Sunday, February 22, 2009

E-Government in Malaysia: Its implementation so far and citizen's adoption strategies.












"E-Government" refers to the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and mobile computing) that have the ability to transform relations with citizens, businesses, and other arms of government It will improve how the government operates internally, as well as how it delivers services to the people of Malaysia. At the same time, it will improve information flows and processes within government to improve the speed and quality of policy development, coordination and enforcement Malaysian Government has its own official portal now:
http://www.gov.my/


The vision of Electronic Government is a vision for government, businesses and citizenry working together for the benefit of Malaysia and all of its citizens. The vision focuses on effectively and efficiently delivering services from the government to the people of Malaysia, enabling the government to become more responsive to the needs of its citizens.
The 7 pilot projects of the Electronic Government Flagship Application are as follows;
1. Project Monitoring System (SPP II)
2. Human Resource Management Information System (HRMIS)
3. Generic Office Environment (GOE)
4. Electronic Procurement (EP)
5. Electronic Services (E-Services)
6. Electronic Labour Exchange (ELX)
7. E-Syariah









Citizens can now submit their tax details to Inland Revenue Board via e-filing without worrying about making mistakes by making use of TaxSaya, a tax tool (http://www.taxsaya.com/). It is developed by EA-Link System Sdn Bhd, the software comes in three languages, Bahasa Malaysia, English and Mandarin to help taxpayers in understanding the e-filing procedures. After the users fill up sections of the form, it will automatically calculate the amount of tax payable, including offering e-Filing template without having to go through the problems of calculating the tax.

For further information, visit http://e.hasil.org.my/ or call the customer service centre: 1300-88-3010

Wednesday, February 18, 2009

THINGS TO TAKE NOTE TO PREVENT E-AUCTION FRAUD WHEN CONSUMER PARTICIPATING IN AN E-AUCTION


Auction is a market mechanism whereby buyers make bids and sellers place their offers on goods. In auctions, a competitive atmosphere established where the process continue until a final price was reached. E-auctions refer to the auction activities through internet. It has an advantage that is lower cost of providing infrastructure for the auctions. It is a rapidly growing commerce activity which involves all level of people and is far more convenient than traditional auction. Since e-auction fraud is growing epidemic worldwide, effective steps have to be taken out to overcome them.

Below are some tips to keep e-auction fraud to minimum level when purchasing items from e-auction.

To be familiar with the auction website. Read through and understand all the websites protection policies. Never assume you are protected from auction fraud.
Escrow services. Whenever there is any expensive bidding, you should use escrow services. The services are commonly offered by the auction website and it will hold your money until you are certain that the item you purchased is genuine.
User identity verification. Before transaction user information such as IC number, driver license number or date of birth, verified eBay user and so on. With this done, the level of verification will be higher.
Always check on Feedback forum for a particular seller information– e Bay had established its own feedback forum that allows registered buyers or sellers to build up their online trading reputations thus provides users with the ability to give comments on their experiences of using the service.
Always keep 100% of the transaction information. This is necessary to be work as a prove or evidence of transaction between two parties.
Contact empowerment parties. If after the sale you feel the item or payment should have been delivered already, try to work it out with the seller or buyer. If at that point you feel that fraud is involved, immediately contact consumer protection parties.
Do not simply disclose your personal data. If you receive e-mail messages from someone you do not know asking you for personal data for examples, credit card number, account number, or password, do not disclose them without further investigation.
Warranty policy. Ask for the warranty policy if there is any warranty or the exchange policy, if there is a problem on the item purchased.


A review on a post on Legal from My E-Commerce blog



After read the E-commerce web site at
http://ecommerze.blogspot.com/search/label/Legal with the title “New rules for cyber cafes soon”, I’m here to give some comment about the government that try to set out some rules to those cyber cafes in Malaysia.

The first guideline is cyber cafes have to close by midnight daily. After review to the cyber cafes in my area which in Bandar Sg Long. I don’t think that is effective because they operate 24 hour per day without close.

Most of the cyber cafes they also using tinted glass in their premises and unable to see through from the outside. And most of them are operate at ground floor. For children age under 12 years old. Most of them are not accompany by parents or guardian. And of course there are on children who are under 12 years old is still visit after 10pm.

For prohibited from providing gaming activities, gambling, pornography, music and publications with negative element, there is getter lesser and lesser now a day because there is strict control by government. There are no cigarettes and alcohol being sold in cyber cafes. And there are no book logs to record the entry and departure time of the patrons.

