including SMS alerts, a WAP site, and J2ME clients, available in certain markets.
Best of eBay is a new specialty site for finding the most-unusual items on the eBay site. Users can also vote on and nominate listings that they find.
eBay Pulse provides information about popular search terms, trends, and most-watched items.

Credit Card debts: Causes and Prevention

A credit card is a system of payment named after the small plastic card issued to users of the system. In the case of credit cards, the issuer lends money to the consumer or the user to be paid later to the merchant. Credit cards, if used unwisely, can lead to a mountain of debt. If you charge more than you can afford, make low monthly payments, or pay late, you may be headed for trouble.

Listed below are the top five causes of debt:

Spending Above Your Means: Many debt-burdened consumers hold more credit card debt than their annual income. Spending more than you make is the No. 1 cause of debt.

Job Loss: After losing your job, it is important to modify your spending habits and adjust to the depletion of incoming funds.

Medical Expenses: Most people who face debt problems from medical bills failed to save money for an emergency.

Gambling: Gambling is an addictive habit that leads to financial ruin for many Americans.
Poor Budgeting: Whether it is not saving or spending too much, bad budgeting techniques create debt for oblivious spenders.

Credit card prevention:

1) Manage your finances
Starting with a strategy will help keep you on track before you ever even pull out the credit card. You need to determine your monthly income and needed expenses. As part of these monthly expenses, figure in 5-10% of your income to set aside for emergencies, long range savings such as a retirement account, and short term savings. If you have some savings then you avoid having to put large amounts of debt on a credit card in times of a crisis.

2) Create a Budget
If you cannot keep your credit card spending in check, create a budget. Make each credit card purchase only within the framework of your budget. If you cannot stick to your budget, then don't carry your credit card with you (you may want to keep one in the house for emergency use only).

3) Charge Only What You Can Afford
If you do not have enough cash to purchase the item or service, don't charge it. Instead, save your money (preferably in an interest-earning savings account) until you can afford the purchase.

4) Pay the Balance in Full
This is important in keeping control of your credit cards. Before using a credit card for a purchase, ask yourself, “Do I have the funds to pay for this?” In cases of emergencies where your emergency fund won’t cover the whole amount you need to charge, experts say at least pay more than the required minimum payment.

Things to take note to prevent e-auction fraud when a consumer paticipating in an e-auction


Auction are define as market mechanism by which buyers make bids and sellers place offers. It is characterized by the competitive and dynamic nature by which the final price is reached. Seller intended to sell something within a quick timeframe and those example of auction such as traditional auctions, electronic auctions, dynamic pricing, English auctions, Yankee auctions, Dutch auctions, free-fall auctions, sealed-bid first-price auction and sealed-bid second-price auction.

Electronic auctions (e-auctions) are auctions conducted online and most popular nowadays. Sellers are selling the item that sometimes had been using for some while or new things. The most famous e-auction website that familiar by all of us is E-Bay. This site selling the items that sometimes limited edition and the price will be bids by the consumers. Whoever offer the higher price will get to purchase the item.

In order to prevent fraud happen whenever performing auction transaction online, here is the following actions to be effective minimize the fraud.

a)Only purchases from the trustworthiness sites- This is because most of the internet auction fraud cases involve straightforward scams where consumers allegedly win merchandise by being the highest bidder. Everything are going so well until they send the payment and never receive the merchandise that they bid.

b) Refer to the site forum discussion-In order to prevent fraud, users may refer to the site forum regarding their customer perception involving in dealing with particular e-auction site. This is to enhance the details and credibility of the site.

c) Identity verification- User need to key in strong password validation in order to prevent theft by intended personnel. The e-auction site need to provided user ID and password verification so to identify the correct person with their particular information.

d) Always maximize the number of payment options you will accept- Do not making payment of merchandise using the same bank account to prevent easy hacking by other personnel. Users are advice to use several bank payments infrequently.

e)Ranking system are important to check the particular item- Due to the nature of the goods that we can’t see it physically, users have the right to know whether the merchandise are in a good condition and affordable or not. Hence ranking system allow customer to identify the usage of items and the condition whether it is worth to buy. Ranking with the highest one represent the most better and quality goods.

f)Appraisal and evaluate column- This allow customer get to know the respond of particular merchandise in the market. This system provides types of appraisal system and expertise that use to compare the items with the similar one in the recent marketplace.


Better prevention reduced the risk of consumers get threat by unknown e-auction owner. Therefore users need to be smart when dealing online transaction because we are not particular with who we are dealing with.

@----Electronic Currency-----@

Electronic currency (also known as e-money, electronic cash, electronic currency, digital money, digital cash or digital currency) is a trading method that involves converting base currency to a foreign currency at the market exchange rates through an online brokerage account When people dealing transaction online with other country, it provide this system to automatic translate the rate of foreign rate before making exactly amount.