According to the Housing and Local Government Deputy Minister that are aim to prevent the Internet and cyber cafes from turning into the possible source of social ills, I think there are less effective maybe due to not strictly enough to prevent it. For example, one of the cyber cafes in my area that they still operates after midnight. Although they close the main entrance, still running their business by enter to the cyber cafes by back door.

I think that there is harder to survive for the cyber cafes business due to a lot of rules to follow. And in my area, there are one cyber cafes is bankrupt and others they are trying to contract their cafes.

Friday, February 13, 2009

Corporate Blogging: A new marketing communication tool for companies

Blogging means a communication tool, a marketing technique, a listening device and a way to interact directly with customers one-to-one on a global scale. The business world is undergoing profound changes, redefining marketing, public relations, and customer communications. Traditional marketing tools like focus groups or CRM is no longer adequate enough to get real feedback from customers in the fast-changing complex and competitive market place.

The reasons for corporate blogging becomes a new marketing communication tool for companies.

1)Customers nowadays do not want to be talked at, they want to be talked with.

2)For big businesses to talk one-to-one with customers, and small businesses to gain visibility by using what they know to create big-business style opportunities and growth.

3)Experiences, relationships, and trust-all tangible assets- are the single largest source of value for business brand

4)It is the potential customers that cannot be reached that are best target for future growth, and dynamic, engaging, and informative business blogs are an amazing avenue for reaching them in a way that has never been possible with other channels. This can be done by passionate message, constant follow up to gain trust and culture of valuing blogs.

5)The challenge that today’s companies face is one of mindshare. Mindshare is all about how many people are aware of product. Creating spaces where customers can consistently engage in dialogue with and places that are meaningful to customers, only then will the mindshare grow.

Some successful companies are using blogs to extend their brands, interact directly with customers, and get real feedback on their company and products. They are as follow:
1) GM runs new concepts by customers and invites feedback on their popular FastLane blog—one of today’s top 500 blogs.
2) The Disney Channel uses blogs to streamline internal communication and increase their engineering team’s efficiency.
3) Microsoft product development teams look for blog feedback before making significant changes to applications.
4) Boeing used blogs to gather customer feedback while developing the new 787 Dream liner.

Considering Boeing, a leading aircraft and aerospace manufacturer, which began ramping up the production and marketing of its new plane, the 787 Dream liner. The company used the traditional transmission-style marketing: press release, launch parties, media tours, interviews with engineers, and the like. However, Boeing also allowed Randy Baseler, Vice president of marketing, to blog(www.boeing.com/randy). Through his blog, Baseler was able to extend the message into a dialogue that included information about a Boeing competitor’s offering, the Airbus A380.Baseler responds to posts on other blogs, discusses what other blogs are talking about, and reads a vast cross-section of flight and aviation blogs. This blog allows Boeing to use a transmission-style message, which is great for getting the cold hard facts out to the world, as well as personal dialogue, which is great for communication passion, having a conversation, and listening to what customers and aviation enthusiasts think.

Wednesday, February 11, 2009

¨ The application of pre-paid cash card for consumers

Prepaid card is a portable size card that gives users the ability to purchase product and services without paying by cash with more convenient, faster and safe. It contain concept of “pay now, spend later”. Which means user must reload money first before spend it.

So, here are some example of prepaid cash card would like be introduced:


Touch ‘n GO smart card is used by Malaysian toll expressway and highway operators as the sole electronic payment system (EPS). Touch ‘n Go enhances the speed of paying for low value but high frequency transactions. Apart from the speed, it is also very convenient because user no longer need to prepare for small change or wait in queue at the cash lane to complete the transaction. User can reload the card at toll plazas, train stations, Automated Teller Machines, Cash Deposit Machines, Petrol kiosks and at authorised third party outlets. Reload denomination is ranging from RM20 to RM500.



EZ-Link card is a contactless smart card based on Sony’s FeliCa smartcard technology, used for payment in Singapore especially for transportation in Singapore. It established in 2001, it was promoted as a means for faster travel due to speedier boarding times on buses. Both the card and the reader ensure secure, fast and reliable transmission of data between them. The strong encryption techniques prevent eavesdropping and fraudulent use. This helps to ensure the integrity of transaction information captured.

Tuesday, February 10, 2009

Credit Card Debts: Causes & Preventions


Credit Card is a bank-issued card that allows consumers to purchase goods or services from a merchant on credit. It is made of plastic card, with a magnetic strip or an embedded microchip, connected to a credit account to make purchases. Credit card debt is an example of unsecured consumer debt, accessed through ISO 7810 plastic credit cards. The credit card debts will accumulate and increases through interest and penalties when we do not pay the company for the money we spent on. How to tell if you are in too deep of credit card debt?
Below are some signs to be determined:
1. You find that you can't make your minimum payments on your credit cards.
2. You realize you've been borrowing money from family members or friends to cover your payments.
3. You've gone to a lender you wouldn't normally use -- like a payday lender that loans you money at really high rates against your next paycheck.
4. When 15% of more of your monthly income goes to pay the credit card bills

These are the warning signs which imply that the usage of credit card is out of control.



Causes for credit card debts:

1. Poor money management: One without a proper financial plan in life will tend to spend their money unwisely and spend money on unnecessary matters. This kind of people will buy whatever they like without thinking whether they afford them or not. All in their mind is credit card can buy anything and they do not have to pay now.
2. Gambling: This is a typical cause that leads to massive amount of credit card debts. One who are addictive to gambling will not care about where they get the money and the consequences if losing money, thus lead to a financial disaster when borrow money through credit card method.
3. Excessive medical expenses: Credit card will probably become one of the sources of funds to pay off the medical expenses if health insurance is not adequate to cover the medical bills if one of your family members suffers serious illness.
4. Financial illiteracy: This refers to those people who take money for granted without consider how money comes from and how credit card really functions. This group of people usually is youngster with parent’s financial support and they spend money in improper way.



Prevention:

1. Develop a budget: Budget is needed to guide us on spending money wisely and only when needed. Develop a budget with listing the income you get monthly and states all the necessary expenses in a month (eg. Water bills, electric bills, rental, food, car loan and car fuel). This is a helpful way to track your spending patterns and identify necessary expenses.
2. Keep your credit limit low: High credit limit will make us purchase more and lead to more debts to be paid. When the bank inform you that your credit limit has been increased, try to contact them and reject the offer. The lower credit limit the lower risk we get into high debts.
3. Self control and self-disciplined: It is often said that the gun don’t kill people! It is the people who kill people. The point is that we are the one who cause high credit card debts and all we need to do is control our spending on credit card. Only use credit card when urgent. If we feel that we cannot control our will to purchase using credit cards, cut up the cards.

Mobile payment systems in Malaysia: its potentials and consumers' adoption strategies










M-payment (mobile payment) is a point-of-sale payment made through a mobile device, There are various types of mobile payment systems, such as .
Banks / Credit Card Companies / Dedicated Payment Processors :
~ Mobile Credit Card Payments
~ Migrating Internet Payment Systems
Mobile Network Operators :
~ Utilization of existing Billing Mechanisms (Prepaid and contract based)
Multi-Payment Method Frameworks :
~ Mobile Network Operators
~ Dedicated Payment Processors
~ Shopping Malls, Large Shops
Other Mobile Payment Systems
~ Mobile Home Banking, Internet Payments, Mobile Retailer Support
Using m-payment, a person with a wireless device could pay for items in a store or settle a restaurant bill without interacting with any staff member. So, for example, if a restaurant patron wanted to pay quickly and leave the restaurant on time to get to an appointment, the bill could be paid directly from the table - without waiting for a server to bring the check. The patron would simply connect to the cash register with a wireless device, punch in the table number and bank personal identification number (
PIN), and authorize payment.
The earliest m-payment trials were based on the wide area network (
WAN) used for cellular phones. That meant, however, that users had to pay cell phone charges to make a payment, and also had to punch in long sequences of digits each time. Other technologies tested enable less cumbersome procedures. Palm and Verifone will use infrared (IR) data transmission for their initial trials. Among the other technologies being used are Bluetooth, WiFi, and RFID, a short-range transmission system. Public key infrastructure (PKI) encryption - considered to be necessary for secure m-commerce in general - is currently being incorporated into digital wireless networks and into an increasing number of wireless devices, a trend that is likely to increase consumer confidence in m-payment's security.
Bank Negara Malaysia sees tremendous promise in mobile telecommunication networks as an electronic payment channel since mobile phones are already in the hands of most Malaysians, with 88% of the Malaysian population subscribing to mobile phone services.

The high penetration rate affirms mobile phone networks as an increasingly popular channel for Malaysians to perform a plethora of activities beyond voice communication, encompassing all forms of digital communication, commerce, banking and payments. Indeed, payments via text messaging has the potential to grow in importance.

Saturday, February 7, 2009

Electronic currency




Electronic currency which is also known as electronic money, e-money, electronic cash, digital money, digital cash or digital currency refers to money or scrip which is exchanged only electronically. In general, this involves use of computer networks, the internet and digital stored value systems. Electronic Funds Transfer (EFT) and direct deposit are examples of electronic money. EFT systems range from the now-familiar automated teller machines (ATM) to “virtual banking” on the Internet. However, use of digital cash has been relatively low-scale. One of the success examples has been Hong Kong’s Octopus card system, which started as a transit payment system and has grown into a widely used electronic cash system. Furthermore, Singapore also has an electronic money implementation for its public transportation system such as commuter trains, bus and etc which based on the same type of card called FeliCa. Chipknip is a very successful implementation is in the Netherlands.