This system had benefits the online users in assist them but however, the widely use of electronic currency only begin when the automated clearinghouse was set up by the US Federal Reserve in 1972 in order to provide the US Treasury and commercial banks with an electronic alternative to check processing. While at the same time, similar systems also emerged in Europe. Hence, electronic currency has been widely used throughout the world on an institutional level for more than two decades.

Nowadays, nearly all of the deposit currencies in the world's banking systems are handled electronically by a series of interbank computer networks. The Clearing House Interbank Payments System (CHIPS), owned and operated by the New York Clearing House, is the largest financial computer networks in the world.

Even the electronic currency had been introduced long time ago, but it is only effective recently due to the increasing power and decreasing cost of computers. Combine with advancements in communication technology that had made global interaction available at vastly reduced costs. Hence, these factors make the digital transfer of funds a reality for millions of individuals around the world. Besides that, usesage of internet and E-commerce have become an increasingly commercial area, where daily payments are rendered for goods, information and services. As a result, electronic payments are becoming the important role to perform online business between customer and seller.

There is some problem exists when using electronic currency whereby some merchants are not accept the credit card transaction. Additionally, consumers have become concerned with "hackers" who intended to intercepting and obtaining their credit card number stored on the Internet, not only that they affair to become a victim of fraud on the Internet since the customer and the merchant never physically meet. Furthermore, as the data collection industry continues to grow, credit card companies are invading consumer's privacy by collecting their spending habits and reselling the data to third parties and cause unsafe to consumers.

In overall, electronic currency is important system that allows a person to pay for goods or services by transmitting a number from one computer to another. These transactions are carried out electronically whether transferring funds from one party to another, and by either a debit or credit. These funds still can safe and secured by using strong encryption, and thus it will eliminating the payment risk to the consumer. In conclusion, electronic currency is the digital representation of money, or more accurately, the digital representation of currency.

Reference: http://www.murdoch.edu.au/elaw/issues/v6n3/ishman63.html
http://www.investopedia.com/terms/forex/e/electronic-currency-trading.asp
http://www.businesspme.com/uk/articles/trade/90/Electronic-money---advantages-and-disadvantages.html

Sunday, July 6, 2008

Corporate blogging: A new marketing communication tool for companies

A corporate blog is published and used by an organization to reach its organizational goals,and it also used for internal and external communication.

For internal communication, They promote the sharing of information of work-related matters. Since blogs can be easily updated, they are used as a part of newsletters or company Intranets. This helps employees to keep themselves informed on all the current happenings in the organization. Blogs also allow employees to display their expertise on a particular topic, thereby becoming a recognized industry or subject "expert".

For external communication, company employees, teams, or spokespersons allow to share their views. It is often used to announce new products and services (or the end of old products), to explain and clarify policies, or to react on public criticism on certain issues. It also allows a window to the company culture and is often treated more informally than traditional press releases, though a corporate blog often tries to accomplish similar goals as press releases do.

Pros of corporate blog :
  • Leaders can communicate directly with customers, suppliers and investors, as well as employees, helping disseminate and explain strategy.
  • Blogs give the writer an opportunity to answer critics in a controlled forum.
  • Compared with conference or printed memos to all staff, blogs are highly cost effective.
  • A well written blog can give a human face to an otherwise anonymous corporation.

Cons of coporate blog :

  • The best non-corporate blogs are spontaneous and genuine. Poorly written corporate blogs can look fake -- or perhaps worse, they reveal incompetence on he part of the writer
  • It is difficult for executives to write freely, particularly at listed companies where they are legally required to publish significant information to all investors at the same time.
  • There is a risk that an ill-judged comment could be seized upon by the media or disgruntled investors.
  • The writing can be difficult unless the CEO loves to write (in which case this becomes a positive)

The application of pre-paid cash card for consumers

Electronic cash cards are often confused with credit cards and debit cards. However, they are some very key differences between the two primary types of financial transaction card. Credit cards are the least like prepaid cash cards because with a credit card the fund are essentially borrowed from the lender, and then you pay the funds back. If the balance of the credit card is not paid back in full by the next statement, the remaining balance is charged interest. Basically, with a credit card you borrow the money and then pay it back later. Debit cards and prepaid cash cards are similar because they both use your existing money, rather than borrowing. Both debit cards and prepaid cash cards draw funds from your bank account, usually a checking account. The difference is that debit cards can be used without a personal identification number to make purchases where the card is not present. This is the case for online purchases where you enter your debit card information into an online form or Email it to the merchant. Debit card transactions usually need a personal identification number to be keyed into a terminal in order for the transaction to be authorized, but not always. This is why online merchants do not need your personal identification number and why you may come across a terminal or point of sale merchant that allows you to use your debit card with a simple swipe and no personal identification number entry.