Digital cash development concentrates on:
1) being able to use it through a wider range of hardware such as secured credit cards
2) linked bank accounts that would generally be used over an internet means, for exchange with a secure micropayment system such as in large corporations
(PayPal).
Systems of accounting such as Altruistic Economics are emerging that are entirely electronic, and can be more efficient and more realistic because they do not assume a zero-sum transaction model.

There are many potential issues with the use of digital cash although digital cash can provide many benefits such as convenience and privacy, increased efficiency of transactions, lower transaction fees, new business opportunities with the expansion of economic activities on the Internet. The transfer of digital currencies raises local issues such as how to levy taxes or the possible ease of money laundering. In addition, there are also potential macroeconomic effects such as exchange rate stabilities and shortage of money supplies. Some type of cyberspace regulations or laws that regulate the transactions and watch for signs of trouble may address the issues mentioned above.

Wednesday, February 4, 2009

The threat of online security.How safe is our data?




There are still a lot of threat via internet which is not a safe place for you to keep the data unless you really have sufficient protection software, such as anti-virus,kaspersky to against the varieties of threats until right now. There many types of threats, for example, spyware, Trojan, Malware, worms, viruses.

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software viruses or as the result of installing a new program.

A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.


A destructive program that masquerades as a benign applocation. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.


Also, the ‘private’ information of the user can also being track back notwithstanding the file has been deleted at the ‘recycle bin’. These facts show us that the data are actually available publicly for the ‘hacker’ once the data have been store in the computer.. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating system

Tuesday, February 3, 2009

Phishing: Examples and Prevention Method



Nowadays people are relying more and more on the usage of internet for business, investment, and personal trading; internet fraud becomes increasingly a threat or harm for users. There are various types of fraud on internet, one interesting and fast-growing is phishing. This method attacks user by sending email or creating website that falsely claimed to be an established legitimate organization in order to scam the particular user into disclosing personal, financial, or computer account information.

One example of famous and the very first phising case reported on March 9, 2004 is the attack to ebay customers. The perpetrator sends emails to targeted customers stating that the customers’ information was invalid and correction is necessary to prevent interruption of services and keep their ebay account active. The other page requires user to key in their credit card number, contact information, social security number and ebay username and password. The perpetrator had formed a mental model in user mind that is: ebay is requesting for information update.

Phising can be appear in many forms. Besides in email, it can be appear in your social networking Web sites, on a fake Web site that accepts donations for charity, on a website with almost the same web site name hoping you would not notice it, in your instant messaging programs- Msn and yahoo messenger. There are many types of scam too. Below are some examples:
a. Verify your account- usually happen when involving banks and trading websites asking you to update your credit card information.
b. You have won a lottery- I believe most of us had received this kind of mail or messages before. In order to bait the user to believe the message, the perpetrator will usually use big companies like Microsoft or oversea countries celebrating their 30th year of establishment and had randomly picked your hand phone numbers as the winner!
c. Your account will be closed if you do not response within 24 hour- this message conveys a sense of urgency to get user in no time to think properly.


Some of the method to prevent phising:




1. detecting the fake registered domain names- perpetrator have to set up a website name that is similar to the original organization’s name to get users fooled. If we are careful enough to see the website name it usually got extra words or less. For example, www.publicbanks.com or www.yahooo.com . This method of detection is not always useful because of different reasons. First - Even though it is easy to track new registrations of GLTD-generic top-level-domain like .com and .net, it is not true for CCTLD -country specific top-level-domains like .cn(China) or .kr(Korea) where many phishing sites are registered. Second - attackers may choose not to register a domain name and operate the website using just IP address.




2. Detecting looked-alike webpage- when creating a false website, the perpetrator might just copy and paste some image or logo from the original website. If we insert something like JavaScript into the original website (which alerts us when run under any URL other than the authentic) we can get alerted of any of those phishing attacks.




3. Detecting the email sent to users- Once the phishing site is set up, perpetrator sends emails to hundreds of users, who are the potential victims. As expected, many of these emails would bounce as the TO: address is incorrect. To increase credibility of the mail perpetrator would keep the “From: address of the mail” as something like admin@xyzbank.com. This user id will be non-existent on the real xyzbank.com email server. Otherwise the mails which bounce will get into the mailbox of a user, if the admin@xyzbank.com is a valid email id. If this is a valid email address, attackers would keep the “from address” as something like admin1@xyzbank.com.
The mails with wrong “To: addresses” will be all returned to the xyzbank.com SMTP server. The SMTP server looks at the “From: address admin1@xyzbank.com “and finds whether it exist or not. If “From: address” and “To: address” are both wrong, this is called a double-bounce mail.
Bounced mails are common but double bounced mails are not. It is highly likely that double bounce mails are phishing mails targeting abcbank.com.




4. Always use email verification- with this double confirmation phishing is less likely to occur since email address and password is only known to one person. PayPal, a world welknown business website is now having “iconix eMail ID” function to offer extra measure of phishing protection.



The application of 3rd party certification programme in Malaysia


The most famous application of 3rd party certification program in Malaysia is provided by the MSC Trustgate.com Sdn Bhd. MSC Trustgate.com Sdn Bhd is a licensed Certification Authority (CA) operation within the Multimedia Super Corridor. MSC Trustgate was incorporated in 1999 to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region. At present, MSC Trustgate has 12 million in paid up capital.

Trustgate is licensed under the Digital Signature Act 1997 (DSA), a Malaysia law that sets a global precedent for the mandate of a CA. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development.

It provides the finest Public Key Infrastructure (PKI) to assist all types of companies and institutions conducting their business over the Internet. The state of the art back-end infrastructure that costs RM 14 million is one of the best in the region.

Trustgate vision are “to enable organizations to conduct their business securely over the Internet, as much as what they have been enjoying in the physical world.” They provide trusted and encryption technology that secure online communication, hence protect vital business information. It’s first Malaysian Internet trust solutions company authorized to offer 128-bit SSL Server ID that is now used in financial institutions, insurance companies, e-government, healthcare organizations and other online trading. They also offer Digital ID for MyKad (Malaysian National Identity Card) that is now used in online tax filing, e-procurements and others.

-The Secure SSL Server ID provides encryption between browser and the Web server. It is ideal for securing intranet, extranet, and Web sites.

-The Global SSL Server ID is the strongest encryption commercially available today. E-commerce players who are serious about their business choose the 128-bit or 256 bit technology to secure the communication between their Web sites and their visitors. Global Server ID is commonly used in financial institutions, insurance companies, e-government, online merchants, and healthcare organizations.

- MyKey is the Digital ID that is stored inside MyKad. It provides encryption technology and digital signature capability so that the Malaysian citizen and conduct online transaction securely. MyKey is governed by Malaysia’s Digital Signature Act 1997 & is accepted by the court of laws in Malaysia. A document digitally signed with MyKey is treated as a legal binding document as it is with a handwritten signature.

www.msctrustgate.com

How to safeguard our personal and financial data?


Since there are a lot of cases that information had been stolen by hackers or inadvertently given away by the victim when they are tricked into doing so, some methods as follow may help people in safeguarding their personal and financial data. The information that will be targeted by villain is name, gender, telephone, e-mail address, date of birth, occupation, interests and bank and credit card account numbers.



Some of the useful methods in preventing personal and financial information to be stolen or revealed are as follow:

1)Installing and updating antispyware and antivirus software. Kaspersky, AVG and Norton antivirus are popular and effective antivirus software that are being used by many computer users. It helps to detect threat that can compromise computer system. Furthermore, some antivirus software will monitor instant messaging traffic to detect and block malicious threats.

2)Utilizing Virtual Private Networking (VPN). VPNs are based on encryption. Encryption converts a file or message that is in readable form into unreadable form. This can prevent information stolen by hackers when transferring information. The content of the messages which is in scrambled form will not be understood by others people besides sender and receiver.

3)Firewalls which is a gatekeeper system that protects a company’s intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the Internet and other networks. Besides, it screens all network traffic for proper passwords or other security codes and only allow authorized transmission in and out of network.

4)Creating passwords and PINs that are not easily guessed by other people that including letters and numbers. However, passwords will be stolen if users are not careful. With the present of biometric controls, probability of information to be stolen is minimizing. A biometric control is an automated method of verifying the identity of a person, based on physiological or behavioral characteristics. For example, fingerprint scanning.

5)Logging out the websites whenever finish transactions. That is to prevent other users from reading your personal information and mail. In addition, close the browser window after using it at internet café, public library, school computer labs and etc.

6)Avoid using free wireless connections particularly in cafes, airports and other public places. The information in computer system will be accessed by others without users’ knowledge.

7)Using own computer instead of a work or public machine to access financial and other sensitive personal information.

8)Avoid clicking on pop-up ads or downloading information from unknown sites.