Since prepaid cash cards always need a personal identification number to be keyed in for the transaction to be authorized, unless you tell someone your personal identification number, no one else can ever use your card. This means that if someone steals your card information, or your physical prepaid cash cards, you do not need to worry about them using your money. This is why prepaid cash cards are considered the most secure and safe financial transaction cards. The downside of prepaid cash cards is that you cannot use them to make "card not present" purchases, such as by buying something online. You can also not use prepaid cash cards in "quick pay" terminals that have a card reader but no keypad to enter a personal identification number.

The great thing about prepaid cash cards is that they are like a portable access point to your checking account. Automated teller machines are everywhere now, and you can use prepaid cash cards at automated teller machines to withdrawal funds from your checking account in cash, deposit funds into your checking account, and even make an account balance inquiry. You don't have to go to the bank anymore to get money out of your checking account, and you don't need to have a personal computer handy to check your balance. While you are "on the go" at the mall or running errands you can use your prepaid cash cards to see how much money you have left in your account, and get that money out as cash. This helps keep you from overspending and overdrawing your account. While automated teller machines usually charge your account a convenience fee, this fee is much smaller than the fee your bank charges you if you spend more money than you have in your account.

Tuesday, July 1, 2008

Mobile payment systems in Malaysia: Its potentials and consumers’ adoption strategies.

Can you even imagine just a few years ago that so soon will come a time when people like us can use our hand phone as wallet to pay whoever and whatever we want in the comfort of wherever we are using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service)? It’s just so fantastic because just the other day I paid my utility bills like Astro, TNB, Telecom and water bill from the chair in the front of my TV. I was also being able to reload my hand phone at a discounted rate and settle my credit card loans, car loans and house loans via my personal hand phone.

Although not tangible, I am for sure going to save hundreds of Ringgit Malaysia in terms of fuel, waiting time, parking fees and tolls in a year. Not forgetting the anxiety and helplessness I have suffered because of banks operating time and Public Holidays.

Mobile Payment is a point-of-sale (POS) payment made through a mobile device, such as a cellular telephone, a smart phone, or a personal digital assistant (PDA). Using mobile payment method, a person with a wireless device could pay for items in a store or settle a restaurant bill without interacting with any staff member. Mobile payments are used to pay no only for merchandise purchased via mobile channel but also transactions in the physical world such as vending machines, passport photo machines and car wash machines.

One of the example of Mobile Payment Systems that are available in Malaysia such as MMWallet. It is designed by Mobile Money International Sdn Bhd. It is to solve the problem created by cash, credit cards and cheques. Now, users are free to purchase products online and made payment without being physically present at the store. This will definitely boom our e-commerce industry in Malaysia since it encouraged consumers to shop online.

To use Mobile Money, he/she must have a savings, current or credit card account with participating banks. It is like a Credit Card if he/she applies for a "Pay by Mobile Phone" credit card account or be billed by the bank accordingly every month. Besides, it also functions as a Debit Card if it is tied to shopper's savings or current account. The amount will be deducted directly once the transaction is successful from their account.

To encourage consumer to adopt this payment system, super low transaction fee must be introduce compared to what typically being charged by credit card (acquiring banks) at 2.5 to 3%. For e-commerce website integrated with Mobile Money WebLink, the transaction rate is 2.5%, one of the lowest online transaction rate compared to other typically charges such as 3.5% for MOTO transaction and 4.5% for Internet Payment Gateway.

Besides, consumers must be told that it is safe and secure. With Mobile Money, they do not have to be concern of cash /cheque/credit card handling problems or fraud. The Mobile Money Payment System conforms to the stringent requirements set by Bank Negara Malaysia and the participating banks.

Phishing: Examples and its prevention methods.

Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.
Here are some examples of phishing ;

1) This is a sample of phishing by Citibank regarding the user as a citbank checking account holder, must become acquainted with our new terms and condition and agree to it.

1) Phishing scam, As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites.The following is an example of what a phishing scam e-mail message might look like.


3) This genuine looking email is a masquerade. As soon as you clicked on "respond", you were directed to an exact clone of eBay and your personal information was stolen. These messages come in different styles and writings. Go manually to ebay.com and check your private messages there and you will see if it’s real or not.

Prevention method for phishing

1. Always be wary of any email requesting personal information. You can never be too cautious. Don't reply to any suspicious looking emails or click on any links that you're unsure of. For example, if you receive an email from Ebay requesting personal information such as your user name or password, visit Ebay directly by typing http://www.ebay.com into your browser to check on your account status. Many times, phishers will include a link leading to a fake website, possibly with a similar name like ebayauctions.com, that gives them full access to your sensitive information.