Tuesday, January 27, 2009

Revenue Model for Google, Amazon.com and eBay

A revenue model is a way to generate revenues, like charging your customers or advertising. The revenue model has little to do with the reasons why a business will eventually succeed or fail. This is the time to introduce the revenue models for Google, Amazon.com and eBay to everyone.

Revenue Model for Google









Actually, Google has various types of revenue model, such as and Pay per Click Advertising to as well as AdSense, AdWords, which are helping Google to make profit through the advertisement fees and allow those advertisers to promote their latest products or services in the google web page.

AdWords offers pay-per-click (PPC) advertising, and site-targeted advertising for both text and banner ads. The AdWords program includes local, national, and international distribution. Google's text advertisements are short, consisting of one title line and two content text lines. Image ads can be one of several different Interactive Advertising Bureau (IAB) standard sizes.

Pay per Click Advertising is the best way to send immediate, targeted traffic to your website. It is an online advertising payment model in which payment is based on qualifying click-throughs. An advertiser has to pay every time his ad receives a click. The Advertisers decide the keywords relevant to their offer that should display their ad and the maximum amount they are willing to pay per click for that keyword. This function is a very useful function and will continue to bring about an increase in income especially if the number of people clicking on these ads increase. However, Google should take care that this function is not misused. There might be and increase in click frauds when manipulation of search results are not dealt with properly.

AdSense is an advertisement application run by Google. Website owners can enroll in this program to enable text, image, and more recently, video advertisements on their websites.

Revenue model for Amazon.com




Amazon. Com is one of the most successful e-commerce providers in which its income are mostly generated from transaction fees, affiliate fees and subscription fees. Amazon started as an online bookstore, but soon diversified its product lines from DVD to food..Moreover, Amazon.com also generates revenue by Affiliate revenue model. Amazon was one of the first online businesses to set up an affiliate marketing program. AStore is an Amazon.com affiliate product which website owners can use to create an online store on their site. The store does not allow website owners to sell their own products directly. Website owners pick products from Amazon’s store and earn referral fees on the products purchased by their readers. The fee structure is currently the same as for the other affiliate links and ranges from 4% to 10% of the product price.



Revenue model for ebay

eBay does not have inventory like Amazon.com. It only provides technology platforms and tools for e-commerce. ebay has various revenue model, it earns transaction fee from owning paypal, an online paying service system for users to buy items online more conveniently. ebay also gains sales from the service of listing customer’s product to be sold to other users as well as some advertisement fee. ebay generated overall revenue around $6 billion from its three primary business: auctions, payments (PayPal) and communication (Skype).

History and evolution of e-commerce



First and foremost, e-commerce also called as electronic-commerce which is the process of buying, selling, transferring, or exchanging products, services and/or information via computer network

Actually, e-commerce arises because of the development of the Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) which gave an opportunity for users to exchange business information and do transactions electronically. Furthermore, As the World-Wide-Web(WWW) was also existed has made the e-commerce growth up among the global.

In the 1960s, the businessmen commenced realizing that many documents they exchange related to the shipping of goods – for instance bills of lading purchase order and all the daily transactions. The traditional boundaries will soon replaced with a whole new technology as well as a mechanism and media for purchasing goods and services

During the year 1994, Netscape arrived which is providing users a simple browser to surf the Internet and a safe online transaction technology called Secure Sockets Layers. The different types of e-commerce that we are used until today, for example, Amazon.com and eBay.com has started in 1995. E-commerce also quite useful and popular in different industries, for instance, banks have been using electronic funds transfer (EFT, also called wire transfer), which are electronic transmissions of account exchange information over private communication network

In 1999, during the first generation of E-commerce boom, B2C (Business to Consumer) models have been tried and tested but the newer trends are toward B2B (Business to Business) and Click-and-Mortar models. According to all available data, ecommerce sales continued to grow in the next few years and, by the third quarter of 2008, ecommerce sales accounted for 3.4 percent of total sales. According to the this website:

http://www.census.gov/mrts/www/data/html/08Q3.html

An example of an E-Commerce success and its causes


A successful implementation of e-commerce company we have chosen is CrazedPaintball from United States. The company business is to sell paintball sports utilities to the sport enthusiasts either amateurs or professionals. The shop was operated in 2004 by Ryan Caberra who was a 22 year old entrepreneur. Ryan had always wanted a website that is easy to navigate and understand. To make the purchasing easy and time saving, Ryan added a shopping cart which is also user-friendly to customers who intend to purchase the goods online. CrazedPaintball’s shopping cart is advanced from other business’s because it has many tools that others do not have.

Other than that, to make the business more exposed to public through online Ryan added link advertising in his website. This method has generated more traffic through important sites like search engines. CrazedPaintball also know their target audiences right by targeting those who love shooting games such as Counter Strikes and Medal of Honour. Ryan post the advertise on some hot shooting game forum to attract customers to have a view on CrazedPaintball website.

Other tools Crazed Paintball involved in are Monster business forum and Monster marketplaces. The forum is a tool their company can use to learn about many typical mistakes that are overlooked much of the time, but are easily fixed with simple instructions from technical specialists. With the use of marketplace, the company has reached new height in profit with more business reputation gained through online. There are also discussion of the paintball game on the forum and a form of customer services are provided to solve customers’ questions.

Ryan is now the owner of the successful e-commerce business with the implementation of those methods, not only from financial prospective but also from the feedback gained from customers.

Saturday, January 24, 2009

Discuss how E-commerce can reduce cycle time, improve employee’s empowerment and facilitate customer support?

  • REDUCE CYCLE TIME

World changing rapidly and everyone strive to minimum the total time spend for every transaction. Supply chain management show a list of importance and significance of reducing cycle time needed in business field. Cycle time in others form means the amount of time taken to complete a business transaction. For example a process of purchase order, delivery goods, reach customer. E-commerce able to reduce cycle time by eliminates the few steps in traditional business process and it takes shorter time to complete a business transaction. E-commerce also able to reduce cycle time by eliminates the time taken to process in between supplier, intermediaries and customer. It shorten order cycle time to increase competitive advantage, decrease carrying costs, decrease shrinkage costs and improve cash flow. It decreases the amount of time necessary for a customer to receive an order after it placed. For example Dell Company is using Just In Time (JIT) strategy.


  • IMPROVE EMPLOYEES’ EMPOWERMENT

E-commerce able to improve employee’s empowerment by electronic-data-interchange (EDI) which enables the employees to have freedom and authority to access in transaction system, transparency barrier between employee and customer is clear cut. Employee in charge can have more understanding on the business and the transaction and provide relevant feedback to customer. Employee can do their job independently without supervision. Employees who work in these circumstances are more productivity rather than those who work under tight supervise. And freedom at workplace can increase their motivation to perform better.


  • FACILITATE CUSTOMER SUPPORT

Customer demands are increase from day to day. They require more efficiency ways of dealing with their daily demand. Ordinary customer required more than what the web page provide, they required immediate response for their request. So, quality of services is much more emphasize nowadays compare with the physical product. Share database in between the employee is crucial for further follow up process where they can obtain customer profile and information in order to solve their problem.


Firms are encouraged to provide Graphic-user-interface (GUI) enables the user to view and to order the product. Firm can provide some information and brief summary of their product through picture or video to clarify to customers about the product. Firms need a better prospect to recognize the customer changing trends and demands. Hence, a well define feedback of the services and products are essential for company long term improvement.

Friday, January 23, 2009

An example of an E-Commerce failure and its causes






There are many failure examples of e-commerce. One of the example is eToys. eToys was overextending with development of market share before they considered profits. eToys’ business model did not utilize the specific advantages the Internet offered and ultimately ran up a debt that was huge in amount. Furthermore, eToys believed the popular philosophy of the time that Internet companies were not susceptible to traditional business metrics of profit and loss that they could devote every resource towards “getting big fast”.

eToys had taken a series of risks and made some unsuited decisions in terms of capital resources and the amount of debt that would be able to make good on in the future. The company rushed to expand and shout about themselves at every opportunity. Huge and expensive advertising campaigns and expansion were the core activities of company to be the first visible company in the market. For example, eToys decided to enter the new market of baby-oriented products in 1999 and acquired BabyCenter, Inc., a web-based community offering baby products and information content for parents. It required the integration of distribution and customer service operations and required funds that eToys had to take out of its borrowings. It does not make logical sense that eToys was still trying to improve its website and distribution system and still trying to promote its brand name and build market awareness although eToys was still operating at a loss at this time.

In February 1999, eToys immensely increased the inventory, logistics, costly brand promotion, and establishment of international facilities with the purpose of expanding business into European market with the inception of etoys.co.uk and purchase of a subsidiary in the Netherlands, as well as added service to Canada.


Another mistake that eToys made which lead to its failure is that they failed to realize the highly seasonal and fluctuating nature of demand in their industry and how this would affect their rate of growth. In overestimating their demand, they failed to account for the fact that to get lots of people buying online, it would take time because it required a systems innovation in the way people thought about their lifestyles and modes of business. The fact is that “more people today are buying online, but most aren’t,” and eToys’ success was predicated on the fact that eventually holiday shoppers would go online instead of going to the stores but it never happened quick enough to keep up with their costs.