2. Always ensure that you are on a secure connection to a web server when submitting personal information across the Internet. It can be determined by seeing an https:// appear in URL instead of http:// or seeing a picture of a locked padlock in the lower right-hand corner of the BROWSER WINDOW, not the page itself.

3. Do not use your email address on online forms that may appear to be suspicious. Doing so may cause you to be the recipient of hundreds of other phishing scams. Often, people like to set up websites to collect email addresses (titled "email address harvesters") for the sole purpose of selling them to spammers who are willing to pay for a fresh set of target addresses.

4. Avoid emails with urgent requests for financial, account, or email information. :.

5. If you receive spam or an email you suspect is phishing-related, forward it to spam@uce.gov. The email address spam@uce.gov is maintained by the FTC and they regularly investigate emails that they receive. Also, make sure to email the company that the phisher was trying to spoof or mimic.

6. Use antivirus and firewall software and keep them up to date using their Update features. If you are unsure of what an antivirus program is, it is a program that prevents and removes viruses. A firewall is used to prevent unauthorized access from a remote computer system. Antivirus and firewall software are very important because there are millions of existing viruses and new ones created everyday. Some of them have the potential to spread identity stealing programs.

7. Install Spyware removal software such as AdAware.

8. Make sure to carefully review your bank statements to check for unauthorized transactions. Many credit card companies have identity protection features that will reimburse you for charges made by an attacker, so long as they are promptly identified.

Monday, June 30, 2008

The threat of online security: How safe is our data

Nowadays, internet becomes really popular. Whole world for millions of users rely on internet services such as e-mail, chat programmers, searching engines etc. Beside that, internet users display more of their personal information on social networking Web sites, and office workers upload more sensitive data to online software programs, therefore it is important for us to learn about the online security threats. With identity theft on the rise, it is necessary to understand online security threats and know the ways to protect our confidential information.

The several online security threats include the following:

1) Spyware
It is software that monitors the actions of a computer user. This software falls
into a number of categories: Software that may be installed legitimately to
provide security or workplace monitoring, software with relatively benign
purposes that may be associated with marketing data collection and software
that is maliciously installed, either as a general violation of a user’s privacy
or to collect information to allow further attacks on their computer or online
transactions (e.g. “keylogging” to gain passwords).


2) Viruses
A computer virus is a rogue software program that attaches itself to other
software programs without user knowledge or permission. It may be highly
destructive such as destroying programs or data, clogging computer memory,
reformatting a computer’s hard drive, or causing programs to run improperly.


3) Identity Theft
Identity Theft is a crime in which an imposter obtains key pieces of personal
information like ID number to impersonate someone else. The information
may be used to obtain credit, merchandise, or services in the name of the
victim or to provide the thief with false credentials.


4) Hacker
A person who either breaks into systems for which they have no
authorization or intentionally overstep their bounds on systems for which
they do have legitimate access, i.e., an unauthorized individual who attempts
to penetrate information systems; to browse, steal, or modify data; deny
access or service to others; or cause damage or harm in some other way.

~How to safeguard our personal and financial data~

There is always the theft of information happen while using e-commerce services on internet as business tools. Hence, users of internet that usually perform online transaction must know the way to safeguard their personal and financial data.

Here is some hints and step provided to users to safeguard the personal and financial data. In order to avoid theft of personal and financial data, individual are advice to keep all the receipt, bank statement, credit card information billing and other document related when doing online transaction. Third party will easily trace this information if the individual does not dispose off this information and use it as threaten way to hack their account.

Individual is advice to be avoiding using computer at public places to perform their personal and financial business transaction because their local area network security might be unsecured. Moreover, all users are advise not to accept unauthorized file thru chatting devices that pop up suddenly and do not open those email that consists of unnecessary even reply it. Therefore, the personal and financial information will be easily exposed to the third party.

Not only that, it is strongly recommended that user should used strong and unique password to assess their business transaction site. Password should consist of alphabetical and numerical as less probability those intention hackers try to hacking the personal and financial information

Beside that, we secure our computer by turn it to screen saver when the computer and left to be silent for few minutes. After that, in order to active the computer usage, owner need key in the password so that other would not have chance to get excess to the personal information.

As last, remember to enhance the firewall and spy ware scanning should keep it strong enough to block unauthorized personnel who are intended to expose to our own personal and financial data that store inside the computer.

In conclusion, better preventing of computer and internet security can effectively avoid all internet users from exposing their personal and financial data to third party and suffer unnecessary loss.

Reference:
http://ecommerze.wordpress.com/2008/06/17/how-to-safeguard-personal-financial-data/

Sunday, June 29, 2008

Review : Growing Threat from Mobile Malware

A new more dangerous time for mobile device users, filled with mobile malware, is upon us. As with desktop computers, the Lilliputian world of PDAs and smartphones is no longer immune to malicious attack.

The number of mobile malware attacks is on the rise, according to a study by the Informa Telecoms & Media that was sponsored by McAfee. Eighty-three percent of mobile operators surveyed have been hit by device infections -- five times more than the number of incidents in 2005.

This snoopware is an extreme example of the vulnerability to which our phones can expose us. The more likely target by hackers will be financial or personal data on a smartphone.

Another example of malware is FlexiSpy which is discovered in March 2006. FlexiSpy is a worm and it normally infect through internet download typically installed by someone other than phone owner. Once the phone is infected with this spyware, it will send a log of phone calls and copies of text and MMS messages to a commercial Internet server for viewing by a third party.

I totally agree that there is potential for cyber crime to occur in the mobile networks as cell phones have evolved into smart phones that enable phone users to download programs from the Internet and share software with one another through short range Bluetooth connections, worldwide multimedia messaging service (MMS) communications and memory cards, the devices’ novel capabilities have created new vulnerabilities. Scoundrels were bound to find the weaknesses and exploit them for mischief or, worse, for criminal gain.

Antivirus software now available from many companies can immunize and disinfect smartphones. Yet few customers have installed such protection. That needs to change. Phones should also incorporate firewall software that warns the user when a program on the phone seizes the initiative to open an Internet connection. This is an especially important form of protection for smartphones that can connect to Wi-Fi (also called 802.11) networks and thus directly to the public Internet. Many cellular companies aggressively filter traffic on the GPRS or UMTS data networks that their mobile devices use; open Wi-Fi networks have no such protection. And while some carriers already filter their MMS streams to remove messages bearing malicious attachments, all should do so.

The number of mobile viruses will more than double over the next year or two, and is expected to target applications such as m-commerce and mobile banking. Most users have to lose a phone before they realize how much information they have put on it. The risk to corporations is also high because data is leaking out of corporations through mobile devices because they are linked to the corporate system.

Friday, June 20, 2008

~The history and evolution for E-commerce~

The first extended use of a form of electronic commerce appeared in the early 1970swhen system called Electronic Fund Transfer (EFT) was introduced. This enabled banks and financial institutions to transfer over secure networks large amounts of money either among themselves or with associated businesses. The EFT forms were used by employers to pay their employees by transferring the money directly to either their personal bank accounts or to their debit cards. To date, most payments made by the federal Government of USA are carried out via the EFT.

In the late 1970s a new model in business computerization was devised, namely the Electronic Data Exchange (EDI).2 EDI enables inter-company exchanges of documents, such as order forms for suppliers, invoices, customs forms, reimbursement receipts, stock inventories etc. EDI ran on a privately maintained network exclusively dedicated to this system. In parallel, many companies used to run their own private networks that were open to their business partners and acted as information exchange highway.

EDI technology has reduced costs both on the producers’ side and on the distributors’ (whether retail and wholesale). Likewise it brought about a substantial enhancement of purchase processes, by optimizing stocks and their correlation with the demand. Yet, several problematic issues — the high costs of its implementation and the difficulty of making the various versions of EDI fully compatible — caused EDI to fall short of attaining the ample market penetration one had expected.

In the late 1980s two new types of applications were widely adopted in the business world: electronic mail (e-mail) and group ware. When they were first introduced, these two systems were considered a major breakthrough. Despite this initial perception, both applications caused only insignificant growth of internal productivity.

In the year 1984, EDI, or electronic data interchange, was standardized through ASC X12. This guaranteed that companies would be able to complete transactions with one another reliably. In the year 1992, Compuserve offers online retail products to its customers. This gives people the first chance to buy things off their computer. In the year 1995, two biggest names launched in e-commerce which are Amazon.com and E-bay.com. In the year 2000,The U.S government extended the moratorium on Internet taxes until at least 2005.

Thursday, June 19, 2008

An example of E-Commerce failure and causes~


An example of E-Commerce failure is Kozmo.com. Kozmo.com was one of the leading delivery companies on the Internet in the United States. People would order a wide variety of product from a DVD rental, or just a single pack of gum and they would delivery your good within an hour and not charge for delivery. It was founded by young investment bankers Joseph Park and Yong Kang in New York City in March 1998. Kozmo.com serviced nine major urban areas, including Boston and San Francisco.


The main failure of Kozmo.com was too much competitive around the same area and challenging. At their peak, Kozmo.com was operating in 11 cities including San Francisco, Boston, New York and Seattle. At that time the competitors of Kozmo.com such as Webvan, Sameday.com and Pink Dot, all focused on a single urban area instead of trying to start operations in multiple markets simultaneously.