Thursday, January 22, 2009

introduction- Bong Ying Jie



Hi my name is Bong Ying Jie and everyone can call me Ah Jie. Jack is my English name but not many people know this yet. I am now 21 years old and currently having last year study Accounting at Sg. Long UTAR campus. Kuching, Sarawak is where I come from. I enjoy watching movie and listening hits songs. I also love eating and I get bad mood when seriously hungry.

My favourite pet will be cats and I cannot keep my eyes off them everytime I see any stray cats around me. I enjoy playing with them too but of course I will wash my hands after that. I consider myself a person who is quite hygienic since I got a habit that’s washing hand whenever I feel greasy. I am also a quiet person who seldom talks and always remain silence except there is need for me to talk. However, I enjoy the time hanging out with friends especially playing Dota with my classmates.^^ Even though my skills at playing DOTA sucks but our team will always be the winner because of my “pro” teammates. Thanks to them a lot in spending time in Dota with me. That makes my life in UTAR meaningful a bit. LoLs.

Lastly, the five websites I visited the most recently are as below:

a) http://www.hotmail.com/ to check my mails

b) http://www.haoting.com/ to get me updated with the latest songs in markets

c) http://www.utar.edu.my/ to search to articles for assignment purposes

d) http://www.google.com/ whenever I need to find out something I do not know I will google

e) http://www.friendster.com/ to make friends from different places and keep in touch with friends who seldom meet.

ehong is available in e-commerce now!

I am LEE YIK HONG, nick name is e-hong. My birth place is full of flowers and siew pau. ya, you are right, it is seremban. I am a short guy but strong enough. Hehe! Dating beautiful girls are my routine life, and rejecting cute guys is also a routine job for me. I like to do something whatever that I have not tried before. For example, emm… cannot tell you la, you guess yourself. Furthermore, my favourite is to tell grandma story to those new meet friends. They usually stay away from me because they like to listen grandpa’s story more than grandma. I am 23 years old this year, my grandma is 70 something. I love my grandparents very much because they love me very much also. I was the best athlete in Negeri Sembilan in year 1998, a long time ago la. Now I am busy with my study. Due to stress reason, my weight is increasing every month, each month 2kg. I think I will become 137kg(before enter UTAR is 65kg)when I graduate. My favourite 5 websites that I visit the most are http://www.google.com/, http://www.utar.edu.my/, http://www.friendster.com/. http://www.4d2u.com/, http://www.dotastrategy.com/. The reason I visit http://www.google.com/ most is because I need to search a lot of things during my life especially in UTAR life. The next is http://www.utar.edu.my/ because I need to check my results, timetable and any announcements. The website which I can meet a lot of friends and know their current life is http://www.friendster.com/. The fourth one is actually not my favourite website but my mother. She always asks me visit http://www.4d2u.com/ to see her results, LOTTERY results!!! Last but not least, http://www.dotastrategy.com/ is a fun place where provides many games here. I will visit this website whenever I feel bored and have nothing to do. I used to utilize internet for the purpose of chatting with friends, seeing the news from all over the world, playing games online, downloading music and video and searching some funny stuff from web.

The Vermillion Bird of the South (Wong Wai Jun)

Hello, everybody! Thank you for giving me this opportunity to introduce myself. My name is Wong Wai Jun or called me as Thomas who is a year 3 semesters 1 student from accounting course in Utar. I shall be working with Yik Hong, Wei Lun as well as Ying Jie to complete this e-commerce assignment for around these few weeks. We are just like the 4 symbols of Chinese constellations, Yik hong is The Azure Dragon of the East, Wei Lun is The White Tiger of the West, Ying Jie is The White Tiger of the West as well as me is The Vermillion Bird of the South who are performed our own task perfectly

That is a quite challenge semester for me as I want to try my best to do every assignments, tasks and duties perfectly as possible in order to achieve my target, dreams and everything. So that, everybody, do not give up easily in any difficulty situations.

My internet activities are find the information for doing the assignments, read the news, listen music, discuss the assignments through the MSN messenger as well as to check the economic condition currently

It is time to let me share my top 5 most visited website with you guys

http://www.investorguide.com/

To understand and clear about the economic condition, especially the financial crisis which is happened currently.

http://www.youtube.com/

To know more about innovative and creative ideas to complete a task, such as the ways of egg-drop project, how to create an attractive advertisements.

http://www.google.com/

To search the information for my assignments, final year projects

http://www.merdekareview.com/

To know the latest news about the social, politics’ problem

http://www.thestar.com.my/

To know the news and improve my English language, especially: mind our language