Besides that businesses of Kozmo.com had not been profitable. They delivered the usual grocery and drug store type items such as food and shampoo, but became too ambitious when Kozmo decided to deliver things like DVD players and other items that were not so cost effective. Kozmo was also in other various cities such as Houston and Boston. Due to offering too many different products and expanding in too many locations too quickly, the businesses collapsed.

Not only is that, Kozmo.com seem does not have a very wide client base due to the range of products that Kozmo.com would be able to provide are limited. Kozmo.com’s catalogue featured five main product categories that are entertainment, meals, grocery, drug store and gift shop. And the market of people who really need a DVD player or sweater in an hour is very small. Therefore, Kozmo.com has closed the operations.

An example of an E-Commerce success and its causes

The example of success of E-Commence business i want to highlight here is E-Bay. Ebay is a business that used of E-Commerce to commence its business. It had successful it business by enrolled it in this field with good strategic planning.Hence, it lead to this business to a long term growth.

The key success of Ebay is cause by the Effective, Persistent Marketing and Public relationship of the owner. By implement the strategic marketing policies in promoting their products and the cheap price quoted, it attracted a lot of customer to view and purchased their product all the times and indirectly continuous increase their profit.

Another cause of their success is Ebay give great customers’ services. Ebay maintain continuous concern on their customer and understand customers’ needs. Maintenance and warranty provided for the customer that purchases their goods and found out damages.

Besides that business on Ebay provided easy and convenience tools for the users to select their items purchases, simply clicking on the product, the design of the webpage will bring customer to another sites of the products. Users’ friendly webpage allows customers to view on details and explanation on the products before making purchases.

Not only that’s, another key success of Ebay is based on the safety banking payment process. Ebay business provide safe environment for the users and customer that browsing their webpage and when they making purchase through the internet, this sites making it private and disallow hacking on customer password by other intentional hackers.

In conclusion, E-Commerce services provided by Ebay keeping on success because their reputation and marketing policies in dealing with customer. This is one of the examples of success that we can refers to.




E-Commerce : Reduce cycle time, Improve employees’ empowerment and Facilitate customer support.

Reduce Cycle Time

Cycle Time is the amount of time between a customer placing and order and receiving the goods. Reducing cycle times can increase competitive advantage, decrease carrying costs , decrease shrinkage costs and improve cash flow. The need for Government organisations to transmit business information quickly is imperative in today's business environment. With business information exchange between Government organisations, electronic data can be sent and received 24 hours a day. Because electronic data exchange allows business to continue outside the normal business day, the turnaround time for a business transaction can be reduced from days to hours and, in some instances, to minutes.

One of the main advantages of integrating the Internet within the supply chain is the reduced product development cycletime. This means that customers receive their products in a more timely fashion, due to quicker order response. This in turn leads to maintainence of customer service levels and assists in solidifying the relationship with the customer.

Improve employees' empowerment

With e-commerce, now employees have the power to make decision concerning aspects in e-business. Most company have already come out with their own intranets that give employees chances to access to the internal corporate or government network. Besides, they are always updated with the details of its company existing and new products as well as company's activities. They can directly keep in touch with the customer responding to their requests and complaints. By letting them to have power in making decisions, they will be happy and indirectly make them feel contented and competent and even being loyal to their corporation. This will enhance the quality of their working life.

Today, people can easily order materials andreview the status of their orders over the Internet. In addition, the company eliminated redundant data entry, freeing two employees to focus on other tasks.

Facilitate customer support

Building and maintaining customer relationships is the key to success in e-commerce and, unless service is maintained, customer loss may result, more than offsetting any cost efficiencies due to introducing e-commerce technology. Since the core of e-commerce is information and communications, support for managing customer relationships is available to those who know how to use it.

By allowing customers to track delivery of parcels in real time, the Federal Express website keepscustomers in touch with the location of their goods and when they will arrive. Provision of this sortof information creates greater customer satisfaction and sense of control.


Automatic TellerMachines (ATM’s) are now well used by most bank customers, who, although some still expressfeelings about the lack of personal interaction with bank staff, generally would not want to return tothe old system of standing in a queue for personal service. They feel more in control of thetransaction process and can access their information any time.



Publishing Frequently AskedQuestions (FAQ’s) on a website saves customers time and money waiting on the phone for aresponse. They also allow the business to concentrate on generating more business rather thandealing with often simple issues.

about ~HeanHean~

Well…First of all, I never write a blog before therefore it really puzzles me when I start my page on this blog. Therefore, let me start introducing myself. My name is Lee Chien Hean, most of my classmates prefer to call me Ah Hean. I came from Kuala Selangor. Well, the first impression most of you will have when I mention about Kuala Selangor is the yummy seafood and fireflies. However, frankly speaking, although I stay in Kuala Selangor but I only went to see fireflies only once. Unbelievable right? But it’s true! Haha…
I am currently having my education at University Tunku Abdul Rahman in Sungai Long taking Bachelor of Commerce (HONS) Accounting course. I’m currently in Year 3 Sem 1 in tutorial group 11 now and this is my last year to complete my studies. Really looking forward to enter the working life~~ Erm, Tutorial group 11 consist of 8 HANDSOME gentleman (include me ^.^) and 19 BEAUTIFUL ladies~~ I am very happy that I am here in this group because I am having my sweet sweet UTAR life her because of their presence in my life. Everyone in this group are very nice and very talkative…(Don’t come beat me when all buddy saw this post ya!Haha~~)
Regarding my hobby,I like sport activities such as playing basketball, football, swimming, badminton and snooker. You may think that I only involved in healthy activities right? Haha, it is because unhealthy activities cant be mentioned here…The sports I like the most is playing basketball…since I was young, I am already playing basketball…Till now, I still playing basketball at least twice a week, in order to keep my body fit. Well, no choice in order to keep myself fit.. hehe….Besides, I like to play football as well, but friends around me are not really interested in playing football…so I can only enjoy the fun of playing football through computer games - FIFA!!
Recently I am very busy watching Euro Cup 2008, which show live at midnight…I will not miss any of the match because Euro Cup is organize once every 4 years. If u ask me, which team will lift championship cup, I will definitely tell u it's SPAIN~~ because I really love this team very much.
The top 5 website I always surf are:

I’m sure everyone is very familiar with this website. It allows us to know more friends around the world. Besides that, we can post comment to wish our friends during occasions such as birthday and New Year.

I always use this website to check any latest transfer news for football club. This website not only consists of updated football news but also included other sports such as NBA, golf and tennis. So, anyone would like to check for any latest status for sports, I strongly recommend all of you to visit this website
For those who are comic admirer, this website may suitable for u as they upload any latest comic every week…This website consists of thousand of comic. I personally prefer this website very much because it saves my time and money to go to bookshop.
This is a website that allows user to play online game such as big 2 and mahjong. Anyone who are bored or stress in study can try surf this website to play online game. Besides, you may also get to know new friends from other country
bt1.btchina.net
I think this is a quite famous website, this website allow user to download any latest Hong Kong drama(especially for student like me ^.^) or music.

Naughty Lil Gal^Phylis

Hihi..First let me introduce myself..I'm a naughty girl born in Muar, Johor with the name Phylis Phan Sin Yin. I'm 20 years old this year where I find it quite sad to enter into the 20s world.haha...still don wan to admit old..But most of my friends always say that "aiyo..u physically are 20 but ur brain and thinking are only 15 only la". Well, Muar is an excellent place to stay in, although the there is no gigantic shopping centre like Sungai Wang there. Oh ya..Muar is famous with otak-otak..(if you all want to eat, tell me..come my house and we have otak-otak party!!).Muar is very near to Malacca which takes only 45 minutes of journey. We always go Malacca to shopping such as Mahkota Parade and Pahlawan and the most attractive place in Malacca is A' Famosa.

Ok, ok, enought of Malacca, back to myself. I am currently enrolling in accounting course in University Tunku Abdul Rahman which situated at Sungai Long. I'm very proud to say that i'm in Tutorial Group 11 where I find myself having a bunch of good classmates and friends. They really play an important role in accompanying me walking through this 2 years life of staying away from my sweet home. We share laugher and sadness no matter where we are and what we are doing. They will always be there for me whenever there is any stones or any blockage on the road of my life. Thanks ya buddy~~

Since I'm having my university life, I'm having lots of free time here in Sungai Long. So during my leisure time, I like to watch drama series especially Hong Kong drama because I think it is more straight forward and exciting. I don't really prefer Taiwan drama series which they like to drag the story like grandmother story and I always think that Taiwan drama series too dramatic (those who like Taiwan drama series don't come beat me ya cause above it's purely Phylis Phan's opinion).

I also like to go shopping and I guess all girls like shopping, right? But of course it's after I get my PTPTN loan la..haha..using future money to finance current condition..haha~~not a good practice actually..don't follow ya~~I like to buy Padini concepts store clothes but I also don't know why..Just like to be in that shop.

Beside, I also enjoy sleeping very much because there is a proverb in Chinese saying 'getting rest is to be prepared for a longer journey'. You guys must be thinking, "aiya..this is just an excuse to be lazy"..haha~~Indeed! I don't know why I just enjoy the feeling of lying on my bed. Once I'm on my bed, nothing can drag me out of there. Haha~~

Surfing Net is also one of my favourite activity. I guess most of the teenagers will choose it as their hobby. I have chosen 5 out of the various website I like to visit to share with all of you.


Google is indeed a good searching engine as you can find almost everything you want on a click of mouse. I usually use it to find information as a reference for my assignment



Friendster is the place where I keep myself updated of what my friends are doing and where are them now. It's also a place where I keep myself in contact with them by sending messages.

I use my yahoo mail to email to my friends and keep in touch with my
friends that are located all over the world.



Viwawa is an interesting online game where I spend most of my times playing mahjong online. I get to know lots of friends through this game. This website also offer some strategy game to tackle our mind.


I always use Maybank website to check my account balances and have some online transaction such as using my account to pay bills such as electricity bills and Astro bills.

Wednesday, June 11, 2008

Silence means gold _Khai Ying

Hi…! Nice to meet you all…Let me briefly introduce myself….My name is Chan Khai Ying. I am just a simple and ordinary girl… shy, quiet, sensitive….that is what my friends always think of whenever I appear before them. I was born in 18 October 1985 and that makes me a Libra. I came from Penang, which is known as ‘The Pearl of the Orien’ and having a reputation as a food paradise. Penang is a place that has many delicious foods such as Char Koay Teow, Laksa, Satay, Hokkien Mee and more. I love my hometown very much. Gurney Plaza is one of the famous shopping mall in Penang. I always go shopping with my best friends during weekend whenever I’m having my semester break.

Now, I am studying at University Tunku Abdul Rahman (UTAR) located Sungai Long. I am undertaking accounting course and currently in Year 3 Semester 1. Two more semesters and I can complete my degree. Hope everything will go smoothly as it was. The same goes to everyone in Year 3 Sem 1. Since I entered UTAR, I got a nickname “Panda”, because I have dark circles under the eyes. Haha~~ But I like the name very much..

I like listening to music and singing karaoke. Music has always been a big part of my life but the only instrument I know how to play is the CD player. Since small I really have the ambition to become a musician.. But of course it’s just a small kid ambition. When I grown up, I know I don’t have the talent. Keke….. Shopping is also one of the activities I like the most to fill up my leisure time. But most of the time I just window shopping because as you know things are getting more expensive as petrol prices keep shooting up like rocket. Beside that, when I am free, I like to travel. I promised myself, if I manage to save money, the country I would like to visit the most is Paris. I think travelling is the best way to relax after working hard for some time.

Top 5 websites I visited the most are:-

http://www.friendster.com/– It allows me to keep in touch with my old friends, friends who have lost contact for long time and update myself regarding my friend’s recent situation. I also can get to know new friends from here.



http://www.google.com/ – Google is a good search engine for me to find information when I am doing my assignment and homework.

http://www.gougou.com – I use this website to download my favorite songs and latest movies.



http://www.hotmail.com – I do check my mail everyday when I am free and contact with friends through email.

http://www.youtube.com – I always watch a lot of funny video clip from You Tube.



K-queen ~ ciew hoiew

Hello, my name is Lim Ciew Hoiew. I am a 20 years old girl, pursuing Bachelor of Commerce in (Hons) Accounting, in University Tunku Abdul Rahman. I am now in Year 3 Semester 1 now. I am from Klang, Selangor.The most famous food there I am sure u all will know that the most famous food in Klang is “bat kut teh”. Even I myself also enjoy it. My favorite singer is Wang Lee Hom. His songs are really different from others and I like him so much. Of course, he is really very handsome and I am just addicted to him.

I have 4 siblings including me. I am the elder sister in my family. I am enjoying my lifestyle now just like anyone else teenage. Erm….I have a lot of hobbies which include swimming, net surfing, reading novel, outdoor activities watching movies. I like singing karaoke at Green box the most because I like the feeling of screaming out my emotion to release tension and stress from studies.

People who don’t know me will be hard to see deep down inside me because I’m the type of girl who always hide my feelings to myself...haha…I like surfing net a lot. It helps me to reduce my stress sometimes and finding enjoyment through it. A lot of activities can be carry out such as knowing friends, searching song and playing game.

Well, I usually visited this 5 websites :-


http://www.friendster.com/ – It allows me to know more friends around the world. I am sure now teenage all know this website because it was fun actually.

http://www.hotmail.com/ – I am sure everyone need an email to check their mail. This is also my routine as well. I choose hotmail because it is more convenient. Until now, it had provide 5 gb storage of mail and I believe that other mail services can't satisfy me.
http://www.yqxsj.com/ – I enjoy this site because I will always browse here to get the latest novel and read it online.

http://www.haoting.com/ –For searching music, I like this website very much and I could heard song online.
http://www.tom365.com/ – I often download movie or drama too… I can always get the latest movie here.